/external/chromium_org/third_party/WebKit/Tools/Scripts/webkitpy/layout_tests/port/ |
win.py | 158 # We should add the variable to an explicit whitelist in base.Port.
|
/external/chromium_org/tools/ |
isolate_driver.py | 136 # TODO(maruel): Use a whitelist instead? .stamp, .so.TOC, .dylib.TOC,
|
/external/chromium_org/tools/symsrc/ |
source_index.py | 34 # This serves two purposes. First, it acts as a whitelist, and only files
|
/packages/inputmethods/LatinIME/java/src/com/android/inputmethod/latin/ |
Suggest.java | 166 // Also, shortcuts should never auto-correct unless they are whitelist entries.
|
UserBinaryDictionary.java | 50 // Shortcut frequency is 0~15, with 15 = whitelist. We don't want user dictionary entries
|
/external/chromium_org/chrome/browser/extensions/api/webstore_private/ |
webstore_private_api.cc | 490 // the future we may also want to add time-based expiration, where a whitelist 601 // the whitelist entry will bypass the normal permissions install dialog.
|
/external/chromium_org/chrome/browser/media/ |
media_stream_devices_controller.cc | 451 // If the security origin policy matches a value in the whitelist, allow it. 456 // TODO(tommi): Remove the kiosk mode check when the whitelist below
|
/external/chromium_org/chrome/renderer/ |
content_settings_observer.cc | 667 // Whitelist Instant processes. 671 // Whitelist ftp directory listings, as they require JavaScript to function
|
chrome_content_renderer_client.cc | [all...] |
/external/chromium_org/tools/grit/grit/node/ |
base.py | 27 # Default nodes to not whitelist skipped 580 whitelist.
|
/external/owasp/sanitizer/src/main/org/owasp/html/ |
HtmlPolicyBuilder.java | 431 public HtmlPolicyBuilder allowStyling(CssSchema whitelist) { 434 new StylingPolicy(whitelist), ImmutableList.of("style"));
|
/external/clang/lib/ARCMigrate/ |
ObjCMT.cpp | 109 ArrayRef<std::string> WhiteList) 117 I = WhiteList.begin(), E = WhiteList.end(); I != E; ++I) { [all...] |
/external/chromium_org/components/policy/resources/ |
policy_templates_fil.xtb | 72 <translation id="5183383917553127163">Pinapayagan kang tukuyin kung aling mga extension ang hindi sumasailalim sa blacklist. Nangangahulugan ang halaga ng blacklist ng* na naka-blacklist ang lahat ng mga extension at mai-install lamang ng mga user ang mga extension na nakalista sa whitelist. Bilang default, naka-whitelist ang lahat ng mga extension, ngunit kung na-blacklist ang lahat ng mga extension ng patakaran, magagamit ang whitelist upang i-override ang patakarang iyon.</translation> 247 Nangangahulugan ang isang halaga ng blacklist na '*' na ang lahat ng extension ay na-blacklist maliban kung tahasang nakalista sa whitelist ang mga ito. [all...] |
policy_templates_en-GB.xtb | 74 A blacklist value of * means all extensions are blacklisted and users can only install extensions listed in the whitelist. 76 By default, all extensions are whitelisted, but if all extensions have been blacklisted by policy, the whitelist can be used to override that policy.</translation> 251 A blacklist value of '*' means all extensions are blacklisted unless they are explicitly listed in the whitelist. [all...] |
policy_templates_it.xtb | 56 <translation id="5183383917553127163">Consente di specificare le estensioni da non includere nella blacklist. Un valore di * riportato nella blacklist indica che tutte le estensioni sono state inserite nella blacklist e che gli utenti possono installare solo quelle elencate nella whitelist. Per impostazione predefinita, tutte le estensioni si trovano nella whitelist, ma se in base alla norma applicata tutte le estensioni sono state inserite nella blacklist, la whitelist puņ essere utilizzata per annullare tale norma.</translation> 200 <translation id="3153348162326497318">Consente di specificare le estensioni che gli utenti NON possono installare. Se presenti nella blacklist, le estensioni precedentemente installate verranno rimosse. Un valore "*" riportato nella blacklist indica che tutte le estensioni sono state inserite nella blacklist a meno che non siano espressamente elencate nella whitelist. Se questa norma non viene impostata, gli utenti potranno installare qualsiasi estensione in <ph name="PRODUCT_NAME"/>.</translation> [all...] |
/external/chromium_org/chrome/browser/history/ |
url_index_private_data.cc | [all...] |
/external/chromium_org/chrome/browser/prerender/ |
prerender_local_predictor.cc | 122 bool whitelist, 129 info.service_whitelist = whitelist; [all...] |
/device/generic/goldfish/opengl/tests/gles_android_wrapper/ |
egl.cpp | 159 // check on our whitelist
|
/external/chromium_org/chrome/browser/apps/ |
web_view_browsertest.cc | 2030 extensions::ExtensionsClient::ScriptingWhitelist whitelist; local [all...] |
/external/chromium_org/chrome/browser/sync/test/integration/ |
sync_test.h | 355 // Helper class to whitelist the notification port.
|
/external/chromium_org/chrome/browser/ui/blocked_content/ |
popup_blocker_browsertest.cc | 311 // Whitelist iframe URL instead.
|
/external/chromium_org/chrome/browser/ui/webui/chromeos/login/ |
signin_screen_handler.h | 322 // sign-in (allow BWSI and allow whitelist) are changed.
|
/external/chromium_org/chrome/common/extensions/docs/templates/articles/ |
app_identity.html | 286 you need to whitelist the appropriate patterns in the permissions:
|
contentSecurityPolicy.html | 283 over HTTP from servers on your local machine. You may whitelist script and
|
/external/chromium_org/content/browser/renderer_host/pepper/ |
pepper_file_io_host.cc | 188 // Whitelist the supported ones.
|