/external/webkit/Source/WebCore/page/ |
H A D | UserScript.h | 42 PassOwnPtr<Vector<String> > whitelist, PassOwnPtr<Vector<String> > blacklist, 46 , m_whitelist(whitelist) 55 const Vector<String>* whitelist() const { return m_whitelist.get(); } function in class:WebCore::UserScript 41 UserScript(const String& source, const KURL& url, PassOwnPtr<Vector<String> > whitelist, PassOwnPtr<Vector<String> > blacklist, UserScriptInjectionTime injectionTime, UserContentInjectedFrames injectedFrames) argument
|
H A D | UserStyleSheet.h | 42 PassOwnPtr<Vector<String> > whitelist, PassOwnPtr<Vector<String> > blacklist, 46 , m_whitelist(whitelist) 55 const Vector<String>* whitelist() const { return m_whitelist.get(); } function in class:WebCore::UserStyleSheet 41 UserStyleSheet(const String& source, const KURL& url, PassOwnPtr<Vector<String> > whitelist, PassOwnPtr<Vector<String> > blacklist, UserContentInjectedFrames injectedFrames, UserStyleLevel level) argument
|
H A D | UserContentURLPattern.cpp | 33 bool UserContentURLPattern::matchesPatterns(const KURL& url, const Vector<String>* whitelist, const Vector<String>* blacklist) argument 35 // In order for a URL to be a match it has to be present in the whitelist and not present in the blacklist. 36 // If there is no whitelist at all, then all URLs are assumed to be in the whitelist. 37 bool matchesWhitelist = !whitelist || whitelist->isEmpty(); 39 for (unsigned i = 0; i < whitelist->size(); ++i) { 40 UserContentURLPattern contentPattern(whitelist->at(i));
|
H A D | UserContentURLPattern.h | 56 static bool matchesPatterns(const KURL&, const Vector<String>* whitelist, const Vector<String>* blacklist);
|
H A D | PageGroup.h | 96 PassOwnPtr<Vector<String> > whitelist, PassOwnPtr<Vector<String> > blacklist, 99 PassOwnPtr<Vector<String> > whitelist, PassOwnPtr<Vector<String> > blacklist,
|
H A D | PageGroup.cpp | 369 PassOwnPtr<Vector<String> > whitelist, PassOwnPtr<Vector<String> > blacklist, 374 OwnPtr<UserScript> userScript(new UserScript(source, url, whitelist, blacklist, injectionTime, injectedFrames)); 384 PassOwnPtr<Vector<String> > whitelist, PassOwnPtr<Vector<String> > blacklist, 391 OwnPtr<UserStyleSheet> userStyleSheet(new UserStyleSheet(source, url, whitelist, blacklist, injectedFrames, level)); 368 addUserScriptToWorld(DOMWrapperWorld* world, const String& source, const KURL& url, PassOwnPtr<Vector<String> > whitelist, PassOwnPtr<Vector<String> > blacklist, UserScriptInjectionTime injectionTime, UserContentInjectedFrames injectedFrames) argument 383 addUserStyleSheetToWorld(DOMWrapperWorld* world, const String& source, const KURL& url, PassOwnPtr<Vector<String> > whitelist, PassOwnPtr<Vector<String> > blacklist, UserContentInjectedFrames injectedFrames, UserStyleLevel level, UserStyleInjectionTime injectionTime) argument
|
/external/chromium/chrome/browser/extensions/ |
H A D | all_urls_apitest.cc | 25 // Then add the two extensions to the whitelist. 26 Extension::ScriptingWhitelist whitelist; local 27 whitelist.push_back(Extension::GenerateIdForPath(extension_dir1)); 28 whitelist.push_back(Extension::GenerateIdForPath(extension_dir2)); 29 Extension::SetScriptingWhitelist(whitelist);
|
H A D | extension_prefs.cc | 469 // Check the whitelist first. 470 const ListValue* whitelist = local 472 if (whitelist) { 473 for (ListValue::const_iterator it = whitelist->begin(); 474 it != whitelist->end(); ++it) { 476 LOG(WARNING) << "Failed to read whitelist string.";
|
/external/chromium/chrome/browser/chromeos/login/ |
H A D | signed_settings_unittest.cc | 130 em::PolicyData BuildPolicyData(std::vector<std::string> whitelist) { argument 137 if (!whitelist.empty()) { 139 for (std::vector<std::string>::const_iterator it = whitelist.begin(); 140 it != whitelist.end(); 167 const RepeatedPtrField<std::string>& whitelist = local 169 for (RepeatedPtrField<std::string>::const_iterator it = whitelist.begin(); 170 it != whitelist.end(); 328 std::vector<std::string> whitelist(1, fake_email_); 329 whitelist.push_back(fake_email_ + "m"); 330 em::PolicyData fake_pol = BuildPolicyData(whitelist); [all...] |
H A D | signed_settings.cc | 92 const RepeatedPtrField<std::string>& whitelist = local 94 for (RepeatedPtrField<std::string>::const_iterator it = whitelist.begin(); 95 it != whitelist.end(); 405 const RepeatedPtrField<std::string>& whitelist = local 407 for (RepeatedPtrField<std::string>::const_iterator it = whitelist.begin(); 408 it != whitelist.end(); 498 const RepeatedPtrField<string>& whitelist = whitelist_proto->user_whitelist(); local 499 for (RepeatedPtrField<string>::const_iterator it = whitelist.begin(); 500 it != whitelist.end(); 505 // |i| contains the index of |email|, if it is in |whitelist| [all...] |
/external/webkit/Source/WebKit2/WebProcess/InjectedBundle/API/c/ |
H A D | WKBundlePrivate.h | 58 WK_EXPORT void WKBundleAddUserScript(WKBundleRef bundle, WKBundlePageGroupRef pageGroup, WKBundleScriptWorldRef scriptWorld, WKStringRef source, WKURLRef url, WKArrayRef whitelist, WKArrayRef blacklist, WKUserScriptInjectionTime injectionTime, WKUserContentInjectedFrames injectedFrames); 59 WK_EXPORT void WKBundleAddUserStyleSheet(WKBundleRef bundle, WKBundlePageGroupRef pageGroup, WKBundleScriptWorldRef scriptWorld, WKStringRef source, WKURLRef url, WKArrayRef whitelist, WKArrayRef blacklist, WKUserContentInjectedFrames injectedFrames);
|
/external/webkit/Source/WebKit2/WebProcess/InjectedBundle/ |
H A D | InjectedBundle.h | 102 void addUserScript(WebPageGroupProxy*, InjectedBundleScriptWorld*, const String& source, const String& url, ImmutableArray* whitelist, ImmutableArray* blacklist, WebCore::UserScriptInjectionTime, WebCore::UserContentInjectedFrames); 103 void addUserStyleSheet(WebPageGroupProxy*, InjectedBundleScriptWorld*, const String& source, const String& url, ImmutableArray* whitelist, ImmutableArray* blacklist, WebCore::UserContentInjectedFrames);
|
H A D | InjectedBundle.cpp | 216 void InjectedBundle::addUserScript(WebPageGroupProxy* pageGroup, InjectedBundleScriptWorld* scriptWorld, const String& source, const String& url, ImmutableArray* whitelist, ImmutableArray* blacklist, WebCore::UserScriptInjectionTime injectionTime, WebCore::UserContentInjectedFrames injectedFrames) argument 219 PageGroup::pageGroup(pageGroup->identifier())->addUserScriptToWorld(scriptWorld->coreWorld(), source, KURL(KURL(), url), toStringVector(whitelist), toStringVector(blacklist), injectionTime, injectedFrames); 222 void InjectedBundle::addUserStyleSheet(WebPageGroupProxy* pageGroup, InjectedBundleScriptWorld* scriptWorld, const String& source, const String& url, ImmutableArray* whitelist, ImmutableArray* blacklist, WebCore::UserContentInjectedFrames injectedFrames) argument 225 PageGroup::pageGroup(pageGroup->identifier())->addUserStyleSheetToWorld(scriptWorld->coreWorld(), source, KURL(KURL(), url), toStringVector(whitelist), toStringVector(blacklist), injectedFrames);
|
/external/dhcpcd/ |
H A D | if-options.h | 112 in_addr_t *whitelist; member in struct:if_options
|
H A D | if-options.c | 100 {"whitelist", required_argument, NULL, 'W'}, 700 ifo->whitelist = xrealloc(ifo->whitelist, 702 ifo->whitelist[ifo->whitelist_len++] = addr.s_addr; 703 ifo->whitelist[ifo->whitelist_len++] = addr2.s_addr;
|
/external/chromium/chrome/browser/chromeos/ |
H A D | user_cros_settings_provider.cc | 136 std::vector<std::string> whitelist; local 137 if (!SignedSettings::EnumerateWhitelist(&whitelist)) { 138 LOG(WARNING) << "Failed to retrieve user whitelist."; 148 for (size_t i = 0; i < whitelist.size(); ++i) { 149 const std::string& email = whitelist[i]; 235 VLOG(1) << "Setting user whitelist is not implemented. Please use " 236 "whitelist/unwhitelist instead."; 388 VLOG(1) << "Add " << email << " to whitelist, code=" << code; 390 // Reload the whitelist on settings op failure. 398 VLOG(1) << "Remove " << email << " from whitelist, cod 536 const ListValue* whitelist = cached_whitelist(); local [all...] |
/external/webkit/Source/WebKit/mac/WebView/ |
H A D | WebViewPrivate.h | 514 // - allowDestinationSubdomains: If host is a domain, setting this to YES will whitelist host and all its subdomains, recursively. 522 + (void)_addUserScriptToGroup:(NSString *)groupName world:(WebScriptWorld *)world source:(NSString *)source url:(NSURL *)url whitelist:(NSArray *)whitelist blacklist:(NSArray *)blacklist injectionTime:(WebUserScriptInjectionTime)injectionTime; 523 + (void)_addUserStyleSheetToGroup:(NSString *)groupName world:(WebScriptWorld *)world source:(NSString *)source url:(NSURL *)url whitelist:(NSArray *)whitelist blacklist:(NSArray *)blacklist; 525 + (void)_addUserScriptToGroup:(NSString *)groupName world:(WebScriptWorld *)world source:(NSString *)source url:(NSURL *)url whitelist:(NSArray *)whitelist blacklist:(NSArray *)blacklist injectionTime:(WebUserScriptInjectionTime)injectionTime injectedFrames:(WebUserContentInjectedFrames)injectedFrames; 526 + (void)_addUserStyleSheetToGroup:(NSString *)groupName world:(WebScriptWorld *)world source:(NSString *)source url:(NSURL *)url whitelist:(NSArray *)whitelist blacklist:(NSArray *)blacklist injectedFrames:(WebUserContentInjectedFrames)injectedFrames;
|
H A D | WebView.mm | 2586 whitelist:(NSArray *)whitelist blacklist:(NSArray *)blacklist 2589 [WebView _addUserScriptToGroup:groupName world:world source:source url:url whitelist:whitelist blacklist:blacklist injectionTime:injectionTime injectedFrames:WebInjectInAllFrames]; 2593 whitelist:(NSArray *)whitelist blacklist:(NSArray *)blacklist 2605 pageGroup->addUserScriptToWorld(core(world), source, url, toStringVector(whitelist), toStringVector(blacklist), 2611 whitelist:(NSArray *)whitelist blacklist:(NSArray *)blacklist 2613 [WebView _addUserStyleSheetToGroup:groupName world:world source:source url:url whitelist [all...] |
/external/valgrind/tsan/ |
H A D | thread_sanitizer.h | 61 vector<string> whitelist; member in struct:FLAGS
|
/external/webkit/Source/WebKit/win/Interfaces/ |
H A D | IWebViewPrivate.idl | 188 [in] unsigned whitelistCount, [in, size_is(whitelistCount)] BSTR* whitelist, 192 [in] unsigned whitelistCount, [in, size_is(whitelistCount)] BSTR* whitelist, 209 // - allowDestinationSubdomains: If host is a domain, setting this to YES will whitelist host and all its subdomains, recursively.
|
/external/libnfc-nxp/src/ |
H A D | phHciNfc_AdminMgmt.c | 100 uint8_t whitelist[WHITELIST_MAX_LEN]; member in struct:phHciNfc_AdminGate_Info 476 p_admin_info->whitelist[i] = i + 2; 480 (uint8_t *)p_admin_info->whitelist, i ); 1177 p_admin_info->whitelist[i] = reg_value[i];
|
/external/chromium/chrome/common/extensions/ |
H A D | extension.cc | 153 Extension::ScriptingWhitelist* whitelist() { return &scripting_whitelist_; } function in class:__anon1950::ExtensionConfig 167 // A whitelist of extensions that can script anywhere. Do not add to this 2578 const Extension::ScriptingWhitelist& whitelist) { 2580 ExtensionConfig::GetInstance()->whitelist(); 2582 for (ScriptingWhitelist::const_iterator it = whitelist.begin(); 2583 it != whitelist.end(); ++it) { 2590 return ExtensionConfig::GetInstance()->whitelist(); 2868 ScriptingWhitelist* whitelist = 2869 ExtensionConfig::GetInstance()->whitelist(); 2871 for (ScriptingWhitelist::const_iterator it = whitelist 2577 SetScriptingWhitelist( const Extension::ScriptingWhitelist& whitelist) argument [all...] |
H A D | extension.h | 466 // Adds an extension to the scripting whitelist. Used for testing only. 467 static void SetScriptingWhitelist(const ScriptingWhitelist& whitelist); 553 // on the whitelist of extensions that can script all pages.
|
/external/webkit/Source/WebCore/loader/appcache/ |
H A D | ApplicationCacheStorage.cpp | 628 // When a cache is deleted, all its entries and its whitelist should be deleted. 727 // Store the online whitelist 743 // Store online whitelist wildcard flag. 1110 // Load the online whitelist 1116 Vector<KURL> whitelist; local 1118 whitelist.append(KURL(ParsedURLString, whitelistStatement.getColumnText(0))); 1121 LOG_ERROR("Could not load cache online whitelist, error \"%s\"", m_database.lastErrorMsg()); 1123 cache->setOnlineWhitelist(whitelist); 1125 // Load online whitelist wildcard flag. 1133 LOG_ERROR("Could not load cache online whitelist wildcar [all...] |
/external/webkit/Tools/DumpRenderTree/mac/ |
H A D | LayoutTestControllerMac.mm | 817 [WebView _addUserScriptToGroup:@"org.webkit.DumpRenderTree" world:[WebScriptWorld world] source:sourceNS url:nil whitelist:nil blacklist:nil injectionTime:(runAtStart ? WebInjectAtDocumentStart : WebInjectAtDocumentEnd) injectedFrames:(allFrames ? WebInjectInAllFrames : WebInjectInTopFrameOnly)]; 824 [WebView _addUserStyleSheetToGroup:@"org.webkit.DumpRenderTree" world:[WebScriptWorld world] source:sourceNS url:nil whitelist:nil blacklist:nil injectedFrames:(allFrames ? WebInjectInAllFrames : WebInjectInTopFrameOnly)];
|