/external/chromium_org/sandbox/win/src/ |
named_pipe_policy_test.cc | 31 // The second parameter allows us to enforce a whitelist for where the
|
/external/chromium_org/third_party/WebKit/Source/modules/navigatorcontentutils/ |
NavigatorContentUtils.cpp | 121 exceptionState.throwSecurityError("The scheme '" + scheme + "' doesn't belong to the protocol whitelist. Please prefix non-whitelisted schemes with the string 'web+'.");
|
/external/chromium_org/tools/grit/grit/gather/ |
chrome_scaled_image.py | 48 remains valid). Also delete ancillary chunks that are not on our whitelist.
|
/frameworks/webview/chromium/tools/ |
merge_common.py | 27 # Whitelist of projects that need to be merged to build WebView. We don't need
|
/packages/inputmethods/LatinIME/java/src/com/android/inputmethod/latin/personalization/ |
DynamicPersonalizationDictionaryWriter.java | 81 * @param shortcutFreq The frequency of the shortcut (0~15, with 15 = whitelist). Ignored
|
/packages/inputmethods/LatinIME/java/src/com/android/inputmethod/latin/utils/ |
UserHistoryDictIOUtils.java | 57 * @param shortcutFreq The frequency of the shortcut (0~15, with 15 = whitelist).
|
/external/chromium/chrome/browser/extensions/ |
extension_prefs.cc | 469 // Check the whitelist first. 470 const ListValue* whitelist = local 472 if (whitelist) { 473 for (ListValue::const_iterator it = whitelist->begin(); 474 it != whitelist->end(); ++it) { 476 LOG(WARNING) << "Failed to read whitelist string."; [all...] |
/external/chromium_org/chrome/browser/ui/webui/chromeos/login/ |
signin_screen_handler.cc | 1586 const base::ListValue* whitelist = NULL; local [all...] |
/external/chromium/chrome/browser/safe_browsing/ |
safe_browsing_service.h | 167 // client-side phishing detection whitelist. Returns true if there was a 433 // Indicate if client-side phishing detection whitelist should be enabled
|
safe_browsing_service.cc | 253 // enabled the csd whitelist yet. Just to be safe we return true in this 456 // Whitelist this domain and warning type for the given tab. 885 // We only download the csd-whitelist if client-side phishing detection is 891 // downloading the whitelist. [all...] |
/external/chromium_org/chrome/browser/background/ |
background_application_list_model.cc | 278 // If in the whitelist, then does not require background mode even if 280 // TODO(dimich): remove this whitelist once we have a better way to keep
|
/external/chromium_org/chrome/browser/media/ |
media_stream_devices_controller.cc | 344 // If the security origin policy matches a value in the whitelist, allow it. 349 // TODO(tommi): Remove the kiosk mode check when the whitelist below
|
/external/chromium_org/chrome/browser/safe_browsing/ |
safe_browsing_test.cc | 245 // client-side phishing whitelist. 254 // free whitelist.
|
/external/chromium_org/chrome/browser/translate/ |
translate_prefs.cc | 169 NOTREACHED() << "Unregistered translate whitelist pref"; 181 NOTREACHED() << "Unregistered translate whitelist pref";
|
/external/chromium_org/chrome/common/extensions/api/ |
_api_features.json | 120 "whitelist": [ 341 "whitelist": [
|
/external/chromium_org/chrome/common/extensions/docs/templates/articles/ |
tut_migration_to_manifest_v2.html | 113 <li>Whitelist the HTTPS domain that serves the resource 268 to whitelist these resources so that external Web pages can use them:
|
/external/chromium_org/chrome/renderer/ |
content_settings_observer.cc | 618 // Whitelist Instant processes. 622 // Whitelist ftp directory listings, as they require JavaScript to function
|
/external/chromium_org/sandbox/linux/services/ |
broker_process.cc | 448 // the whitelist. For paranoia a caller should then use |file_to_access|. See 489 // whitelist. For paranoia, a caller should then use |file_to_open| rather
|
/external/chromium_org/tools/grit/grit/tool/ |
build.py | 138 self.VerboseOut('Using whitelist: %s\n' % whitelist_filename); 194 # Mark the item to be skipped if it wasn't in the whitelist.
|
/packages/apps/Bluetooth/res/values/ |
strings.xml | 35 <string name="permlab_bluetoothWhitelist">Whitelist bluetooth device access.</string> 37 <string name="permdesc_bluetoothWhitelist">Allows the app to temporarily whitelist
|
/packages/apps/Bluetooth/res/values-tl/ |
strings.xml | 21 <string name="permlab_bluetoothWhitelist" msgid="7091552898592306386">"Mag-whitelist ng access ng isang bluetooth device."</string> 22 <string name="permdesc_bluetoothWhitelist" msgid="5494513855192170109">"Pinapayagan ang app na pansamantalang mag-whitelist ng isang Bluetooth device, na pinapayagan ang device na iyon na magpadala ng mga file sa device na ito nang walang kumpirmasyon ng user."</string>
|
/packages/apps/Bluetooth/src/com/android/bluetooth/opp/ |
BluetoothOppManager.java | 117 // The time for which the whitelist entries remain valid. 162 if (V) Log.v(TAG, "Cleaning out whitelist entry " + entry.first);
|
/packages/apps/UnifiedEmail/src/com/android/mail/lib/html/parser/ |
HTML4.java | 42 /** Default Whitelist */ 59 /** Gets the default Whitelist */
|
/packages/apps/UnifiedEmail/src/com/google/android/mail/common/html/parser/ |
HTML4.java | 43 /** Default Whitelist */ 60 /** Gets the default Whitelist */
|
/packages/inputmethods/LatinIME/java/src/com/android/inputmethod/latin/ |
Suggest.java | 277 // The word can be auto-corrected if it has a whitelist entry that is not itself, 300 // Also, shortcuts should never auto-correct unless they are whitelist entries.
|