Searched refs:allowed (Results 1 - 25 of 117) sorted by relevance

12345

/external/webkit/Source/WebKit/chromium/src/
H A DWebGeolocationPermissionRequest.cpp44 void WebGeolocationPermissionRequest::setIsAllowed(bool allowed) argument
46 m_private->setIsAllowed(allowed);
H A DWebGeolocationClientMock.cpp80 void WebGeolocationClientMock::setPermission(bool allowed) argument
82 m_clientMock->setPermission(allowed);
/external/chromium/base/threading/
H A Dthread_restrictions.cc27 bool ThreadRestrictions::SetIOAllowed(bool allowed) { argument
29 g_io_disallowed.Get().Set(!allowed);
38 "disallows IO! If this thread really should be allowed to "
45 bool ThreadRestrictions::SetSingletonAllowed(bool allowed) { argument
47 g_singleton_disallowed.Get().Set(!allowed);
54 LOG(FATAL) << "LazyInstance/Singleton is not allowed to be used on this "
H A Dthread_restrictions.h21 // 1) If a thread should not be allowed to make IO calls, mark it:
23 // By default, threads *are* allowed to make IO calls.
27 // current thread is allowed:
48 // Whether IO is allowed when the ScopedAllowIO was constructed.
61 // Whether singleton use is allowed when the ScopedAllowSingleton was
70 // Threads start out in the *allowed* state.
72 static bool SetIOAllowed(bool allowed);
74 // Check whether the current thread is allowed to make IO calls,
81 static bool SetSingletonAllowed(bool allowed);
83 // Check whether the current thread is allowed t
89 SetIOAllowed(bool allowed) argument
91 SetSingletonAllowed(bool allowed) argument
[all...]
/external/libsepol/include/sepol/policydb/
H A Dflask_types.h55 sepol_access_vector_t allowed; member in struct:sepol_av_decision
/external/webkit/Source/WebKit/mac/Plugins/
H A DWebNetscapeContainerCheckPrivate.h43 typedef uint32_t (*WKN_CheckIfAllowedToLoadURLProcPtr)(NPP npp, const char* url, const char* frame, void (*callbackFunc)(NPP npp, uint32_t, NPBool allowed, void* context), void* context);
47 uint32_t WKN_CheckIfAllowedToLoadURL(NPP npp, const char* url, const char* frame, void (*callbackFunc)(NPP npp, uint32_t, NPBool allowed, void* context), void* context);
H A DWebNetscapeContainerCheckContextInfo.h39 - (id)initWithCheckRequestID:(uint32_t)checkRequestID callbackFunc:(void (*)(NPP npp, uint32_t checkID, NPBool allowed, void* context))callbackFunc context:(void*)context;
H A DWebNetscapeContainerCheckContextInfo.mm32 - (id)initWithCheckRequestID:(uint32_t)checkRequestID callbackFunc:(void (*)(NPP npp, uint32_t checkID, NPBool allowed, void* context))callbackFunc context:(void*)context
/external/webkit/Source/WebKit2/UIProcess/
H A DGeolocationPermissionRequestManagerProxy.cpp57 void GeolocationPermissionRequestManagerProxy::didReceiveGeolocationPermissionDecision(uint64_t geolocationID, bool allowed) argument
66 m_page->process()->send(Messages::WebPage::DidReceiveGeolocationPermissionDecision(geolocationID, allowed), m_page->pageID());
/external/webkit/Source/WebCore/bindings/
H A DScriptControllerBase.cpp42 const bool allowed = m_frame->loader()->client()->allowJavaScript(settings && settings->isJavaScriptEnabled()); local
43 if (!allowed && reason == AboutToExecuteScript)
45 return allowed;
/external/webkit/Source/WebCore/platform/mock/
H A DGeolocationClientMock.cpp76 void GeolocationClientMock::setPermission(bool allowed) argument
78 m_permissionState = allowed ? PermissionStateAllowed : PermissionStateDenied;
113 bool allowed = m_permissionState == PermissionStateAllowed; local
121 (*it)->setIsAllowed(allowed);
/external/webkit/Source/WebKit2/WebProcess/Geolocation/
H A DGeolocationPermissionRequestManager.h47 void didReceiveGeolocationPermissionDecision(uint64_t geolocationID, bool allowed);
H A DGeolocationPermissionRequestManager.cpp78 void GeolocationPermissionRequestManager::didReceiveGeolocationPermissionDecision(uint64_t geolocationID, bool allowed) argument
85 geolocation->setIsAllowed(allowed);
/external/openssh/
H A Dauth-rsa.c168 int allowed = 0; local
248 /* break out, this key is allowed */
249 allowed = 1;
256 /* return key if allowed */
257 if (allowed && rkey != NULL)
262 return allowed;
267 * return key if login is allowed, NULL otherwise
274 u_int i, allowed = 0; local
278 for (i = 0; !allowed && i < options.num_authkeys_files; i++) {
281 allowed
[all...]
H A Dreadpass.c174 int allowed = 0; local
188 allowed = 1;
192 return (allowed);
/external/chromium/chrome/browser/
H A Dcontent_setting_image_model.cc153 // If any embedded site has access the allowed icon takes priority over the
157 bool allowed = local
159 set_icon(allowed ? IDR_GEOLOCATION_ALLOWED_LOCATIONBAR_ICON :
161 set_tooltip(l10n_util::GetStringUTF8(allowed ?
/external/chromium/chrome/browser/notifications/
H A Dnotifications_prefs_cache.cc39 const std::vector<GURL>& allowed) {
41 allowed_origins_.insert(allowed.begin(), allowed.end());
38 SetCacheAllowedOrigins( const std::vector<GURL>& allowed) argument
H A Dnotification_exceptions_table_model.cc115 std::vector<GURL> allowed(service_->GetAllowedOrigins());
117 entries_.reserve(allowed.size() + blocked.size());
118 for (size_t i = 0; i < allowed.size(); ++i)
119 entries_.push_back(Entry(allowed[i], CONTENT_SETTING_ALLOW));
H A Dnotifications_prefs_cache.h37 // Updates the cache with a new origin allowed or denied.
43 void SetCacheAllowedOrigins(const std::vector<GURL>& allowed);
/external/dbus/bus/
H A Dpolicy.c58 /* allow rules default to TRUE (only requested replies allowed)
65 /* allow rules default to TRUE (only requested replies allowed)
384 dbus_bool_t allowed; local
386 allowed = def;
430 allowed = rule->allow;
433 return allowed;
440 dbus_bool_t allowed; local
453 allowed = _dbus_unix_user_is_process_owner (uid);
455 allowed = list_allows_user (allowed,
875 dbus_bool_t allowed; local
1057 dbus_bool_t allowed; local
1249 dbus_bool_t allowed; local
[all...]
/external/chromium/chrome/browser/geolocation/
H A Dgeolocation_settings_state.h30 void OnGeolocationPermissionSet(const GURL& requesting_origin, bool allowed);
H A Dgeolocation_permission_context_unittest.cc86 void CheckPermissionMessageSent(int bridge_id, bool allowed);
87 void CheckPermissionMessageSentForTab(int tab, int bridge_id, bool allowed);
90 bool allowed);
122 bool allowed) {
123 CheckPermissionMessageSentInternal(process(), bridge_id, allowed); local
129 bool allowed) {
131 extra_tabs_[tab]->render_view_host()->process()), bridge_id, allowed);
137 bool allowed) {
146 EXPECT_EQ(allowed, param.b);
120 CheckPermissionMessageSent( int bridge_id, bool allowed) argument
126 CheckPermissionMessageSentForTab( int tab, int bridge_id, bool allowed) argument
134 CheckPermissionMessageSentInternal( MockRenderProcessHost* process, int bridge_id, bool allowed) argument
H A Dgeolocation_permission_context.cc81 bool allowed);
389 bool allowed) {
393 allowed ? CONTENT_SETTING_ALLOW : CONTENT_SETTING_BLOCK;
418 copied_request.bridge_id, copied_request.requesting_frame, allowed);
583 bool allowed) {
594 allowed);
600 render_view_id, bridge_id, allowed));
603 if (allowed) {
383 OnPermissionSet( int render_process_id, int render_view_id, int bridge_id, const GURL& requesting_frame, const GURL& embedder, bool allowed) argument
578 NotifyPermissionSet( int render_process_id, int render_view_id, int bridge_id, const GURL& requesting_frame, bool allowed) argument
H A Dgeolocation_settings_state.cc24 const GURL& requesting_origin, bool allowed) {
26 allowed ? CONTENT_SETTING_ALLOW : CONTENT_SETTING_BLOCK;
23 OnGeolocationPermissionSet( const GURL& requesting_origin, bool allowed) argument
/external/webkit/Tools/DumpRenderTree/win/
H A DDRTDesktopNotificationPresenter.cpp128 bool allowed = ::gLayoutTestController->checkDesktopNotificationPermission(jsOrigin); local
130 if (allowed)

Completed in 313 milliseconds

12345