/external/junit/src/org/junit/ |
Rule.java | 15 * annotated {@link Rule}s on a class, they will be applied in an order 24 * @Rule 45 public @interface Rule {
|
/external/chromium_org/chrome/common/extensions/docs/examples/api/downloads/download_filename_controller/ |
options.js | 5 function Rule(data) { 7 this.node = document.getElementById('rule-template').cloneNode(true); 8 this.node.id = 'rule' + (Rule.next_id++); 9 this.node.rule = this; 32 var rule = this; 34 var sib = rule.node.previousSibling; 35 rule.node.parentNode.removeChild(rule.node); 36 sib.parentNode.insertBefore(rule.node, sib) [all...] |
/external/chromium_org/net/proxy/ |
proxy_bypass_rules.h | 21 // Interface for an individual proxy bypass rule. 22 class NET_EXPORT Rule { 24 Rule(); 25 virtual ~Rule(); 27 // Returns true if |url| matches the rule. 30 // Returns a string representation of this rule. This is used both for 34 // Creates a copy of this rule. (Caller is responsible for deleting it) 35 virtual Rule* Clone() const = 0; 37 bool Equals(const Rule& rule) const [all...] |
proxy_bypass_rules.cc | 20 class HostnamePatternRule : public ProxyBypassRules::Rule { 53 virtual Rule* Clone() const OVERRIDE { 65 class BypassLocalRule : public ProxyBypassRules::Rule { 78 virtual Rule* Clone() const OVERRIDE { 83 // Rule for matching a URL that is an IP address, if that IP address falls 84 // within a certain numeric range. For example, you could use this rule to 86 class BypassIPBlockRule : public ProxyBypassRules::Rule { 120 virtual Rule* Clone() const OVERRIDE { 148 ProxyBypassRules::Rule::Rule() { [all...] |
/external/chromium_org/sandbox/mac/ |
policy.cc | 9 Rule::Rule() 14 Rule::Rule(PolicyDecision result) 19 Rule::Rule(mach_port_t override_port) 30 static bool IsRuleValid(const Rule& rule) { 31 if (!(rule.result > POLICY_DECISION_INVALID && 32 rule.result < POLICY_DECISION_LAST)) [all...] |
policy.h | 22 // default behavior for servers not given an explicit rule. 28 // specified in the Rule. 33 // A Rule expresses the action to take when a service port is requested via 37 struct SANDBOX_EXPORT Rule { 38 Rule(); 39 explicit Rule(PolicyDecision result); 40 explicit Rule(mach_port_t override_port); 44 // The Rule does not take ownership of this port, but additional send rights 52 typedef std::map<std::string, Rule> NamedRules; 59 Rule default_rule [all...] |
/external/chromium_org/tools/memory_inspector/memory_inspector/classification/ |
rules.py | 8 is of to the concrete classifiers, which have to override the Rule class herein 16 - Order of siblings rules matter: what is caught by a rule will not be caught 19 catch-all child catches everything (within the parent rule scope) that is 24 The format of a rule dictionary is the following: 27 'name': 'Name of the rule', 33 'name': 'Name of the sub-rule 1' 40 And a typical resulting rule tree looks like this: 64 """Construct a rule tree from a python-style dict representation. 67 content: a string containing the dict (i.e. content of the rule file). 69 and returns a subclass of |Rule|. |filters_dict| is a dict of the key [all...] |
/external/jarjar/src/main/com/tonicsystems/jarjar/ |
Rule.java | 19 public class Rule extends PatternElement
|
/external/chromium_org/components/content_settings/core/browser/ |
content_settings_rule.cc | 10 Rule::Rule() {} 12 Rule::Rule( 22 Rule::~Rule() {} 32 Rule EmptyRuleIterator::Next() { 34 return Rule(); 58 Rule ConcatenationIterator::Next() { 63 const Rule& to_return = (*current_iterator)->Next() [all...] |
content_settings_rule.h | 20 struct Rule { 21 Rule(); 22 // Rule takes ownership of |value|. 23 Rule(const ContentSettingsPattern& primary_pattern, 26 ~Rule(); 37 virtual Rule Next() = 0; 44 virtual Rule Next() OVERRIDE; 55 virtual Rule Next() OVERRIDE;
|
/external/chromium_org/third_party/libaddressinput/src/cpp/src/ |
rule.cc | 15 #include "rule.h" 110 Rule::Rule() 126 Rule::~Rule() {} 129 const Rule& Rule::GetDefault() { 131 static Rule* default_rule = NULL; 133 default_rule = new Rule; 140 void Rule::CopyFrom(const Rule& rule) [all...] |
rule.h | 39 // Rule rule; 40 // if (rule.ParseSerializedRule("{\"fmt\": \"%A%n%C%S %Z\"}")) { 41 // Process(rule.GetFormat()); 43 class Rule { 45 Rule(); 46 ~Rule(); 48 // Returns the default rule at a country level. If a country does not specify 49 // address format, for example, then the format from this rule should be used 51 static const Rule& GetDefault() [all...] |
/external/antlr/antlr-3.4/gunit/src/main/java/org/antlr/gunit/swingui/model/ |
Rule.java | 37 * ANTLR v3 Rule Information. 40 public class Rule extends DefaultListModel { 44 public Rule(String name) {
|
/external/chromium-trace/trace-viewer/third_party/closure_linter/closure_linter/ |
error_check.py | 27 class Rule(object): 39 # Rule to raise all known errors. 54 'This includes ' + (', '.join(Rule.CLOSURE_RULES)) + '.') 58 ' - ' + Rule.ALL + ': enables all following errors.\n' 59 ' - ' + Rule.BLANK_LINES_AT_TOP_LEVEL + ': validates' 61 ' - ' + Rule.INDENTATION + ': checks correct ' 63 ' - ' + Rule.WELL_FORMED_AUTHOR + ': validates the ' 65 ' - ' + Rule.NO_BRACES_AROUND_INHERIT_DOC + ': ' 67 ' - ' + Rule.BRACES_AROUND_TYPE + ': enforces braces ' 69 ' - ' + Rule.OPTIONAL_TYPE_MARKER + ': checks correct [all...] |
javascriptlintrules.py | 42 Rule = error_check.Rule 97 if error_check.ShouldCheck(Rule.UNUSED_PRIVATE_MEMBERS): 135 if (error_check.ShouldCheck(Rule.OPTIONAL_TYPE_MARKER) and 189 if (error_check.ShouldCheck(Rule.BLANK_LINES_AT_TOP_LEVEL) and 467 if error_check.ShouldCheck(Rule.UNUSED_PRIVATE_MEMBERS):
|
/external/chromium_org/net/cert/ |
mock_cert_verifier.cc | 16 struct MockCertVerifier::Rule { 17 Rule(X509Certificate* cert, 79 Rule rule(cert, host_pattern, verify_result, rv); 80 rules_.push_back(rule);
|
/external/chromium_org/net/tools/tld_cleanup/ |
tld_cleanup_util.h | 18 struct Rule { 24 typedef std::map<std::string, Rule> RuleMap;
|
/external/chromium_org/third_party/closure_linter/closure_linter/ |
error_check.py | 27 class Rule(object): 41 # Rule to raise all known errors. 57 'This includes ' + (', '.join(Rule.CLOSURE_RULES)) + '.') 61 ' - ' + Rule.ALL + ': enables all following errors.\n' 62 ' - ' + Rule.BLANK_LINES_AT_TOP_LEVEL + ': validates' 64 ' - ' + Rule.INDENTATION + ': checks correct ' 66 ' - ' + Rule.WELL_FORMED_AUTHOR + ': validates the ' 68 ' - ' + Rule.NO_BRACES_AROUND_INHERIT_DOC + ': ' 70 ' - ' + Rule.BRACES_AROUND_TYPE + ': enforces braces ' 72 ' - ' + Rule.OPTIONAL_TYPE_MARKER + ': checks correct [all...] |
javascriptlintrules.py | 41 Rule = error_check.Rule 104 if error_check.ShouldCheck(Rule.UNUSED_LOCAL_VARIABLES): 107 if error_check.ShouldCheck(Rule.UNUSED_PRIVATE_MEMBERS): 152 if error_check.ShouldCheck(Rule.VARIABLE_ARG_MARKER): 167 if error_check.ShouldCheck(Rule.OPTIONAL_TYPE_MARKER): 223 if (error_check.ShouldCheck(Rule.BLANK_LINES_AT_TOP_LEVEL) and 666 if error_check.ShouldCheck(Rule.UNUSED_PRIVATE_MEMBERS):
|
/frameworks/base/tools/split-select/ |
Rule.cpp | 17 #include "Rule.h" 32 Rule::Rule(const Rule& rhs) 42 String8 Rule::toJson(int indent) const { 177 sp<Rule> Rule::simplify(sp<Rule> rule) { 178 if (rule->op != AND_SUBRULES && rule->op != OR_SUBRULES) [all...] |
/external/chromium_org/third_party/WebKit/Source/core/html/parser/ |
CSSPreloadScanner.h | 56 Rule,
|
/external/chromium_org/third_party/WebKit/ |
PRESUBMIT.py | 195 from rules import Rule 216 if rule_type == Rule.DISALLOW:
|
/external/chromium_org/v8/ |
PRESUBMIT.py | 103 from rules import Rule 123 if rule_type == Rule.DISALLOW:
|
/external/chromium_org/third_party/webrtc/base/ |
firewallsocketserver.h | 22 // This SocketServer shim simulates a rule-based firewall server. 84 struct Rule { 91 std::vector<Rule> rules_;
|
/external/chromium_org/tools/deep_memory_profiler/lib/ |
policy.py | 33 class Rule(object): 34 """Represents one matching rule in a policy file.""" 129 """Finds a rule whose name is |component_name|. """ 130 for rule in self._rules: 131 if rule.name == component_name: 132 return rule 157 for rule in self._rules: 158 if (rule.allocator_type == 'malloc' and 159 (not rule.stackfunction_pattern or 160 rule.stackfunction_pattern.match(stackfunction)) an [all...] |