/external/chromium_org/ui/accessibility/extensions/alt/ |
background.js | 10 console.log('successfully injected axs_testing.js'); 15 console.log('successfully injected script', opt_tab ? opt_tab.url : ''); 20 console.log('successfully injected css', opt_tab ? opt_tab.url : '');
|
/external/mockito/src/org/mockito/internal/configuration/injection/ |
PropertyAndSetterInjection.java | 46 * <li>remove mock from mocks copy (mocks are just injected once in a class) 47 * <li>remove injected field from list of class fields 114 Object injected = mockCandidateFilter.filterCandidate(mocks, field, instance).thenInject(); local 115 if (injected != null) { 117 mocks.remove(injected);
|
/external/chromium_org/native_client_sdk/src/build_tools/screenshot_extension/ |
background.js | 18 {file: 'injected.js', runAt: 'document_start'});
|
/frameworks/av/media/libstagefright/rtsp/ |
ARTPConnection.h | 41 bool injected);
|
ARTPConnection.cpp | 84 bool injected) { 91 msg->setInt32("injected", injected); 192 int32_t injected; local 193 CHECK(msg->findInt32("injected", &injected)); 195 info->mIsInjected = injected; 208 if (!injected) {
|
/external/chromium_org/chrome/renderer/resources/extensions/ |
input.ime_custom_bindings.js | 5 // Custom binding for the input ime API. Only injected into the
|
/external/chromium_org/chrome/browser/resources/chromeos/chromevox/chromevox/injected/ |
init_document.js | 6 * @fileoverview Initializes the injected content script on the document. 72 * again, but our injected page script has remained.
|
initial_speech.js | 20 // script is injected after page load (i.e. when manually enabling ChromeVox). 30 // Don't speak page title and other information if this script is not injected
|
init_globals.js | 6 * @fileoverview Initializes the injected content script.
|
/bionic/libc/kernel/uapi/asm-x86/asm/ |
kvm.h | 305 __u8 injected; member in struct:kvm_vcpu_events::__anon219 314 __u8 injected; member in struct:kvm_vcpu_events::__anon220 321 __u8 injected; member in struct:kvm_vcpu_events::__anon221
|
/development/ndk/platforms/android-L/arch-x86/include/asm/ |
kvm.h | 305 __u8 injected; member in struct:kvm_vcpu_events::__anon1866 314 __u8 injected; member in struct:kvm_vcpu_events::__anon1867 321 __u8 injected; member in struct:kvm_vcpu_events::__anon1868
|
/development/ndk/platforms/android-L/arch-x86_64/include/asm/ |
kvm.h | 305 __u8 injected; member in struct:kvm_vcpu_events::__anon1877 314 __u8 injected; member in struct:kvm_vcpu_events::__anon1878 321 __u8 injected; member in struct:kvm_vcpu_events::__anon1879
|
/external/kernel-headers/original/uapi/asm-x86/asm/ |
kvm.h | 289 __u8 injected; member in struct:kvm_vcpu_events::__anon27403 296 __u8 injected; member in struct:kvm_vcpu_events::__anon27404 302 __u8 injected; member in struct:kvm_vcpu_events::__anon27405
|
/external/linux-tools-perf/perf-3.12.0/arch/x86/include/uapi/asm/ |
kvm.h | 289 __u8 injected; member in struct:kvm_vcpu_events::__anon29745 296 __u8 injected; member in struct:kvm_vcpu_events::__anon29746 302 __u8 injected; member in struct:kvm_vcpu_events::__anon29747
|
/prebuilts/ndk/9/platforms/android-21/arch-x86/usr/include/asm/ |
kvm.h | 305 __u8 injected; member in struct:kvm_vcpu_events::__anon79015 314 __u8 injected; member in struct:kvm_vcpu_events::__anon79016 321 __u8 injected; member in struct:kvm_vcpu_events::__anon79017
|
/prebuilts/ndk/9/platforms/android-21/arch-x86_64/usr/include/asm/ |
kvm.h | 305 __u8 injected; member in struct:kvm_vcpu_events::__anon79792 314 __u8 injected; member in struct:kvm_vcpu_events::__anon79793 321 __u8 injected; member in struct:kvm_vcpu_events::__anon79794
|
/external/chromium_org/chrome/browser/resources/gaia_auth/ |
background.js | 8 * between the main and injected scripts. 14 * 2. A script is injected into each SAML page. The injected script sends three 21 * c) The injected script scrapes passwords. They are sent to this background 86 } else if (port.name == 'injected') { 99 * BackgroundBridge allows the main script and the injected script to 134 // injected script should scrape passwords. 174 * Sets up the communication channel with the injected script. 401 * |msg| to the injected script.
|
saml_injected.js | 7 * Script to be injected into SAML provider pages, serving three main purposes: 154 channel.connect('injected');
|
/external/chromium_org/third_party/WebKit/Source/bindings/modules/v8/ |
IDBBindingUtilities.cpp | 158 bool injected = injectV8KeyIntoV8Value(isolate, key, value, impl->keyPath()); local 159 ASSERT_UNUSED(injected, injected); 456 bool injected = injectV8KeyIntoV8Value(isolate, keyValue.v8Value(), scriptValue.v8Value(), keyPath); local 457 ASSERT_UNUSED(injected, injected);
|
/external/chromium_org/chrome/common/extensions/docs/examples/api/devtools/inspectedWindow/chrome-preprocessor/Panel/ |
InspectedWindowLoadMonitor.js | 13 * @return {function} A function to be injected into the inspected window.
|
/external/chromium_org/chrome/browser/resources/chromeos/chromevox/host/chrome/ |
braille.js | 46 // Since ChromeVox gets injected into multiple iframes on a page, check to
|
/external/chromium_org/chrome/browser/resources/chromeos/chromevox/host/interface/ |
mathjax_interface.js | 20 * True if MathJax is injected in a page.
|
/external/chromium_org/ppapi/native_client/tests/nacl_browser/fault_injection/ |
nacl.scons | 37 # test, and a "fault-injected" version -- essentially this test is
|
/external/chromium_org/ui/webui/resources/js/ |
local_strings.js | 8 * The local strings get injected into the page using a variable named
|
/external/chromium_org/chrome/common/extensions/docs/examples/api/downloads/download_links/ |
popup.js | 90 // injected into all frames of the active tab, so this listener may be called
|