/external/chromium_org/chrome/common/extensions/permissions/ |
chrome_api_permissions.cc | 25 template<typename T> APIPermission* CreateAPIPermission( 36 {APIPermission::kBackground, "background"}, 37 {APIPermission::kClipboardRead, "clipboardRead", 40 {APIPermission::kClipboardWrite, "clipboardWrite"}, 41 {APIPermission::kDeclarativeContent, "declarativeContent"}, 42 {APIPermission::kDeclarativeWebRequest, "declarativeWebRequest", 46 {APIPermission::kDesktopCapture, "desktopCapture", 50 {APIPermission::kDownloads, "downloads", APIPermissionInfo::kFlagNone, 52 {APIPermission::kDownloadsOpen, "downloads.open", 56 {APIPermission::kDownloadsShelf, "downloads.shelf"} [all...] |
settings_override_permission_unittest.cc | 70 EXPECT_TRUE(permission_set->HasAPIPermission(APIPermission::kHomepage)); 77 EXPECT_FALSE(permission_set->HasAPIPermission(APIPermission::kStartupPages)); 79 APIPermission::kSearchProvider)); 81 EXPECT_FALSE(permission_set->HasAPIPermission(APIPermission::kHomepage)); 82 EXPECT_FALSE(permission_set->HasAPIPermission(APIPermission::kStartupPages)); 84 permission_set->HasAPIPermission(APIPermission::kSearchProvider)); 94 EXPECT_TRUE(permission_set->HasAPIPermission(APIPermission::kStartupPages)); 101 EXPECT_FALSE(permission_set->HasAPIPermission(APIPermission::kHomepage)); 103 APIPermission::kSearchProvider)); 105 EXPECT_FALSE(permission_set->HasAPIPermission(APIPermission::kHomepage)) [all...] |
permission_set_unittest.cc | 70 EXPECT_EQ(APIPermission::kTab, info->GetByName("tabs")->id()); 71 EXPECT_EQ(APIPermission::kManagement, 83 EXPECT_NE(APIPermission::kInvalid, api->id()); 84 EXPECT_NE(APIPermission::kUnknown, api->id()); 102 expected.insert(APIPermission::kBackground); 103 expected.insert(APIPermission::kManagement); 104 expected.insert(APIPermission::kTab); 115 EXPECT_EQ(tabs_name, info->GetByID(APIPermission::kTab)->name()); 116 EXPECT_EQ(APIPermission::kTab, info->GetByName("tabs")->id()); 117 EXPECT_EQ(APIPermission::kTab, info->GetByName("windows")->id()) [all...] |
/external/chromium_org/extensions/common/permissions/ |
api_permission.cc | 11 using extensions::APIPermission; 16 class SimpleAPIPermission : public APIPermission { 19 : APIPermission(permission) { } 35 const APIPermission::CheckParam* param) const OVERRIDE { 39 virtual bool Contains(const APIPermission* rhs) const OVERRIDE { 44 virtual bool Equal(const APIPermission* rhs) const OVERRIDE { 61 virtual APIPermission* Clone() const OVERRIDE { 65 virtual APIPermission* Diff(const APIPermission* rhs) const OVERRIDE { 70 virtual APIPermission* Union(const APIPermission* rhs) const OVERRIDE [all...] |
settings_override_permission.h | 16 class SettingsOverrideAPIPermission : public APIPermission { 22 // APIPermission overrides. 25 virtual bool Check(const APIPermission::CheckParam* param) const OVERRIDE; 26 virtual bool Contains(const APIPermission* rhs) const OVERRIDE; 27 virtual bool Equal(const APIPermission* rhs) const OVERRIDE; 33 virtual APIPermission* Clone() const OVERRIDE; 34 virtual APIPermission* Diff(const APIPermission* rhs) const OVERRIDE; 35 virtual APIPermission* Union(const APIPermission* rhs) const OVERRIDE [all...] |
extensions_api_permissions.cc | 18 APIPermission* CreateAPIPermission(const APIPermissionInfo* permission) { 27 {APIPermission::kDns, "dns"}, 32 {APIPermission::kSocket, "socket", 35 {APIPermission::kStorage, "storage"}, 36 {APIPermission::kUsb, "usb", APIPermissionInfo::kFlagNone, 38 {APIPermission::kUsbDevice, "usbDevices", APIPermissionInfo::kFlagNone, 0,
|
api_permission_set.h | 23 typedef APIPermission ElementType; 24 typedef APIPermission::ID ElementIDType; 39 void insert(APIPermission::ID id); 43 void insert(APIPermission* permission);
|
api_permission_set_unittest.cc | 17 apis.insert(APIPermission::kTab); 18 apis.insert(APIPermission::kBackground); 19 apis.insert(APIPermission::kProxy); 20 apis.insert(APIPermission::kClipboardWrite); 21 apis.insert(APIPermission::kPlugin); 23 EXPECT_EQ(apis.find(APIPermission::kProxy)->id(), APIPermission::kProxy); 24 EXPECT_TRUE(apis.find(APIPermission::kSocket) == apis.end()); 28 EXPECT_EQ(apis.erase(APIPermission::kTab), 1u); 31 EXPECT_EQ(apis.erase(APIPermission::kTab), 0u) [all...] |
settings_override_permission.cc | 16 : APIPermission(permission), setting_value_(setting_value) {} 52 const APIPermission::CheckParam* param) const { 56 bool SettingsOverrideAPIPermission::Contains(const APIPermission* rhs) const { 61 bool SettingsOverrideAPIPermission::Equal(const APIPermission* rhs) const { 78 APIPermission* SettingsOverrideAPIPermission::Clone() const { 82 APIPermission* SettingsOverrideAPIPermission::Diff( 83 const APIPermission* rhs) const { 88 APIPermission* SettingsOverrideAPIPermission::Union( 89 const APIPermission* rhs) const { 94 APIPermission* SettingsOverrideAPIPermission::Intersect [all...] |
api_permission.h | 27 // APIPermission is for handling some complex permissions. Please refer to 30 class APIPermission { 188 explicit APIPermission(const APIPermissionInfo* info); 190 virtual ~APIPermission(); 198 // Returns the APIPermission of this permission. 213 virtual bool Contains(const APIPermission* rhs) const = 0; 216 virtual bool Equal(const APIPermission* rhs) const = 0; 218 // Parses the APIPermission from |value|. Returns false if an error happens 231 virtual APIPermission* Clone() const = 0; 234 virtual APIPermission* Diff(const APIPermission* rhs) const = 0 [all...] |
permission_set.h | 74 bool HasAPIPermission(APIPermission::ID permission) const; 83 bool CheckAPIPermission(APIPermission::ID permission) const; 86 bool CheckAPIPermissionWithParam(APIPermission::ID permission, 87 const APIPermission::CheckParam* param) const;
|
permissions_info.h | 31 const APIPermissionInfo* GetByID(APIPermission::ID id) const; 65 typedef std::map<APIPermission::ID, APIPermissionInfo*> IDMap;
|
media_galleries_permission_data.h | 28 bool Check(const APIPermission::CheckParam* param) const;
|
usb_device_permission.h | 19 struct CheckParam : public APIPermission::CheckParam { 32 // APIPermission overrides
|
set_disjunction_permission.h | 24 // APIPermission::CheckParam matches any of the conditions in the set, the 29 class SetDisjunctionPermission : public APIPermission { 32 : APIPermission(info) {} 36 // APIPermission overrides 39 virtual bool Check(const APIPermission::CheckParam* param) const OVERRIDE { 50 virtual bool Contains(const APIPermission* rhs) const OVERRIDE { 58 virtual bool Equal(const APIPermission* rhs) const OVERRIDE { 65 virtual APIPermission* Clone() const OVERRIDE { 71 virtual APIPermission* Diff(const APIPermission* rhs) const OVERRIDE [all...] |
api_permission_set.cc | 32 scoped_ptr<APIPermission> permission( 122 void APIPermissionSet::insert(APIPermission::ID id) { 129 void APIPermissionSet::insert(APIPermission* permission) { 180 if (ContainsKey(map(), APIPermission::kFileSystemWrite) && 181 ContainsKey(map(), APIPermission::kFileSystemDirectory)) { 182 insert(APIPermission::kFileSystemWriteDirectory);
|
/external/chromium_org/extensions/common/manifest_handlers/ |
permissions_parser.h | 38 APIPermission::ID permission); 39 static void AddAPIPermission(Extension* extension, APIPermission* permission); 41 APIPermission::ID permission);
|
/external/chromium_org/chrome/browser/extensions/ |
suggest_permission_util.h | 24 APIPermission::ID permission,
|
suggest_permission_util.cc | 27 void SuggestAPIPermissionInDevToolsConsole(APIPermission::ID permission, 50 APIPermission::ID permission,
|
active_tab_permission_granter.cc | 56 APIPermission::kActiveTab) || 64 new_apis.insert(APIPermission::kTab); 68 APIPermission::kTabCapture)) 69 new_apis.insert(APIPermission::kTabCaptureForTab);
|
extension_special_storage_policy.cc | 26 using extensions::APIPermission; 108 APIPermission::kUnlimitedStorage) || 110 APIPermission::kFileBrowserHandler) || 126 APIPermission::kUnlimitedStorage) && 131 APIPermission::kFileBrowserHandler)) 149 APIPermission::kUnlimitedStorage) || 151 APIPermission::kFileBrowserHandler) || 166 APIPermission::kUnlimitedStorage) && 171 APIPermission::kFileBrowserHandler))
|
/external/chromium_org/chrome/browser/extensions/api/preference/ |
preference_api.cc | 55 // Use APIPermission::kInvalid for |read_permission| to express that the read 57 APIPermission::ID read_permission; 60 // Use APIPermission::kInvalid for |write_permission| to express that the 62 APIPermission::ID write_permission; 71 {"protectedContentEnabled", prefs::kEnableDRM, APIPermission::kPrivacy, 72 APIPermission::kPrivacy}, 74 APIPermission::kPrivacy, APIPermission::kPrivacy}, 76 APIPermission::kPrivacy, APIPermission::kPrivacy} [all...] |
preference_helpers.h | 42 extensions::APIPermission::ID permission,
|
/external/chromium_org/chrome/browser/extensions/api/guest_view/ |
guest_view_internal_api.cc | 28 APIPermission::kWebView)) {
|
/external/chromium_org/chrome/common/extensions/manifest_tests/ |
extension_manifests_old_unittest.cc | 18 extensions::APIPermission::kUnlimitedStorage));
|