/external/chromium_org/chrome/browser/content_settings/ |
H A D | permission_context_base.cc | 128 bool allowed) { 134 if (allowed) 144 id, requesting_origin, embedder_origin, callback, persist, allowed); 157 bool allowed) { 160 UpdateContentSetting(requesting_origin, embedder_origin, allowed); 162 UpdateTabContext(id, requesting_origin, allowed); 163 callback.Run(allowed); 174 bool allowed) { 178 allowed ? CONTENT_SETTING_ALLOW : CONTENT_SETTING_BLOCK; 122 PermissionDecided( const PermissionRequestID& id, const GURL& requesting_origin, const GURL& embedder_origin, const BrowserPermissionCallback& callback, bool persist, bool allowed) argument 151 NotifyPermissionSet( const PermissionRequestID& id, const GURL& requesting_origin, const GURL& embedder_origin, const BrowserPermissionCallback& callback, bool persist, bool allowed) argument 171 UpdateContentSetting( const GURL& requesting_origin, const GURL& embedder_origin, bool allowed) argument
|
H A D | permission_queue_controller.cc | 60 void RunCallback(bool allowed); 99 bool allowed) { 100 callback_.Run(allowed); 195 bool allowed) { 201 UpdateContentSetting(requesting_frame, embedder, allowed); 202 if (allowed) 247 i->RunCallback(allowed); 362 bool allowed) { 371 allowed ? CONTENT_SETTING_ALLOW : CONTENT_SETTING_BLOCK; 98 RunCallback( bool allowed) argument 190 OnPermissionSet( const PermissionRequestID& id, const GURL& requesting_frame, const GURL& embedder, bool update_content_setting, bool allowed) argument 359 UpdateContentSetting( const GURL& requesting_frame, const GURL& embedder, bool allowed) argument
|
/external/chromium_org/chrome/browser/media/ |
H A D | protected_media_identifier_infobar_delegate.cc | 64 bool allowed) { 69 update_content_setting, allowed); 62 SetPermission( bool update_content_setting, bool allowed) argument
|
H A D | protected_media_identifier_permission_context.cc | 163 bool allowed) { 164 NotifyPermissionSet(id, origin, callback, allowed); 171 bool allowed) { 180 origin.GetOrigin(), allowed); 183 callback.Run(allowed); 158 PermissionDecided( const PermissionRequestID& id, const GURL& origin, const GURL& embedder, const base::Callback<void(bool)>& callback, bool allowed) argument 167 NotifyPermissionSet( const PermissionRequestID& id, const GURL& origin, const base::Callback<void(bool)>& callback, bool allowed) argument
|
/external/chromium_org/chrome/browser/net/spdyproxy/ |
H A D | data_reduction_proxy_settings_unittest_android.cc | 52 bool allowed, 58 if (allowed) 110 DataReductionProxyChromeSettings>(bool allowed, 51 ResetSettings( bool allowed, bool fallback_allowed, bool alt_allowed, bool promo_allowed, bool holdback) argument
|
/external/chromium_org/chrome/browser/ui/website_settings/ |
H A D | website_settings_ui.h | 53 // The number of allowed cookies. 54 int allowed; member in struct:WebsiteSettingsUI::CookieInfo
|
/external/chromium_org/third_party/WebKit/Source/modules/beacon/ |
H A D | NavigatorBeacon.cpp | 80 bool NavigatorBeacon::beaconResult(ExecutionContext* context, bool allowed, int sentBytes) argument 82 if (allowed) { 88 return allowed;
|
/external/chromium_org/third_party/WebKit/Source/modules/webmidi/ |
H A D | MIDIAccessInitializer.cpp | 80 void MIDIAccessInitializer::resolveSysexPermission(bool allowed) argument 82 if (allowed)
|
/external/chromium_org/android_webview/native/permission/ |
H A D | permission_request_handler_unittest.cc | 33 // Notify the permission request is allowed or not. 34 virtual void NotifyRequestResult(bool allowed) OVERRIDE { 35 callback_.Run(allowed); 127 void NotifyRequestResult(bool allowed) { argument 128 allowed_ = allowed; 164 bool allowed() { function in class:android_webview::PermissionRequestHandlerTest 191 EXPECT_TRUE(allowed()); 211 EXPECT_FALSE(allowed()); 283 EXPECT_TRUE(allowed()); 295 EXPECT_TRUE(allowed()); [all...] |
/external/chromium_org/base/threading/ |
H A D | thread_restrictions.h | 102 // 1) If a thread should not be allowed to make IO calls, mark it: 104 // By default, threads *are* allowed to make IO calls. 108 // current thread is allowed: 128 // Whether IO is allowed when the ScopedAllowIO was constructed. 141 // Whether singleton use is allowed when the ScopedAllowSingleton was 150 // Threads start out in the *allowed* state. 152 static bool SetIOAllowed(bool allowed); 154 // Check whether the current thread is allowed to make IO calls, 161 static bool SetSingletonAllowed(bool allowed); 163 // Check whether the current thread is allowed t 176 SetIOAllowed(bool allowed) argument 178 SetSingletonAllowed(bool allowed) argument 235 SetWaitAllowed(bool allowed) argument [all...] |
/external/chromium_org/chrome/browser/extensions/ |
H A D | chrome_url_request_util.cc | 137 bool* allowed) { 139 request, is_incognito, extension, extension_info_map, allowed)) { 144 // load should be allowed only if it is by DevTools. A close approximation is 147 *allowed = true; 151 // Couldn't determine if the resource is allowed or not. 133 AllowCrossRendererResourceLoad(net::URLRequest* request, bool is_incognito, const Extension* extension, InfoMap* extension_info_map, bool* allowed) argument
|
H A D | chrome_extensions_browser_client.cc | 137 bool allowed = false; local 139 request, is_incognito, extension, extension_info_map, &allowed)) 140 return allowed; 142 // Couldn't determine if resource is allowed. Block the load.
|
H A D | extension_management_test_util.cc | 63 bool allowed) { 66 allowed ? schema::kAllowed : schema::kBlocked); 61 SetIndividualExtensionInstallationAllowed( const ExtensionId& id, bool allowed) argument
|
H A D | extension_management_unittest.cc | 37 " \"installation_mode\": \"allowed\"," 527 const char* allowed = kTargetExtension; local 534 EXPECT_TRUE(extension_management_->IsInstallationExplicitlyAllowed(allowed)); 549 EXPECT_TRUE(extension_management_->IsInstallationExplicitlyAllowed(allowed));
|
H A D | extension_util.cc | 187 bool allowed = false; local 191 &allowed) && 192 allowed; 197 bool allowed) { 198 if (allowed == AllowedScriptingOnAllUrls(extension_id, context)) 204 allowed ? new base::FundamentalValue(true) : NULL); 211 if (allowed) 195 SetAllowedScriptingOnAllUrls(const std::string& extension_id, content::BrowserContext* context, bool allowed) argument
|
/external/chromium_org/chrome/browser/geolocation/ |
H A D | geolocation_infobar_delegate.cc | 32 // User allowed use of geolocation. 106 bool allowed) { 112 update_content_setting, allowed); 105 SetPermission(bool update_content_setting, bool allowed) argument
|
/external/chromium_org/chrome/browser/ |
H A D | pepper_broker_infobar_delegate.cc | 66 bool allowed = (setting == CONTENT_SETTING_ALLOW); local 67 content::RecordAction(allowed ? 70 tab_content_settings->SetPepperBrokerAllowed(allowed); 71 callback.Run(allowed);
|
/external/chromium_org/chrome/browser/ui/content_settings/ |
H A D | content_setting_image_model.cc | 200 // If any embedded site has access the allowed icon takes priority over the 204 bool allowed = local 206 set_icon(allowed ? IDR_ALLOWED_LOCATION : IDR_BLOCKED_LOCATION); 207 set_tooltip(l10n_util::GetStringUTF8(allowed ? 336 // If any embedded site has access the allowed icon takes priority over the 340 bool allowed = local 342 set_icon(allowed ? IDR_ALLOWED_MIDI_SYSEX : IDR_BLOCKED_MIDI_SYSEX); 343 set_tooltip(l10n_util::GetStringUTF8(allowed ?
|
/external/chromium_org/content/shell/renderer/test_runner/ |
H A D | web_permissions.cc | 22 bool allowed = enabled_per_settings && images_allowed_; local 26 (allowed ? "true" : "false") + "\n"); 28 return allowed; 32 bool allowed = media_allowed_; local 36 (allowed ? "true" : "false") + "\n"); 37 return allowed; 42 bool allowed = enabled_per_settings && scripts_allowed_; local 47 (allowed ? "true" : "false") + "\n"); 49 return allowed; 94 void WebPermissions::SetDisplayingInsecureContentAllowed(bool allowed) { argument 98 SetRunningInsecureContentAllowed(bool allowed) argument [all...] |
/external/chromium_org/remoting/host/setup/ |
H A D | daemon_controller.h | 92 // Indicates if crash dump reporting is allowed by the user. 93 bool allowed; member in struct:remoting::DaemonController::UsageStatsConsent
|
/external/chromium_org/third_party/WebKit/Source/core/loader/ |
H A D | MixedContentChecker.cpp | 205 void MixedContentChecker::logToConsole(LocalFrame* frame, const KURL& url, WebURLRequest::RequestContext requestContext, bool allowed) argument 210 allowed ? "This content should also be served over HTTPS." : "This request has been blocked; the content must be served over HTTPS."); 211 MessageLevel messageLevel = allowed ? WarningMessageLevel : ErrorMessageLevel; 246 bool allowed = false; local 254 allowed = client->allowDisplayingInsecureContent(settings && settings->allowDisplayOfInsecureContent(), securityOrigin, url); 255 if (allowed) 260 allowed = client->allowRunningInsecureContent(settings && settings->allowRunningOfInsecureContent(), securityOrigin, url); 261 if (allowed) 274 logToConsole(frame, url, resourceRequest.requestContext(), allowed); 275 return !allowed; 300 bool allowed = client()->allowDisplayingInsecureContent(settings && settings->allowDisplayOfInsecureContent(), securityOrigin, url); local 332 bool allowed = client()->allowRunningInsecureContent(allowedPerSettings, securityOrigin, url); local 374 logWarning(bool allowed, const KURL& target, const MixedContentType type) const argument [all...] |
/external/chromium_org/third_party/WebKit/Source/modules/geolocation/testing/ |
H A D | GeolocationClientMock.cpp | 70 void GeolocationClientMock::setPermission(bool allowed) argument 72 m_permissionState = allowed ? PermissionStateAllowed : PermissionStateDenied; 117 bool allowed = m_permissionState == PermissionStateAllowed; local 125 (*it)->setIsAllowed(allowed);
|
/external/libselinux/include/selinux/ |
H A D | selinux.h | 110 access_vector_t allowed; member in struct:av_decision
|
/external/qemu/distrib/libselinux/include/selinux/ |
H A D | selinux.h | 110 access_vector_t allowed; member in struct:av_decision
|
/external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/ |
H A D | SSLEngineImplTest.java | 95 // with the server not allowed to session creation 887 * of the peers is not allowed to create the session. 889 private void doNoRenegotiationTest(SSLEngine allowed, argument 900 allowed.getSession().getPacketBufferSize(); 912 allowed.beginHandshake(); 920 while (allowed.getHandshakeStatus().equals( 922 print(result = allowed.wrap(app_data_plain, buffer)); 929 System.out.println("\nNot allowed unwraps the message"); 1006 print(result = allowed.unwrap(buffer, app_data_plain)); 1009 assertEquals("Responce from the peer not allowed t [all...] |