HomeSort by relevance Sort by last modified time
    Searched defs:whitelist (Results 1 - 25 of 45) sorted by null

1 2

  /external/chromium_org/chrome/browser/extensions/activity_log/
activity_log_policy_unittest.cc 62 ActivityLogPolicy::Util::ApiSet whitelist; local
63 whitelist.insert(
66 // API is in whitelist; not stripped.
73 ActivityLogPolicy::Util::StripArguments(whitelist, action);
76 // Not in whitelist: stripped.
80 ActivityLogPolicy::Util::StripArguments(whitelist, action);
  /external/chromium_org/chrome/renderer/extensions/
renderer_permissions_policy_delegate.cc 34 const ExtensionsClient::ScriptingWhitelist& whitelist = local
36 if (std::find(whitelist.begin(), whitelist.end(), extension->id()) !=
37 whitelist.end()) {
  /external/smack/src/org/jivesoftware/smackx/pubsub/
AccessModel.java 36 /** Only those on a whitelist may subscribe and retrieve items */
37 whitelist; enum constant in enum:AccessModel
ChildrenAssociationPolicy.java 30 /** Only those on a whitelist may associate leaf nodes with the collection. */
31 whitelist; enum constant in enum:ChildrenAssociationPolicy
  /external/chromium_org/chrome/browser/extensions/
all_urls_apitest.cc 42 // Then add the two extensions to the whitelist.
43 extensions::ExtensionsClient::ScriptingWhitelist whitelist; local
44 whitelist.push_back(extensions::id_util::GenerateIdForPath(extension_dir1));
45 whitelist.push_back(extensions::id_util::GenerateIdForPath(extension_dir2));
46 extensions::ExtensionsClient::Get()->SetScriptingWhitelist(whitelist);
standard_management_policy_provider.cc 42 const base::ListValue* whitelist = local
51 blacklist, whitelist, forcelist, allowed_types, extension, error);
  /external/chromium_org/chrome/common/
pepper_permission_util_unittest.cc 60 std::set<std::string> whitelist; local
70 IsExtensionOrSharedModuleWhitelisted(GURL(url), &extensions, whitelist));
71 whitelist.insert(whitelisted_id);
73 IsExtensionOrSharedModuleWhitelisted(GURL(url), &extensions, whitelist));
75 GURL(bad_scheme_url), &extensions, whitelist));
77 GURL(bad_host_url), &extensions, whitelist));
94 // Add the extension to the whitelist. This
96 .Set("whitelist", ListBuilder().Append(whitelisted_id)))
106 std::set<std::string> whitelist; local
107 // Important: whitelist *only* the shared module
    [all...]
  /external/chromium_org/extensions/browser/
admin_policy_unittest.cc 96 // Tests UserMayLoad for an extension on the whitelist.
100 base::ListValue whitelist; local
101 whitelist.Append(new base::StringValue(extension_->id()));
102 EXPECT_TRUE(ap::UserMayLoad(NULL, &whitelist, NULL, NULL, extension_.get(),
107 EXPECT_TRUE(ap::UserMayLoad(NULL, &whitelist, NULL, NULL, extension_.get(),
110 EXPECT_TRUE(ap::UserMayLoad(NULL, &whitelist, NULL, NULL, extension_.get(),
138 // With a whitelist. There's no such thing as a whitelist wildcard.
139 base::ListValue whitelist; local
140 whitelist.Append
    [all...]
  /external/chromium_org/third_party/WebKit/Source/core/page/
InjectedStyleSheets.h 40 InjectedStyleSheetEntry(const String& source, const Vector<String>& whitelist, StyleInjectionTarget injectedFrames)
42 , m_whitelist(whitelist)
48 const Vector<String>& whitelist() const { return m_whitelist; } function in class:WebCore::InjectedStyleSheetEntry
63 void add(const String& source, const Vector<String>& whitelist, StyleInjectionTarget);
  /external/chromium_org/chrome/browser/chromeos/settings/
cros_settings_unittest.cc 124 // Setting the whitelist should also switch the value of
126 base::ListValue whitelist; local
127 whitelist.Append(new base::StringValue("me@owner"));
130 AddExpectation(kAccountsPrefUsers, whitelist.DeepCopy());
131 SetPref(kAccountsPrefUsers, &whitelist);
137 base::ListValue* whitelist = new base::ListValue(); local
139 whitelist->Append(hacky_user.DeepCopy());
142 AddExpectation(kAccountsPrefUsers, whitelist);
143 // Add some user to the whitelist.
150 base::ListValue whitelist; local
173 base::ListValue whitelist; local
184 base::ListValue whitelist; local
198 base::ListValue whitelist; local
    [all...]
  /external/chromium_org/chrome/common/extensions/manifest_handlers/
mime_types_handler.cc 46 std::vector<std::string> whitelist; local
48 whitelist.push_back(kMIMETypeHandlersWhitelist[i]);
49 return whitelist;
  /external/chromium_org/third_party/libjingle/source/talk/base/
natserver.h 101 AddressSet* whitelist; member in struct:talk_base::NATServer::TransEntry
  /external/chromium_org/third_party/webrtc/base/
natserver.h 84 AddressSet* whitelist; member in struct:rtc::NATServer::TransEntry
  /external/chromium_org/chrome/browser/chromeos/policy/
device_policy_decoder_chromeos.cc 151 base::ListValue* whitelist = new base::ListValue(); local
156 whitelist->Append(new base::StringValue(*entry));
161 whitelist,
  /external/chromium_org/chrome/browser/extensions/api/enterprise_platform_keys_private/
enterprise_platform_keys_private_api_unittest.cc 191 base::ListValue whitelist; variable
192 whitelist.AppendString(extension_->id());
193 prefs_->Set(prefs::kAttestationExtensionWhitelist, whitelist);
  /external/chromium_org/chrome/browser/extensions/api/messaging/
native_message_process_host.cc 82 // The native messaging host is blacklisted. Check the whitelist.
85 const base::ListValue* whitelist = local
87 if (whitelist && whitelist->Find(name_value) != whitelist->end())
  /external/chromium_org/chrome/test/chromedriver/server/
chromedriver_server.cc 233 "whitelisted-ips", "comma-separated whitelist of remote IPv4 addresses "
285 std::string whitelist = cmd_line->GetSwitchValueASCII("whitelisted-ips"); local
286 base::SplitString(whitelist, ',', &whitelisted_ips);
294 printf("Remote connections are allowed by a whitelist (%s).\n",
297 printf("All remote connections are allowed. Use a whitelist instead!\n");
  /external/chromium_org/content/browser/appcache/
appcache_unittest.cc 151 const NamespaceVector& whitelist = cache->online_whitelist_namespaces_; local
153 EXPECT_EQ(expected, whitelist.size());
154 EXPECT_EQ(GURL("http://w1.com"), whitelist[0].namespace_url);
155 EXPECT_EQ(GURL("http://w2.com"), whitelist[1].namespace_url);
569 const GURL kWhitelistUrl("http://foo.com/whitelist*");
577 "/whitelist* isPattern\r"
  /external/chromium_org/extensions/common/features/
simple_feature.h 57 std::set<std::string>* whitelist() { return &whitelist_; } function in class:extensions::SimpleFeature
simple_feature_unittest.cc 88 TEST_F(ExtensionSimpleFeatureTest, Whitelist) {
93 feature.whitelist()->insert(kIdFoo);
94 feature.whitelist()->insert(kIdBar);
143 feature.whitelist()->insert(kIdFooHashed);
311 feature.whitelist()->insert("monkey");
315 feature.whitelist()->clear();
497 EXPECT_TRUE(feature->whitelist()->empty());
508 base::ListValue* whitelist = new base::ListValue(); local
509 whitelist->Append(new base::StringValue("foo"));
510 whitelist->Append(new base::StringValue("bar"))
648 base::ListValue* whitelist = new base::ListValue(); local
    [all...]
  /external/chromium_org/extensions/common/manifest_handlers/
shared_module_info.cc 149 const base::ListValue* whitelist = NULL; local
150 if (!export_value->GetList(keys::kWhitelist, &whitelist)) {
154 for (size_t i = 0; i < whitelist->GetSize(); ++i) {
156 if (!whitelist->GetString(i, &extension_id) ||
  /external/chromium_org/extensions/common/permissions/
permissions_data.cc 61 const ExtensionsClient::ScriptingWhitelist& whitelist = local
64 return std::find(whitelist.begin(), whitelist.end(), extension->id()) !=
65 whitelist.end();
  /external/chromium_org/chrome/browser/policy/
url_blacklist_manager_unittest.cc 196 base::ListValue* whitelist = new base::ListValue; local
197 whitelist->Append(new base::StringValue("mail.google.com"));
199 pref_service_.SetManagedPref(policy_prefs::kUrlBlacklist, whitelist);
  /external/chromium_org/chrome/browser/renderer_host/
chrome_resource_dispatcher_host_delegate.cc 558 std::vector<std::string> whitelist = MimeTypesHandler::GetMIMETypeWhitelist(); local
561 for (size_t i = 0; i < whitelist.size(); ++i) {
562 const char* extension_id = whitelist[i].c_str();
  /external/chromium_org/chrome/browser/supervised_user/
supervised_user_site_list.cc 27 const char kWhitelistKey[] = "whitelist";
68 // Takes a DictionaryValue entry from the JSON file and fills the whitelist
76 const base::ListValue* whitelist = NULL; local
77 if (site_dict->GetList(kWhitelistKey, &whitelist)) {
79 for (base::ListValue::const_iterator whitelist_it = whitelist->begin();
80 whitelist_it != whitelist->end(); ++whitelist_it) {
83 LOG(ERROR) << "Invalid whitelist entry";
99 LOG(ERROR) << "Invalid whitelist entry";
110 // Fall back to using a whitelist based on the URL.
113 LOG(ERROR) << "Whitelist is invalid"
    [all...]

Completed in 712 milliseconds

1 2