/external/chromium_org/third_party/tcmalloc/chromium/src/ |
profile-handler.h | 140 bool allowed; /* Profiling is allowed */ member in struct:ProfileHandlerState
|
/external/chromium_org/third_party/tcmalloc/vendor/src/ |
profile-handler.h | 140 bool allowed; /* Profiling is allowed */ member in struct:ProfileHandlerState
|
/external/chromium_org/chrome/browser/extensions/ |
extension_installer.cc | 32 bool allowed = ExtensionSystem::Get(profile_)->management_policy() local 34 DCHECK(allowed || !error.empty());
|
extension_function_dispatcher.cc | 514 bool allowed = true; local 516 allowed = AllowHostedAppAPICall(*extension, params.source_url, params.name); 520 if (allowed && api->IsPrivileged(params.name)) 521 allowed = process_map.Contains(extension->id(), requesting_process_id); 523 if (!allowed) {
|
/external/chromium_org/remoting/host/ |
usage_stats_consent_mac.cc | 17 bool GetUsageStatsConsent(bool* allowed, bool* set_by_policy) { 19 *allowed = false; 30 return host_config.GetBoolean(kUsageStatsConsentConfigPath, allowed); 37 bool allowed; local 39 return GetUsageStatsConsent(&allowed, &set_by_policy) && allowed; 42 bool SetUsageStatsConsent(bool allowed) {
|
usage_stats_consent_win.cc | 44 bool GetUsageStatsConsent(bool* allowed, bool* set_by_policy) { 54 *allowed = value != 0; 58 *allowed = value != 0; 68 bool allowed; local 70 return GetUsageStatsConsent(&allowed, &set_by_policy) && allowed; 73 bool SetUsageStatsConsent(bool allowed) { 74 DWORD value = allowed;
|
/external/chromium_org/third_party/WebKit/Source/core/loader/ |
MixedContentChecker.cpp | 68 bool allowed = client()->allowDisplayingInsecureContent(settings && settings->allowDisplayOfInsecureContent(), securityOrigin, url); local 69 logWarning(allowed, "displayed", url); 71 if (allowed) 74 return allowed; 83 bool allowed = client()->allowRunningInsecureContent(settings && settings->allowRunningOfInsecureContent(), securityOrigin, url); local 84 logWarning(allowed, "ran", url); 86 if (allowed) 89 return allowed; 92 void MixedContentChecker::logWarning(bool allowed, const String& action, const KURL& target) const 94 String message = String(allowed ? "" : "[blocked] ") + "The page at " + m_frame->document()->url().elidedString() + " " + action + (…) [all...] |
/external/libsepol/include/sepol/policydb/ |
flask_types.h | 55 sepol_access_vector_t allowed; member in struct:sepol_av_decision
|
/external/chromium_org/third_party/WebKit/Source/testing/runner/ |
NotificationPresenter.cpp | 148 bool allowed = m_allowedOrigins.find(string(originString.utf8())) != m_allowedOrigins.end(); local 149 return allowed ? WebNotificationPresenter::PermissionAllowed
|
WebPermissions.cpp | 54 bool allowed = enabledPerSettings && m_imagesAllowed; local 56 m_delegate->printMessage(std::string("PERMISSION CLIENT: allowImage(") + normalizeLayoutTestURL(imageURL.spec()) + "): " + (allowed ? "true" : "false") + "\n"); 57 return allowed; 62 bool allowed = enabledPerSettings && m_scriptsAllowed; local 64 m_delegate->printMessage(std::string("PERMISSION CLIENT: allowScriptFromSource(") + normalizeLayoutTestURL(scriptURL.spec()) + "): " + (allowed ? "true" : "false") + "\n"); 65 return allowed; 108 void WebPermissions::setDisplayingInsecureContentAllowed(bool allowed) 110 m_displayingInsecureContentAllowed = allowed; 113 void WebPermissions::setRunningInsecureContentAllowed(bool allowed) 115 m_runningInsecureContentAllowed = allowed; [all...] |
/external/openssh/ |
readpass.c | 174 int allowed = 0; local 188 allowed = 1; 192 return (allowed);
|
auth-rsa.c | 168 int allowed = 0; local 248 /* break out, this key is allowed */ 249 allowed = 1; 256 /* return key if allowed */ 257 if (allowed && rkey != NULL) 262 return allowed; 267 * return key if login is allowed, NULL otherwise 274 u_int i, allowed = 0; local 278 for (i = 0; !allowed && i < options.num_authkeys_files; i++) { 281 allowed = rsa_key_allowed_in_file(pw, file, client_n, rkey) [all...] |
/external/chromium/chrome/browser/ |
content_setting_image_model.cc | 153 // If any embedded site has access the allowed icon takes priority over the 157 bool allowed = local 159 set_icon(allowed ? IDR_GEOLOCATION_ALLOWED_LOCATIONBAR_ICON : 161 set_tooltip(l10n_util::GetStringUTF8(allowed ?
|
/external/chromium_org/chrome/browser/media_galleries/ |
media_galleries_dialog_controller.h | 60 GalleryPermission(const MediaGalleryPrefInfo& pref_info, bool allowed) 61 : pref_info(pref_info), allowed(allowed) {} 65 bool allowed; member in struct:chrome::MediaGalleriesDialogController::GalleryPermission
|
/external/chromium_org/chrome/browser/ui/content_settings/ |
content_setting_image_model.cc | 190 // If any embedded site has access the allowed icon takes priority over the 194 bool allowed = local 196 set_icon(allowed ? IDR_ALLOWED_LOCATION : IDR_BLOCKED_LOCATION); 197 set_tooltip(l10n_util::GetStringUTF8(allowed ? 326 // If any embedded site has access the allowed icon takes priority over the 330 bool allowed = local 332 set_icon(allowed ? IDR_ALLOWED_MIDI_SYSEX : IDR_BLOCKED_MIDI_SYSEX); 333 set_tooltip(l10n_util::GetStringUTF8(allowed ?
|
/external/chromium_org/chrome/browser/ui/website_settings/ |
website_settings_ui.h | 52 // The number of allowed cookies. 53 int allowed; member in struct:WebsiteSettingsUI::CookieInfo 110 // including why that action was taken. E.g. "Allowed by you",
|
/external/chromium_org/third_party/WebKit/Source/core/platform/mock/ |
GeolocationClientMock.cpp | 77 void GeolocationClientMock::setPermission(bool allowed) 79 m_permissionState = allowed ? PermissionStateAllowed : PermissionStateDenied; 114 bool allowed = m_permissionState == PermissionStateAllowed; local 122 (*it)->setIsAllowed(allowed);
|
/external/chromium_org/third_party/WebKit/Source/web/ |
IDBFactoryBackendProxy.cpp | 114 bool allowed; local 121 allowed = !webView->permissionClient() || webView->permissionClient()->allowIndexedDB(webFrame, name, origin); 136 allowed = bridge->result(); 139 if (!allowed) 142 return allowed;
|
/external/chromium_org/chrome/browser/ |
pepper_broker_infobar_delegate.cc | 106 bool allowed = (setting == CONTENT_SETTING_ALLOW); local 107 content::RecordAction(allowed ? 110 tab_content_settings->SetPepperBrokerAllowed(allowed); 111 callback.Run(allowed);
|
/external/libselinux/include/selinux/ |
selinux.h | 109 access_vector_t allowed; member in struct:av_decision
|
/external/wpa_supplicant_8/src/ap/ |
acs.c | 367 const int allowed[] = { 36, 44, 52, 60, 100, 108, 116, 124, 132, 149, local 371 for (i = 0; i < sizeof(allowed) / sizeof(allowed[0]); i++) 372 if (chan->chan == allowed[i]) 520 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not allowed as primary channel for HT40",
|
/external/wpa_supplicant_8/src/radius/ |
radius_das.c | 42 u8 allowed[] = { local 62 attr = radius_msg_find_unlisted_attr(msg, allowed);
|
/frameworks/native/cmds/servicemanager/ |
service_manager.c | 29 } allowed[] = { variable in typeref:struct:__anon32185 86 for (n = 0; n < sizeof(allowed) / sizeof(allowed[0]); n++) 87 if ((uid == allowed[n].uid) && str16eq(name, allowed[n].name))
|
/dalvik/vm/analysis/ |
Optimize.cpp | 497 /* access allowed? */ 499 bool allowed = dvmCheckClassAccess(referrer, resClass); local 501 if (!allowed) { 567 /* access allowed? */ 569 bool allowed = dvmCheckFieldAccess(referrer, (Field*)resField); local 571 if (!allowed) { 645 /* access allowed? */ 647 bool allowed = dvmCheckFieldAccess(referrer, (Field*)resField); local 649 if (!allowed) { 861 /* access allowed? * 863 bool allowed = dvmCheckMethodAccess(referrer, resMethod); local [all...] |
/external/chromium/chrome/browser/geolocation/ |
geolocation_permission_context_unittest.cc | 86 void CheckPermissionMessageSent(int bridge_id, bool allowed); 87 void CheckPermissionMessageSentForTab(int tab, int bridge_id, bool allowed); 90 bool allowed); 122 bool allowed) { 123 CheckPermissionMessageSentInternal(process(), bridge_id, allowed); local 129 bool allowed) { 131 extra_tabs_[tab]->render_view_host()->process()), bridge_id, allowed); 137 bool allowed) { 146 EXPECT_EQ(allowed, param.b);
|