/external/chromium_org/extensions/common/api/bluetooth/ |
H A D | bluetooth_manifest_permission.cc | 30 bool ParseUuid(BluetoothManifestPermission* permission, argument 39 permission->AddPermission(uuid); 43 bool ParseUuidArray(BluetoothManifestPermission* permission, argument 49 if (!ParseUuid(permission, *it, error)) {
|
/external/chromium_org/extensions/common/api/sockets/ |
H A D | sockets_manifest_handler.cc | 39 return data->permission()->Clone();
|
H A D | sockets_manifest_permission.cc | 33 SocketsManifestPermission* permission, 44 permission->AddPermission(entry); 49 SocketsManifestPermission* permission, 58 permission, operation_type, *host_patterns->as_string, error); 66 if (!ParseHostPattern(permission, operation_type, *it, error)) { 75 const SocketsManifestPermission* permission, 80 permission->entries().begin(); 81 it != permission->entries().end(); 32 ParseHostPattern( SocketsManifestPermission* permission, content::SocketPermissionRequest::OperationType operation_type, const std::string& host_pattern, base::string16* error) argument 48 ParseHostPatterns( SocketsManifestPermission* permission, content::SocketPermissionRequest::OperationType operation_type, const scoped_ptr<SocketHostPatterns>& host_patterns, base::string16* error) argument 73 SetHostPatterns( scoped_ptr<SocketHostPatterns>& host_patterns, const SocketsManifestPermission* permission, content::SocketPermissionRequest::OperationType operation_type) argument
|
/external/chromium_org/extensions/common/permissions/ |
H A D | permissions_info.h | 21 // A global object that holds the extension permission instances and provides 30 // Returns the permission with the given |id|, and NULL if it doesn't exist. 33 // Returns the permission with the given |name|, and NULL if none 37 // Returns a set containing all valid api permission ids. 40 // Converts all the permission names in |permission_names| to permission ids. 58 // Registers an |alias| for a given permission |name|. 61 // Registers a permission with the specified attributes and flags. 62 void RegisterPermission(APIPermissionInfo* permission); 64 // Maps permission id [all...] |
H A D | extensions_api_permissions.cc | 24 APIPermission* CreateAPIPermission(const APIPermissionInfo* permission) { argument 25 return new T(permission); 49 // Because warning messages for the "socket" permission vary based 73 // appear in the install permission dialogue, so we need a fake 74 // permission for it. See http://crbug.com/247857.
|
H A D | settings_override_permission.cc | 14 const APIPermissionInfo* permission, 16 : APIPermission(permission), setting_value_(setting_value) {} 13 SettingsOverrideAPIPermission( const APIPermissionInfo* permission, const std::string& setting_value) argument
|
H A D | permissions_data.cc | 143 bool PermissionsData::HasAPIPermission(APIPermission::ID permission) const { 144 return active_permissions()->HasAPIPermission(permission); 154 APIPermission::ID permission) const { 155 if (HasAPIPermission(permission)) 164 return tab_permissions.get() && tab_permissions->HasAPIPermission(permission); 168 APIPermission::ID permission, 170 return active_permissions()->CheckAPIPermissionWithParam(permission, param); 167 CheckAPIPermissionWithParam( APIPermission::ID permission, const APIPermission::CheckParam* param) const argument
|
H A D | permissions_data.h | 67 // Returns true if the |extension| can silently increase its permission level. 105 // Returns true if the |extension| has the given |permission|. Prefer 107 // api that requires a permission they didn't know about, e.g. open web apis. 108 // Note this does not include APIs with no corresponding permission, like 111 bool HasAPIPermission(APIPermission::ID permission) const; 113 bool HasAPIPermissionForTab(int tab_id, APIPermission::ID permission) const; 115 APIPermission::ID permission, 132 // permission grants access to all hosts (like <all_urls>) or an api 133 // permission that effectively grants access to all hosts (e.g. proxy, 137 // Returns the full list of permission message [all...] |
/external/chromium_org/ppapi/api/private/ |
H A D | ppp_flash_browser_operations.idl | 33 PP_Flash_BrowserOperations_Permission permission; 87 * Gets permission settings. <code>callback</code> will be called exactly once 105 * Sets default permission. It applies to all sites except those with 111 * @param[in] permission The default permission. 121 [in] PP_Flash_BrowserOperations_Permission permission, 125 * Sets site-specific permission. If a site has already got site-specific 126 * permission and it is not in <code>sites</code>, it won't be affected. 133 * <code>PP_FLASH_BROWSEROPERATIONS_PERMISSION_DEFAULT</code> permission, it
|
H A D | ppb_talk_private.idl | 20 * Request permission for screencast. 24 * Request permission for Remote Desktop. 28 * Request permission for continuing Remote Desktop. 76 * permission, or 0 if the user denied. 90 * Requests permission from the user using a system modal dialog. 92 * <code>permission</code> specifies the type of permission to request from 96 * as the result if the user gave permission, or 0 if the user denied. 105 [in] PP_TalkPermission permission,
|
/external/chromium_org/ppapi/c/private/ |
H A D | ppb_talk_private.h | 36 * Request permission for screencast. 40 * Request permission for Remote Desktop. 44 * Request permission for continuing Remote Desktop. 101 * Requests permission from the user using a system modal dialog. 103 * <code>permission</code> specifies the type of permission to request from 107 * as the result if the user gave permission, or 0 if the user denied. 114 PP_TalkPermission permission,
|
/external/smack/src/org/apache/harmony/javax/security/auth/ |
H A D | Subject.java | 505 // checks passed permission 557 // permission required to modify set 558 private transient AuthPermission permission; field in class:Subject.SecureSet 561 permission = perm; 565 // creates set from specified collection with specified permission 590 if (permission == _PRINCIPALS && !(Principal.class.isAssignableFrom(o.getClass()))) { 596 * verifies specified element, checks set state, and security permission 605 checkPermission(permission); 618 if (permission == _PRIVATE_CREDENTIALS) { 625 * checks permission t [all...] |
/external/chromium-libpac/ |
H A D | Android.mk | 26 # DO NOT COPY without permission from WebView Owners
|
/external/chromium_org/base/test/ |
H A D | test_file_util_posix.cc | 24 // Deny |permission| on the file |path|. 25 bool DenyFilePermission(const FilePath& path, mode_t permission) { argument 29 stat_buf.st_mode &= ~permission; 35 // Gets a blob indicating the permission information for |path|. 53 // Restores the permission information for |path|, given the blob retrieved
|
/external/chromium_org/chrome/browser/media/ |
H A D | media_stream_devices_controller.h | 37 MediaStreamTypeSettings(Permission permission, 42 Permission permission; member in struct:MediaStreamDevicesController::MediaStreamTypeSettings 105 // Sets the permission of the origin of the request. This is triggered when 117 // Return true if the type has been requested and permission is currently set 118 // to allowed. Note that it does not reflect the final permission decision. 120 // been blocked yet or not and the permission may be changed to blocked during 149 // Holds the requested media types and the permission for each type. It is
|
H A D | media_stream_devices_controller.cc | 90 Permission permission, const std::string& requested_device_id): 91 permission(permission), requested_device_id(requested_device_id) {} 94 MediaStreamTypeSettings(): permission(MEDIA_NONE) {} 116 // case take a ride on the MEDIA_DEVICE_*_CAPTURE permission. Should be fixed. 327 // TODO(raymes): We currently set the content permission for non-https 508 request_permissions_[content::MEDIA_DEVICE_AUDIO_CAPTURE].permission = 521 request_permissions_[content::MEDIA_DEVICE_VIDEO_CAPTURE].permission = 591 request_permissions_[content::MEDIA_DEVICE_AUDIO_CAPTURE].permission = 595 request_permissions_[content::MEDIA_DEVICE_VIDEO_CAPTURE].permission 89 MediaStreamTypeSettings( Permission permission, const std::string& requested_device_id) argument [all...] |
/external/chromium_org/content/ppapi_plugin/ |
H A D | broker_process_dispatcher.cc | 64 ppapi::FlashSiteSetting(sites[i].site, sites[i].permission)); 192 PP_Flash_BrowserOperations_Permission permission, 196 SetDefaultPermission(plugin_data_path, setting_type, permission, 275 PP_Flash_BrowserOperations_Permission permission, 280 data_str.c_str(), setting_type, permission, 287 data_str.c_str(), setting_type, permission, 307 site_array[i].permission = sites[i].permission; 188 OnSetDefaultPermission( uint32 request_id, const base::FilePath& plugin_data_path, PP_Flash_BrowserOperations_SettingType setting_type, PP_Flash_BrowserOperations_Permission permission, bool clear_site_specific) argument 272 SetDefaultPermission( const base::FilePath& plugin_data_path, PP_Flash_BrowserOperations_SettingType setting_type, PP_Flash_BrowserOperations_Permission permission, bool clear_site_specific) argument
|
H A D | broker_process_dispatcher.h | 55 PP_Flash_BrowserOperations_Permission permission, 76 PP_Flash_BrowserOperations_Permission permission,
|
/external/chromium_org/extensions/browser/ |
H A D | info_map.h | 75 // |process_id| with the specified |permission|. 79 extensions::APIPermission::ID permission, 83 // |origin| in |process_id| with |permission|. 86 extensions::APIPermission::ID permission)
|
H A D | info_map.cc | 135 APIPermission::ID permission, 143 extension->permissions_data()->HasAPIPermission(permission) && 154 (*i)->permissions_data()->HasAPIPermission(permission)) { 162 APIPermission::ID permission) 166 origin, process_id, permission, &extensions); 132 GetExtensionsWithAPIPermissionForSecurityOrigin( const GURL& origin, int process_id, APIPermission::ID permission, ExtensionSet* extensions) const argument
|
/external/chromium_org/ppapi/proxy/ |
H A D | talk_resource.cc | 28 PP_TalkPermission permission, 37 PpapiHostMsg_Talk_RequestPermission(permission), 27 RequestPermission( PP_TalkPermission permission, scoped_refptr<TrackedCallback> callback) argument
|
/external/chromium_org/third_party/WebKit/Source/modules/notifications/ |
H A D | Notification.idl | 17 * this software without specific prior written permission. 40 [CallWith=ExecutionContext, MeasureAs=NotificationPermission] static readonly attribute DOMString permission;
|
/external/chromium_org/chrome/browser/renderer_host/pepper/ |
H A D | pepper_talk_host.cc | 32 PP_TalkPermission permission, 49 switch (permission) { 170 PP_TalkPermission permission) { 171 if (permission < PP_TALKPERMISSION_SCREENCAST || 172 permission >= PP_TALKPERMISSION_NUM_PERMISSIONS) 184 permission, 31 GetPermissionOnUIThread( PP_TalkPermission permission, int render_process_id, int render_frame_id, ppapi::host::ReplyMessageContext reply) argument 168 OnRequestPermission( ppapi::host::HostMessageContext* context, PP_TalkPermission permission) argument
|
/external/chromium_org/extensions/common/manifest_handlers/ |
H A D | permissions_parser.cc | 49 // Custom checks for the experimental permission that can't be expressed in 100 // Parses the host and api permissions from the specified permission |key| 141 // two systems should be updated together whenever a permission is added. 189 // Check if it's a host pattern permission. 236 // It's probably an unknown API permission. Do not throw an error so 308 APIPermission::ID permission) { 311 ->initial_required_permissions_->api_permissions.insert(permission); 316 APIPermission* permission) { 319 ->initial_required_permissions_->api_permissions.insert(permission); 324 APIPermission::ID permission) { 307 AddAPIPermission(Extension* extension, APIPermission::ID permission) argument 315 AddAPIPermission(Extension* extension, APIPermission* permission) argument 323 HasAPIPermission(const Extension* extension, APIPermission::ID permission) argument [all...] |
/external/chromium_org/chrome/browser/resources/options/ |
H A D | website_settings.css | 46 .permission-name { 52 #website-settings-edit-page .permission-selection-option { 58 #website-settings-permission-column { 101 .origin-permission-list { 164 .permission-option {
|