HomeSort by relevance Sort by last modified time
    Searched full:whitelist (Results 26 - 50 of 363) sorted by null

12 3 4 5 6 7 8 91011>>

  /external/chromium_org/chrome/common/extensions/features/
complex_feature_unittest.cc 39 // Rule: "extension", whitelist "foo".
43 .Set("whitelist", ListBuilder().Append(kIdFoo))
49 // Rule: "legacy_packaged_app", whitelist "bar".
52 .Set("whitelist", ListBuilder().Append(kIdBar))
76 // Test whitelist with wrong extension type.
simple_feature_unittest.cc 78 TEST_F(ExtensionSimpleFeatureTest, Whitelist) {
83 feature.whitelist()->insert(kIdFoo);
84 feature.whitelist()->insert(kIdBar);
118 feature.whitelist()->insert(kIdFooHashed);
195 feature.whitelist()->insert("monkey");
199 feature.whitelist()->clear();
377 EXPECT_TRUE(feature->whitelist()->empty());
388 base::ListValue* whitelist = new base::ListValue(); local
389 whitelist->Append(new base::StringValue("foo"));
390 whitelist->Append(new base::StringValue("bar"))
521 base::ListValue* whitelist = new base::ListValue(); local
    [all...]
  /external/chromium_org/chrome_frame/
chrome_launcher_unittest.cc 13 bad.AppendSwitch(switches::kNoFirstRun); // in whitelist
15 bad.AppendSwitch(switches::kHomePage); // exists but not in whitelist
21 good.AppendSwitch(switches::kNoFirstRun); // in whitelist
22 good.AppendSwitch(switches::kDisableBackgroundMode); // in whitelist
23 good.AppendSwitchASCII(switches::kUserDataDir, "foo"); // in whitelist
  /external/chromium_org/extensions/browser/
admin_policy.cc 54 const base::ListValue* whitelist,
98 // Check the whitelist/forcelist first.
100 if ((whitelist && whitelist->Find(id_value) != whitelist->end()) ||
  /external/chromium_org/chrome/browser/managed_mode/
managed_mode_site_list.cc 27 const char kWhitelistKey[] = "whitelist";
68 // Takes a DictionaryValue entry from the JSON file and fills the whitelist
76 const base::ListValue* whitelist = NULL; local
77 if (site_dict->GetList(kWhitelistKey, &whitelist)) {
79 for (base::ListValue::const_iterator whitelist_it = whitelist->begin();
80 whitelist_it != whitelist->end(); ++whitelist_it) {
83 LOG(ERROR) << "Invalid whitelist entry";
99 LOG(ERROR) << "Invalid whitelist entry";
110 // Fall back to using a whitelist based on the URL.
113 LOG(ERROR) << "Whitelist is invalid"
    [all...]
managed_mode_site_list.h 26 // Every site has -- among other attributes -- a whitelist of URLs that are
29 // can tell for a given URL if it is part of the whitelist for any site.
30 // Effectively, ManagedModeURLFilter then acts as a big whitelist which is the
  /external/chromium_org/chrome/common/extensions/
mime_types_handler.cc 52 std::vector<std::string> whitelist; local
54 whitelist.push_back(kMIMETypeHandlersWhitelist[i]);
55 return whitelist;
chrome_extensions_client.h 35 virtual void SetScriptingWhitelist(const ScriptingWhitelist& whitelist)
50 // A whitelist of extensions that can script anywhere. Do not add to this
chrome_extensions_client.cc 43 // Set up the scripting whitelist.
44 // Whitelist ChromeVox, an accessibility extension from Google that needs
51 // Whitelist "Discover DevTools Companion" extension from Google that
96 const ExtensionsClient::ScriptingWhitelist& whitelist) {
97 scripting_whitelist_ = whitelist;
  /external/jsilver/src/com/google/clearsilver/jsilver/functions/escape/
StyleEscapeFunction.java 25 * characters that are not part of a whitelist of safe characters. This replicates the autoescaping
29 * characters to escape. The StyleAttrEscapeFunction instead applies a whitelist, and strips out any
30 * characters not in the whitelist.
  /external/chromium/chrome/browser/chromeos/
user_cros_settings_provider.cc 136 std::vector<std::string> whitelist; local
137 if (!SignedSettings::EnumerateWhitelist(&whitelist)) {
138 LOG(WARNING) << "Failed to retrieve user whitelist.";
148 for (size_t i = 0; i < whitelist.size(); ++i) {
149 const std::string& email = whitelist[i];
235 VLOG(1) << "Setting user whitelist is not implemented. Please use "
236 "whitelist/unwhitelist instead.";
388 VLOG(1) << "Add " << email << " to whitelist, code=" << code;
390 // Reload the whitelist on settings op failure.
398 VLOG(1) << "Remove " << email << " from whitelist, code=" << code
536 const ListValue* whitelist = cached_whitelist(); local
    [all...]
  /external/chromium/chrome/browser/ui/webui/options/chromeos/
accounts_options_handler.h 33 // Javascript callbacks to whitelist/unwhitelist user.
  /external/chromium/net/http/
http_auth_filter_win.h 29 // Override the whitelist key. Passing in NULL restores the default value.
http_auth_filter.h 30 // Whitelist HTTP authentication filter.
52 // Installs the whitelist.
  /external/chromium_org/apps/shell/
shell_extensions_client.cc 93 // TODO(jamescook): Do we need to whitelist any extensions?
124 const ScriptingWhitelist& whitelist) {
125 scripting_whitelist_ = whitelist;
130 // TODO(jamescook): Real whitelist.
  /external/chromium_org/chrome/browser/ui/webui/options/chromeos/
accounts_options_handler.h 28 // Javascript callbacks to whitelist/unwhitelist user.
  /external/chromium_org/chrome/common/
pepper_permission_util.h 20 const std::set<std::string>& whitelist);
  /external/chromium_org/net/http/
http_auth_filter_win.h 28 // Override the whitelist key. Passing in NULL restores the default value.
http_auth_filter.h 30 // Whitelist HTTP authentication filter.
52 // Installs the whitelist.
  /external/chromium_org/chrome/browser/extensions/
standard_management_policy_provider.cc 41 const base::ListValue* whitelist = local
50 blacklist, whitelist, forcelist, allowed_types, extension, error);
all_urls_apitest.cc 42 // Then add the two extensions to the whitelist.
43 extensions::ExtensionsClient::ScriptingWhitelist whitelist; local
44 whitelist.push_back(extensions::id_util::GenerateIdForPath(extension_dir1));
45 whitelist.push_back(extensions::id_util::GenerateIdForPath(extension_dir2));
46 extensions::ExtensionsClient::Get()->SetScriptingWhitelist(whitelist);
  /external/chromium_org/chrome/browser/ui/webui/chromeos/
salsa_ui.h 39 // Check and see if a key is on the whitelist. Returns the index into
40 // the whitelist on success and -1 on failure.
  /external/chromium_org/chrome/common/extensions/docs/server2/
features_utility_test.py 20 'whitelist': 'hashhashashhashashhashashhash'
24 { 'whitelist': 'hashhashashhashashhashashhash' }
  /external/chromium/chrome/browser/chromeos/login/
signed_settings_unittest.cc 130 em::PolicyData BuildPolicyData(std::vector<std::string> whitelist) {
137 if (!whitelist.empty()) {
139 for (std::vector<std::string>::const_iterator it = whitelist.begin();
140 it != whitelist.end();
167 const RepeatedPtrField<std::string>& whitelist = local
169 for (RepeatedPtrField<std::string>::const_iterator it = whitelist.begin();
170 it != whitelist.end();
328 std::vector<std::string> whitelist(1, fake_email_);
329 whitelist.push_back(fake_email_ + "m");
330 em::PolicyData fake_pol = BuildPolicyData(whitelist);
    [all...]
  /external/chromium_org/third_party/WebKit/Source/platform/
URLPatternMatcher.cpp 34 bool URLPatternMatcher::matchesPatterns(const KURL& url, const Vector<String>& whitelist)
36 // If there is no whitelist at all, then all URLs are assumed to be in the whitelist.
37 if (whitelist.isEmpty())
40 for (size_t i = 0; i < whitelist.size(); ++i) {
41 URLPatternMatcher contentPattern(whitelist[i]);

Completed in 224 milliseconds

12 3 4 5 6 7 8 91011>>