HomeSort by relevance Sort by last modified time
    Searched full:whitelist (Results 51 - 75 of 391) sorted by null

1 23 4 5 6 7 8 91011>>

  /external/chromium_org/chrome/browser/extensions/
all_urls_apitest.cc 42 // Then add the two extensions to the whitelist.
43 extensions::ExtensionsClient::ScriptingWhitelist whitelist; local
44 whitelist.push_back(extensions::id_util::GenerateIdForPath(extension_dir1));
45 whitelist.push_back(extensions::id_util::GenerateIdForPath(extension_dir2));
46 extensions::ExtensionsClient::Get()->SetScriptingWhitelist(whitelist);
  /external/chromium_org/extensions/common/features/
complex_feature_unittest.cc 51 // Rule: "extension", whitelist "foo".
55 .Set("whitelist", ListBuilder().Append(kIdFoo))
61 // Rule: "legacy_packaged_app", whitelist "bar".
64 .Set("whitelist", ListBuilder().Append(kIdBar))
90 // Test whitelist with wrong extension type.
  /external/chromium_org/sync/protocol/
synced_notification_data.proto 178 // List of AppIds and whether to treat the list as a Whitelist or Blacklist.
182 WHITELIST = 1;
187 // Whether to treat the app_id list as a Whitelist or Blacklist.
188 optional Type type = 1 [default = WHITELIST];
199 // List of AppIds and whether it is a blacklist or whitelist.
  /external/chromium_org/third_party/libjingle/source/talk/base/
natserver.cc 185 whitelist = new AddressSet(AddrCmp(nat));
189 delete whitelist;
195 whitelist->insert(addr);
200 return whitelist->find(ext_addr) == whitelist->end();
  /external/chromium_org/third_party/webrtc/base/
natserver.cc 168 whitelist = new AddressSet(AddrCmp(nat));
172 delete whitelist;
178 whitelist->insert(addr);
183 return whitelist->find(ext_addr) == whitelist->end();
  /external/chromium_org/chrome/browser/resources/options/chromeos/
accounts_options.js 19 // Whether to show the whitelist.
97 // Whitelist existing users when guest login is being disabled.
138 * Returns whether the whitelist is managed by policy or not.
  /external/chromium_org/chrome/common/extensions/docs/server2/
PRESUBMIT.py 16 WHITELIST = [ r'.+_test.py$' ]
92 input_api, output_api, '.', whitelist=WHITELIST, blacklist=BLACKLIST)
features_utility_test.py 21 'whitelist': 'hashhashashhashashhashashhash'
25 { 'whitelist': 'hashhashashhashashhashashhash' }
  /external/chromium_org/chrome/common/extensions/manifest_handlers/
mime_types_handler.cc 46 std::vector<std::string> whitelist; local
48 whitelist.push_back(kMIMETypeHandlersWhitelist[i]);
49 return whitelist;
  /external/chromium_org/components/domain_reliability/
bake_in_configs.py 17 # A whitelist of domains that the script will accept when baking configs in to
19 # whitelist entries are also allowed (e.g. maps.google.com, ssl.gstatic.com).
90 print >> sys.stderr ('%s: monitored_domain "%s" not in whitelist' %
  /external/chromium_org/extensions/common/manifest_handlers/
shared_module_manifest_unittest.cc 90 "Invalid value for 'export.whitelist[0]'."),
92 "Invalid value for 'export.whitelist[0]'."),
94 "Invalid value for 'export.whitelist'."),
shared_module_info.h 39 // Check against the shared module's whitelist to see if |other_id| can import
40 // its resources. If no whitelist is specified, all extensions can import this
  /frameworks/base/services/core/java/com/android/server/location/
LocationBlacklist.java 70 if (D) Slog.d(TAG, "whitelist: " + Arrays.toString(mWhitelist));
83 * (package name matches blacklist, and does not match whitelist)
103 * Return true if any of packages are in whitelist
  /frameworks/base/policy/src/com/android/internal/policy/impl/
PolicyControl.java 190 private Filter(ArraySet<String> whitelist, ArraySet<String> blacklist) {
191 mWhitelist = whitelist;
219 dump("whitelist", mWhitelist, pw); pw.print(',');
244 ArraySet<String> whitelist = new ArraySet<String>();
252 whitelist.add(token);
255 return new Filter(whitelist, blacklist);
  /external/chromium_org/build/ios/
clean_env.py 10 """This is like 'env -i', but it uses a whitelist of env variables to allow
16 # the only approach that seems to work is to have a whitelist.
  /external/chromium_org/net/http/
url_security_manager.h 27 // |whitelist_default| is the whitelist of servers that default credentials
35 // |whitelist_delegate| is the whitelist of servers that are allowed
url_security_manager_unittest.cc 28 // In Posix systems (or on Windows if a whitelist is specified explicitly),
29 // everything depends on the whitelist.
  /external/clang/include/clang/AST/
CommentHTMLTags.td 58 // FIXME: this should be a whitelist. When changing this to a whitelist, don't
  /external/libnfc-nci/src/nfa/dm/
nfa_dm_cfg.c 119 0x03, /* Number of host in the whitelist of Terminal host */
120 (UINT8 *) nfa_hci_whitelist /* Pointer to the Whitelist of Terminal Host */
  /frameworks/webview/chromium/tools/
jar_check.py 21 and a whitelist file of allowed package names, one per line, check that all the
35 whitelist_path: The path to the whitelist file.
  /external/chromium_org/chrome/browser/history/
in_memory_url_index.cc 36 // Initializes a whitelist of URL schemes.
37 void InitializeSchemeWhitelist(std::set<std::string>* whitelist) {
38 DCHECK(whitelist);
39 if (!whitelist->empty())
41 whitelist->insert(std::string(url::kAboutScheme));
42 whitelist->insert(std::string(content::kChromeUIScheme));
43 whitelist->insert(std::string(url::kFileScheme));
44 whitelist->insert(std::string(url::kFtpScheme));
45 whitelist->insert(std::string(url::kHttpScheme));
46 whitelist->insert(std::string(url::kHttpsScheme))
    [all...]
  /external/chromium_org/apps/shell/common/
shell_extensions_client.cc 109 // TODO(jamescook): Do we need to whitelist any extensions?
168 const ScriptingWhitelist& whitelist) {
169 scripting_whitelist_ = whitelist;
174 // TODO(jamescook): Real whitelist.
  /external/chromium_org/chrome/browser/extensions/api/preference/
chrome_direct_setting_api.h 38 // Returns true if the preference is on the whitelist.
  /external/chromium_org/components/policy/core/common/
policy_switches.cc 25 // This allows skipping the server whitelist.
  /external/chromium_org/third_party/WebKit/Source/modules/serviceworkers/
Response.cpp 27 // FIXME: Implement. Spec will eventually whitelist allowable headers.

Completed in 850 milliseconds

1 23 4 5 6 7 8 91011>>