/external/webkit/Source/WebKit/chromium/src/ |
H A D | WebGeolocationPermissionRequest.cpp | 44 void WebGeolocationPermissionRequest::setIsAllowed(bool allowed) argument 46 m_private->setIsAllowed(allowed);
|
H A D | WebGeolocationClientMock.cpp | 80 void WebGeolocationClientMock::setPermission(bool allowed) argument 82 m_clientMock->setPermission(allowed);
|
/external/chromium/base/threading/ |
H A D | thread_restrictions.cc | 27 bool ThreadRestrictions::SetIOAllowed(bool allowed) { argument 29 g_io_disallowed.Get().Set(!allowed); 38 "disallows IO! If this thread really should be allowed to " 45 bool ThreadRestrictions::SetSingletonAllowed(bool allowed) { argument 47 g_singleton_disallowed.Get().Set(!allowed); 54 LOG(FATAL) << "LazyInstance/Singleton is not allowed to be used on this "
|
H A D | thread_restrictions.h | 21 // 1) If a thread should not be allowed to make IO calls, mark it: 23 // By default, threads *are* allowed to make IO calls. 27 // current thread is allowed: 48 // Whether IO is allowed when the ScopedAllowIO was constructed. 61 // Whether singleton use is allowed when the ScopedAllowSingleton was 70 // Threads start out in the *allowed* state. 72 static bool SetIOAllowed(bool allowed); 74 // Check whether the current thread is allowed to make IO calls, 81 static bool SetSingletonAllowed(bool allowed); 83 // Check whether the current thread is allowed t 89 SetIOAllowed(bool allowed) argument 91 SetSingletonAllowed(bool allowed) argument [all...] |
/external/libsepol/include/sepol/policydb/ |
H A D | flask_types.h | 55 sepol_access_vector_t allowed; member in struct:sepol_av_decision
|
/external/webkit/Source/WebKit/mac/Plugins/ |
H A D | WebNetscapeContainerCheckPrivate.h | 43 typedef uint32_t (*WKN_CheckIfAllowedToLoadURLProcPtr)(NPP npp, const char* url, const char* frame, void (*callbackFunc)(NPP npp, uint32_t, NPBool allowed, void* context), void* context); 47 uint32_t WKN_CheckIfAllowedToLoadURL(NPP npp, const char* url, const char* frame, void (*callbackFunc)(NPP npp, uint32_t, NPBool allowed, void* context), void* context);
|
H A D | WebNetscapeContainerCheckContextInfo.h | 39 - (id)initWithCheckRequestID:(uint32_t)checkRequestID callbackFunc:(void (*)(NPP npp, uint32_t checkID, NPBool allowed, void* context))callbackFunc context:(void*)context;
|
H A D | WebNetscapeContainerCheckContextInfo.mm | 32 - (id)initWithCheckRequestID:(uint32_t)checkRequestID callbackFunc:(void (*)(NPP npp, uint32_t checkID, NPBool allowed, void* context))callbackFunc context:(void*)context
|
/external/webkit/Source/WebKit2/UIProcess/ |
H A D | GeolocationPermissionRequestManagerProxy.cpp | 57 void GeolocationPermissionRequestManagerProxy::didReceiveGeolocationPermissionDecision(uint64_t geolocationID, bool allowed) argument 66 m_page->process()->send(Messages::WebPage::DidReceiveGeolocationPermissionDecision(geolocationID, allowed), m_page->pageID());
|
/external/webkit/Source/WebCore/bindings/ |
H A D | ScriptControllerBase.cpp | 42 const bool allowed = m_frame->loader()->client()->allowJavaScript(settings && settings->isJavaScriptEnabled()); local 43 if (!allowed && reason == AboutToExecuteScript) 45 return allowed;
|
/external/webkit/Source/WebCore/platform/mock/ |
H A D | GeolocationClientMock.cpp | 76 void GeolocationClientMock::setPermission(bool allowed) argument 78 m_permissionState = allowed ? PermissionStateAllowed : PermissionStateDenied; 113 bool allowed = m_permissionState == PermissionStateAllowed; local 121 (*it)->setIsAllowed(allowed);
|
/external/webkit/Source/WebKit2/WebProcess/Geolocation/ |
H A D | GeolocationPermissionRequestManager.h | 47 void didReceiveGeolocationPermissionDecision(uint64_t geolocationID, bool allowed);
|
H A D | GeolocationPermissionRequestManager.cpp | 78 void GeolocationPermissionRequestManager::didReceiveGeolocationPermissionDecision(uint64_t geolocationID, bool allowed) argument 85 geolocation->setIsAllowed(allowed);
|
/external/openssh/ |
H A D | auth-rsa.c | 168 int allowed = 0; local 248 /* break out, this key is allowed */ 249 allowed = 1; 256 /* return key if allowed */ 257 if (allowed && rkey != NULL) 262 return allowed; 267 * return key if login is allowed, NULL otherwise 274 u_int i, allowed = 0; local 278 for (i = 0; !allowed && i < options.num_authkeys_files; i++) { 281 allowed [all...] |
H A D | readpass.c | 174 int allowed = 0; local 188 allowed = 1; 192 return (allowed);
|
/external/webkit/Source/WebKit/android/WebCoreSupport/ |
H A D | GeolocationManager.cpp | 102 void GeolocationManager::setMockPermission(bool allowed) argument 105 mockClient()->setPermission(allowed);
|
H A D | GeolocationManager.h | 66 void setMockPermission(bool allowed);
|
/external/chromium/chrome/browser/ |
H A D | content_setting_image_model.cc | 153 // If any embedded site has access the allowed icon takes priority over the 157 bool allowed = local 159 set_icon(allowed ? IDR_GEOLOCATION_ALLOWED_LOCATIONBAR_ICON : 161 set_tooltip(l10n_util::GetStringUTF8(allowed ?
|
/external/chromium/chrome/browser/notifications/ |
H A D | notifications_prefs_cache.cc | 39 const std::vector<GURL>& allowed) { 41 allowed_origins_.insert(allowed.begin(), allowed.end()); 38 SetCacheAllowedOrigins( const std::vector<GURL>& allowed) argument
|
H A D | notification_exceptions_table_model.cc | 115 std::vector<GURL> allowed(service_->GetAllowedOrigins()); 117 entries_.reserve(allowed.size() + blocked.size()); 118 for (size_t i = 0; i < allowed.size(); ++i) 119 entries_.push_back(Entry(allowed[i], CONTENT_SETTING_ALLOW));
|
H A D | notifications_prefs_cache.h | 37 // Updates the cache with a new origin allowed or denied. 43 void SetCacheAllowedOrigins(const std::vector<GURL>& allowed);
|
/external/dbus/bus/ |
H A D | policy.c | 58 /* allow rules default to TRUE (only requested replies allowed) 65 /* allow rules default to TRUE (only requested replies allowed) 384 dbus_bool_t allowed; local 386 allowed = def; 430 allowed = rule->allow; 433 return allowed; 440 dbus_bool_t allowed; local 453 allowed = _dbus_unix_user_is_process_owner (uid); 455 allowed = list_allows_user (allowed, 875 dbus_bool_t allowed; local 1057 dbus_bool_t allowed; local 1249 dbus_bool_t allowed; local [all...] |
/external/chromium/chrome/browser/geolocation/ |
H A D | geolocation_settings_state.h | 30 void OnGeolocationPermissionSet(const GURL& requesting_origin, bool allowed);
|
H A D | geolocation_permission_context_unittest.cc | 86 void CheckPermissionMessageSent(int bridge_id, bool allowed); 87 void CheckPermissionMessageSentForTab(int tab, int bridge_id, bool allowed); 90 bool allowed); 122 bool allowed) { 123 CheckPermissionMessageSentInternal(process(), bridge_id, allowed); local 129 bool allowed) { 131 extra_tabs_[tab]->render_view_host()->process()), bridge_id, allowed); 137 bool allowed) { 146 EXPECT_EQ(allowed, param.b); 120 CheckPermissionMessageSent( int bridge_id, bool allowed) argument 126 CheckPermissionMessageSentForTab( int tab, int bridge_id, bool allowed) argument 134 CheckPermissionMessageSentInternal( MockRenderProcessHost* process, int bridge_id, bool allowed) argument
|
/external/webkit/Tools/DumpRenderTree/win/ |
H A D | DRTDesktopNotificationPresenter.cpp | 128 bool allowed = ::gLayoutTestController->checkDesktopNotificationPermission(jsOrigin); local 130 if (allowed)
|