/external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/ |
H A D | MyPermission.java | 49 public boolean implies(Permission permission) { argument
|
H A D | MyPermissionCollection.java | 35 public void add(Permission permission) {} argument 50 public boolean implies(Permission permission) { argument
|
/external/webkit/Source/WebKit/qt/WebCoreSupport/ |
H A D | GeolocationPermissionClientQt.cpp | 16 * this software without specific prior written permission. 80 void GeolocationPermissionClientQt::setPermission(QWebFrame* webFrame, QWebPage::PermissionPolicy permission) argument 87 if (permission == QWebPage::PermissionGrantedByUser) 89 else if (permission == QWebPage::PermissionDeniedByUser)
|
/external/bouncycastle/src/main/java/org/bouncycastle/jce/ |
H A D | ProviderConfigurationPermission.java | 10 * A permission class to define what can be done with the ConfigurableProvider interface. 24 * Note: permission checks are only enforced if a security manager is present. 94 Permission permission) 96 if (!(permission instanceof ProviderConfigurationPermission)) 101 if (!this.getName().equals(permission.getName())) 106 ProviderConfigurationPermission other = (ProviderConfigurationPermission)permission; 93 implies( Permission permission) argument
|
/external/webkit/Source/WebCore/html/parser/ |
H A D | HTMLDocumentParser.h | 63 static PassRefPtr<HTMLDocumentParser> create(DocumentFragment* fragment, Element* contextElement, FragmentScriptingPermission permission) argument 65 return adoptRef(new HTMLDocumentParser(fragment, contextElement, permission));
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
H A D | ProtectionDomainTest.java | 248 public boolean implies(ProtectionDomain domain, Permission permission) { argument 252 return super.implies(domain, permission);
|
/external/chromium/chrome/common/ |
H A D | web_apps.cc | 260 std::string permission; local 261 CHECK(permissions_value->GetString(i, &permission)); 262 permissions.push_back(permission);
|
/external/stlport/src/details/ |
H A D | fstream_stdio.cpp | 55 // map permission masks 173 long permission) 231 (void)permission; // currently unused //*TY 02/26/2000 - added to suppress warning message 172 _M_open(const char* name, ios_base::openmode openmode, long permission) argument
|
H A D | fstream_unistd.cpp | 156 long permission) 177 permission = 0; // Irrelevant unless we're writing. 193 file_no = OPEN(name, flags, permission); 155 _M_open(const char* name, ios_base::openmode openmode, long permission) argument
|
H A D | fstream_win32io.cpp | 219 long permission) { 244 permission = 0; // Irrelevant unless we're writing. 267 dwCreationDisposition, permission, 0); 218 _M_open(const char* name, ios_base::openmode openmode, long permission) argument
|
/external/chromium/chrome/browser/extensions/ |
H A D | extension_preference_api.cc | 28 const char* permission; member in struct:__anon1571::PrefMappingEntry 44 "You do not have permission to access incognito preferences."; 47 "You do not have permission to access the preference '%s'. " 118 std::string* permission) { 123 *permission = it->second.second; 131 std::string* permission) { 136 *permission = it->second.second; 160 kPrefMapping[i].permission); 165 std::make_pair(event_name, kPrefMapping[i].permission); 231 std::string permission; local 116 FindBrowserPrefForExtensionPref(const std::string& extension_pref, std::string* browser_pref, std::string* permission) argument 129 FindEventForBrowserPref(const std::string& browser_pref, std::string* event_name, std::string* permission) argument 306 std::string permission; local 357 std::string permission; local 401 std::string permission; local [all...] |
/external/chromium/chrome/common/extensions/ |
H A D | extension_unittest.cc | 1014 // TODO(erikkay) add a string for this permission. 1017 // The cookie permission does nothing unless you have associated host 1021 // The proxy permission is warned as part of host permission checks. 1024 // This permission requires explicit user action (context menu handler) 1041 Extension::Permission permission = Extension::kPermissions[i]; local 1042 if (skip.count(permission.name)) { 1043 EXPECT_EQ(ID_NONE, permission.message_id) 1044 << "unexpected message_id for " << permission.name; 1046 EXPECT_NE(ID_NONE, permission [all...] |
H A D | extension.cc | 104 // Names of API modules that do not require a permission. 132 // without asking for the module permission. In other words, functions you can 149 const std::string& permission) { 150 return Extension::kPermissions[permission_map_[permission]].message_id; 263 // Explicit permissions -- permission declaration required. 467 const std::string& permission) { 468 return ExtensionConfig::GetInstance()->GetPermissionMessageId(permission); 2221 // Remap the old unlimited storage permission name. 2226 // Check if it's a module permission. If so, enable that permission 148 GetPermissionMessageId( const std::string& permission) argument 466 GetPermissionMessageId( const std::string& permission) argument [all...] |
/external/webkit/Source/WebCore/dom/ |
H A D | XMLDocumentParserQt.cpp | 115 XMLDocumentParser::XMLDocumentParser(DocumentFragment* fragment, Element* parentElement, FragmentScriptingPermission permission) argument 137 , m_scriptingPermission(permission)
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
H A D | org.eclipse.osgi.services_3.2.100.v20100503.jar | ... ?defs= " () public void add (java.security.Permission) java.security.Permission permission
public boolean implies (java ... |
H A D | org.eclipse.equinox.launcher.jar | ... Main$EclipsePolicy) public void add (java.security.Permission) java.security.Permission permission
public boolean implies (java ... |
H A D | org.eclipse.equinox.launcher_1.1.0.v20100507.jar | ... Main$EclipsePolicy) public void add (java.security.Permission) java.security.Permission permission
public boolean implies (java ... |
H A D | org.eclipse.osgi_3.6.1.R36x_v20100806.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
H A D | org.eclipse.osgi_3.6.2.R36x_v20101103.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
/external/valgrind/main/coregrind/m_syswrap/ |
H A D | syswrap-darwin.c | 5817 vm_prot_t permission; member in struct:__anon12388 5825 req->size, req->offset, req->permission, req->parent_entry.type);
|
/external/kernel-headers/original/linux/ |
H A D | fs.h | 1101 int (*permission) (struct inode *, int, struct nameidata *); member in struct:inode_operations 1551 extern int permission(struct inode *, int, struct nameidata *);
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.eclipse.pde.build_3.6.1.R36x_v20100823/ |
H A D | pdebuild.jar | META-INF/ META-INF/MANIFEST.MF org/ org/eclipse/ org/eclipse/pde/ org/eclipse/pde/build/ ... |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.apache.ant_1.7.1.v20090120-1145/lib/ |
H A D | ant.jar | META-INF/ META-INF/MANIFEST.MF org/ org/apache/ org/apache/tools/ org/apache/tools/ant/ ... |