Searched defs:allowed (Results 1 - 25 of 55) sorted by relevance

123

/external/webkit/Source/WebKit/chromium/src/
H A DWebGeolocationPermissionRequest.cpp44 void WebGeolocationPermissionRequest::setIsAllowed(bool allowed) argument
46 m_private->setIsAllowed(allowed);
H A DWebGeolocationClientMock.cpp80 void WebGeolocationClientMock::setPermission(bool allowed) argument
82 m_clientMock->setPermission(allowed);
/external/chromium/base/threading/
H A Dthread_restrictions.cc27 bool ThreadRestrictions::SetIOAllowed(bool allowed) { argument
29 g_io_disallowed.Get().Set(!allowed);
38 "disallows IO! If this thread really should be allowed to "
45 bool ThreadRestrictions::SetSingletonAllowed(bool allowed) { argument
47 g_singleton_disallowed.Get().Set(!allowed);
54 LOG(FATAL) << "LazyInstance/Singleton is not allowed to be used on this "
H A Dthread_restrictions.h21 // 1) If a thread should not be allowed to make IO calls, mark it:
23 // By default, threads *are* allowed to make IO calls.
27 // current thread is allowed:
48 // Whether IO is allowed when the ScopedAllowIO was constructed.
61 // Whether singleton use is allowed when the ScopedAllowSingleton was
70 // Threads start out in the *allowed* state.
72 static bool SetIOAllowed(bool allowed);
74 // Check whether the current thread is allowed to make IO calls,
81 static bool SetSingletonAllowed(bool allowed);
83 // Check whether the current thread is allowed t
89 SetIOAllowed(bool allowed) argument
91 SetSingletonAllowed(bool allowed) argument
[all...]
/external/libsepol/include/sepol/policydb/
H A Dflask_types.h55 sepol_access_vector_t allowed; member in struct:sepol_av_decision
/external/webkit/Source/WebCore/bindings/
H A DScriptControllerBase.cpp42 const bool allowed = m_frame->loader()->client()->allowJavaScript(settings && settings->isJavaScriptEnabled()); local
43 if (!allowed && reason == AboutToExecuteScript)
45 return allowed;
/external/webkit/Source/WebKit2/UIProcess/
H A DGeolocationPermissionRequestManagerProxy.cpp57 void GeolocationPermissionRequestManagerProxy::didReceiveGeolocationPermissionDecision(uint64_t geolocationID, bool allowed) argument
66 m_page->process()->send(Messages::WebPage::DidReceiveGeolocationPermissionDecision(geolocationID, allowed), m_page->pageID());
/external/webkit/Source/WebKit2/WebProcess/Geolocation/
H A DGeolocationPermissionRequestManager.cpp78 void GeolocationPermissionRequestManager::didReceiveGeolocationPermissionDecision(uint64_t geolocationID, bool allowed) argument
85 geolocation->setIsAllowed(allowed);
/external/webkit/Tools/DumpRenderTree/chromium/
H A DNotificationPresenter.cpp136 bool allowed = m_allowedOrigins.find(origin) != m_allowedOrigins.end(); local
137 return allowed ? WebNotificationPresenter::PermissionAllowed
/external/chromium/chrome/browser/
H A Dcontent_setting_image_model.cc153 // If any embedded site has access the allowed icon takes priority over the
157 bool allowed = local
159 set_icon(allowed ? IDR_GEOLOCATION_ALLOWED_LOCATIONBAR_ICON :
161 set_tooltip(l10n_util::GetStringUTF8(allowed ?
/external/chromium/chrome/browser/geolocation/
H A Dgeolocation_settings_state.cc24 const GURL& requesting_origin, bool allowed) {
26 allowed ? CONTENT_SETTING_ALLOW : CONTENT_SETTING_BLOCK;
23 OnGeolocationPermissionSet( const GURL& requesting_origin, bool allowed) argument
H A Dgeolocation_permission_context_unittest.cc86 void CheckPermissionMessageSent(int bridge_id, bool allowed);
87 void CheckPermissionMessageSentForTab(int tab, int bridge_id, bool allowed);
90 bool allowed);
122 bool allowed) {
123 CheckPermissionMessageSentInternal(process(), bridge_id, allowed); local
129 bool allowed) {
131 extra_tabs_[tab]->render_view_host()->process()), bridge_id, allowed);
137 bool allowed) {
146 EXPECT_EQ(allowed, param.b);
120 CheckPermissionMessageSent( int bridge_id, bool allowed) argument
126 CheckPermissionMessageSentForTab( int tab, int bridge_id, bool allowed) argument
134 CheckPermissionMessageSentInternal( MockRenderProcessHost* process, int bridge_id, bool allowed) argument
/external/chromium/chrome/browser/notifications/
H A Dnotifications_prefs_cache.cc39 const std::vector<GURL>& allowed) {
41 allowed_origins_.insert(allowed.begin(), allowed.end());
38 SetCacheAllowedOrigins( const std::vector<GURL>& allowed) argument
/external/openssh/
H A Dreadpass.c174 int allowed = 0; local
188 allowed = 1;
192 return (allowed);
H A Dauth-rsa.c168 int allowed = 0; local
248 /* break out, this key is allowed */
249 allowed = 1;
256 /* return key if allowed */
257 if (allowed && rkey != NULL)
262 return allowed;
267 * return key if login is allowed, NULL otherwise
274 u_int i, allowed = 0; local
278 for (i = 0; !allowed && i < options.num_authkeys_files; i++) {
281 allowed
[all...]
H A Dauth-options.c433 char *command, *allowed; local
503 if ((allowed = buffer_get_cstring_ret(&data,
509 if (strlen(allowed) != clen) {
517 xfree(allowed);
522 allowed)) {
525 xfree(allowed);
538 xfree(allowed);
543 xfree(allowed);
/external/webkit/Source/WebKit/android/WebCoreSupport/
H A DGeolocationManager.cpp102 void GeolocationManager::setMockPermission(bool allowed) argument
105 mockClient()->setPermission(allowed);
H A DGeolocationPermissions.cpp292 bool allowed = false; local
296 allowed = iter->second;
297 return allowed;
/external/webkit/Tools/DumpRenderTree/win/
H A DDRTDesktopNotificationPresenter.cpp128 bool allowed = ::gLayoutTestController->checkDesktopNotificationPermission(jsOrigin); local
130 if (allowed)
/external/libselinux/include/selinux/
H A Dselinux.h109 access_vector_t allowed; member in struct:av_decision
/external/webkit/Source/WebCore/platform/mock/
H A DGeolocationClientMock.cpp76 void GeolocationClientMock::setPermission(bool allowed) argument
78 m_permissionState = allowed ? PermissionStateAllowed : PermissionStateDenied;
113 bool allowed = m_permissionState == PermissionStateAllowed; local
121 (*it)->setIsAllowed(allowed);
/external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/
H A DSSLEngineImplTest.java95 // with the server not allowed to session creation
877 * of the peers is not allowed to create the session.
879 private void doNoRenegotiationTest(SSLEngine allowed, argument
890 allowed.getSession().getPacketBufferSize();
902 allowed.beginHandshake();
910 while (allowed.getHandshakeStatus().equals(
912 print(result = allowed.wrap(app_data_plain, buffer));
919 System.out.println("\nNot allowed unwraps the message");
996 print(result = allowed.unwrap(buffer, app_data_plain));
999 assertEquals("Responce from the peer not allowed t
[all...]
/external/chromium/chrome/browser/tab_contents/
H A Dtab_specific_content_settings.cc210 bool allowed) {
212 allowed);
214 delegate_->OnContentSettingsAccessed(!allowed);
208 OnGeolocationPermissionSet( const GURL& requesting_origin, bool allowed) argument
/external/libppp/src/
H A Dsystems.c230 int f, mode, allowed; local
232 allowed = 0;
238 allowed |= mode;
241 modeok = modereq & allowed ? 1 : 0;
/external/webkit/Source/WebCore/loader/
H A DSubframeLoader.cpp294 bool allowed = m_frame->loader()->client()->allowPlugins(settings && settings->arePluginsEnabled()); local
295 if (!allowed && reason == AboutToInstantiatePlugin)
297 return allowed;

Completed in 446 milliseconds

123