Searched refs:allowed (Results 1 - 25 of 288) sorted by relevance

1234567891011>>

/external/chromium_org/remoting/host/
H A Dusage_stats_consent.h12 bool GetUsageStatsConsent(bool* allowed, bool* set_by_policy);
15 // usage statistics. In most cases the returned value matches |allowed| returned
22 bool SetUsageStatsConsent(bool allowed);
H A Dusage_stats_consent_mac.cc17 bool GetUsageStatsConsent(bool* allowed, bool* set_by_policy) { argument
19 *allowed = false;
30 return host_config.GetBoolean(kUsageStatsConsentConfigPath, allowed);
37 bool allowed; local
39 return GetUsageStatsConsent(&allowed, &set_by_policy) && allowed;
42 bool SetUsageStatsConsent(bool allowed) { argument
H A Dusage_stats_consent_win.cc44 bool GetUsageStatsConsent(bool* allowed, bool* set_by_policy) { argument
54 *allowed = value != 0;
58 *allowed = value != 0;
68 bool allowed; local
70 return GetUsageStatsConsent(&allowed, &set_by_policy) && allowed;
73 bool SetUsageStatsConsent(bool allowed) { argument
74 DWORD value = allowed;
/external/chromium_org/third_party/WebKit/Source/platform/
H A DPermissionCallbacks.cpp37 PassOwnPtr<PermissionCallbacks> PermissionCallbacks::create(const Closure& allowed, const Closure& denied) argument
39 return adoptPtr(new PermissionCallbacks(allowed, denied));
42 PermissionCallbacks::PermissionCallbacks(const Closure& allowed, const Closure& denied) argument
43 : m_allowed(allowed)
H A DPermissionCallbacks.h18 static PassOwnPtr<PermissionCallbacks> create(const Closure& allowed, const Closure& denied);
25 PermissionCallbacks(const Closure& allowed, const Closure& denied);
/external/chromium_org/content/shell/renderer/test_runner/
H A Dweb_permissions.cc22 bool allowed = enabled_per_settings && images_allowed_; local
26 (allowed ? "true" : "false") + "\n");
28 return allowed;
32 bool allowed = media_allowed_; local
36 (allowed ? "true" : "false") + "\n");
37 return allowed;
42 bool allowed = enabled_per_settings && scripts_allowed_; local
47 (allowed ? "true" : "false") + "\n");
49 return allowed;
94 void WebPermissions::SetDisplayingInsecureContentAllowed(bool allowed) { argument
98 SetRunningInsecureContentAllowed(bool allowed) argument
[all...]
/external/chromium_org/base/threading/
H A Dthread_restrictions.cc29 bool ThreadRestrictions::SetIOAllowed(bool allowed) { argument
31 g_io_disallowed.Get().Set(!allowed);
40 "disallows IO! If this thread really should be allowed to "
48 bool ThreadRestrictions::SetSingletonAllowed(bool allowed) { argument
50 g_singleton_disallowed.Get().Set(!allowed);
57 LOG(FATAL) << "LazyInstance/Singleton is not allowed to be used on this "
72 LOG(FATAL) << "Waiting is not allowed to be used on this thread to prevent"
77 bool ThreadRestrictions::SetWaitAllowed(bool allowed) { argument
79 g_wait_disallowed.Get().Set(!allowed);
/external/chromium_org/android_webview/native/permission/
H A Dsimple_permission_request.cc24 void SimplePermissionRequest::NotifyRequestResult(bool allowed) { argument
25 callback_.Run(allowed);
H A Daw_permission_request_delegate.h26 // Notify the permission request is allowed or not.
27 virtual void NotifyRequestResult(bool allowed) = 0;
/external/chromium_org/chrome/browser/media/
H A Dmidi_permission_context.cc21 bool allowed) {
26 if (allowed)
19 UpdateTabContext(const PermissionRequestID& id, const GURL& requesting_frame, bool allowed) argument
/external/chromium_org/chrome/browser/ui/webui/
H A Ddownloads_ui_browsertest.cc21 void DownloadsUIBrowserTest::SetDeleteAllowed(bool allowed) { argument
23 SetBoolean(prefs::kAllowDeletingBrowserHistory, allowed);
/external/chromium_org/third_party/WebKit/Source/modules/webmidi/
H A DMIDIClientMock.cpp47 void MIDIClientMock::setSysexPermission(bool allowed) argument
49 m_allowed = allowed;
/external/chromium_org/third_party/WebKit/Source/web/
H A DWebGeolocationPermissionRequest.cpp52 void WebGeolocationPermissionRequest::setIsAllowed(bool allowed) argument
54 m_private->setIsAllowed(allowed);
H A DWebMIDIPermissionRequest.cpp55 void WebMIDIPermissionRequest::setIsAllowed(bool allowed) argument
57 m_initializer->resolveSysexPermission(allowed);
H A DWebMIDIClientMock.cpp50 void WebMIDIClientMock::setSysexPermission(bool allowed) argument
52 m_clientMock->setSysexPermission(allowed);
/external/chromium_org/extensions/browser/
H A Durl_request_util.cc25 bool* allowed) {
37 *allowed = true;
42 // allowed. The navigation logic in CrossSiteResourceHandler will properly
45 *allowed = true;
50 *allowed = false;
58 *allowed = true;
74 *allowed = false;
84 *allowed = true;
88 // Couldn't determine if the resource is allowed or not.
21 AllowCrossRendererResourceLoad(net::URLRequest* request, bool is_incognito, const Extension* extension, InfoMap* extension_info_map, bool* allowed) argument
/external/chromium_org/chrome/browser/mac/
H A Dsecurity_wrappers.h18 explicit ScopedSecKeychainSetUserInteractionAllowed(Boolean allowed);
H A Dsecurity_wrappers.cc14 ScopedSecKeychainSetUserInteractionAllowed(Boolean allowed) { argument
21 status = SecKeychainSetUserInteractionAllowed(allowed);
/external/chromium_org/chrome/common/extensions/docs/examples/api/permissions/extension-questions/
H A Doptions.js21 chrome.permissions.contains(PERMISSIONS, function(allowed) {
22 if (allowed) {
36 chrome.permissions.contains(PERMISSIONS, function(allowed) {
37 if (allowed) {
/external/chromium_org/chrome/installer/util/
H A Dlegacy_firewall_manager_win_unittest.cc56 bool allowed = false; local
57 EXPECT_TRUE(manager_.GetAllowIncomingConnection(&allowed));
58 EXPECT_TRUE(allowed);
67 bool allowed = true; local
68 EXPECT_TRUE(manager_.GetAllowIncomingConnection(&allowed));
69 EXPECT_FALSE(allowed);
/external/chromium_org/chrome/browser/web_resource/
H A Dresource_request_allowed_notifier_test_util.cc22 void TestRequestAllowedNotifier::SetRequestsAllowedOverride(bool allowed) { argument
24 requests_allowed_ = allowed;
28 // Force the allowed state and requested state to true. This forces
/external/chromium_org/third_party/WebKit/Source/modules/geolocation/testing/
H A DInternalsGeolocation.idl35 void setGeolocationPermission(Document document, boolean allowed);
/external/chromium_org/chrome/browser/renderer_host/
H A Dchrome_render_message_filter.cc173 bool* allowed) {
174 *allowed =
180 display_name, !*allowed));
187 bool* allowed) {
188 *allowed =
195 !*allowed));
217 bool allowed) {
219 allowed);
264 bool allowed) {
266 render_frame_id, request_id, allowed));
167 OnAllowDatabase( int render_frame_id, const GURL& origin_url, const GURL& top_origin_url, const base::string16& name, const base::string16& display_name, bool* allowed) argument
183 OnAllowDOMStorage(int render_frame_id, const GURL& origin_url, const GURL& top_origin_url, bool local, bool* allowed) argument
215 OnRequestFileSystemAccessSyncResponse( IPC::Message* reply_msg, bool allowed) argument
261 OnRequestFileSystemAccessAsyncResponse( int render_frame_id, int request_id, bool allowed) argument
276 bool allowed = local
309 FileSystemAccessedOnUIThread( int render_process_id, int render_frame_id, const GURL& url, bool allowed, base::Callback<void(bool)> callback) argument
333 FileSystemAccessedResponse( int render_process_id, int render_frame_id, const GURL& url, base::Callback<void(bool)> callback, bool allowed) argument
345 OnAllowIndexedDB(int render_frame_id, const GURL& origin_url, const GURL& top_origin_url, const base::string16& name, bool* allowed) argument
[all...]
/external/chromium_org/third_party/WebKit/Source/core/loader/
H A DMixedContentChecker.cpp205 void MixedContentChecker::logToConsole(LocalFrame* frame, const KURL& url, WebURLRequest::RequestContext requestContext, bool allowed) argument
210 allowed ? "This content should also be served over HTTPS." : "This request has been blocked; the content must be served over HTTPS.");
211 MessageLevel messageLevel = allowed ? WarningMessageLevel : ErrorMessageLevel;
246 bool allowed = false; local
254 allowed = client->allowDisplayingInsecureContent(settings && settings->allowDisplayOfInsecureContent(), securityOrigin, url);
255 if (allowed)
260 allowed = client->allowRunningInsecureContent(settings && settings->allowRunningOfInsecureContent(), securityOrigin, url);
261 if (allowed)
274 logToConsole(frame, url, resourceRequest.requestContext(), allowed);
275 return !allowed;
300 bool allowed = client()->allowDisplayingInsecureContent(settings && settings->allowDisplayOfInsecureContent(), securityOrigin, url); local
332 bool allowed = client()->allowRunningInsecureContent(allowedPerSettings, securityOrigin, url); local
374 logWarning(bool allowed, const KURL& target, const MixedContentType type) const argument
[all...]
/external/chromium_org/base/mac/
H A Dscoped_nsexception_enabler.h43 BASE_EXPORT void SetNSExceptionsAllowed(bool allowed);

Completed in 808 milliseconds

1234567891011>>