/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
H A D | PKIXCertPathValidatorSpi.java | 40 private final static CertBlacklist blacklist = new CertBlacklist(); field in class:PKIXCertPathValidatorSpi 90 if (blacklist.isSerialNumberBlackListed(serial)) { 277 if (blacklist.isPublicKeyBlackListed(workingPublicKey)) {
|
/external/webkit/Source/WebCore/page/ |
H A D | UserScript.h | 42 PassOwnPtr<Vector<String> > whitelist, PassOwnPtr<Vector<String> > blacklist, 47 , m_blacklist(blacklist) 56 const Vector<String>* blacklist() const { return m_blacklist.get(); } function in class:WebCore::UserScript 41 UserScript(const String& source, const KURL& url, PassOwnPtr<Vector<String> > whitelist, PassOwnPtr<Vector<String> > blacklist, UserScriptInjectionTime injectionTime, UserContentInjectedFrames injectedFrames) argument
|
H A D | UserStyleSheet.h | 42 PassOwnPtr<Vector<String> > whitelist, PassOwnPtr<Vector<String> > blacklist, 47 , m_blacklist(blacklist) 56 const Vector<String>* blacklist() const { return m_blacklist.get(); } function in class:WebCore::UserStyleSheet 41 UserStyleSheet(const String& source, const KURL& url, PassOwnPtr<Vector<String> > whitelist, PassOwnPtr<Vector<String> > blacklist, UserContentInjectedFrames injectedFrames, UserStyleLevel level) argument
|
H A D | UserContentURLPattern.cpp | 33 bool UserContentURLPattern::matchesPatterns(const KURL& url, const Vector<String>* whitelist, const Vector<String>* blacklist) argument 35 // In order for a URL to be a match it has to be present in the whitelist and not present in the blacklist. 49 if (blacklist) { 50 for (unsigned i = 0; i < blacklist->size(); ++i) { 51 UserContentURLPattern contentPattern(blacklist->at(i));
|
H A D | PageGroup.cpp | 369 PassOwnPtr<Vector<String> > whitelist, PassOwnPtr<Vector<String> > blacklist, 374 OwnPtr<UserScript> userScript(new UserScript(source, url, whitelist, blacklist, injectionTime, injectedFrames)); 384 PassOwnPtr<Vector<String> > whitelist, PassOwnPtr<Vector<String> > blacklist, 391 OwnPtr<UserStyleSheet> userStyleSheet(new UserStyleSheet(source, url, whitelist, blacklist, injectedFrames, level)); 368 addUserScriptToWorld(DOMWrapperWorld* world, const String& source, const KURL& url, PassOwnPtr<Vector<String> > whitelist, PassOwnPtr<Vector<String> > blacklist, UserScriptInjectionTime injectionTime, UserContentInjectedFrames injectedFrames) argument 383 addUserStyleSheetToWorld(DOMWrapperWorld* world, const String& source, const KURL& url, PassOwnPtr<Vector<String> > whitelist, PassOwnPtr<Vector<String> > blacklist, UserContentInjectedFrames injectedFrames, UserStyleLevel level, UserStyleInjectionTime injectionTime) argument
|
/external/chromium/chrome/browser/ |
H A D | enumerate_modules_model_unittest_win.cc | 104 ModuleEnumerator::BlacklistEntry blacklist; member in struct:MatchingEntryList 200 ModuleEnumerator::BlacklistEntry blacklist = local 201 kMatchineEntryList[i].blacklist; 206 ModuleEnumerator::Match(test, blacklist));
|
/external/chromium/chrome/browser/translate/ |
H A D | translate_prefs.cc | 224 const ListValue* blacklist = prefs_->GetList(pref_id); local 225 return (blacklist && !blacklist->empty() && IsValueInList(blacklist, value)); 232 ListValue* blacklist = update.Get(); local 233 if (!blacklist) { 234 NOTREACHED() << "Unregistered translate blacklist pref"; 237 blacklist->Append(new StringValue(value)); 247 ListValue* blacklist = update.Get(); local 248 if (!blacklist) { [all...] |
/external/dhcpcd/ |
H A D | if-options.h | 112 in_addr_t *blacklist; member in struct:if_options
|
/external/webkit/Source/WebKit2/WebProcess/InjectedBundle/ |
H A D | InjectedBundle.cpp | 216 void InjectedBundle::addUserScript(WebPageGroupProxy* pageGroup, InjectedBundleScriptWorld* scriptWorld, const String& source, const String& url, ImmutableArray* whitelist, ImmutableArray* blacklist, WebCore::UserScriptInjectionTime injectionTime, WebCore::UserContentInjectedFrames injectedFrames) argument 219 PageGroup::pageGroup(pageGroup->identifier())->addUserScriptToWorld(scriptWorld->coreWorld(), source, KURL(KURL(), url), toStringVector(whitelist), toStringVector(blacklist), injectionTime, injectedFrames); 222 void InjectedBundle::addUserStyleSheet(WebPageGroupProxy* pageGroup, InjectedBundleScriptWorld* scriptWorld, const String& source, const String& url, ImmutableArray* whitelist, ImmutableArray* blacklist, WebCore::UserContentInjectedFrames injectedFrames) argument 225 PageGroup::pageGroup(pageGroup->identifier())->addUserStyleSheetToWorld(scriptWorld->coreWorld(), source, KURL(KURL(), url), toStringVector(whitelist), toStringVector(blacklist), injectedFrames);
|
/external/chromium/chrome/browser/extensions/ |
H A D | extension_updater.cc | 55 // Update AppID for extension blacklist. 56 const char* ExtensionUpdater::kBlacklistAppID = "com.google.crx.blacklist"; 796 NOTREACHED() << "Fetched blacklist checksum is not as expected. " 801 std::vector<std::string> blacklist; local 802 base::SplitString(data, '\n', &blacklist); 805 service_->UpdateExtensionBlacklist(blacklist); 807 // Update the pref value for blacklist version 968 // Start a fetch of the blacklist if needed. 971 // url here to avoid DNS hijacking of the blacklist, which is not validated
|
H A D | extension_updater_unittest.cc | 107 const std::vector<std::string>& blacklist) { 301 const std::vector<std::string>& blacklist) { 395 // Disable blacklist checks (tested elsewhere) so that we only see the 475 EXPECT_EQ("com.google.crx.blacklist", params["id"]); 783 std::string id = "com.google.crx.blacklist"; 803 // blacklist. 106 UpdateExtensionBlacklist( const std::vector<std::string>& blacklist) argument 300 UpdateExtensionBlacklist( const std::vector<std::string>& blacklist) argument
|
H A D | extension_prefs.cc | 41 const char kPrefBlacklist[] = "blacklist"; 61 // Path for settings specific to blacklist update. 464 const ListValue* blacklist = local 466 if (!blacklist || blacklist->empty()) 482 // Then check the blacklist (the admin blacklist, not the Google blacklist). 483 if (blacklist) { 484 for (ListValue::const_iterator it = blacklist [all...] |
H A D | extension_service.cc | 1165 const std::vector<std::string>& blacklist) { 1166 // Use this set to indicate if an extension in the blacklist has been used. 1168 for (unsigned int i = 0; i < blacklist.size(); ++i) { 1169 if (Extension::IdIsValid(blacklist[i])) { 1170 blacklist_set.insert(blacklist[i]); 1164 UpdateExtensionBlacklist( const std::vector<std::string>& blacklist) argument
|
H A D | extension_service_unittest.cc | 2305 // Test pref settings for blacklist and unblacklist extensions. 2308 std::vector<std::string> blacklist; local 2309 blacklist.push_back(good0); 2310 blacklist.push_back("invalid_id"); // an invalid id 2311 blacklist.push_back(good1); 2312 service_->UpdateExtensionBlacklist(blacklist); 2316 // blacklist is set for good0,1,2 2317 ValidateBooleanPref(good0, "blacklist", true); 2318 ValidateBooleanPref(good1, "blacklist", true); 2320 EXPECT_FALSE(IsPrefExist("invalid_id", "blacklist")); 2345 std::vector<std::string> blacklist; local 2367 std::vector<std::string> blacklist; local 2397 std::vector<std::string> blacklist; local 2428 ListValue* blacklist = update.Get(); local 2466 ListValue* blacklist = update.Get(); local [all...] |
/external/chromium/chrome/browser/history/ |
H A D | top_sites.cc | 355 DictionaryValue* blacklist = update.Get(); local 356 blacklist->SetWithoutPathExpansion(GetURLHash(url), dummy); 367 DictionaryValue* blacklist = update.Get(); local 368 blacklist->RemoveWithoutPathExpansion(GetURLHash(url), NULL); 383 DictionaryValue* blacklist = update.Get(); local 384 blacklist->Clear(); 740 // We don't use canonical URLs here to be able to blacklist only one of
|
/external/wpa_supplicant_6/wpa_supplicant/ |
H A D | wpa_supplicant_i.h | 342 struct wpa_blacklist *blacklist; member in struct:wpa_supplicant
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | wpa_supplicant_i.h | 388 struct wpa_blacklist *blacklist; member in struct:wpa_supplicant
|
/external/chromium/chrome/browser/automation/ |
H A D | testing_automation_provider.cc | 3351 bool blacklist = false; local 3365 password_dict.GetBoolean("blacklist", &blacklist); 3379 password_form.blacklisted_by_user = blacklist;
|