Searched refs:permission (Results 51 - 75 of 285) sorted by relevance

1234567891011>>

/external/chromium_org/extensions/common/api/bluetooth/
H A Dbluetooth_manifest_permission.cc30 bool ParseUuid(BluetoothManifestPermission* permission, argument
39 permission->AddPermission(uuid);
43 bool ParseUuidArray(BluetoothManifestPermission* permission, argument
49 if (!ParseUuid(permission, *it, error)) {
/external/chromium_org/extensions/common/api/sockets/
H A Dsockets_manifest_handler.cc39 return data->permission()->Clone();
H A Dsockets_manifest_permission.cc33 SocketsManifestPermission* permission,
44 permission->AddPermission(entry);
49 SocketsManifestPermission* permission,
58 permission, operation_type, *host_patterns->as_string, error);
66 if (!ParseHostPattern(permission, operation_type, *it, error)) {
75 const SocketsManifestPermission* permission,
80 permission->entries().begin();
81 it != permission->entries().end();
32 ParseHostPattern( SocketsManifestPermission* permission, content::SocketPermissionRequest::OperationType operation_type, const std::string& host_pattern, base::string16* error) argument
48 ParseHostPatterns( SocketsManifestPermission* permission, content::SocketPermissionRequest::OperationType operation_type, const scoped_ptr<SocketHostPatterns>& host_patterns, base::string16* error) argument
73 SetHostPatterns( scoped_ptr<SocketHostPatterns>& host_patterns, const SocketsManifestPermission* permission, content::SocketPermissionRequest::OperationType operation_type) argument
/external/chromium_org/extensions/common/permissions/
H A Dpermissions_info.h21 // A global object that holds the extension permission instances and provides
30 // Returns the permission with the given |id|, and NULL if it doesn't exist.
33 // Returns the permission with the given |name|, and NULL if none
37 // Returns a set containing all valid api permission ids.
40 // Converts all the permission names in |permission_names| to permission ids.
58 // Registers an |alias| for a given permission |name|.
61 // Registers a permission with the specified attributes and flags.
62 void RegisterPermission(APIPermissionInfo* permission);
64 // Maps permission id
[all...]
H A Dextensions_api_permissions.cc24 APIPermission* CreateAPIPermission(const APIPermissionInfo* permission) { argument
25 return new T(permission);
49 // Because warning messages for the "socket" permission vary based
73 // appear in the install permission dialogue, so we need a fake
74 // permission for it. See http://crbug.com/247857.
H A Dsettings_override_permission.cc14 const APIPermissionInfo* permission,
16 : APIPermission(permission), setting_value_(setting_value) {}
13 SettingsOverrideAPIPermission( const APIPermissionInfo* permission, const std::string& setting_value) argument
H A Dpermissions_data.cc143 bool PermissionsData::HasAPIPermission(APIPermission::ID permission) const {
144 return active_permissions()->HasAPIPermission(permission);
154 APIPermission::ID permission) const {
155 if (HasAPIPermission(permission))
164 return tab_permissions.get() && tab_permissions->HasAPIPermission(permission);
168 APIPermission::ID permission,
170 return active_permissions()->CheckAPIPermissionWithParam(permission, param);
167 CheckAPIPermissionWithParam( APIPermission::ID permission, const APIPermission::CheckParam* param) const argument
H A Dpermissions_data.h67 // Returns true if the |extension| can silently increase its permission level.
105 // Returns true if the |extension| has the given |permission|. Prefer
107 // api that requires a permission they didn't know about, e.g. open web apis.
108 // Note this does not include APIs with no corresponding permission, like
111 bool HasAPIPermission(APIPermission::ID permission) const;
113 bool HasAPIPermissionForTab(int tab_id, APIPermission::ID permission) const;
115 APIPermission::ID permission,
132 // permission grants access to all hosts (like <all_urls>) or an api
133 // permission that effectively grants access to all hosts (e.g. proxy,
137 // Returns the full list of permission message
[all...]
/external/chromium_org/ppapi/api/private/
H A Dppp_flash_browser_operations.idl33 PP_Flash_BrowserOperations_Permission permission;
87 * Gets permission settings. <code>callback</code> will be called exactly once
105 * Sets default permission. It applies to all sites except those with
111 * @param[in] permission The default permission.
121 [in] PP_Flash_BrowserOperations_Permission permission,
125 * Sets site-specific permission. If a site has already got site-specific
126 * permission and it is not in <code>sites</code>, it won't be affected.
133 * <code>PP_FLASH_BROWSEROPERATIONS_PERMISSION_DEFAULT</code> permission, it
H A Dppb_talk_private.idl20 * Request permission for screencast.
24 * Request permission for Remote Desktop.
28 * Request permission for continuing Remote Desktop.
76 * permission, or 0 if the user denied.
90 * Requests permission from the user using a system modal dialog.
92 * <code>permission</code> specifies the type of permission to request from
96 * as the result if the user gave permission, or 0 if the user denied.
105 [in] PP_TalkPermission permission,
/external/chromium_org/ppapi/c/private/
H A Dppb_talk_private.h36 * Request permission for screencast.
40 * Request permission for Remote Desktop.
44 * Request permission for continuing Remote Desktop.
101 * Requests permission from the user using a system modal dialog.
103 * <code>permission</code> specifies the type of permission to request from
107 * as the result if the user gave permission, or 0 if the user denied.
114 PP_TalkPermission permission,
/external/smack/src/org/apache/harmony/javax/security/auth/
H A DSubject.java505 // checks passed permission
557 // permission required to modify set
558 private transient AuthPermission permission; field in class:Subject.SecureSet
561 permission = perm;
565 // creates set from specified collection with specified permission
590 if (permission == _PRINCIPALS && !(Principal.class.isAssignableFrom(o.getClass()))) {
596 * verifies specified element, checks set state, and security permission
605 checkPermission(permission);
618 if (permission == _PRIVATE_CREDENTIALS) {
625 * checks permission t
[all...]
/external/chromium-libpac/
H A DAndroid.mk26 # DO NOT COPY without permission from WebView Owners
/external/chromium_org/base/test/
H A Dtest_file_util_posix.cc24 // Deny |permission| on the file |path|.
25 bool DenyFilePermission(const FilePath& path, mode_t permission) { argument
29 stat_buf.st_mode &= ~permission;
35 // Gets a blob indicating the permission information for |path|.
53 // Restores the permission information for |path|, given the blob retrieved
/external/chromium_org/chrome/browser/media/
H A Dmedia_stream_devices_controller.h37 MediaStreamTypeSettings(Permission permission,
42 Permission permission; member in struct:MediaStreamDevicesController::MediaStreamTypeSettings
105 // Sets the permission of the origin of the request. This is triggered when
117 // Return true if the type has been requested and permission is currently set
118 // to allowed. Note that it does not reflect the final permission decision.
120 // been blocked yet or not and the permission may be changed to blocked during
149 // Holds the requested media types and the permission for each type. It is
H A Dmedia_stream_devices_controller.cc90 Permission permission, const std::string& requested_device_id):
91 permission(permission), requested_device_id(requested_device_id) {}
94 MediaStreamTypeSettings(): permission(MEDIA_NONE) {}
116 // case take a ride on the MEDIA_DEVICE_*_CAPTURE permission. Should be fixed.
327 // TODO(raymes): We currently set the content permission for non-https
508 request_permissions_[content::MEDIA_DEVICE_AUDIO_CAPTURE].permission =
521 request_permissions_[content::MEDIA_DEVICE_VIDEO_CAPTURE].permission =
591 request_permissions_[content::MEDIA_DEVICE_AUDIO_CAPTURE].permission =
595 request_permissions_[content::MEDIA_DEVICE_VIDEO_CAPTURE].permission
89 MediaStreamTypeSettings( Permission permission, const std::string& requested_device_id) argument
[all...]
/external/chromium_org/content/ppapi_plugin/
H A Dbroker_process_dispatcher.cc64 ppapi::FlashSiteSetting(sites[i].site, sites[i].permission));
192 PP_Flash_BrowserOperations_Permission permission,
196 SetDefaultPermission(plugin_data_path, setting_type, permission,
275 PP_Flash_BrowserOperations_Permission permission,
280 data_str.c_str(), setting_type, permission,
287 data_str.c_str(), setting_type, permission,
307 site_array[i].permission = sites[i].permission;
188 OnSetDefaultPermission( uint32 request_id, const base::FilePath& plugin_data_path, PP_Flash_BrowserOperations_SettingType setting_type, PP_Flash_BrowserOperations_Permission permission, bool clear_site_specific) argument
272 SetDefaultPermission( const base::FilePath& plugin_data_path, PP_Flash_BrowserOperations_SettingType setting_type, PP_Flash_BrowserOperations_Permission permission, bool clear_site_specific) argument
H A Dbroker_process_dispatcher.h55 PP_Flash_BrowserOperations_Permission permission,
76 PP_Flash_BrowserOperations_Permission permission,
/external/chromium_org/extensions/browser/
H A Dinfo_map.h75 // |process_id| with the specified |permission|.
79 extensions::APIPermission::ID permission,
83 // |origin| in |process_id| with |permission|.
86 extensions::APIPermission::ID permission)
H A Dinfo_map.cc135 APIPermission::ID permission,
143 extension->permissions_data()->HasAPIPermission(permission) &&
154 (*i)->permissions_data()->HasAPIPermission(permission)) {
162 APIPermission::ID permission)
166 origin, process_id, permission, &extensions);
132 GetExtensionsWithAPIPermissionForSecurityOrigin( const GURL& origin, int process_id, APIPermission::ID permission, ExtensionSet* extensions) const argument
/external/chromium_org/ppapi/proxy/
H A Dtalk_resource.cc28 PP_TalkPermission permission,
37 PpapiHostMsg_Talk_RequestPermission(permission),
27 RequestPermission( PP_TalkPermission permission, scoped_refptr<TrackedCallback> callback) argument
/external/chromium_org/third_party/WebKit/Source/modules/notifications/
H A DNotification.idl17 * this software without specific prior written permission.
40 [CallWith=ExecutionContext, MeasureAs=NotificationPermission] static readonly attribute DOMString permission;
/external/chromium_org/chrome/browser/renderer_host/pepper/
H A Dpepper_talk_host.cc32 PP_TalkPermission permission,
49 switch (permission) {
170 PP_TalkPermission permission) {
171 if (permission < PP_TALKPERMISSION_SCREENCAST ||
172 permission >= PP_TALKPERMISSION_NUM_PERMISSIONS)
184 permission,
31 GetPermissionOnUIThread( PP_TalkPermission permission, int render_process_id, int render_frame_id, ppapi::host::ReplyMessageContext reply) argument
168 OnRequestPermission( ppapi::host::HostMessageContext* context, PP_TalkPermission permission) argument
/external/chromium_org/extensions/common/manifest_handlers/
H A Dpermissions_parser.cc49 // Custom checks for the experimental permission that can't be expressed in
100 // Parses the host and api permissions from the specified permission |key|
141 // two systems should be updated together whenever a permission is added.
189 // Check if it's a host pattern permission.
236 // It's probably an unknown API permission. Do not throw an error so
308 APIPermission::ID permission) {
311 ->initial_required_permissions_->api_permissions.insert(permission);
316 APIPermission* permission) {
319 ->initial_required_permissions_->api_permissions.insert(permission);
324 APIPermission::ID permission) {
307 AddAPIPermission(Extension* extension, APIPermission::ID permission) argument
315 AddAPIPermission(Extension* extension, APIPermission* permission) argument
323 HasAPIPermission(const Extension* extension, APIPermission::ID permission) argument
[all...]
/external/chromium_org/chrome/browser/resources/options/
H A Dwebsite_settings.css46 .permission-name {
52 #website-settings-edit-page .permission-selection-option {
58 #website-settings-permission-column {
101 .origin-permission-list {
164 .permission-option {

Completed in 1010 milliseconds

1234567891011>>