Searched defs:allowed (Results 26 - 50 of 131) sorted by relevance

123456

/external/chromium_org/chrome/browser/content_settings/
H A Dpermission_context_base.cc128 bool allowed) {
134 if (allowed)
144 id, requesting_origin, embedder_origin, callback, persist, allowed);
157 bool allowed) {
160 UpdateContentSetting(requesting_origin, embedder_origin, allowed);
162 UpdateTabContext(id, requesting_origin, allowed);
163 callback.Run(allowed);
174 bool allowed) {
178 allowed ? CONTENT_SETTING_ALLOW : CONTENT_SETTING_BLOCK;
122 PermissionDecided( const PermissionRequestID& id, const GURL& requesting_origin, const GURL& embedder_origin, const BrowserPermissionCallback& callback, bool persist, bool allowed) argument
151 NotifyPermissionSet( const PermissionRequestID& id, const GURL& requesting_origin, const GURL& embedder_origin, const BrowserPermissionCallback& callback, bool persist, bool allowed) argument
171 UpdateContentSetting( const GURL& requesting_origin, const GURL& embedder_origin, bool allowed) argument
H A Dpermission_queue_controller.cc60 void RunCallback(bool allowed);
99 bool allowed) {
100 callback_.Run(allowed);
195 bool allowed) {
201 UpdateContentSetting(requesting_frame, embedder, allowed);
202 if (allowed)
247 i->RunCallback(allowed);
362 bool allowed) {
371 allowed ? CONTENT_SETTING_ALLOW : CONTENT_SETTING_BLOCK;
98 RunCallback( bool allowed) argument
190 OnPermissionSet( const PermissionRequestID& id, const GURL& requesting_frame, const GURL& embedder, bool update_content_setting, bool allowed) argument
359 UpdateContentSetting( const GURL& requesting_frame, const GURL& embedder, bool allowed) argument
/external/chromium_org/chrome/browser/media/
H A Dprotected_media_identifier_infobar_delegate.cc64 bool allowed) {
69 update_content_setting, allowed);
62 SetPermission( bool update_content_setting, bool allowed) argument
H A Dprotected_media_identifier_permission_context.cc163 bool allowed) {
164 NotifyPermissionSet(id, origin, callback, allowed);
171 bool allowed) {
180 origin.GetOrigin(), allowed);
183 callback.Run(allowed);
158 PermissionDecided( const PermissionRequestID& id, const GURL& origin, const GURL& embedder, const base::Callback<void(bool)>& callback, bool allowed) argument
167 NotifyPermissionSet( const PermissionRequestID& id, const GURL& origin, const base::Callback<void(bool)>& callback, bool allowed) argument
/external/chromium_org/chrome/browser/net/spdyproxy/
H A Ddata_reduction_proxy_settings_unittest_android.cc52 bool allowed,
58 if (allowed)
110 DataReductionProxyChromeSettings>(bool allowed,
51 ResetSettings( bool allowed, bool fallback_allowed, bool alt_allowed, bool promo_allowed, bool holdback) argument
/external/chromium_org/chrome/browser/ui/website_settings/
H A Dwebsite_settings_ui.h53 // The number of allowed cookies.
54 int allowed; member in struct:WebsiteSettingsUI::CookieInfo
/external/chromium_org/third_party/WebKit/Source/modules/beacon/
H A DNavigatorBeacon.cpp80 bool NavigatorBeacon::beaconResult(ExecutionContext* context, bool allowed, int sentBytes) argument
82 if (allowed) {
88 return allowed;
/external/chromium_org/third_party/WebKit/Source/modules/webmidi/
H A DMIDIAccessInitializer.cpp80 void MIDIAccessInitializer::resolveSysexPermission(bool allowed) argument
82 if (allowed)
/external/chromium_org/android_webview/native/permission/
H A Dpermission_request_handler_unittest.cc33 // Notify the permission request is allowed or not.
34 virtual void NotifyRequestResult(bool allowed) OVERRIDE {
35 callback_.Run(allowed);
127 void NotifyRequestResult(bool allowed) { argument
128 allowed_ = allowed;
164 bool allowed() { function in class:android_webview::PermissionRequestHandlerTest
191 EXPECT_TRUE(allowed());
211 EXPECT_FALSE(allowed());
283 EXPECT_TRUE(allowed());
295 EXPECT_TRUE(allowed());
[all...]
/external/chromium_org/base/threading/
H A Dthread_restrictions.h102 // 1) If a thread should not be allowed to make IO calls, mark it:
104 // By default, threads *are* allowed to make IO calls.
108 // current thread is allowed:
128 // Whether IO is allowed when the ScopedAllowIO was constructed.
141 // Whether singleton use is allowed when the ScopedAllowSingleton was
150 // Threads start out in the *allowed* state.
152 static bool SetIOAllowed(bool allowed);
154 // Check whether the current thread is allowed to make IO calls,
161 static bool SetSingletonAllowed(bool allowed);
163 // Check whether the current thread is allowed t
176 SetIOAllowed(bool allowed) argument
178 SetSingletonAllowed(bool allowed) argument
235 SetWaitAllowed(bool allowed) argument
[all...]
/external/chromium_org/chrome/browser/extensions/
H A Dchrome_url_request_util.cc137 bool* allowed) {
139 request, is_incognito, extension, extension_info_map, allowed)) {
144 // load should be allowed only if it is by DevTools. A close approximation is
147 *allowed = true;
151 // Couldn't determine if the resource is allowed or not.
133 AllowCrossRendererResourceLoad(net::URLRequest* request, bool is_incognito, const Extension* extension, InfoMap* extension_info_map, bool* allowed) argument
H A Dchrome_extensions_browser_client.cc137 bool allowed = false; local
139 request, is_incognito, extension, extension_info_map, &allowed))
140 return allowed;
142 // Couldn't determine if resource is allowed. Block the load.
H A Dextension_management_test_util.cc63 bool allowed) {
66 allowed ? schema::kAllowed : schema::kBlocked);
61 SetIndividualExtensionInstallationAllowed( const ExtensionId& id, bool allowed) argument
H A Dextension_management_unittest.cc37 " \"installation_mode\": \"allowed\","
527 const char* allowed = kTargetExtension; local
534 EXPECT_TRUE(extension_management_->IsInstallationExplicitlyAllowed(allowed));
549 EXPECT_TRUE(extension_management_->IsInstallationExplicitlyAllowed(allowed));
H A Dextension_util.cc187 bool allowed = false; local
191 &allowed) &&
192 allowed;
197 bool allowed) {
198 if (allowed == AllowedScriptingOnAllUrls(extension_id, context))
204 allowed ? new base::FundamentalValue(true) : NULL);
211 if (allowed)
195 SetAllowedScriptingOnAllUrls(const std::string& extension_id, content::BrowserContext* context, bool allowed) argument
/external/chromium_org/chrome/browser/geolocation/
H A Dgeolocation_infobar_delegate.cc32 // User allowed use of geolocation.
106 bool allowed) {
112 update_content_setting, allowed);
105 SetPermission(bool update_content_setting, bool allowed) argument
/external/chromium_org/chrome/browser/
H A Dpepper_broker_infobar_delegate.cc66 bool allowed = (setting == CONTENT_SETTING_ALLOW); local
67 content::RecordAction(allowed ?
70 tab_content_settings->SetPepperBrokerAllowed(allowed);
71 callback.Run(allowed);
/external/chromium_org/chrome/browser/ui/content_settings/
H A Dcontent_setting_image_model.cc200 // If any embedded site has access the allowed icon takes priority over the
204 bool allowed = local
206 set_icon(allowed ? IDR_ALLOWED_LOCATION : IDR_BLOCKED_LOCATION);
207 set_tooltip(l10n_util::GetStringUTF8(allowed ?
336 // If any embedded site has access the allowed icon takes priority over the
340 bool allowed = local
342 set_icon(allowed ? IDR_ALLOWED_MIDI_SYSEX : IDR_BLOCKED_MIDI_SYSEX);
343 set_tooltip(l10n_util::GetStringUTF8(allowed ?
/external/chromium_org/content/shell/renderer/test_runner/
H A Dweb_permissions.cc22 bool allowed = enabled_per_settings && images_allowed_; local
26 (allowed ? "true" : "false") + "\n");
28 return allowed;
32 bool allowed = media_allowed_; local
36 (allowed ? "true" : "false") + "\n");
37 return allowed;
42 bool allowed = enabled_per_settings && scripts_allowed_; local
47 (allowed ? "true" : "false") + "\n");
49 return allowed;
94 void WebPermissions::SetDisplayingInsecureContentAllowed(bool allowed) { argument
98 SetRunningInsecureContentAllowed(bool allowed) argument
[all...]
/external/chromium_org/remoting/host/setup/
H A Ddaemon_controller.h92 // Indicates if crash dump reporting is allowed by the user.
93 bool allowed; member in struct:remoting::DaemonController::UsageStatsConsent
/external/chromium_org/third_party/WebKit/Source/core/loader/
H A DMixedContentChecker.cpp205 void MixedContentChecker::logToConsole(LocalFrame* frame, const KURL& url, WebURLRequest::RequestContext requestContext, bool allowed) argument
210 allowed ? "This content should also be served over HTTPS." : "This request has been blocked; the content must be served over HTTPS.");
211 MessageLevel messageLevel = allowed ? WarningMessageLevel : ErrorMessageLevel;
246 bool allowed = false; local
254 allowed = client->allowDisplayingInsecureContent(settings && settings->allowDisplayOfInsecureContent(), securityOrigin, url);
255 if (allowed)
260 allowed = client->allowRunningInsecureContent(settings && settings->allowRunningOfInsecureContent(), securityOrigin, url);
261 if (allowed)
274 logToConsole(frame, url, resourceRequest.requestContext(), allowed);
275 return !allowed;
300 bool allowed = client()->allowDisplayingInsecureContent(settings && settings->allowDisplayOfInsecureContent(), securityOrigin, url); local
332 bool allowed = client()->allowRunningInsecureContent(allowedPerSettings, securityOrigin, url); local
374 logWarning(bool allowed, const KURL& target, const MixedContentType type) const argument
[all...]
/external/chromium_org/third_party/WebKit/Source/modules/geolocation/testing/
H A DGeolocationClientMock.cpp70 void GeolocationClientMock::setPermission(bool allowed) argument
72 m_permissionState = allowed ? PermissionStateAllowed : PermissionStateDenied;
117 bool allowed = m_permissionState == PermissionStateAllowed; local
125 (*it)->setIsAllowed(allowed);
/external/libselinux/include/selinux/
H A Dselinux.h110 access_vector_t allowed; member in struct:av_decision
/external/qemu/distrib/libselinux/include/selinux/
H A Dselinux.h110 access_vector_t allowed; member in struct:av_decision
/external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/
H A DSSLEngineImplTest.java95 // with the server not allowed to session creation
887 * of the peers is not allowed to create the session.
889 private void doNoRenegotiationTest(SSLEngine allowed, argument
900 allowed.getSession().getPacketBufferSize();
912 allowed.beginHandshake();
920 while (allowed.getHandshakeStatus().equals(
922 print(result = allowed.wrap(app_data_plain, buffer));
929 System.out.println("\nNot allowed unwraps the message");
1006 print(result = allowed.unwrap(buffer, app_data_plain));
1009 assertEquals("Responce from the peer not allowed t
[all...]

Completed in 1833 milliseconds

123456