/external/chromium_org/chrome/browser/content_settings/ |
permission_queue_controller.h | 28 typedef base::Callback<void(bool /* allowed */)> PermissionDecidedCallback; 50 bool allowed); 81 const GURL& requesting_frame, const GURL& embedder, bool allowed);
|
/external/chromium_org/chrome/browser/geolocation/ |
chrome_geolocation_permission_context.h | 50 // Notifies whether or not the corresponding bridge is allowed to use 57 bool allowed); 77 bool allowed);
|
chrome_geolocation_permission_context_android.h | 34 bool allowed) OVERRIDE;
|
/external/chromium_org/chrome/browser/media/ |
protected_media_identifier_permission_context.h | 52 // Notifies whether or not the corresponding bridge is allowed to use 58 bool allowed); 78 bool allowed);
|
/external/chromium_org/chrome/common/extensions/manifest_handlers/ |
externally_connectable.h | 65 // The URL patterns that are allowed to connect/sendMessage. 68 // The extension IDs that are allowed to connect/sendMessage. Sorted. 71 // True if any extension is allowed to connect. This would have corresponded
|
/external/clang/test/Sema/ |
vla.c | 30 int c[][i]; // expected-error {{variably modified type declaration not allowed at file scope}} 31 int d[i]; // expected-error {{variable length array declaration not allowed at file scope}} 33 int (*e)[i]; // expected-error {{variably modified type declaration not allowed at file scope}}
|
/external/clang/test/SemaObjC/ |
warn-direct-ivar-access.m | 52 x->ivar = 0; // expected-error {{dereferencing a __weak pointer is not allowed}} 53 return y ? y->ivar // expected-error {{dereferencing a __weak pointer is not allowed}} 54 : (*x).ivar; // expected-error {{dereferencing a __weak pointer is not allowed}}
|
/external/proguard/src/proguard/util/ |
VariableStringMatcher.java | 93 * Returns whether the given character is allowed in the variable string. 97 // Check the allowed characters. 123 // Any remaining character is allowed.
|
/frameworks/base/packages/services/PacProcessor/src/com/android/pacprocessor/ |
PacService.java | 91 Log.e(TAG, "Only system user is allowed to call setPacFile"); 100 Log.e(TAG, "Only system user is allowed to call startPacSystem"); 109 Log.e(TAG, "Only system user is allowed to call stopPacSystem");
|
/frameworks/base/services/java/com/android/server/ |
IdleMaintenanceService.java | 235 boolean allowed = (mLastUserActivityElapsedTimeMillis != LAST_USER_ACTIVITY_TIME_INVALID 237 if (!allowed && noisy) { 238 Slog.i("IdleMaintenance", "Idle maintenance not allowed due to power"); 240 return allowed; 245 boolean allowed = (mLastUserActivityElapsedTimeMillis != LAST_USER_ACTIVITY_TIME_INVALID 248 if (!allowed && noisy) { 249 Slog.i("IdleMaintenance", "Idle maintenance not allowed due to last user activity"); 251 return allowed; 256 boolean allowed = SystemClock.elapsedRealtime() - mLastIdleMaintenanceStartTimeMillis 258 if (!allowed && noisy) [all...] |
/packages/apps/Mms/src/org/w3c/dom/smil/ |
ElementTimeManipulation.java | 27 * are signed floating point values. Zero values are not allowed. The 38 * element. Allowed values are from <code>0</code> to <code>100</code> . 52 * element. Allowed values are from <code>0</code> to <code>100</code> .
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/bits/ |
posix2_lim.h | 27 /* The maximum `ibase' and `obase' values allowed by the `bc' utility. */ 30 /* The maximum number of elements allowed in an array by the `bc' utility. */ 33 /* The maximum `scale' value allowed by the `bc' utility. */
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/bits/ |
posix2_lim.h | 27 /* The maximum `ibase' and `obase' values allowed by the `bc' utility. */ 30 /* The maximum number of elements allowed in an array by the `bc' utility. */ 33 /* The maximum `scale' value allowed by the `bc' utility. */
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/bits/ |
posix2_lim.h | 27 /* The maximum `ibase' and `obase' values allowed by the `bc' utility. */ 30 /* The maximum number of elements allowed in an array by the `bc' utility. */ 33 /* The maximum `scale' value allowed by the `bc' utility. */
|
/external/chromium_org/chrome/browser/policy/ |
url_blacklist_manager_unittest.cc | 383 scoped_ptr<base::ListValue> allowed(new base::ListValue); 385 allowed->Append(new base::StringValue("s.xxx.com/a/b")); 387 allowed->Append(new base::StringValue("https://s.xxx.com/a/b/c/d")); 389 blacklist.Allow(allowed.get()); 414 allowed.reset(new base::ListValue); 415 allowed->Append(new base::StringValue("plus.google.com")); 416 blacklist.Allow(allowed.get()); 422 allowed.reset(new base::ListValue); 423 allowed->Append(new base::StringValue("https://mail.google.com")); 424 blacklist.Allow(allowed.get()) [all...] |
/art/test/069-field-type/src/ |
Main.java | 17 System.out.println("Assignment was allowed");
|
/cts/tests/tests/widget/src/android/widget/cts/ |
RemoteViewsActivityTest.java | 93 assertTrue("Derived class (EditText) allowed to be inflated", exceptionThrown); 94 assertNull("Derived class (EditText) allowed to be inflated", result); 119 assertTrue("WebView allowed to be inflated", exceptionThrown); 120 assertNull("WebView allowed to be inflated", result);
|
/dalvik/tests/069-field-type/src/ |
Main.java | 17 System.out.println("Assignment was allowed");
|
/dalvik/vm/ |
README.txt | 19 - Use of gcc-specific and C99 constructs is allowed.
|
/dalvik/vm/oo/ |
AccessCheck.cpp | 119 * Determine whether the "accessFrom" class is allowed to get at "clazz". 121 * It's allowed if "clazz" is public or is in the same package. (Only 134 * Determine whether the "accessFrom" class is allowed to get at "method". 142 * Determine whether the "accessFrom" class is allowed to get at "field".
|
/external/chromium/chrome/browser/ |
content_setting_image_model.cc | 153 // If any embedded site has access the allowed icon takes priority over the 157 bool allowed = local 159 set_icon(allowed ? IDR_GEOLOCATION_ALLOWED_LOCATIONBAR_ICON : 161 set_tooltip(l10n_util::GetStringUTF8(allowed ?
|
/external/chromium/chrome/browser/notifications/ |
notification_exceptions_table_model.cc | 115 std::vector<GURL> allowed(service_->GetAllowedOrigins()); 117 entries_.reserve(allowed.size() + blocked.size()); 118 for (size_t i = 0; i < allowed.size(); ++i) 119 entries_.push_back(Entry(allowed[i], CONTENT_SETTING_ALLOW));
|
/external/chromium-trace/trace-viewer/build/ |
gjslint | 18 sys.stderr.write('No arguments allowed')
|
/external/chromium_org/android_webview/browser/ |
scoped_allow_wait_for_legacy_web_view_api.h | 14 // added in the public API, and and no new uses of this will be allowed.
|
/external/chromium_org/chrome/browser/chromeos/input_method/ |
DEPS | 25 # Do not add to the list of temporarily-allowed dependencies below,
|