OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/common/pref_names.h" | 5 #include "chrome/common/pref_names.h" |
6 | 6 |
7 #include "base/basictypes.h" | 7 #include "base/basictypes.h" |
8 #include "chrome/common/pref_font_webkit_names.h" | 8 #include "chrome/common/pref_font_webkit_names.h" |
9 | 9 |
10 namespace prefs { | 10 namespace prefs { |
(...skipping 1285 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
1296 // explanation of why this redundancy is needed. | 1296 // explanation of why this redundancy is needed. |
1297 const char kProfileResetPromptMementosInLocalState[] = | 1297 const char kProfileResetPromptMementosInLocalState[] = |
1298 "profile.reset_prompt_mementos"; | 1298 "profile.reset_prompt_mementos"; |
1299 | 1299 |
1300 // Prefs for SSLConfigServicePref. | 1300 // Prefs for SSLConfigServicePref. |
1301 const char kCertRevocationCheckingEnabled[] = "ssl.rev_checking.enabled"; | 1301 const char kCertRevocationCheckingEnabled[] = "ssl.rev_checking.enabled"; |
1302 const char kCertRevocationCheckingRequiredLocalAnchors[] = | 1302 const char kCertRevocationCheckingRequiredLocalAnchors[] = |
1303 "ssl.rev_checking.required_for_local_anchors"; | 1303 "ssl.rev_checking.required_for_local_anchors"; |
1304 const char kSSLVersionMin[] = "ssl.version_min"; | 1304 const char kSSLVersionMin[] = "ssl.version_min"; |
1305 const char kSSLVersionMax[] = "ssl.version_max"; | 1305 const char kSSLVersionMax[] = "ssl.version_max"; |
| 1306 const char kSSLVersionFallbackMin[] = "ssl.version_fallback_min"; |
1306 const char kCipherSuiteBlacklist[] = "ssl.cipher_suites.blacklist"; | 1307 const char kCipherSuiteBlacklist[] = "ssl.cipher_suites.blacklist"; |
1307 const char kDisableSSLRecordSplitting[] = "ssl.ssl_record_splitting.disabled"; | 1308 const char kDisableSSLRecordSplitting[] = "ssl.ssl_record_splitting.disabled"; |
1308 | 1309 |
1309 // Dictionary of dates when a site's SSL blocking interstitial was proceeded | 1310 // Dictionary of dates when a site's SSL blocking interstitial was proceeded |
1310 // through. | 1311 // through. |
1311 const char kSSLBlockingBypassed[] = "ssl.ssl_blocking_bypassed"; | 1312 const char kSSLBlockingBypassed[] = "ssl.ssl_blocking_bypassed"; |
1312 | 1313 |
1313 // A boolean pref of the EULA accepted flag. | 1314 // A boolean pref of the EULA accepted flag. |
1314 const char kEulaAccepted[] = "EulaAccepted"; | 1315 const char kEulaAccepted[] = "EulaAccepted"; |
1315 | 1316 |
(...skipping 1017 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
2333 // Whether Guest Mode is enabled within the browser. | 2334 // Whether Guest Mode is enabled within the browser. |
2334 const char kBrowserGuestModeEnabled[] = "profile.browser_guest_enabled"; | 2335 const char kBrowserGuestModeEnabled[] = "profile.browser_guest_enabled"; |
2335 | 2336 |
2336 // Whether Adding a new Person is enabled within the user manager. | 2337 // Whether Adding a new Person is enabled within the user manager. |
2337 const char kBrowserAddPersonEnabled[] = "profile.add_person_enabled"; | 2338 const char kBrowserAddPersonEnabled[] = "profile.add_person_enabled"; |
2338 | 2339 |
2339 // A dictionary that maps user id to hardlock state. | 2340 // A dictionary that maps user id to hardlock state. |
2340 const char kEasyUnlockHardlockState[] = "easy_unlock.hardlock_state"; | 2341 const char kEasyUnlockHardlockState[] = "easy_unlock.hardlock_state"; |
2341 | 2342 |
2342 } // namespace prefs | 2343 } // namespace prefs |
OLD | NEW |