/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | acs.c | 359 const int allowed[] = { 36, 44, 52, 60, 100, 108, 116, 124, 132, 149, local 363 for (i = 0; i < ARRAY_SIZE(allowed); i++) 364 if (chan->chan == allowed[i]) 373 const int allowed[] = { 36, 52, 100, 116, 132, 149 }; local 376 for (i = 0; i < ARRAY_SIZE(allowed); i++) 377 if (chan->chan == allowed[i]) 553 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not allowed as primary channel for HT40", 562 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not allowed as primary channel for VHT80",
|
H A D | dfs.c | 94 int *allowed = allowed_40; local 99 allowed = allowed_40; 103 allowed = allowed_80; 107 allowed = allowed_160; 116 if (chan->chan == allowed[i])
|
H A D | hw_features.c | 227 int allowed[] = { 36, 44, 52, 60, 100, 108, 116, 124, 132, 149, 157, local 239 /* Verify that HT40 secondary channel is an allowed 20 MHz 252 wpa_printf(MSG_ERROR, "HT40 secondary channel %d not allowed", 258 * Verify that HT40 primary,secondary channel pair is allowed per 261 * the list of allowed channels (already checked above). 272 for (k = 0; k < ARRAY_SIZE(allowed); k++) { 273 if (first == allowed[k]) { 279 wpa_printf(MSG_ERROR, "HT40 channel pair (%d, %d) not allowed", 519 * allowed per IEEE Std 802.11-2012, 10.15.3.2 */
|
/external/wpa_supplicant_8/wpa_supplicant/src/radius/ |
H A D | radius_das.c | 39 u8 allowed[] = { local 64 attr = radius_msg_find_unlisted_attr(msg, allowed);
|
/external/chromium_org/chrome/browser/devtools/ |
H A D | devtools_file_helper.cc | 366 bool allowed) { 367 if (!allowed) { 363 AddUserConfirmedFileSystem( const AddFileSystemCallback& callback, const base::FilePath& path, bool allowed) argument
|
/external/chromium_org/chrome/browser/ui/webui/ |
H A D | plugins_ui.cc | 301 bool allowed = false; local 302 if (!args->GetString(0, &plugin) || !args->GetBoolean(1, &allowed)) { 312 allowed ? CONTENT_SETTING_ALLOW : CONTENT_SETTING_DEFAULT); 318 update->SetBoolean(plugin, allowed);
|
/external/chromium_org/components/data_reduction_proxy/browser/ |
H A D | data_reduction_proxy_params.cc | 172 bool DataReductionProxyParams::Init(bool allowed, argument 178 if (allowed) { 185 if (allowed && fallback_allowed) { 194 if (!allowed) { 196 << "be allowed if the regular configuration is not allowed"; 217 if (allowed && !probe_url_.is_valid()) { 223 DVLOG(1) << "The data reduction proxy fallback cannot be allowed if " 224 << "the data reduction proxy is not allowed"; 229 << "allowed i [all...] |
/external/chromium_org/content/public/test/ |
H A D | mock_render_process_host.cc | 169 void MockRenderProcessHost::SetSuddenTerminationAllowed(bool allowed) { argument
|
/external/chromium_org/remoting/host/win/ |
H A D | elevated_controller.cc | 482 STDMETHODIMP ElevatedController::GetUsageStatsConsent(BOOL* allowed, argument 487 *allowed = local_allowed; 495 STDMETHODIMP ElevatedController::SetUsageStatsConsent(BOOL allowed) { argument 496 if (remoting::SetUsageStatsConsent(!!allowed)) {
|
/external/chromium_org/third_party/WebKit/Source/modules/geolocation/ |
H A D | Geolocation.cpp | 208 // If permissions are allowed, make the callback 279 void Geolocation::setIsAllowed(bool allowed) argument 282 m_geolocationPermission = allowed ? PermissionAllowed : PermissionDenied;
|
/external/chromium_org/v8/test/cctest/ |
H A D | test-utils-arm64.cc | 214 int reg_size, int reg_count, RegList allowed) { 218 if (((1UL << n) & allowed) != 0) { 219 // Only assign allowed registers. 241 int reg_size, int reg_count, RegList allowed) { 245 if (((1UL << n) & allowed) != 0) { 246 // Only assigned allowed registers. 213 PopulateRegisterArray(Register* w, Register* x, Register* r, int reg_size, int reg_count, RegList allowed) argument 240 PopulateFPRegisterArray(FPRegister* s, FPRegister* d, FPRegister* v, int reg_size, int reg_count, RegList allowed) argument
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | dfs.c | 94 int *allowed = allowed_40; local 99 allowed = allowed_40; 103 allowed = allowed_80; 107 allowed = allowed_160; 116 if (chan->chan == allowed[i])
|
H A D | hw_features.c | 227 int allowed[] = { 36, 44, 52, 60, 100, 108, 116, 124, 132, 149, 157, local 239 /* Verify that HT40 secondary channel is an allowed 20 MHz 252 wpa_printf(MSG_ERROR, "HT40 secondary channel %d not allowed", 258 * Verify that HT40 primary,secondary channel pair is allowed per 261 * the list of allowed channels (already checked above). 272 for (k = 0; k < ARRAY_SIZE(allowed); k++) { 273 if (first == allowed[k]) { 279 wpa_printf(MSG_ERROR, "HT40 channel pair (%d, %d) not allowed", 519 * allowed per IEEE Std 802.11-2012, 10.15.3.2 */
|
/external/wpa_supplicant_8/src/ap/ |
H A D | dfs.c | 94 int *allowed = allowed_40; local 99 allowed = allowed_40; 103 allowed = allowed_80; 107 allowed = allowed_160; 116 if (chan->chan == allowed[i])
|
H A D | hw_features.c | 227 int allowed[] = { 36, 44, 52, 60, 100, 108, 116, 124, 132, 149, 157, local 239 /* Verify that HT40 secondary channel is an allowed 20 MHz 252 wpa_printf(MSG_ERROR, "HT40 secondary channel %d not allowed", 258 * Verify that HT40 primary,secondary channel pair is allowed per 261 * the list of allowed channels (already checked above). 272 for (k = 0; k < ARRAY_SIZE(allowed); k++) { 273 if (first == allowed[k]) { 279 wpa_printf(MSG_ERROR, "HT40 channel pair (%d, %d) not allowed", 519 * allowed per IEEE Std 802.11-2012, 10.15.3.2 */
|
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/ |
H A D | networkconfig.cpp | 166 QStringList allowed; local 167 allowed << "MSCHAPV2" << "MD5" << "GTC" << "TLS" << "OTP" << "SIM" 170 if (allowed.contains(eapSelect->itemText(i))) {
|
/external/chromium_org/base/message_loop/ |
H A D | message_loop.cc | 347 void MessageLoop::SetNestableTasksAllowed(bool allowed) { argument 348 if (allowed) { 353 nestable_tasks_allowed_ = allowed;
|
/external/chromium_org/chrome/browser/content_settings/ |
H A D | tab_specific_content_settings.cc | 459 bool allowed) { 460 geolocation_usages_state_.OnPermissionSet(requesting_origin, allowed); 470 bool allowed) { 471 if (allowed) { 625 void TabSpecificContentSettings::SetPepperBrokerAllowed(bool allowed) { argument 626 if (allowed) { 457 OnGeolocationPermissionSet( const GURL& requesting_origin, bool allowed) argument 468 OnProtectedMediaIdentifierPermissionSet( const GURL& requesting_origin, bool allowed) argument
|
/external/chromium_org/chrome/browser/geolocation/ |
H A D | geolocation_browsertest.cc | 280 // For |requesting_url| if |allowed| is true accept the infobar. Otherwise 282 void SetInfoBarResponse(const GURL& requesting_url, bool allowed); 404 bool allowed) { 418 if (allowed) 434 allowed ? CONTENT_SETTING_ALLOW : CONTENT_SETTING_BLOCK; 403 SetInfoBarResponse(const GURL& requesting_url, bool allowed) argument
|
/external/chromium_org/chrome/browser/ui/views/website_settings/ |
H A D | permissions_bubble_view.cc | 61 virtual void PermissionSelectionChanged(int index, bool allowed) = 0; 202 virtual void PermissionSelectionChanged(int index, bool allowed) OVERRIDE; 400 int index, bool allowed) { 401 owner_->Toggle(index, allowed); 399 PermissionSelectionChanged( int index, bool allowed) argument
|
/external/chromium_org/content/browser/webui/ |
H A D | url_data_manager_backend.cc | 165 void StartAsync(bool allowed); 167 // Called on the UI thread to check if this request is allowed. 367 bool allowed = false; local 374 allowed = true; 377 allowed = true; 383 allowed = partition == process->GetStoragePartition(); 390 base::Bind(&URLRequestChromeJob::StartAsync, job, allowed)); 393 void URLRequestChromeJob::StartAsync(bool allowed) { argument 397 if (!allowed || !backend_->StartRequest(request_, this)) {
|
/external/chromium_org/sync/test/android/javatests/src/org/chromium/sync/test/util/ |
H A D | MockAccountManager.java | 630 boolean allowed) { 633 mAllowed = allowed; 629 AccountAuthTokenPreparation(Account account, String authTokenType, boolean allowed) argument
|
/external/chromium_org/third_party/WebKit/Source/bindings/core/v8/ |
H A D | ScriptController.cpp | 522 const bool allowed = m_frame->loader().client()->allowScript(settings && settings->scriptEnabled()) local 524 if (!allowed && reason == AboutToExecuteScript) 526 return allowed;
|
/external/llvm/lib/CodeGen/ |
H A D | RegAllocPBQP.cpp | 181 assert(option <= allowedSet.size() && "Option outside allowed set."); 216 // Compute an initial allowed set for the current vreg. 254 // Record the mapping and allowed set in the problem. 348 const PBQPRAProblem::AllowedSet &allowed = p->getAllowedSet(src); local 350 while (pregOpt < allowed.size() && allowed[pregOpt] != dst) { 353 if (pregOpt < allowed.size()) {
|
/external/chromium_org/chrome/browser/ui/content_settings/ |
H A D | content_setting_bubble_model.cc | 275 bool allowed = local 277 DCHECK(!allowed || 301 if (allowed) { 332 if (allowed) {
|