/external/chromium_org/chrome/common/extensions/api/sockets/ |
H A D | sockets_manifest_data.h | 28 scoped_ptr<SocketsManifestPermission> permission); 44 const SocketsManifestPermission* permission() const { function in class:extensions::SocketsManifestData
|
H A D | sockets_manifest_data.cc | 13 scoped_ptr<SocketsManifestPermission> permission) 14 : permission_(permission.Pass()) { 33 return data->permission()->CheckRequest(extension, request); 42 scoped_ptr<SocketsManifestPermission> permission = local 44 if (!permission) 48 new SocketsManifestData(permission.Pass())).Pass(); 12 SocketsManifestData( scoped_ptr<SocketsManifestPermission> permission) argument
|
/external/chromium_org/chrome/common/extensions/permissions/ |
H A D | media_galleries_permission_data.h | 39 std::string permission() const { return permission_; } function in class:extensions::MediaGalleriesPermissionData 43 std::string& permission() { return permission_; } function in class:extensions::MediaGalleriesPermissionData
|
H A D | media_galleries_permission.h | 16 // <media-galleries-permission-pattern> 29 explicit CheckParam(const std::string& permission) argument 30 : permission(permission) {} 31 const std::string permission; member in struct:extensions::MediaGalleriesPermission::CheckParam
|
H A D | socket_permission_data.h | 17 // A pattern that can be used to match socket permission. 18 // <socket-permission-pattern> 37 // The multicast membership permission implies a permission to any address. 61 bool ParseForTest(const std::string& permission) { return Parse(permission); } argument 73 bool Parse(const std::string& permission);
|
H A D | socket_permission_unittest.cc | 21 void ParseTest(const std::string& permission, argument 24 ASSERT_TRUE(data.ParseForTest(permission)) << "Parse permission \"" 25 << permission << "\" failed.";
|
H A D | chrome_api_permissions.cc | 25 const APIPermissionInfo* permission) { 26 return new T(permission); 70 // appear in the install permission dialogue, so we need a fake 71 // permission for it. See http://crbug.com/247857. 283 // Because warning messages for the "socket" permission vary based on the 302 // The permission string for "fileSystem" is only shown when "write" or 322 // Because warning messages for the "mediaGalleries" permission vary based 333 // Because warning messages for the "bluetooth" permission vary based on 24 CreateAPIPermission( const APIPermissionInfo* permission) argument
|
H A D | settings_override_permission.cc | 15 const APIPermissionInfo* permission, const std::string& setting_value) 16 : APIPermission(permission), 14 SettingsOverrideAPIPermission( const APIPermissionInfo* permission, const std::string& setting_value) argument
|
/external/chromium_org/ppapi/shared_impl/ |
H A D | ppp_flash_browser_operations_shared.h | 17 : permission(PP_FLASH_BROWSEROPERATIONS_PERMISSION_DEFAULT) { 22 permission(in_permission) { 26 PP_Flash_BrowserOperations_Permission permission; member in struct:ppapi::FlashSiteSetting
|
/external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/ |
H A D | MyPermission.java | 49 public boolean implies(Permission permission) { argument
|
H A D | MyPermissionCollection.java | 35 public void add(Permission permission) {} argument 50 public boolean implies(Permission permission) { argument
|
/external/chromium_org/chrome/browser/extensions/ |
H A D | suggest_permission_util.cc | 25 void SuggestAPIPermissionInDevToolsConsole(APIPermission::ID permission, argument 32 PermissionsInfo::GetInstance()->GetByID(permission); 38 "Is the '%s' permission appropriate? See %s.", 47 void SuggestAPIPermissionInDevToolsConsole(APIPermission::ID permission, argument 59 SuggestAPIPermissionInDevToolsConsole(permission, extension, host); 64 APIPermission::ID permission, 67 if (extension && extension->HasAPIPermission(permission)) 71 SuggestAPIPermissionInDevToolsConsole(permission, extension, host); 77 APIPermission::ID permission, 80 if (extension && extension->HasAPIPermission(permission)) 63 IsExtensionWithPermissionOrSuggestInConsole( APIPermission::ID permission, const Extension* extension, content::RenderViewHost* host) argument 76 IsExtensionWithPermissionOrSuggestInConsole( APIPermission::ID permission, const Extension* extension, Profile* profile) argument [all...] |
/external/chromium_org/extensions/common/permissions/ |
H A D | api_permission_set_unittest.cc | 36 APIPermission* permission = NULL; local 45 permission = permission_info->CreateAPIPermission(); 51 if (!permission->FromValue(value.get())) { 59 apis1.insert(permission->Clone()); 62 expected_apis.insert(permission); 81 permission = permission_info->CreateAPIPermission(); 86 if (!permission->FromValue(value.get())) { 90 apis2.insert(permission); 97 permission = permission_info->CreateAPIPermission(); 104 if (!permission 124 APIPermission* permission = NULL; local 202 APIPermission* permission = NULL; local 273 APIPermission* permission = NULL; local [all...] |
H A D | manifest_permission_set_unittest.cc | 133 ManifestPermission* permission = new MockManifestPermission("p3"); local 138 permissions1.insert(permission->Clone()); 141 expected_permissions.insert(permission);
|
H A D | api_permission_set.cc | 32 scoped_ptr<APIPermission> permission( 36 // An internal permission specified in permissions list is an error. 44 if (!permission->FromValue(permission_value)) { 50 LOG(WARNING) << "Parse permission failed."; 52 api_permissions->insert(permission.release()); 60 LOG(WARNING) << "Unknown permission[" << permission_str << "]."; 88 // permission should be a string 118 void APIPermissionSet::insert(APIPermission* permission) { argument 119 BaseSetOperators<APIPermissionSet>::insert(permission); 134 // permission shoul [all...] |
H A D | api_permission.cc | 18 explicit SimpleAPIPermission(const APIPermissionInfo* permission) argument 19 : APIPermission(permission) { }
|
H A D | permissions_info.cc | 91 void PermissionsInfo::RegisterPermission(APIPermissionInfo* permission) { argument 92 DCHECK(!ContainsKey(id_map_, permission->id())); 93 DCHECK(!ContainsKey(name_map_, permission->name())); 95 id_map_[permission->id()] = permission; 96 name_map_[permission->name()] = permission;
|
/external/chromium_org/ppapi/thunk/ |
H A D | ppb_talk_private_thunk.cc | 34 PP_TalkPermission permission, 40 enter.object()->RequestPermission(permission, enter.callback())); 33 RequestPermission(PP_Resource resource, PP_TalkPermission permission, PP_CompletionCallback callback) argument
|
/external/chromium_org/third_party/WebKit/Source/modules/notifications/ |
H A D | Notification.cpp | 17 * this software without specific prior written permission. 80 const String& Notification::permission(ExecutionContext* context) function in class:WebCore::Notification
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/config/ |
H A D | ProviderConfigurationPermission.java | 10 * A permission class to define what can be done with the ConfigurableProvider interface. 24 * Note: permission checks are only enforced if a security manager is present. 107 Permission permission) 109 if (!(permission instanceof ProviderConfigurationPermission)) 114 if (!this.getName().equals(permission.getName())) 119 ProviderConfigurationPermission other = (ProviderConfigurationPermission)permission; 106 implies( Permission permission) argument
|
/external/chromium_org/base/test/ |
H A D | test_file_util_posix.cc | 26 // Deny |permission| on the file |path|. 27 bool DenyFilePermission(const base::FilePath& path, mode_t permission) { argument 31 stat_buf.st_mode &= ~permission; 37 // Gets a blob indicating the permission information for |path|. 55 // Restores the permission information for |path|, given the blob retrieved
|
/external/chromium_org/chrome/browser/extensions/api/permissions/ |
H A D | permissions_api_helpers.cc | 32 "Invalid argument for permission '*'."; 36 "'*' is not a recognized permission."; 38 "Only the usbDevices permission supports arguments."; 96 APIPermission* permission = NULL; local 103 permission = new UsbDevicePermission(usb_device_permission_info); 109 CHECK(permission); 110 if (!permission->FromValue(permission_json.get())) { 114 apis.insert(permission);
|
/external/chromium_org/chrome/browser/media/ |
H A D | media_stream_devices_controller.h | 36 MediaStreamTypeSettings(Permission permission, 41 Permission permission; member in struct:MediaStreamDevicesController::MediaStreamTypeSettings 107 // Sets the permission of the origin of the request. This is triggered when 119 // Return true if the type has been requested and permission is currently set 120 // to allowed. Note that it does not reflect the final permission decision. 122 // been blocked yet or not and the permission may be changed to blocked during 147 // Holds the requested media types and the permission for each type. It is
|
/external/chromium_org/chrome/browser/media_galleries/ |
H A D | media_galleries_permissions_unittest.cc | 24 MediaGalleryPermission permission; local 25 permission.pref_id = gallery; 26 permission.has_permission = has_access; 27 vector->push_back(permission); 75 // Id4 isn't used to ensure that an empty permission list is ok.
|
/external/chromium_org/ppapi/c/private/ |
H A D | ppp_flash_browser_operations.h | 60 PP_Flash_BrowserOperations_Permission permission; member in struct:PP_Flash_BrowserOperations_SiteSetting 125 * Gets permission settings. <code>callback</code> will be called exactly once 141 * Sets default permission. It applies to all sites except those with 147 * @param[in] permission The default permission. 156 PP_Flash_BrowserOperations_Permission permission, 159 * Sets site-specific permission. If a site has already got site-specific 160 * permission and it is not in <code>sites</code>, it won't be affected. 167 * <code>PP_FLASH_BROWSEROPERATIONS_PERMISSION_DEFAULT</code> permission, it 221 PP_Flash_BrowserOperations_Permission permission, [all...] |