/external/chromium_org/third_party/WebKit/Source/modules/notifications/ |
H A D | NotificationPermissionCallback.idl | 27 void handleEvent(DOMString permission);
|
H A D | NotificationPermissionCallback.h | 36 virtual void handleEvent(const String& permission) = 0;
|
/external/chromium_org/chrome/common/extensions/permissions/ |
H A D | media_galleries_permission_data.cc | 23 return permission_ == specific_param.permission; 38 std::string permission; 39 TrimWhitespaceASCII(raw_permission, TRIM_ALL, &permission); 41 if (permission == MediaGalleriesPermission::kAllAutoDetectedPermission || 42 permission == MediaGalleriesPermission::kReadPermission || 43 permission == MediaGalleriesPermission::kCopyToPermission || 44 permission == MediaGalleriesPermission::kDeletePermission) { 45 permission_ = permission;
|
H A D | media_galleries_permission.h | 16 // <media-galleries-permission-pattern> 29 explicit CheckParam(const std::string& permission) argument 30 : permission(permission) {} 31 const std::string permission; member in struct:extensions::MediaGalleriesPermission::CheckParam
|
H A D | media_galleries_permission.cc | 18 // copyTo permission requires delete permission as a prerequisite. 19 // delete permission requires read permission as a prerequisite. 58 if (it->permission() == kAllAutoDetectedPermission) { 61 if (it->permission() == kReadPermission) { 65 if (it->permission() == kCopyToPermission) { 69 if (it->permission() == kDeletePermission) { 95 if (it->permission() == kAllAutoDetectedPermission) 97 else if (it->permission() [all...] |
H A D | socket_permission_data.h | 17 // A pattern that can be used to match socket permission. 18 // <socket-permission-pattern> 37 // The multicast membership permission implies a permission to any address. 61 bool ParseForTest(const std::string& permission) { return Parse(permission); } argument 73 bool Parse(const std::string& permission);
|
H A D | media_galleries_permission_data.h | 39 std::string permission() const { return permission_; } function in class:extensions::MediaGalleriesPermissionData 43 std::string& permission() { return permission_; } function in class:extensions::MediaGalleriesPermissionData
|
H A D | usb_device_permission_unittest.cc | 52 UsbDevicePermission permission( 54 ASSERT_TRUE(permission.FromValue(permission_list.get())); 56 PermissionMessages messages = permission.GetMessages();
|
/external/chromium_org/ppapi/shared_impl/ |
H A D | ppp_flash_browser_operations_shared.h | 17 : permission(PP_FLASH_BROWSEROPERATIONS_PERMISSION_DEFAULT) { 22 permission(in_permission) { 26 PP_Flash_BrowserOperations_Permission permission; member in struct:ppapi::FlashSiteSetting
|
/external/chromium_org/chrome/browser/extensions/ |
H A D | suggest_permission_util.cc | 25 void SuggestAPIPermissionInDevToolsConsole(APIPermission::ID permission, argument 32 PermissionsInfo::GetInstance()->GetByID(permission); 38 "Is the '%s' permission appropriate? See %s.", 47 void SuggestAPIPermissionInDevToolsConsole(APIPermission::ID permission, argument 59 SuggestAPIPermissionInDevToolsConsole(permission, extension, host); 64 APIPermission::ID permission, 67 if (extension && extension->HasAPIPermission(permission)) 71 SuggestAPIPermissionInDevToolsConsole(permission, extension, host); 77 APIPermission::ID permission, 80 if (extension && extension->HasAPIPermission(permission)) 63 IsExtensionWithPermissionOrSuggestInConsole( APIPermission::ID permission, const Extension* extension, content::RenderViewHost* host) argument 76 IsExtensionWithPermissionOrSuggestInConsole( APIPermission::ID permission, const Extension* extension, Profile* profile) argument [all...] |
H A D | suggest_permission_util.h | 20 // Outputs a suggestion in the developer tools console to use |permission|. 21 void SuggestAPIPermissionInDevToolsConsole(APIPermission::ID permission, 25 // Outputs a suggestion in the developer tools console to use |permission|. 26 void SuggestAPIPermissionInDevToolsConsole(APIPermission::ID permission, 30 // Checks that |extension| is not NULL and that it has |permission|. If not 31 // and extension, just returns false. If an extension without |permission| 34 APIPermission::ID permission, 38 // Checks that |extension| is not NULL and that it has |permission|. If not 39 // and extension, just returns false. If an extension without |permission| 42 APIPermission::ID permission, [all...] |
/external/chromium_org/chrome/common/extensions/api/sockets/ |
H A D | sockets_manifest_data.cc | 13 scoped_ptr<SocketsManifestPermission> permission) 14 : permission_(permission.Pass()) { 33 return data->permission()->CheckRequest(extension, request); 42 scoped_ptr<SocketsManifestPermission> permission = local 44 if (!permission) 48 new SocketsManifestData(permission.Pass())).Pass(); 12 SocketsManifestData( scoped_ptr<SocketsManifestPermission> permission) argument
|
H A D | sockets_manifest_data.h | 28 scoped_ptr<SocketsManifestPermission> permission); 44 const SocketsManifestPermission* permission() const { function in class:extensions::SocketsManifestData
|
H A D | sockets_manifest_permission_unittest.cc | 34 static void AssertEmptyPermission(const SocketsManifestPermission* permission) { argument 35 EXPECT_TRUE(permission); 36 EXPECT_EQ(std::string(extensions::manifest_keys::kSockets), permission->id()); 37 EXPECT_EQ(permission->id(), permission->name()); 38 EXPECT_FALSE(permission->HasMessages()); 39 EXPECT_EQ(0u, permission->entries().size()); 51 scoped_ptr<SocketsManifestPermission> permission( 53 EXPECT_TRUE(permission) 54 << "Error parsing Value into permission [all...] |
/external/chromium_org/chrome/common/extensions/docs/server2/ |
H A D | permissions_data_source.py | 30 for name, permission in permissions.iteritems(): 32 if 'partial' in permission or not permission['platforms']: 38 if dependency.startswith('permission:'): 42 permission['partial'] = 'permissions/generic_description.html' 62 for permission in permission_features.values(): 63 if not 'anchor' in permission: 64 permission['anchor'] = permission['name'] 65 if 'partial' in permission [all...] |
/external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/ |
H A D | MyPermissionCollection.java | 35 public void add(Permission permission) {} argument 50 public boolean implies(Permission permission) { argument
|
H A D | MyPermission.java | 49 public boolean implies(Permission permission) { argument
|
/external/chromium_org/extensions/common/permissions/ |
H A D | api_permission_set_unittest.cc | 36 APIPermission* permission = NULL; local 45 permission = permission_info->CreateAPIPermission(); 51 if (!permission->FromValue(value.get())) { 59 apis1.insert(permission->Clone()); 62 expected_apis.insert(permission); 81 permission = permission_info->CreateAPIPermission(); 86 if (!permission->FromValue(value.get())) { 90 apis2.insert(permission); 97 permission = permission_info->CreateAPIPermission(); 104 if (!permission 124 APIPermission* permission = NULL; local 202 APIPermission* permission = NULL; local 273 APIPermission* permission = NULL; local [all...] |
H A D | manifest_permission_set.cc | 30 scoped_ptr<ManifestPermission> permission( 33 if (!permission) { 37 LOG(WARNING) << "Unknown permission[" << permission_name << "]."; 41 if (!permission->FromValue(permission_value)) { 47 LOG(WARNING) << "Parse permission failed."; 50 manifest_permissions->insert(permission.release()); 70 // permission should be a string or a single key dict.
|
H A D | permissions_info.cc | 91 void PermissionsInfo::RegisterPermission(APIPermissionInfo* permission) { argument 92 DCHECK(!ContainsKey(id_map_, permission->id())); 93 DCHECK(!ContainsKey(name_map_, permission->name())); 95 id_map_[permission->id()] = permission; 96 name_map_[permission->name()] = permission;
|
H A D | permission_set.h | 33 // Creates an empty permission set (e.g. default permissions). 36 // Creates a new permission set based on the specified data: the API 38 // hosts. The effective hosts of the newly created permission set will be 45 // Creates a new permission set equal to |set1| - |set2|, passing ownership of 50 // Creates a new permission set equal to the intersection of |set1| and 55 // Creates a new permission set equal to the union of |set1| and |set2|. 62 // Returns true if every API or host permission available to |set| is also 70 // Returns true if this is an empty set (e.g., the default permission set). 73 // Returns true if the set has the specified API permission. 74 bool HasAPIPermission(APIPermission::ID permission) cons [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/config/ |
H A D | ProviderConfigurationPermission.java | 10 * A permission class to define what can be done with the ConfigurableProvider interface. 24 * Note: permission checks are only enforced if a security manager is present. 107 Permission permission) 109 if (!(permission instanceof ProviderConfigurationPermission)) 114 if (!this.getName().equals(permission.getName())) 119 ProviderConfigurationPermission other = (ProviderConfigurationPermission)permission; 106 implies( Permission permission) argument
|
/external/chromium_org/ppapi/thunk/ |
H A D | ppb_talk_private_api.h | 23 PP_TalkPermission permission,
|
/external/chromium_org/ppapi/c/private/ |
H A D | ppp_flash_browser_operations.h | 60 PP_Flash_BrowserOperations_Permission permission; member in struct:PP_Flash_BrowserOperations_SiteSetting 125 * Gets permission settings. <code>callback</code> will be called exactly once 141 * Sets default permission. It applies to all sites except those with 147 * @param[in] permission The default permission. 156 PP_Flash_BrowserOperations_Permission permission, 159 * Sets site-specific permission. If a site has already got site-specific 160 * permission and it is not in <code>sites</code>, it won't be affected. 167 * <code>PP_FLASH_BROWSEROPERATIONS_PERMISSION_DEFAULT</code> permission, it 221 PP_Flash_BrowserOperations_Permission permission, [all...] |
/external/chromium/chrome/browser/extensions/ |
H A D | extension_preference_api.cc | 28 const char* permission; member in struct:__anon2151::PrefMappingEntry 44 "You do not have permission to access incognito preferences."; 47 "You do not have permission to access the preference '%s'. " 118 std::string* permission) { 123 *permission = it->second.second; 131 std::string* permission) { 136 *permission = it->second.second; 160 kPrefMapping[i].permission); 165 std::make_pair(event_name, kPrefMapping[i].permission); 231 std::string permission; local 116 FindBrowserPrefForExtensionPref(const std::string& extension_pref, std::string* browser_pref, std::string* permission) argument 129 FindEventForBrowserPref(const std::string& browser_pref, std::string* event_name, std::string* permission) argument 306 std::string permission; local 357 std::string permission; local 401 std::string permission; local [all...] |