/external/chromium_org/chrome/browser/content_settings/ |
H A D | permission_context_uma_util.cc | 11 // permission actions. Never delete or reorder an entry; only add new entries 24 // permission actions. Never delete or reorder an entry; only add new entries 37 ContentSettingsType permission, PermissionAction action) { 38 switch (permission) { 41 // the generic permission class. 63 // the generic permission class. 67 NOTREACHED() << "PERMISSION " << permission << " not accounted for"; 72 ContentSettingsType permission) { 74 switch (permission) { 85 NOTREACHED() << "PERMISSION " << permission << " no 36 RecordPermissionAction( ContentSettingsType permission, PermissionAction action) argument 71 RecordPermissionRequest( ContentSettingsType permission) argument 96 PermissionRequested( ContentSettingsType permission) argument 101 PermissionGranted( ContentSettingsType permission) argument 106 PermissionDenied( ContentSettingsType permission) argument 111 PermissionDismissed( ContentSettingsType permission) argument 116 PermissionIgnored( ContentSettingsType permission) argument [all...] |
/external/chromium_org/chrome/browser/extensions/api/permissions/ |
H A D | permissions_api_helpers.cc | 32 "Invalid argument for permission '*'."; 36 "'*' is not a recognized permission."; 38 "Only the usbDevices permission supports arguments."; 97 APIPermission* permission = NULL; local 104 permission = new UsbDevicePermission(usb_device_permission_info); 110 CHECK(permission); 111 if (!permission->FromValue(permission_json.get(), NULL, NULL)) { 115 apis.insert(permission);
|
/external/chromium_org/chrome/browser/media/ |
H A D | media_stream_devices_controller.h | 37 MediaStreamTypeSettings(Permission permission, 42 Permission permission; member in struct:MediaStreamDevicesController::MediaStreamTypeSettings 105 // Sets the permission of the origin of the request. This is triggered when 117 // Return true if the type has been requested and permission is currently set 118 // to allowed. Note that it does not reflect the final permission decision. 120 // been blocked yet or not and the permission may be changed to blocked during 149 // Holds the requested media types and the permission for each type. It is
|
/external/chromium_org/chrome/browser/media_galleries/ |
H A D | media_galleries_permissions_unittest.cc | 24 MediaGalleryPermission permission; local 25 permission.pref_id = gallery; 26 permission.has_permission = has_access; 27 vector->push_back(permission); 75 // Id4 isn't used to ensure that an empty permission list is ok.
|
/external/chromium_org/content/renderer/ |
H A D | notification_provider.cc | 67 int permission = WebNotificationPresenter::PermissionNotAllowed; local 71 &permission)); 72 return static_cast<WebNotificationPresenter::Permission>(permission);
|
/external/chromium_org/extensions/common/permissions/ |
H A D | permissions_info.cc | 87 void PermissionsInfo::RegisterPermission(APIPermissionInfo* permission) { argument 88 DCHECK(!ContainsKey(id_map_, permission->id())); 89 DCHECK(!ContainsKey(name_map_, permission->name())); 91 id_map_[permission->id()] = permission; 92 name_map_[permission->name()] = permission;
|
H A D | settings_override_permission.cc | 14 const APIPermissionInfo* permission, 16 : APIPermission(permission), setting_value_(setting_value) {} 13 SettingsOverrideAPIPermission( const APIPermissionInfo* permission, const std::string& setting_value) argument
|
H A D | socket_permission_data.cc | 124 bool SocketPermissionData::Parse(const std::string& permission) { argument 128 base::SplitStringDontTrim(permission, kColon, &tokens);
|
/external/chromium_org/ppapi/c/private/ |
H A D | ppp_flash_browser_operations.h | 60 PP_Flash_BrowserOperations_Permission permission; member in struct:PP_Flash_BrowserOperations_SiteSetting 125 * Gets permission settings. <code>callback</code> will be called exactly once 141 * Sets default permission. It applies to all sites except those with 147 * @param[in] permission The default permission. 156 PP_Flash_BrowserOperations_Permission permission, 159 * Sets site-specific permission. If a site has already got site-specific 160 * permission and it is not in <code>sites</code>, it won't be affected. 167 * <code>PP_FLASH_BROWSEROPERATIONS_PERMISSION_DEFAULT</code> permission, it 221 PP_Flash_BrowserOperations_Permission permission, [all...] |
/external/chromium_org/ppapi/proxy/ |
H A D | talk_resource.cc | 28 PP_TalkPermission permission, 37 PpapiHostMsg_Talk_RequestPermission(permission), 27 RequestPermission( PP_TalkPermission permission, scoped_refptr<TrackedCallback> callback) argument
|
/external/chromium_org/base/test/ |
H A D | test_file_util_win.cc | 31 // Deny |permission| on the file |path|, for the current user. 32 bool DenyFilePermission(const FilePath& path, DWORD permission) { argument 43 change.grfAccessPermissions = permission; 67 // Gets a blob indicating the permission information for |path|. 91 // Restores the permission information for |path|, given the blob retrieved
|
/external/chromium_org/chrome/browser/extensions/api/preference/ |
H A D | preference_helpers.cc | 90 APIPermission::ID permission, 104 (*it)->permissions_data()->HasAPIPermission(permission) && 86 DispatchEventToExtensions( Profile* profile, const std::string& event_name, base::ListValue* args, APIPermission::ID permission, bool incognito, const std::string& browser_pref) argument
|
/external/chromium_org/chrome/browser/renderer_host/pepper/ |
H A D | pepper_talk_host.cc | 32 PP_TalkPermission permission, 49 switch (permission) { 170 PP_TalkPermission permission) { 171 if (permission < PP_TALKPERMISSION_SCREENCAST || 172 permission >= PP_TALKPERMISSION_NUM_PERMISSIONS) 184 permission, 31 GetPermissionOnUIThread( PP_TalkPermission permission, int render_process_id, int render_frame_id, ppapi::host::ReplyMessageContext reply) argument 168 OnRequestPermission( ppapi::host::HostMessageContext* context, PP_TalkPermission permission) argument
|
/external/chromium_org/chrome/browser/ui/views/website_settings/ |
H A D | permission_selector_view.cc | 124 const WebsiteSettingsUI::PermissionInfo& permission) 151 // Create the permission icon. 153 const gfx::Image& image = WebsiteSettingsUI::GetPermissionIcon(permission); 160 // Create the label that displays the permission type. 163 WebsiteSettingsUI::PermissionTypeToUIString(permission.type))); 172 permission, 175 // Create the permission menu button. 177 permission.source == content_settings::SETTING_SOURCE_USER; 180 permission.setting, permission 122 PermissionSelectorView( const GURL& url, const WebsiteSettingsUI::PermissionInfo& permission) argument 207 PermissionChanged( const WebsiteSettingsUI::PermissionInfo& permission) argument [all...] |
/external/chromium_org/chrome/browser/ui/webui/options/ |
H A D | pepper_flash_content_settings_utils.cc | 52 PP_Flash_BrowserOperations_Permission permission) { 53 switch (permission) { 84 ContentSetting setting = FlashPermissionToContentSetting(iter->permission); 51 FlashPermissionToContentSetting( PP_Flash_BrowserOperations_Permission permission) argument
|
/external/chromium_org/extensions/common/api/bluetooth/ |
H A D | bluetooth_manifest_permission.cc | 30 bool ParseUuid(BluetoothManifestPermission* permission, argument 39 permission->AddPermission(uuid); 43 bool ParseUuidArray(BluetoothManifestPermission* permission, argument 49 if (!ParseUuid(permission, *it, error)) {
|
/external/chromium_org/extensions/common/api/sockets/ |
H A D | sockets_manifest_permission.cc | 33 SocketsManifestPermission* permission, 44 permission->AddPermission(entry); 49 SocketsManifestPermission* permission, 58 permission, operation_type, *host_patterns->as_string, error); 66 if (!ParseHostPattern(permission, operation_type, *it, error)) { 75 const SocketsManifestPermission* permission, 80 permission->entries().begin(); 81 it != permission->entries().end(); 32 ParseHostPattern( SocketsManifestPermission* permission, content::SocketPermissionRequest::OperationType operation_type, const std::string& host_pattern, base::string16* error) argument 48 ParseHostPatterns( SocketsManifestPermission* permission, content::SocketPermissionRequest::OperationType operation_type, const scoped_ptr<SocketHostPatterns>& host_patterns, base::string16* error) argument 73 SetHostPatterns( scoped_ptr<SocketHostPatterns>& host_patterns, const SocketsManifestPermission* permission, content::SocketPermissionRequest::OperationType operation_type) argument
|
H A D | sockets_manifest_permission_unittest.cc | 33 static void AssertEmptyPermission(const SocketsManifestPermission* permission) { argument 34 EXPECT_TRUE(permission); 35 EXPECT_EQ(std::string(extensions::manifest_keys::kSockets), permission->id()); 36 EXPECT_EQ(permission->id(), permission->name()); 37 EXPECT_FALSE(permission->HasMessages()); 38 EXPECT_EQ(0u, permission->entries().size()); 50 scoped_ptr<SocketsManifestPermission> permission( 52 EXPECT_TRUE(permission) << "Error parsing Value into permission [all...] |
/external/chromium_org/extensions/common/manifest_handlers/ |
H A D | permissions_parser.cc | 49 // Custom checks for the experimental permission that can't be expressed in 100 // Parses the host and api permissions from the specified permission |key| 141 // two systems should be updated together whenever a permission is added. 189 // Check if it's a host pattern permission. 236 // It's probably an unknown API permission. Do not throw an error so 308 APIPermission::ID permission) { 311 ->initial_required_permissions_->api_permissions.insert(permission); 316 APIPermission* permission) { 319 ->initial_required_permissions_->api_permissions.insert(permission); 324 APIPermission::ID permission) { 307 AddAPIPermission(Extension* extension, APIPermission::ID permission) argument 315 AddAPIPermission(Extension* extension, APIPermission* permission) argument 323 HasAPIPermission(const Extension* extension, APIPermission::ID permission) argument [all...] |
/external/chromium_org/third_party/WebKit/Source/modules/notifications/ |
H A D | Notification.cpp | 16 * this software without specific prior written permission. 138 const String& Notification::permissionString(NotificationClient::Permission permission) argument 144 switch (permission) { 157 const String& Notification::permission(ExecutionContext* context) function in class:blink::Notification
|
/external/smack/src/org/apache/harmony/javax/security/auth/ |
H A D | PrivateCredentialPermission.java | 32 * only one action which is "read". The target name of this permission has a 44 * following file may define permission to read the private credentials of a 68 * Creates a new permission for private credentials specified by the target 73 * the target name of the permission. 226 * Returns the class name of the credential associated with this permission. 228 * @return the class name of the credential associated with this permission. 260 public boolean implies(Permission permission) { argument 262 if (permission == null || this.getClass() != permission.getClass()) { 266 PrivateCredentialPermission that = (PrivateCredentialPermission) permission; [all...] |
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
H A D | ProtectionDomainTest.java | 248 public boolean implies(ProtectionDomain domain, Permission permission) { argument 252 return super.implies(domain, permission);
|
/external/chromium_org/chrome/browser/notifications/ |
H A D | desktop_notification_service.cc | 304 // Unlike other permission types, granting a notification for a given origin 323 blink::WebNotificationPermission permission = allowed ? local 327 callback.Run(permission); 334 extensions::api::notifications::PermissionLevel permission = local 339 extensions::api::notifications::ToString(permission))); 346 // Tell the IO thread that this extension's permission for notifications
|
/external/chromium_org/chrome/common/extensions/api/ |
H A D | extension_api_unittest.cc | 420 const std::string& permission) { 422 permissions.insert(permission); 627 // Extension with the "ttsEngine" permission but not the "tts" permission; it 628 // should not automatically get "tts" permission. 644 // Conversely, extension with the "tts" permission but not the "ttsEngine" 645 // permission shouldn't get the "ttsEngine" permission. 859 // Test default module/package permission. 419 CreateExtensionWithPermission( const std::string& permission) argument
|
/external/chromium_org/content/ppapi_plugin/ |
H A D | broker_process_dispatcher.cc | 64 ppapi::FlashSiteSetting(sites[i].site, sites[i].permission)); 192 PP_Flash_BrowserOperations_Permission permission, 196 SetDefaultPermission(plugin_data_path, setting_type, permission, 275 PP_Flash_BrowserOperations_Permission permission, 280 data_str.c_str(), setting_type, permission, 287 data_str.c_str(), setting_type, permission, 307 site_array[i].permission = sites[i].permission; 188 OnSetDefaultPermission( uint32 request_id, const base::FilePath& plugin_data_path, PP_Flash_BrowserOperations_SettingType setting_type, PP_Flash_BrowserOperations_Permission permission, bool clear_site_specific) argument 272 SetDefaultPermission( const base::FilePath& plugin_data_path, PP_Flash_BrowserOperations_SettingType setting_type, PP_Flash_BrowserOperations_Permission permission, bool clear_site_specific) argument
|