/external/chromium_org/remoting/host/ |
H A D | usage_stats_consent.h | 12 bool GetUsageStatsConsent(bool* allowed, bool* set_by_policy); 15 // usage statistics. In most cases the returned value matches |allowed| returned 22 bool SetUsageStatsConsent(bool allowed);
|
H A D | usage_stats_consent_mac.cc | 17 bool GetUsageStatsConsent(bool* allowed, bool* set_by_policy) { argument 19 *allowed = false; 30 return host_config.GetBoolean(kUsageStatsConsentConfigPath, allowed); 37 bool allowed; local 39 return GetUsageStatsConsent(&allowed, &set_by_policy) && allowed; 42 bool SetUsageStatsConsent(bool allowed) { argument
|
H A D | usage_stats_consent_win.cc | 44 bool GetUsageStatsConsent(bool* allowed, bool* set_by_policy) { argument 54 *allowed = value != 0; 58 *allowed = value != 0; 68 bool allowed; local 70 return GetUsageStatsConsent(&allowed, &set_by_policy) && allowed; 73 bool SetUsageStatsConsent(bool allowed) { argument 74 DWORD value = allowed;
|
/external/chromium_org/third_party/WebKit/Source/platform/ |
H A D | PermissionCallbacks.cpp | 37 PassOwnPtr<PermissionCallbacks> PermissionCallbacks::create(const Closure& allowed, const Closure& denied) argument 39 return adoptPtr(new PermissionCallbacks(allowed, denied)); 42 PermissionCallbacks::PermissionCallbacks(const Closure& allowed, const Closure& denied) argument 43 : m_allowed(allowed)
|
H A D | PermissionCallbacks.h | 18 static PassOwnPtr<PermissionCallbacks> create(const Closure& allowed, const Closure& denied); 25 PermissionCallbacks(const Closure& allowed, const Closure& denied);
|
/external/chromium_org/content/shell/renderer/test_runner/ |
H A D | web_permissions.cc | 22 bool allowed = enabled_per_settings && images_allowed_; local 26 (allowed ? "true" : "false") + "\n"); 28 return allowed; 32 bool allowed = media_allowed_; local 36 (allowed ? "true" : "false") + "\n"); 37 return allowed; 42 bool allowed = enabled_per_settings && scripts_allowed_; local 47 (allowed ? "true" : "false") + "\n"); 49 return allowed; 94 void WebPermissions::SetDisplayingInsecureContentAllowed(bool allowed) { argument 98 SetRunningInsecureContentAllowed(bool allowed) argument [all...] |
/external/chromium_org/base/threading/ |
H A D | thread_restrictions.cc | 29 bool ThreadRestrictions::SetIOAllowed(bool allowed) { argument 31 g_io_disallowed.Get().Set(!allowed); 40 "disallows IO! If this thread really should be allowed to " 48 bool ThreadRestrictions::SetSingletonAllowed(bool allowed) { argument 50 g_singleton_disallowed.Get().Set(!allowed); 57 LOG(FATAL) << "LazyInstance/Singleton is not allowed to be used on this " 72 LOG(FATAL) << "Waiting is not allowed to be used on this thread to prevent" 77 bool ThreadRestrictions::SetWaitAllowed(bool allowed) { argument 79 g_wait_disallowed.Get().Set(!allowed);
|
/external/chromium_org/android_webview/native/permission/ |
H A D | simple_permission_request.cc | 24 void SimplePermissionRequest::NotifyRequestResult(bool allowed) { argument 25 callback_.Run(allowed);
|
H A D | aw_permission_request_delegate.h | 26 // Notify the permission request is allowed or not. 27 virtual void NotifyRequestResult(bool allowed) = 0;
|
/external/chromium_org/chrome/browser/media/ |
H A D | midi_permission_context.cc | 21 bool allowed) { 26 if (allowed) 19 UpdateTabContext(const PermissionRequestID& id, const GURL& requesting_frame, bool allowed) argument
|
/external/chromium_org/chrome/browser/ui/webui/ |
H A D | downloads_ui_browsertest.cc | 21 void DownloadsUIBrowserTest::SetDeleteAllowed(bool allowed) { argument 23 SetBoolean(prefs::kAllowDeletingBrowserHistory, allowed);
|
/external/chromium_org/third_party/WebKit/Source/modules/webmidi/ |
H A D | MIDIClientMock.cpp | 47 void MIDIClientMock::setSysexPermission(bool allowed) argument 49 m_allowed = allowed;
|
/external/chromium_org/third_party/WebKit/Source/web/ |
H A D | WebGeolocationPermissionRequest.cpp | 52 void WebGeolocationPermissionRequest::setIsAllowed(bool allowed) argument 54 m_private->setIsAllowed(allowed);
|
H A D | WebMIDIPermissionRequest.cpp | 55 void WebMIDIPermissionRequest::setIsAllowed(bool allowed) argument 57 m_initializer->resolveSysexPermission(allowed);
|
H A D | WebMIDIClientMock.cpp | 50 void WebMIDIClientMock::setSysexPermission(bool allowed) argument 52 m_clientMock->setSysexPermission(allowed);
|
/external/chromium_org/extensions/browser/ |
H A D | url_request_util.cc | 25 bool* allowed) { 37 *allowed = true; 42 // allowed. The navigation logic in CrossSiteResourceHandler will properly 45 *allowed = true; 50 *allowed = false; 58 *allowed = true; 74 *allowed = false; 84 *allowed = true; 88 // Couldn't determine if the resource is allowed or not. 21 AllowCrossRendererResourceLoad(net::URLRequest* request, bool is_incognito, const Extension* extension, InfoMap* extension_info_map, bool* allowed) argument
|
/external/chromium_org/chrome/browser/mac/ |
H A D | security_wrappers.h | 18 explicit ScopedSecKeychainSetUserInteractionAllowed(Boolean allowed);
|
H A D | security_wrappers.cc | 14 ScopedSecKeychainSetUserInteractionAllowed(Boolean allowed) { argument 21 status = SecKeychainSetUserInteractionAllowed(allowed);
|
/external/chromium_org/chrome/common/extensions/docs/examples/api/permissions/extension-questions/ |
H A D | options.js | 21 chrome.permissions.contains(PERMISSIONS, function(allowed) { 22 if (allowed) { 36 chrome.permissions.contains(PERMISSIONS, function(allowed) { 37 if (allowed) {
|
/external/chromium_org/chrome/installer/util/ |
H A D | legacy_firewall_manager_win_unittest.cc | 56 bool allowed = false; local 57 EXPECT_TRUE(manager_.GetAllowIncomingConnection(&allowed)); 58 EXPECT_TRUE(allowed); 67 bool allowed = true; local 68 EXPECT_TRUE(manager_.GetAllowIncomingConnection(&allowed)); 69 EXPECT_FALSE(allowed);
|
/external/chromium_org/chrome/browser/web_resource/ |
H A D | resource_request_allowed_notifier_test_util.cc | 22 void TestRequestAllowedNotifier::SetRequestsAllowedOverride(bool allowed) { argument 24 requests_allowed_ = allowed; 28 // Force the allowed state and requested state to true. This forces
|
/external/chromium_org/third_party/WebKit/Source/modules/geolocation/testing/ |
H A D | InternalsGeolocation.idl | 35 void setGeolocationPermission(Document document, boolean allowed);
|
/external/chromium_org/chrome/browser/renderer_host/ |
H A D | chrome_render_message_filter.cc | 173 bool* allowed) { 174 *allowed = 180 display_name, !*allowed)); 187 bool* allowed) { 188 *allowed = 195 !*allowed)); 217 bool allowed) { 219 allowed); 264 bool allowed) { 266 render_frame_id, request_id, allowed)); 167 OnAllowDatabase( int render_frame_id, const GURL& origin_url, const GURL& top_origin_url, const base::string16& name, const base::string16& display_name, bool* allowed) argument 183 OnAllowDOMStorage(int render_frame_id, const GURL& origin_url, const GURL& top_origin_url, bool local, bool* allowed) argument 215 OnRequestFileSystemAccessSyncResponse( IPC::Message* reply_msg, bool allowed) argument 261 OnRequestFileSystemAccessAsyncResponse( int render_frame_id, int request_id, bool allowed) argument 276 bool allowed = local 309 FileSystemAccessedOnUIThread( int render_process_id, int render_frame_id, const GURL& url, bool allowed, base::Callback<void(bool)> callback) argument 333 FileSystemAccessedResponse( int render_process_id, int render_frame_id, const GURL& url, base::Callback<void(bool)> callback, bool allowed) argument 345 OnAllowIndexedDB(int render_frame_id, const GURL& origin_url, const GURL& top_origin_url, const base::string16& name, bool* allowed) argument [all...] |
/external/chromium_org/third_party/WebKit/Source/core/loader/ |
H A D | MixedContentChecker.cpp | 205 void MixedContentChecker::logToConsole(LocalFrame* frame, const KURL& url, WebURLRequest::RequestContext requestContext, bool allowed) argument 210 allowed ? "This content should also be served over HTTPS." : "This request has been blocked; the content must be served over HTTPS."); 211 MessageLevel messageLevel = allowed ? WarningMessageLevel : ErrorMessageLevel; 246 bool allowed = false; local 254 allowed = client->allowDisplayingInsecureContent(settings && settings->allowDisplayOfInsecureContent(), securityOrigin, url); 255 if (allowed) 260 allowed = client->allowRunningInsecureContent(settings && settings->allowRunningOfInsecureContent(), securityOrigin, url); 261 if (allowed) 274 logToConsole(frame, url, resourceRequest.requestContext(), allowed); 275 return !allowed; 300 bool allowed = client()->allowDisplayingInsecureContent(settings && settings->allowDisplayOfInsecureContent(), securityOrigin, url); local 332 bool allowed = client()->allowRunningInsecureContent(allowedPerSettings, securityOrigin, url); local 374 logWarning(bool allowed, const KURL& target, const MixedContentType type) const argument [all...] |
/external/chromium_org/base/mac/ |
H A D | scoped_nsexception_enabler.h | 43 BASE_EXPORT void SetNSExceptionsAllowed(bool allowed);
|