| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "chrome/common/pref_names.h" | 5 #include "chrome/common/pref_names.h" |
| 6 | 6 |
| 7 #include "base/basictypes.h" | 7 #include "base/basictypes.h" |
| 8 #include "chrome/common/pref_font_webkit_names.h" | 8 #include "chrome/common/pref_font_webkit_names.h" |
| 9 | 9 |
| 10 namespace prefs { | 10 namespace prefs { |
| (...skipping 309 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 320 const char kReverseAutologinEnabled[] = "reverse_autologin.enabled"; | 320 const char kReverseAutologinEnabled[] = "reverse_autologin.enabled"; |
| 321 | 321 |
| 322 // List to keep track of emails for which the user has rejected one-click | 322 // List to keep track of emails for which the user has rejected one-click |
| 323 // sign-in. | 323 // sign-in. |
| 324 const char kReverseAutologinRejectedEmailList[] = | 324 const char kReverseAutologinRejectedEmailList[] = |
| 325 "reverse_autologin.rejected_email_list"; | 325 "reverse_autologin.rejected_email_list"; |
| 326 | 326 |
| 327 // Boolean that is true when SafeBrowsing is enabled. | 327 // Boolean that is true when SafeBrowsing is enabled. |
| 328 const char kSafeBrowsingEnabled[] = "safebrowsing.enabled"; | 328 const char kSafeBrowsingEnabled[] = "safebrowsing.enabled"; |
| 329 | 329 |
| 330 // Enum that tell us whether malicious download reporting is: | 330 // Boolean that tell us whether malicious download feedback is enabled. |
| 331 // 0 - Not enabled because the user has not been prompted | 331 const char kSafeBrowsingDownloadFeedbackEnabled[] = |
| 332 // 1 - Disabled because the user does not want to participate | 332 "safebrowsing.download_feedback_enabled"; |
| 333 // 2 - Enabled | |
| 334 const char kSafeBrowsingDownloadReportingEnabled[] = | |
| 335 "safebrowsing.download_reporting_enabled"; | |
| 336 | 333 |
| 337 // Boolean that is true when SafeBrowsing Malware Report is enabled. | 334 // Boolean that is true when SafeBrowsing Malware Report is enabled. |
| 338 const char kSafeBrowsingReportingEnabled[] = | 335 const char kSafeBrowsingReportingEnabled[] = |
| 339 "safebrowsing.reporting_enabled"; | 336 "safebrowsing.reporting_enabled"; |
| 340 | 337 |
| 341 // Boolean that is true when the SafeBrowsing interstitial should not allow | 338 // Boolean that is true when the SafeBrowsing interstitial should not allow |
| 342 // users to proceed anyway. | 339 // users to proceed anyway. |
| 343 const char kSafeBrowsingProceedAnywayDisabled[] = | 340 const char kSafeBrowsingProceedAnywayDisabled[] = |
| 344 "safebrowsing.proceed_anyway_disabled"; | 341 "safebrowsing.proceed_anyway_disabled"; |
| 345 | 342 |
| (...skipping 2348 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 2694 | 2691 |
| 2695 // The number of seconds since epoch that the OS password was last changed. | 2692 // The number of seconds since epoch that the OS password was last changed. |
| 2696 const char kOsPasswordLastChanged[] = | 2693 const char kOsPasswordLastChanged[] = |
| 2697 "password_manager.os_password_last_changed"; | 2694 "password_manager.os_password_last_changed"; |
| 2698 #endif | 2695 #endif |
| 2699 | 2696 |
| 2700 // Whether DNS Quick Check is disabled in proxy resolution. | 2697 // Whether DNS Quick Check is disabled in proxy resolution. |
| 2701 const char kQuickCheckEnabled[] = "proxy.quick_check_enabled"; | 2698 const char kQuickCheckEnabled[] = "proxy.quick_check_enabled"; |
| 2702 | 2699 |
| 2703 } // namespace prefs | 2700 } // namespace prefs |
| OLD | NEW |