/external/chromium_org/chrome/browser/extensions/activity_log/ |
activity_log_policy_unittest.cc | 62 ActivityLogPolicy::Util::ApiSet whitelist; local 63 whitelist.insert( 66 // API is in whitelist; not stripped. 73 ActivityLogPolicy::Util::StripArguments(whitelist, action); 76 // Not in whitelist: stripped. 80 ActivityLogPolicy::Util::StripArguments(whitelist, action);
|
/external/chromium_org/chrome/renderer/extensions/ |
renderer_permissions_policy_delegate.cc | 34 const ExtensionsClient::ScriptingWhitelist& whitelist = local 36 if (std::find(whitelist.begin(), whitelist.end(), extension->id()) != 37 whitelist.end()) {
|
/external/smack/src/org/jivesoftware/smackx/pubsub/ |
AccessModel.java | 36 /** Only those on a whitelist may subscribe and retrieve items */
37 whitelist;
enum constant in enum:AccessModel
|
ChildrenAssociationPolicy.java | 30 /** Only those on a whitelist may associate leaf nodes with the collection. */
31 whitelist;
enum constant in enum:ChildrenAssociationPolicy
|
/external/chromium_org/chrome/browser/extensions/ |
all_urls_apitest.cc | 42 // Then add the two extensions to the whitelist. 43 extensions::ExtensionsClient::ScriptingWhitelist whitelist; local 44 whitelist.push_back(extensions::id_util::GenerateIdForPath(extension_dir1)); 45 whitelist.push_back(extensions::id_util::GenerateIdForPath(extension_dir2)); 46 extensions::ExtensionsClient::Get()->SetScriptingWhitelist(whitelist);
|
standard_management_policy_provider.cc | 42 const base::ListValue* whitelist = local 51 blacklist, whitelist, forcelist, allowed_types, extension, error);
|
/external/chromium_org/chrome/common/ |
pepper_permission_util_unittest.cc | 60 std::set<std::string> whitelist; local 70 IsExtensionOrSharedModuleWhitelisted(GURL(url), &extensions, whitelist)); 71 whitelist.insert(whitelisted_id); 73 IsExtensionOrSharedModuleWhitelisted(GURL(url), &extensions, whitelist)); 75 GURL(bad_scheme_url), &extensions, whitelist)); 77 GURL(bad_host_url), &extensions, whitelist)); 94 // Add the extension to the whitelist. This 96 .Set("whitelist", ListBuilder().Append(whitelisted_id))) 106 std::set<std::string> whitelist; local 107 // Important: whitelist *only* the shared module [all...] |
/external/chromium_org/extensions/browser/ |
admin_policy_unittest.cc | 96 // Tests UserMayLoad for an extension on the whitelist. 100 base::ListValue whitelist; local 101 whitelist.Append(new base::StringValue(extension_->id())); 102 EXPECT_TRUE(ap::UserMayLoad(NULL, &whitelist, NULL, NULL, extension_.get(), 107 EXPECT_TRUE(ap::UserMayLoad(NULL, &whitelist, NULL, NULL, extension_.get(), 110 EXPECT_TRUE(ap::UserMayLoad(NULL, &whitelist, NULL, NULL, extension_.get(), 138 // With a whitelist. There's no such thing as a whitelist wildcard. 139 base::ListValue whitelist; local 140 whitelist.Append [all...] |
/external/chromium_org/third_party/WebKit/Source/core/page/ |
InjectedStyleSheets.h | 40 InjectedStyleSheetEntry(const String& source, const Vector<String>& whitelist, StyleInjectionTarget injectedFrames) 42 , m_whitelist(whitelist) 48 const Vector<String>& whitelist() const { return m_whitelist; } function in class:WebCore::InjectedStyleSheetEntry 63 void add(const String& source, const Vector<String>& whitelist, StyleInjectionTarget);
|
/external/chromium_org/chrome/browser/chromeos/settings/ |
cros_settings_unittest.cc | 124 // Setting the whitelist should also switch the value of 126 base::ListValue whitelist; local 127 whitelist.Append(new base::StringValue("me@owner")); 130 AddExpectation(kAccountsPrefUsers, whitelist.DeepCopy()); 131 SetPref(kAccountsPrefUsers, &whitelist); 137 base::ListValue* whitelist = new base::ListValue(); local 139 whitelist->Append(hacky_user.DeepCopy()); 142 AddExpectation(kAccountsPrefUsers, whitelist); 143 // Add some user to the whitelist. 150 base::ListValue whitelist; local 173 base::ListValue whitelist; local 184 base::ListValue whitelist; local 198 base::ListValue whitelist; local [all...] |
/external/chromium_org/chrome/common/extensions/manifest_handlers/ |
mime_types_handler.cc | 46 std::vector<std::string> whitelist; local 48 whitelist.push_back(kMIMETypeHandlersWhitelist[i]); 49 return whitelist;
|
/external/chromium_org/third_party/libjingle/source/talk/base/ |
natserver.h | 101 AddressSet* whitelist; member in struct:talk_base::NATServer::TransEntry
|
/external/chromium_org/third_party/webrtc/base/ |
natserver.h | 84 AddressSet* whitelist; member in struct:rtc::NATServer::TransEntry
|
/external/chromium_org/chrome/browser/chromeos/policy/ |
device_policy_decoder_chromeos.cc | 151 base::ListValue* whitelist = new base::ListValue(); local 156 whitelist->Append(new base::StringValue(*entry)); 161 whitelist,
|
/external/chromium_org/chrome/browser/extensions/api/enterprise_platform_keys_private/ |
enterprise_platform_keys_private_api_unittest.cc | 191 base::ListValue whitelist; variable 192 whitelist.AppendString(extension_->id()); 193 prefs_->Set(prefs::kAttestationExtensionWhitelist, whitelist);
|
/external/chromium_org/chrome/browser/extensions/api/messaging/ |
native_message_process_host.cc | 82 // The native messaging host is blacklisted. Check the whitelist. 85 const base::ListValue* whitelist = local 87 if (whitelist && whitelist->Find(name_value) != whitelist->end())
|
/external/chromium_org/chrome/test/chromedriver/server/ |
chromedriver_server.cc | 233 "whitelisted-ips", "comma-separated whitelist of remote IPv4 addresses " 285 std::string whitelist = cmd_line->GetSwitchValueASCII("whitelisted-ips"); local 286 base::SplitString(whitelist, ',', &whitelisted_ips); 294 printf("Remote connections are allowed by a whitelist (%s).\n", 297 printf("All remote connections are allowed. Use a whitelist instead!\n");
|
/external/chromium_org/content/browser/appcache/ |
appcache_unittest.cc | 151 const NamespaceVector& whitelist = cache->online_whitelist_namespaces_; local 153 EXPECT_EQ(expected, whitelist.size()); 154 EXPECT_EQ(GURL("http://w1.com"), whitelist[0].namespace_url); 155 EXPECT_EQ(GURL("http://w2.com"), whitelist[1].namespace_url); 569 const GURL kWhitelistUrl("http://foo.com/whitelist*"); 577 "/whitelist* isPattern\r"
|
/external/chromium_org/extensions/common/features/ |
simple_feature.h | 57 std::set<std::string>* whitelist() { return &whitelist_; } function in class:extensions::SimpleFeature
|
simple_feature_unittest.cc | 88 TEST_F(ExtensionSimpleFeatureTest, Whitelist) { 93 feature.whitelist()->insert(kIdFoo); 94 feature.whitelist()->insert(kIdBar); 143 feature.whitelist()->insert(kIdFooHashed); 311 feature.whitelist()->insert("monkey"); 315 feature.whitelist()->clear(); 497 EXPECT_TRUE(feature->whitelist()->empty()); 508 base::ListValue* whitelist = new base::ListValue(); local 509 whitelist->Append(new base::StringValue("foo")); 510 whitelist->Append(new base::StringValue("bar")) 648 base::ListValue* whitelist = new base::ListValue(); local [all...] |
/external/chromium_org/extensions/common/manifest_handlers/ |
shared_module_info.cc | 149 const base::ListValue* whitelist = NULL; local 150 if (!export_value->GetList(keys::kWhitelist, &whitelist)) { 154 for (size_t i = 0; i < whitelist->GetSize(); ++i) { 156 if (!whitelist->GetString(i, &extension_id) ||
|
/external/chromium_org/extensions/common/permissions/ |
permissions_data.cc | 61 const ExtensionsClient::ScriptingWhitelist& whitelist = local 64 return std::find(whitelist.begin(), whitelist.end(), extension->id()) != 65 whitelist.end();
|
/external/chromium_org/chrome/browser/policy/ |
url_blacklist_manager_unittest.cc | 196 base::ListValue* whitelist = new base::ListValue; local 197 whitelist->Append(new base::StringValue("mail.google.com")); 199 pref_service_.SetManagedPref(policy_prefs::kUrlBlacklist, whitelist);
|
/external/chromium_org/chrome/browser/renderer_host/ |
chrome_resource_dispatcher_host_delegate.cc | 558 std::vector<std::string> whitelist = MimeTypesHandler::GetMIMETypeWhitelist(); local 561 for (size_t i = 0; i < whitelist.size(); ++i) { 562 const char* extension_id = whitelist[i].c_str();
|
/external/chromium_org/chrome/browser/supervised_user/ |
supervised_user_site_list.cc | 27 const char kWhitelistKey[] = "whitelist"; 68 // Takes a DictionaryValue entry from the JSON file and fills the whitelist 76 const base::ListValue* whitelist = NULL; local 77 if (site_dict->GetList(kWhitelistKey, &whitelist)) { 79 for (base::ListValue::const_iterator whitelist_it = whitelist->begin(); 80 whitelist_it != whitelist->end(); ++whitelist_it) { 83 LOG(ERROR) << "Invalid whitelist entry"; 99 LOG(ERROR) << "Invalid whitelist entry"; 110 // Fall back to using a whitelist based on the URL. 113 LOG(ERROR) << "Whitelist is invalid" [all...] |