/external/chromium_org/chrome/renderer/ |
content_settings_observer.cc | 169 // If the empty string is in here, it means all plug-ins are allowed. 375 bool allowed = false; local 379 &allowed)); 380 return allowed; 385 bool allowed = false; local 388 &allowed)); 389 return allowed; 552 bool allowed = false; local 556 &allowed)); 557 return allowed; [all...] |
/external/chromium_org/content/public/android/javatests/src/org/chromium/content/browser/ |
JavaBridgeBasicsTest.java | 535 public String allowed() { return "foo"; } 538 // Test calling a method of an explicitly inherited class (Base#allowed()). 539 assertEquals("foo", executeJavaScriptAndGetStringResult("testObject.allowed()")); 550 public String allowed() { return "foo"; } 561 // allowed() is marked with the @JavascriptInterface annotation and should be allowed to be 563 assertEquals("foo", executeJavaScriptAndGetStringResult("testObject.allowed()")); 685 public String allowed() { return "bar"; } method in class:JavaBridgeBasicsTest.Test 703 // Test#allowed() should pass, as it is annotated with JavascriptInterface. 705 "testObject.allowed()")); [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
config_ssid.h | 161 * pairwise_cipher - Bitfield of allowed pairwise ciphers, WPA_CIPHER_* 166 * group_cipher - Bitfield of allowed group ciphers, WPA_CIPHER_* 171 * key_mgmt - Bitfield of allowed key management protocols 184 * proto - Bitfield of allowed protocols, WPA_PROTO_* 189 * auth_alg - Bitfield of allowed authentication algorithms 256 * mixed_cell - Whether mixed cells are allowed 260 * SSID, are allowed. This is disabled (0) by default. Enable by 348 * peerkey - Whether PeerKey handshake for direct links is allowed 439 * freq_list - Array of allowed frequencies or %NULL for all 550 * ht_mcs - Allowed HT-MCS rates, in ASCII hex: ffff0000.. [all...] |
/external/chromium/third_party/libjingle/source/talk/base/ |
stringencode.h | 58 // Note: in-place unescaping (buffer == source) is allowed. 70 // Note: in-place decoding (buffer == source) is allowed. 83 // Note: in-place decoding (buffer == source) is allowed. 90 // Note: in-place decoding (buffer == source) is allowed. 97 // Note: in-place decoding (buffer == source) is allowed.
|
/external/chromium_org/ash/wm/caption_buttons/ |
frame_caption_button_container_view_unittest.cc | 131 // Test how the allowed actions affect which caption buttons are visible. 134 // are allowed because the size button can do both. 147 // The minimize button should be visible when minimizing is allowed but 162 // neither minimizing nor maximizing are allowed. 261 // both minimizing and maximizing are allowed when using the alternate
|
/external/chromium_org/v8/test/webkit/fast/js/ |
basic-strict-mode-expected.txt | 58 PASS (function (eval){'use strict';}) threw exception SyntaxError: Parameter name eval or arguments is not allowed in strict mode. 59 PASS (function(){(function (eval){'use strict';})}) threw exception SyntaxError: Parameter name eval or arguments is not allowed in strict mode. 62 PASS (function (arguments){'use strict';}) threw exception SyntaxError: Parameter name eval or arguments is not allowed in strict mode. 63 PASS (function(){(function (arguments){'use strict';})}) threw exception SyntaxError: Parameter name eval or arguments is not allowed in strict mode. 118 PASS 'use strict'; 007; threw exception SyntaxError: Octal literals are not allowed in strict mode.. 119 PASS (function(){'use strict'; 007;}) threw exception SyntaxError: Octal literals are not allowed in strict mode.. 120 PASS 'use strict'; '\007'; threw exception SyntaxError: Octal literals are not allowed in strict mode.. 121 PASS (function(){'use strict'; '\007';}) threw exception SyntaxError: Octal literals are not allowed in strict mode.. 122 PASS '\007'; 'use strict'; threw exception SyntaxError: Octal literals are not allowed in strict mode.. 123 PASS (function(){'\007'; 'use strict';}) threw exception SyntaxError: Octal literals are not allowed in strict mode. [all...] |
/external/clang/test/SemaCXX/ |
cstyle-cast.cpp | 102 //(void)(A*)((H*)0); // {{static_cast from 'struct H *' to 'struct A *' is not allowed}} 145 (void)(Enum)((int*)0); // expected-error {{C-style cast from 'int *' to 'Enum' is not allowed}} 163 (void)(int A::*)((int F::*)0); // expected-error {{conversion from pointer to member of class 'F' to pointer to member of class 'A' via virtual base 'B' is not allowed}} 230 (void)(void (structure::*)())(psi); // expected-error {{C-style cast from 'const int structure::*' to 'void (structure::*)()' is not allowed}} 231 (void)(int structure::*)(psf); // expected-error {{C-style cast from 'void (structure::*)()' to 'int structure::*' is not allowed}}
|
/external/speex/libspeex/ |
nb_celp.h | 58 int min_pitch; /**< Minimum pitch value allowed */ 59 int max_pitch; /**< Maximum pitch value allowed */ 101 spx_int32_t vbr_max; /**< Max bit-rate allowed in VBR mode */ 131 int min_pitch; /**< Minimum pitch value allowed */ 132 int max_pitch; /**< Maximum pitch value allowed */
|
/frameworks/native/cmds/servicemanager/ |
service_manager.c | 29 } allowed[] = { variable in typeref:struct:__anon30356 86 for (n = 0; n < sizeof(allowed) / sizeof(allowed[0]); n++) 87 if ((uid == allowed[n].uid) && str16eq(name, allowed[n].name))
|
/sdk/eclipse/plugins/com.android.ide.eclipse.tests/src/com/android/ide/eclipse/adt/internal/build/ |
AaptParserTest.java | 48 "aapterror1.xml:5: error: Error: Integer types not allowed (at " 122 "aapterror5.xml:4: error: Error: String types not allowed (at " 131 "aapterror6.xml:5: error: Error: String types not allowed (at 'layout_marginTop'" 140 "aapterror1.xml:5: error: Error: String types not allowed (at 'layout_marginLeft'" 149 "aapterror7.xml:5: error: Error: String types not allowed (at 'id'"
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
DigestOutputStreamTest.java | 161 // allowed failure 199 // allowed failure 227 // allowed failure 304 // allowed failure 339 // allowed failure 380 // allowed failure 421 // allowed failure 496 // allowed failure 516 // allowed failure
|
/external/chromium/chrome/browser/geolocation/ |
geolocation_permission_context_unittest.cc | 86 void CheckPermissionMessageSent(int bridge_id, bool allowed); 87 void CheckPermissionMessageSentForTab(int tab, int bridge_id, bool allowed); 90 bool allowed); 122 bool allowed) { 123 CheckPermissionMessageSentInternal(process(), bridge_id, allowed); local 129 bool allowed) { 131 extra_tabs_[tab]->render_view_host()->process()), bridge_id, allowed); 137 bool allowed) { 146 EXPECT_EQ(allowed, param.b);
|
geolocation_permission_context.cc | 81 bool allowed); 389 bool allowed) { 393 allowed ? CONTENT_SETTING_ALLOW : CONTENT_SETTING_BLOCK; 418 copied_request.bridge_id, copied_request.requesting_frame, allowed); 583 bool allowed) { 594 allowed); 600 render_view_id, bridge_id, allowed)); 603 if (allowed) {
|
/sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/editors/descriptors/ |
ElementDescriptor.java | 50 /** The list of allowed attributes. */ 52 /** The list of allowed children */ 75 * @param attributes The list of allowed attributes. Can be null or empty. 76 * @param children The list of allowed children. Can be null or empty. 103 * @param attributes The list of allowed attributes. Can be null or empty. 104 * @param children The list of allowed children. Can be null or empty. 129 * @param children The list of allowed children. Can be null or empty. 145 * @param children The list of allowed children. Can be null or empty. 294 /* Returns the list of allowed attributes. */ 299 /** Sets the list of allowed attributes. * [all...] |
/external/chromium_org/chrome/browser/signin/ |
signin_manager.h | 75 // Returns true if the username is allowed based on the policy string. 131 // Returns true if the passed username is allowed by policy. Virtual for 171 // Checks if signin is allowed for the profile that owns |io_data|. This must 187 // Flag saying whether signing out is allowed. 210 // passed |username| is not allowed by policy. 289 // Helper object to listen for changes to the signin allowed preference.
|
/frameworks/base/core/java/android/os/ |
Trace.java | 85 private static native void nativeSetAppTracingAllowed(boolean allowed); 86 private static native void nativeSetTracingEnabled(boolean allowed); 159 * Set whether application tracing is allowed for this process. This is intended to be set 164 public static void setAppTracingAllowed(boolean allowed) { 165 nativeSetAppTracingAllowed(allowed); 167 // Setting whether app tracing is allowed may change the tags, so we update the cached
|
/packages/apps/Calendar/src/com/android/calendar/event/ |
EventViewUtils.java | 87 * (perhaps because we don't think it's allowed for this calendar), we return zero (the 100 // If not allowed, or undefined, just use the first entry in the list. 101 //Log.d(TAG, "Cannot find method (" + method + ") in allowed list"); 160 * Remove entries from the method list that aren't allowed for this calendar. 177 Log.w(TAG, "Bad allowed-strings list: '" + allowedStrings[i] + 183 // Walk through the method list, removing entries that aren't in the allowed list.
|
/external/chromium_org/chrome/browser/geolocation/ |
chrome_geolocation_permission_context_unittest.cc | 117 bool allowed); 118 void CheckPermissionMessageSent(int bridge_id, bool allowed); 119 void CheckPermissionMessageSentForTab(int tab, int bridge_id, bool allowed); 122 bool allowed); 133 // whether the requested permission was allowed. 174 bool allowed) { 175 responses_[id.render_process_id()] = std::make_pair(id.bridge_id(), allowed); 180 bool allowed) { 181 CheckPermissionMessageSentInternal(process(), bridge_id, allowed); local 187 bool allowed) { [all...] |
/external/clang/test/Driver/ |
fsanitize.c | 26 // CHECK-UNDEFINED-NO-TRAP-ERROR: '-fcatch-undefined-behavior' not allowed with '-fno-sanitize-undefined-trap-on-error' 29 // CHECK-VPTR-UNDEF-ERROR: '-fsanitize=vptr' not allowed with '-fcatch-undefined-behavior' 32 // CHECK-UNDEFINED-TRAP-ON-ERROR-UNDEF: '-fsanitize=undefined' not allowed with '-fsanitize-undefined-trap-on-error' 35 // CHECK-UNDEFINED-TRAP-ON-ERROR-VPTR: '-fsanitize=vptr' not allowed with '-fsanitize-undefined-trap-on-error' 39 // CHECK-VPTR-NO-RTTI: '-fsanitize=vptr' not allowed with '-fno-rtti' 42 // CHECK-SANA-SANT: '-fsanitize=address' not allowed with '-fsanitize=thread' 45 // CHECK-SANA-SANM: '-fsanitize=address' not allowed with '-fsanitize=memory' 48 // CHECK-SANT-SANM: '-fsanitize=thread' not allowed with '-fsanitize=memory' 51 // CHECK-SANM-SANT: '-fsanitize=thread' not allowed with '-fsanitize=memory' 54 // CHECK-SANL-SANT: '-fsanitize=leak' not allowed with '-fsanitize=thread [all...] |
/external/openssh/ |
sshd_config.5 | 109 If specified, login is allowed only for users whose primary 112 By default, login is allowed for all groups. 135 If specified, login is allowed only for user names that 138 By default, login is allowed for all users. 217 authentication is allowed. 224 Specifies whether challenge-response authentication is allowed (e.g. via 275 Specifies the ciphers allowed for protocol version 2. 334 Specifies whether compression is allowed, or delayed until 349 By default, login is allowed for all groups. 367 By default, login is allowed for all users [all...] |
/dalvik/vm/ |
ReferenceTable.h | 37 * table/nextEntry is allowed.) 44 int maxEntries; /* max #of entries allowed */
|
/dalvik/vm/alloc/ |
Alloc.h | 71 * The "self" argument is allowed as an optimization; it may be NULL. 80 * The "self" argument is allowed as an optimization; it may be NULL.
|
/external/bluetooth/bluedroid/bta/gatt/ |
bta_gatts_int.h | 60 /* max number of application allowed on device */ 63 /* max number of services allowed in the device */
|
/external/chromium/chrome/browser/ |
external_protocol_handler.h | 29 // Checks to see if the protocol is allowed, if it is whitelisted, 74 // the state to false (not allowed).
|
/external/chromium/chrome/browser/ui/cocoa/extensions/ |
browser_actions_container_view.h | 49 // Whether the user is allowed to drag the grippy to the left. NO if all 54 // Whether the user is allowed to drag the grippy to the right. NO if all
|