/external/chromium_org/tools/idl_parser/ |
PRESUBMIT.py | 6 WHITELIST = [ r'^.+_test\.py$' ] 10 input_api, output_api, '.', whitelist=WHITELIST) 15 input_api, output_api, '.', whitelist=WHITELIST)
|
/external/chromium_org/tools/json_schema_compiler/ |
PRESUBMIT.py | 11 WHITELIST = [ r'.+_test.py$' ] 15 input_api, output_api, '.', whitelist=WHITELIST) 20 input_api, output_api, '.', whitelist=WHITELIST)
|
/external/chromium_org/tools/json_to_struct/ |
PRESUBMIT.py | 11 WHITELIST = [ r'.+_test.py$' ] 15 input_api, output_api, '.', whitelist=WHITELIST) 20 input_api, output_api, '.', whitelist=WHITELIST)
|
/external/chromium_org/chrome/common/ |
pepper_permission_util_unittest.cc | 60 std::set<std::string> whitelist; local 70 IsExtensionOrSharedModuleWhitelisted(GURL(url), &extensions, whitelist)); 71 whitelist.insert(whitelisted_id); 73 IsExtensionOrSharedModuleWhitelisted(GURL(url), &extensions, whitelist)); 75 GURL(bad_scheme_url), &extensions, whitelist)); 77 GURL(bad_host_url), &extensions, whitelist)); 94 // Add the extension to the whitelist. This 96 .Set("whitelist", ListBuilder().Append(whitelisted_id))) 106 std::set<std::string> whitelist; local 107 // Important: whitelist *only* the shared module [all...] |
/external/chromium_org/chrome/browser/chromeos/settings/ |
cros_settings_unittest.cc | 124 // Setting the whitelist should also switch the value of 126 base::ListValue whitelist; local 127 whitelist.Append(new base::StringValue("me@owner")); 130 AddExpectation(kAccountsPrefUsers, whitelist.DeepCopy()); 131 SetPref(kAccountsPrefUsers, &whitelist); 137 base::ListValue* whitelist = new base::ListValue(); local 139 whitelist->Append(hacky_user.DeepCopy()); 142 AddExpectation(kAccountsPrefUsers, whitelist); 143 // Add some user to the whitelist. 150 base::ListValue whitelist; local 173 base::ListValue whitelist; local 184 base::ListValue whitelist; local 198 base::ListValue whitelist; local [all...] |
/external/chromium_org/chrome/renderer/extensions/ |
renderer_permissions_policy_delegate.cc | 34 const ExtensionsClient::ScriptingWhitelist& whitelist = local 36 if (std::find(whitelist.begin(), whitelist.end(), extension->id()) != 37 whitelist.end()) {
|
/external/chromium_org/tools/grit/grit/format/ |
repack.py | 25 parser.add_option('--whitelist', action='store', dest='whitelist', 26 default=None, help='Full path to the whitelist used to' 34 whitelist_file=options.whitelist)
|
data_pack_unittest.py | 48 whitelist = [1, 10, 20, 30, 40, 50, 60] 52 # RePack using whitelist 53 output, _ = data_pack.RePackFromDataPackStrings(inputs, whitelist) 57 # RePack a None whitelist
|
/external/chromium_org/tools/json_schema_compiler/test/ |
test_features.json | 19 "whitelist": [
|
/external/chromium_org/tools/perf_expectations/ |
PRESUBMIT.py | 22 whitelist = [r'.+_unittest\.py$'] 24 input_api, output_api, 'tests', whitelist)) 36 whitelist = [r'.+_unittest\.py$'] 38 input_api, output_api, 'tests', whitelist))
|
/external/chromium_org/extensions/common/api/ |
_permission_features.json | 17 // Google employees: please update http://go/chrome-api-whitelist to map 32 "whitelist": [ 53 "whitelist": [ 74 "whitelist": [ 88 "whitelist": [
|
_manifest_features.json | 15 // Google employees: please update http://go/chrome-api-whitelist to map 28 "whitelist": [ 65 // overriden (except for a whitelist of exceptions, see the 66 // app.content_security_policy whitelist).
|
/external/chromium_org/chrome/browser/safe_browsing/ |
safe_browsing_database.h | 62 // four databases: browse, download, download whitelist and 63 // client-side detection (csd) whitelist databases. The browse database contains 66 // these downloaded contents. The download whitelist contains whitelisted 68 // etc. The csd whitelist database contains URLs that will never be considered 79 // |enable_client_side_whitelist| is used to control the csd whitelist 81 // |enable_download_whitelist| is used to control the download whitelist 122 // whitelist. Otherwise, this function returns true. Note: the whitelist 127 // The download whitelist is used for two purposes: a white-domain list of 129 // whitelist of arbitrary strings such as hashed certificate authorities tha [all...] |
/external/chromium_org/chrome/common/extensions/api/ |
_permission_features.json | 16 // Google employees: please update http://go/chrome-api-whitelist to map 34 "whitelist": [ "2FCBCE08B34CCA1728A85F1EFBD9A34DD2558B2E" ] 44 "whitelist": [ 77 "whitelist": [ 127 "whitelist": [ 149 "whitelist": [ 168 "whitelist": [ 184 "whitelist": [ 194 "whitelist": [ 221 "whitelist": [all...] |
_manifest_features.json | 15 // Google employees: please update http://go/chrome-api-whitelist to map 71 "whitelist": [ 127 "whitelist": [ 141 "whitelist": [ 150 "whitelist": [ 189 "whitelist": [ 222 "whitelist": [ 234 "whitelist": [ 270 "whitelist": [ 353 "whitelist": [all...] |
/external/chromium_org/third_party/WebKit/Source/core/page/ |
InjectedStyleSheets.h | 40 InjectedStyleSheetEntry(const String& source, const Vector<String>& whitelist, StyleInjectionTarget injectedFrames) 42 , m_whitelist(whitelist) 48 const Vector<String>& whitelist() const { return m_whitelist; } function in class:WebCore::InjectedStyleSheetEntry 63 void add(const String& source, const Vector<String>& whitelist, StyleInjectionTarget);
|
/sdk/build/ |
windows_sdk_whitelist.mk | 0 # Whitelist of SDK projects that can be built for the SDK on Windows 8 # This file defines a whitelist of projects that can be built in the Windows 26 # Whitelist of SDK specific projects that do NOT need Java (e.g. C libraries) 40 # Whitelist of SDK specific projects that DO require Java
|
/external/chromium_org/extensions/browser/ |
admin_policy_unittest.cc | 96 // Tests UserMayLoad for an extension on the whitelist. 100 base::ListValue whitelist; local 101 whitelist.Append(new base::StringValue(extension_->id())); 102 EXPECT_TRUE(ap::UserMayLoad(NULL, &whitelist, NULL, NULL, extension_.get(), 107 EXPECT_TRUE(ap::UserMayLoad(NULL, &whitelist, NULL, NULL, extension_.get(), 110 EXPECT_TRUE(ap::UserMayLoad(NULL, &whitelist, NULL, NULL, extension_.get(), 138 // With a whitelist. There's no such thing as a whitelist wildcard. 139 base::ListValue whitelist; local 140 whitelist.Append [all...] |
/external/chromium_org/chrome/browser/extensions/activity_log/ |
activity_log_policy_unittest.cc | 62 ActivityLogPolicy::Util::ApiSet whitelist; local 63 whitelist.insert( 66 // API is in whitelist; not stripped. 73 ActivityLogPolicy::Util::StripArguments(whitelist, action); 76 // Not in whitelist: stripped. 80 ActivityLogPolicy::Util::StripArguments(whitelist, action);
|
/build/core/tasks/check_boot_jars/ |
check_boot_jars.py | 15 # The compiled whitelist RE. 20 """ Load and compile whitelist regular expressions from filename. 35 'Cannot compile package whitelist regular expression: %r',
|
/development/build/ |
windows_sdk_whitelist.mk | 0 # Whitelist of SDK projects that can be built for the SDK on Windows 8 # This file defines a whitelist of projects that can be built in the Windows 26 # Whitelist of platform specific projects that do NOT need Java (e.g. C libraries) 67 # Whitelist of platform specific projects that DO require Java
|
/external/chromium_org/build/android/pylib/symbols/ |
PRESUBMIT.py | 12 whitelist=[r'^.+_unittest\.py$']))
|
/packages/inputmethods/LatinIME/dictionaries/ |
sample.combined | 17 # into the dictionary is to add shortcut targets and maybe a whitelist 22 # value between 0 and 14, or the special value `whitelist' which becomes 23 # 15, which is then taken to be the whitelist target of this word. 37 shortcut=whitelisted,f=whitelist
|
/external/chromium_org/chrome/browser/policy/ |
policy_helpers.cc | 41 // Whitelist all the signin flow URLs flagged by the SigninManager. 45 // Additionally whitelist /ServiceLoginAuth.
|
/external/chromium_org/chrome/browser/ui/webui/ |
gesture_config_ui.h | 22 // TODO(mohsen): Add a whitelist of preferences that are allowed to be set or 23 // get here and check requested preferences against this whitelist.
|