/external/webkit/Source/WebKit/chromium/src/ |
H A D | WebGeolocationPermissionRequest.cpp | 44 void WebGeolocationPermissionRequest::setIsAllowed(bool allowed) argument 46 m_private->setIsAllowed(allowed);
|
H A D | WebGeolocationClientMock.cpp | 80 void WebGeolocationClientMock::setPermission(bool allowed) argument 82 m_clientMock->setPermission(allowed);
|
/external/chromium/base/threading/ |
H A D | thread_restrictions.cc | 27 bool ThreadRestrictions::SetIOAllowed(bool allowed) { argument 29 g_io_disallowed.Get().Set(!allowed); 38 "disallows IO! If this thread really should be allowed to " 45 bool ThreadRestrictions::SetSingletonAllowed(bool allowed) { argument 47 g_singleton_disallowed.Get().Set(!allowed); 54 LOG(FATAL) << "LazyInstance/Singleton is not allowed to be used on this "
|
H A D | thread_restrictions.h | 21 // 1) If a thread should not be allowed to make IO calls, mark it: 23 // By default, threads *are* allowed to make IO calls. 27 // current thread is allowed: 48 // Whether IO is allowed when the ScopedAllowIO was constructed. 61 // Whether singleton use is allowed when the ScopedAllowSingleton was 70 // Threads start out in the *allowed* state. 72 static bool SetIOAllowed(bool allowed); 74 // Check whether the current thread is allowed to make IO calls, 81 static bool SetSingletonAllowed(bool allowed); 83 // Check whether the current thread is allowed t 89 SetIOAllowed(bool allowed) argument 91 SetSingletonAllowed(bool allowed) argument [all...] |
/external/libsepol/include/sepol/policydb/ |
H A D | flask_types.h | 55 sepol_access_vector_t allowed; member in struct:sepol_av_decision
|
/external/webkit/Source/WebCore/bindings/ |
H A D | ScriptControllerBase.cpp | 42 const bool allowed = m_frame->loader()->client()->allowJavaScript(settings && settings->isJavaScriptEnabled()); local 43 if (!allowed && reason == AboutToExecuteScript) 45 return allowed;
|
/external/webkit/Source/WebKit2/UIProcess/ |
H A D | GeolocationPermissionRequestManagerProxy.cpp | 57 void GeolocationPermissionRequestManagerProxy::didReceiveGeolocationPermissionDecision(uint64_t geolocationID, bool allowed) argument 66 m_page->process()->send(Messages::WebPage::DidReceiveGeolocationPermissionDecision(geolocationID, allowed), m_page->pageID());
|
/external/webkit/Source/WebKit2/WebProcess/Geolocation/ |
H A D | GeolocationPermissionRequestManager.cpp | 78 void GeolocationPermissionRequestManager::didReceiveGeolocationPermissionDecision(uint64_t geolocationID, bool allowed) argument 85 geolocation->setIsAllowed(allowed);
|
/external/webkit/Tools/DumpRenderTree/chromium/ |
H A D | NotificationPresenter.cpp | 136 bool allowed = m_allowedOrigins.find(origin) != m_allowedOrigins.end(); local 137 return allowed ? WebNotificationPresenter::PermissionAllowed
|
/external/chromium/chrome/browser/ |
H A D | content_setting_image_model.cc | 153 // If any embedded site has access the allowed icon takes priority over the 157 bool allowed = local 159 set_icon(allowed ? IDR_GEOLOCATION_ALLOWED_LOCATIONBAR_ICON : 161 set_tooltip(l10n_util::GetStringUTF8(allowed ?
|
/external/chromium/chrome/browser/geolocation/ |
H A D | geolocation_settings_state.cc | 24 const GURL& requesting_origin, bool allowed) { 26 allowed ? CONTENT_SETTING_ALLOW : CONTENT_SETTING_BLOCK; 23 OnGeolocationPermissionSet( const GURL& requesting_origin, bool allowed) argument
|
H A D | geolocation_permission_context_unittest.cc | 86 void CheckPermissionMessageSent(int bridge_id, bool allowed); 87 void CheckPermissionMessageSentForTab(int tab, int bridge_id, bool allowed); 90 bool allowed); 122 bool allowed) { 123 CheckPermissionMessageSentInternal(process(), bridge_id, allowed); local 129 bool allowed) { 131 extra_tabs_[tab]->render_view_host()->process()), bridge_id, allowed); 137 bool allowed) { 146 EXPECT_EQ(allowed, param.b); 120 CheckPermissionMessageSent( int bridge_id, bool allowed) argument 126 CheckPermissionMessageSentForTab( int tab, int bridge_id, bool allowed) argument 134 CheckPermissionMessageSentInternal( MockRenderProcessHost* process, int bridge_id, bool allowed) argument
|
/external/chromium/chrome/browser/notifications/ |
H A D | notifications_prefs_cache.cc | 39 const std::vector<GURL>& allowed) { 41 allowed_origins_.insert(allowed.begin(), allowed.end()); 38 SetCacheAllowedOrigins( const std::vector<GURL>& allowed) argument
|
/external/openssh/ |
H A D | readpass.c | 174 int allowed = 0; local 188 allowed = 1; 192 return (allowed);
|
H A D | auth-rsa.c | 168 int allowed = 0; local 248 /* break out, this key is allowed */ 249 allowed = 1; 256 /* return key if allowed */ 257 if (allowed && rkey != NULL) 262 return allowed; 267 * return key if login is allowed, NULL otherwise 274 u_int i, allowed = 0; local 278 for (i = 0; !allowed && i < options.num_authkeys_files; i++) { 281 allowed [all...] |
H A D | auth-options.c | 433 char *command, *allowed; local 503 if ((allowed = buffer_get_cstring_ret(&data, 509 if (strlen(allowed) != clen) { 517 xfree(allowed); 522 allowed)) { 525 xfree(allowed); 538 xfree(allowed); 543 xfree(allowed);
|
/external/webkit/Source/WebKit/android/WebCoreSupport/ |
H A D | GeolocationManager.cpp | 102 void GeolocationManager::setMockPermission(bool allowed) argument 105 mockClient()->setPermission(allowed);
|
H A D | GeolocationPermissions.cpp | 292 bool allowed = false; local 296 allowed = iter->second; 297 return allowed;
|
/external/webkit/Tools/DumpRenderTree/win/ |
H A D | DRTDesktopNotificationPresenter.cpp | 128 bool allowed = ::gLayoutTestController->checkDesktopNotificationPermission(jsOrigin); local 130 if (allowed)
|
/external/libselinux/include/selinux/ |
H A D | selinux.h | 109 access_vector_t allowed; member in struct:av_decision
|
/external/webkit/Source/WebCore/platform/mock/ |
H A D | GeolocationClientMock.cpp | 76 void GeolocationClientMock::setPermission(bool allowed) argument 78 m_permissionState = allowed ? PermissionStateAllowed : PermissionStateDenied; 113 bool allowed = m_permissionState == PermissionStateAllowed; local 121 (*it)->setIsAllowed(allowed);
|
/external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/ |
H A D | SSLEngineImplTest.java | 95 // with the server not allowed to session creation 877 * of the peers is not allowed to create the session. 879 private void doNoRenegotiationTest(SSLEngine allowed, argument 890 allowed.getSession().getPacketBufferSize(); 902 allowed.beginHandshake(); 910 while (allowed.getHandshakeStatus().equals( 912 print(result = allowed.wrap(app_data_plain, buffer)); 919 System.out.println("\nNot allowed unwraps the message"); 996 print(result = allowed.unwrap(buffer, app_data_plain)); 999 assertEquals("Responce from the peer not allowed t [all...] |
/external/chromium/chrome/browser/tab_contents/ |
H A D | tab_specific_content_settings.cc | 210 bool allowed) { 212 allowed); 214 delegate_->OnContentSettingsAccessed(!allowed); 208 OnGeolocationPermissionSet( const GURL& requesting_origin, bool allowed) argument
|
/external/libppp/src/ |
H A D | systems.c | 230 int f, mode, allowed; local 232 allowed = 0; 238 allowed |= mode; 241 modeok = modereq & allowed ? 1 : 0;
|
/external/webkit/Source/WebCore/loader/ |
H A D | SubframeLoader.cpp | 294 bool allowed = m_frame->loader()->client()->allowPlugins(settings && settings->arePluginsEnabled()); local 295 if (!allowed && reason == AboutToInstantiatePlugin) 297 return allowed;
|