/external/chromium_org/chrome/browser/ui/website_settings/ |
H A D | permission_menu_model_unittest.cc | 20 void PermissionChanged(const WebsiteSettingsUI::PermissionInfo& permission) { argument 21 current_ = permission.setting; 31 WebsiteSettingsUI::PermissionInfo permission; local 32 permission.type = CONTENT_SETTINGS_TYPE_COOKIES; 33 permission.setting = CONTENT_SETTING_ALLOW; 34 permission.default_setting = CONTENT_SETTING_ALLOW; 36 GURL("http://www.google.com"), permission, callback.callback()); 42 WebsiteSettingsUI::PermissionInfo permission; local 43 permission.type = CONTENT_SETTINGS_TYPE_MEDIASTREAM; 44 permission [all...] |
/external/chromium_org/extensions/common/api/sockets/ |
H A D | sockets_manifest_data.h | 28 scoped_ptr<SocketsManifestPermission> permission); 43 const SocketsManifestPermission* permission() const { function in class:extensions::SocketsManifestData
|
H A D | sockets_manifest_data.cc | 13 scoped_ptr<SocketsManifestPermission> permission) 14 : permission_(permission.Pass()) { 32 return data->permission()->CheckRequest(extension, request); 41 scoped_ptr<SocketsManifestPermission> permission = local 43 if (!permission) 47 new SocketsManifestData(permission.Pass())).Pass(); 12 SocketsManifestData( scoped_ptr<SocketsManifestPermission> permission) argument
|
/external/chromium_org/extensions/common/permissions/ |
H A D | media_galleries_permission_data.h | 39 std::string permission() const { return permission_; } function in class:extensions::MediaGalleriesPermissionData 43 std::string& permission() { return permission_; } function in class:extensions::MediaGalleriesPermissionData
|
H A D | socket_permission_unittest.cc | 21 void ParseTest(const std::string& permission, argument 24 ASSERT_TRUE(data.ParseForTest(permission)) << "Parse permission \"" 25 << permission << "\" failed.";
|
H A D | api_permission_set_unittest.cc | 36 APIPermission* permission = NULL; local 45 permission = permission_info->CreateAPIPermission(); 51 ASSERT_TRUE(permission->FromValue(value.get(), NULL, NULL)); 57 apis1.insert(permission->Clone()); 60 expected_apis.insert(permission); 80 permission = permission_info->CreateAPIPermission(); 85 ASSERT_TRUE(permission->FromValue(value.get(), NULL, NULL)); 87 apis2.insert(permission); 94 permission = permission_info->CreateAPIPermission(); 101 ASSERT_TRUE(permission 119 APIPermission* permission = NULL; local 193 APIPermission* permission = NULL; local 259 APIPermission* permission = NULL; local [all...] |
H A D | extensions_api_permissions.cc | 24 APIPermission* CreateAPIPermission(const APIPermissionInfo* permission) { argument 25 return new T(permission); 49 // Because warning messages for the "socket" permission vary based 73 // appear in the install permission dialogue, so we need a fake 74 // permission for it. See http://crbug.com/247857.
|
H A D | manifest_permission_set_unittest.cc | 96 ManifestPermission* permission = new MockManifestPermission("p3"); local 101 permissions1.insert(permission->Clone()); 104 expected_permissions.insert(permission);
|
H A D | media_galleries_permission.h | 16 // <media-galleries-permission-pattern> 30 explicit CheckParam(const std::string& permission) argument 31 : permission(permission) {} 32 const std::string permission; member in struct:extensions::MediaGalleriesPermission::CheckParam
|
H A D | socket_permission_data.h | 22 // A pattern that can be used to match socket permission. 23 // <socket-permission-pattern> 42 // The multicast membership permission implies a permission to any address. 66 bool ParseForTest(const std::string& permission) { return Parse(permission); } argument 79 bool Parse(const std::string& permission);
|
H A D | api_permission.cc | 18 explicit SimpleAPIPermission(const APIPermissionInfo* permission) argument 19 : APIPermission(permission) { }
|
H A D | api_permission_set.cc | 32 scoped_ptr<APIPermission> permission( 36 // An internal permission specified in permissions list is an error. 45 if (!permission->FromValue(permission_value, &error_details, 60 LOG(WARNING) << "Parse permission failed."; 62 api_permissions->insert(permission.release()); 70 LOG(WARNING) << "Unknown permission[" << permission_str << "]."; 98 // permission should be a string 129 void APIPermissionSet::insert(APIPermission* permission) { argument 130 BaseSetOperators<APIPermissionSet>::insert(permission); 145 // permission shoul [all...] |
/external/chromium_org/chrome/common/extensions/permissions/ |
H A D | media_galleries_permission_unittest.cc | 21 void CheckFromValue(APIPermission* permission, base::ListValue* value, argument 25 EXPECT_EQ(success_expected, permission->FromValue(value, &error, &unhandled)); 34 scoped_ptr<APIPermission> permission( 41 CheckFromValue(permission.get(), value.get(), true); 48 CheckFromValue(permission.get(), value.get(), true); 53 CheckFromValue(permission.get(), value.get(), true); 58 CheckFromValue(permission.get(), value.get(), true); 63 CheckFromValue(permission.get(), value.get(), true); 69 CheckFromValue(permission.get(), value.get(), true); 75 CheckFromValue(permission [all...] |
H A D | chrome_api_permissions.cc | 23 const APIPermissionInfo* permission) { 24 return new T(permission); 287 // The permission string for "fileSystem" is only shown when 304 // Because warning messages for the "mediaGalleries" permission 22 CreateAPIPermission( const APIPermissionInfo* permission) argument
|
/external/chromium_org/extensions/browser/ |
H A D | suggest_permission_util.cc | 26 void SuggestAPIPermissionInDevToolsConsole(APIPermission::ID permission, argument 33 PermissionsInfo::GetInstance()->GetByID(permission); 39 "Is the '%s' permission appropriate? See %s.", 51 APIPermission::ID permission, 54 if (extension && extension->permissions_data()->HasAPIPermission(permission)) 58 SuggestAPIPermissionInDevToolsConsole(permission, extension, host); 50 IsExtensionWithPermissionOrSuggestInConsole( APIPermission::ID permission, const Extension* extension, content::RenderViewHost* host) argument
|
/external/chromium_org/extensions/common/api/bluetooth/ |
H A D | bluetooth_manifest_data.h | 25 scoped_ptr<BluetoothManifestPermission> permission); 43 const BluetoothManifestPermission* permission() const { function in class:extensions::BluetoothManifestData 51 // Used for checking bluetooth permission.
|
H A D | bluetooth_manifest_data.cc | 13 scoped_ptr<BluetoothManifestPermission> permission) 14 : permission_(permission.Pass()) { 31 return data && data->permission()->CheckRequest(extension, request); 38 return data && data->permission()->CheckSocketPermitted(extension); 45 return data && data->permission()->CheckLowEnergyPermitted(extension); 52 scoped_ptr<BluetoothManifestPermission> permission = local 54 if (!permission) 58 new BluetoothManifestData(permission.Pass())).Pass(); 12 BluetoothManifestData( scoped_ptr<BluetoothManifestPermission> permission) argument
|
/external/chromium_org/ppapi/shared_impl/ |
H A D | ppp_flash_browser_operations_shared.h | 17 : permission(PP_FLASH_BROWSEROPERATIONS_PERMISSION_DEFAULT) {} 20 : site(in_site), permission(in_permission) {} 23 PP_Flash_BrowserOperations_Permission permission; member in struct:ppapi::FlashSiteSetting
|
/external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/ |
H A D | MyPermission.java | 49 public boolean implies(Permission permission) { argument
|
H A D | MyPermissionCollection.java | 35 public void add(Permission permission) { argument 51 public boolean implies(Permission permission) { argument
|
/external/chromium_org/content/shell/browser/ |
H A D | shell_notification_manager.cc | 31 blink::WebNotificationPermission permission) { 32 permission_map_[origin] = permission; 29 SetPermission( const GURL& origin, blink::WebNotificationPermission permission) argument
|
/external/chromium_org/base/test/ |
H A D | test_file_util_posix.cc | 24 // Deny |permission| on the file |path|. 25 bool DenyFilePermission(const FilePath& path, mode_t permission) { argument 29 stat_buf.st_mode &= ~permission; 35 // Gets a blob indicating the permission information for |path|. 53 // Restores the permission information for |path|, given the blob retrieved
|
/external/chromium_org/ppapi/thunk/ |
H A D | ppb_talk_private_thunk.cc | 34 PP_TalkPermission permission, 40 enter.object()->RequestPermission(permission, enter.callback())); 33 RequestPermission(PP_Resource resource, PP_TalkPermission permission, PP_CompletionCallback callback) argument
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/config/ |
H A D | ProviderConfigurationPermission.java | 10 * A permission class to define what can be done with the ConfigurableProvider interface. 24 * Note: permission checks are only enforced if a security manager is present. 107 Permission permission) 109 if (!(permission instanceof ProviderConfigurationPermission)) 114 if (!this.getName().equals(permission.getName())) 119 ProviderConfigurationPermission other = (ProviderConfigurationPermission)permission; 106 implies( Permission permission) argument
|
/external/chromium_org/android_webview/java/src/org/chromium/android_webview/permission/ |
H A D | AwPermissionRequest.java | 5 package org.chromium.android_webview.permission; 15 * This class wraps permission request in Chromium side, and can only be created 75 + "the permission request is denied by default.");
|