/external/chromium_org/chrome/common/extensions/features/ |
complex_feature_unittest.cc | 39 // Rule: "extension", whitelist "foo". 43 .Set("whitelist", ListBuilder().Append(kIdFoo)) 49 // Rule: "legacy_packaged_app", whitelist "bar". 52 .Set("whitelist", ListBuilder().Append(kIdBar)) 76 // Test whitelist with wrong extension type.
|
simple_feature_unittest.cc | 78 TEST_F(ExtensionSimpleFeatureTest, Whitelist) { 83 feature.whitelist()->insert(kIdFoo); 84 feature.whitelist()->insert(kIdBar); 118 feature.whitelist()->insert(kIdFooHashed); 195 feature.whitelist()->insert("monkey"); 199 feature.whitelist()->clear(); 377 EXPECT_TRUE(feature->whitelist()->empty()); 388 base::ListValue* whitelist = new base::ListValue(); local 389 whitelist->Append(new base::StringValue("foo")); 390 whitelist->Append(new base::StringValue("bar")) 521 base::ListValue* whitelist = new base::ListValue(); local [all...] |
/external/chromium_org/chrome_frame/ |
chrome_launcher_unittest.cc | 13 bad.AppendSwitch(switches::kNoFirstRun); // in whitelist 15 bad.AppendSwitch(switches::kHomePage); // exists but not in whitelist 21 good.AppendSwitch(switches::kNoFirstRun); // in whitelist 22 good.AppendSwitch(switches::kDisableBackgroundMode); // in whitelist 23 good.AppendSwitchASCII(switches::kUserDataDir, "foo"); // in whitelist
|
/external/chromium_org/extensions/browser/ |
admin_policy.cc | 54 const base::ListValue* whitelist, 98 // Check the whitelist/forcelist first. 100 if ((whitelist && whitelist->Find(id_value) != whitelist->end()) ||
|
/external/chromium_org/chrome/browser/managed_mode/ |
managed_mode_site_list.cc | 27 const char kWhitelistKey[] = "whitelist"; 68 // Takes a DictionaryValue entry from the JSON file and fills the whitelist 76 const base::ListValue* whitelist = NULL; local 77 if (site_dict->GetList(kWhitelistKey, &whitelist)) { 79 for (base::ListValue::const_iterator whitelist_it = whitelist->begin(); 80 whitelist_it != whitelist->end(); ++whitelist_it) { 83 LOG(ERROR) << "Invalid whitelist entry"; 99 LOG(ERROR) << "Invalid whitelist entry"; 110 // Fall back to using a whitelist based on the URL. 113 LOG(ERROR) << "Whitelist is invalid" [all...] |
managed_mode_site_list.h | 26 // Every site has -- among other attributes -- a whitelist of URLs that are 29 // can tell for a given URL if it is part of the whitelist for any site. 30 // Effectively, ManagedModeURLFilter then acts as a big whitelist which is the
|
/external/chromium_org/chrome/common/extensions/ |
mime_types_handler.cc | 52 std::vector<std::string> whitelist; local 54 whitelist.push_back(kMIMETypeHandlersWhitelist[i]); 55 return whitelist;
|
chrome_extensions_client.h | 35 virtual void SetScriptingWhitelist(const ScriptingWhitelist& whitelist) 50 // A whitelist of extensions that can script anywhere. Do not add to this
|
chrome_extensions_client.cc | 43 // Set up the scripting whitelist. 44 // Whitelist ChromeVox, an accessibility extension from Google that needs 51 // Whitelist "Discover DevTools Companion" extension from Google that 96 const ExtensionsClient::ScriptingWhitelist& whitelist) { 97 scripting_whitelist_ = whitelist;
|
/external/jsilver/src/com/google/clearsilver/jsilver/functions/escape/ |
StyleEscapeFunction.java | 25 * characters that are not part of a whitelist of safe characters. This replicates the autoescaping 29 * characters to escape. The StyleAttrEscapeFunction instead applies a whitelist, and strips out any 30 * characters not in the whitelist.
|
/external/chromium/chrome/browser/chromeos/ |
user_cros_settings_provider.cc | 136 std::vector<std::string> whitelist; local 137 if (!SignedSettings::EnumerateWhitelist(&whitelist)) { 138 LOG(WARNING) << "Failed to retrieve user whitelist."; 148 for (size_t i = 0; i < whitelist.size(); ++i) { 149 const std::string& email = whitelist[i]; 235 VLOG(1) << "Setting user whitelist is not implemented. Please use " 236 "whitelist/unwhitelist instead."; 388 VLOG(1) << "Add " << email << " to whitelist, code=" << code; 390 // Reload the whitelist on settings op failure. 398 VLOG(1) << "Remove " << email << " from whitelist, code=" << code 536 const ListValue* whitelist = cached_whitelist(); local [all...] |
/external/chromium/chrome/browser/ui/webui/options/chromeos/ |
accounts_options_handler.h | 33 // Javascript callbacks to whitelist/unwhitelist user.
|
/external/chromium/net/http/ |
http_auth_filter_win.h | 29 // Override the whitelist key. Passing in NULL restores the default value.
|
http_auth_filter.h | 30 // Whitelist HTTP authentication filter. 52 // Installs the whitelist.
|
/external/chromium_org/apps/shell/ |
shell_extensions_client.cc | 93 // TODO(jamescook): Do we need to whitelist any extensions? 124 const ScriptingWhitelist& whitelist) { 125 scripting_whitelist_ = whitelist; 130 // TODO(jamescook): Real whitelist.
|
/external/chromium_org/chrome/browser/ui/webui/options/chromeos/ |
accounts_options_handler.h | 28 // Javascript callbacks to whitelist/unwhitelist user.
|
/external/chromium_org/chrome/common/ |
pepper_permission_util.h | 20 const std::set<std::string>& whitelist);
|
/external/chromium_org/net/http/ |
http_auth_filter_win.h | 28 // Override the whitelist key. Passing in NULL restores the default value.
|
http_auth_filter.h | 30 // Whitelist HTTP authentication filter. 52 // Installs the whitelist.
|
/external/chromium_org/chrome/browser/extensions/ |
standard_management_policy_provider.cc | 41 const base::ListValue* whitelist = local 50 blacklist, whitelist, forcelist, allowed_types, extension, error);
|
all_urls_apitest.cc | 42 // Then add the two extensions to the whitelist. 43 extensions::ExtensionsClient::ScriptingWhitelist whitelist; local 44 whitelist.push_back(extensions::id_util::GenerateIdForPath(extension_dir1)); 45 whitelist.push_back(extensions::id_util::GenerateIdForPath(extension_dir2)); 46 extensions::ExtensionsClient::Get()->SetScriptingWhitelist(whitelist);
|
/external/chromium_org/chrome/browser/ui/webui/chromeos/ |
salsa_ui.h | 39 // Check and see if a key is on the whitelist. Returns the index into 40 // the whitelist on success and -1 on failure.
|
/external/chromium_org/chrome/common/extensions/docs/server2/ |
features_utility_test.py | 20 'whitelist': 'hashhashashhashashhashashhash' 24 { 'whitelist': 'hashhashashhashashhashashhash' }
|
/external/chromium/chrome/browser/chromeos/login/ |
signed_settings_unittest.cc | 130 em::PolicyData BuildPolicyData(std::vector<std::string> whitelist) { 137 if (!whitelist.empty()) { 139 for (std::vector<std::string>::const_iterator it = whitelist.begin(); 140 it != whitelist.end(); 167 const RepeatedPtrField<std::string>& whitelist = local 169 for (RepeatedPtrField<std::string>::const_iterator it = whitelist.begin(); 170 it != whitelist.end(); 328 std::vector<std::string> whitelist(1, fake_email_); 329 whitelist.push_back(fake_email_ + "m"); 330 em::PolicyData fake_pol = BuildPolicyData(whitelist); [all...] |
/external/chromium_org/third_party/WebKit/Source/platform/ |
URLPatternMatcher.cpp | 34 bool URLPatternMatcher::matchesPatterns(const KURL& url, const Vector<String>& whitelist) 36 // If there is no whitelist at all, then all URLs are assumed to be in the whitelist. 37 if (whitelist.isEmpty()) 40 for (size_t i = 0; i < whitelist.size(); ++i) { 41 URLPatternMatcher contentPattern(whitelist[i]);
|