/external/chromium_org/third_party/tcmalloc/chromium/src/ |
profile-handler.h | 140 bool allowed; /* Profiling is allowed */ member in struct:ProfileHandlerState
|
/external/chromium_org/third_party/tcmalloc/vendor/src/ |
profile-handler.h | 140 bool allowed; /* Profiling is allowed */ member in struct:ProfileHandlerState
|
/external/chromium_org/chrome/browser/extensions/ |
extension_installer.cc | 32 bool allowed = ExtensionSystem::Get(profile_)->management_policy() local 34 DCHECK(allowed || !error.empty());
|
extension_util.cc | 175 bool allowed = false; local 179 &allowed) && 180 allowed; 185 bool allowed) { 189 allowed ? new base::FundamentalValue(true) : NULL);
|
/external/chromium_org/chrome/installer/util/ |
legacy_firewall_manager_win_unittest.cc | 56 bool allowed = false; local 57 EXPECT_TRUE(manager_.GetAllowIncomingConnection(&allowed)); 58 EXPECT_TRUE(allowed); 67 bool allowed = true; local 68 EXPECT_TRUE(manager_.GetAllowIncomingConnection(&allowed)); 69 EXPECT_FALSE(allowed);
|
/external/chromium_org/remoting/host/ |
usage_stats_consent_mac.cc | 17 bool GetUsageStatsConsent(bool* allowed, bool* set_by_policy) { 19 *allowed = false; 30 return host_config.GetBoolean(kUsageStatsConsentConfigPath, allowed); 37 bool allowed; local 39 return GetUsageStatsConsent(&allowed, &set_by_policy) && allowed; 42 bool SetUsageStatsConsent(bool allowed) {
|
usage_stats_consent_win.cc | 44 bool GetUsageStatsConsent(bool* allowed, bool* set_by_policy) { 54 *allowed = value != 0; 58 *allowed = value != 0; 68 bool allowed; local 70 return GetUsageStatsConsent(&allowed, &set_by_policy) && allowed; 73 bool SetUsageStatsConsent(bool allowed) { 74 DWORD value = allowed;
|
/external/chromium_org/third_party/WebKit/Source/core/loader/ |
MixedContentChecker.cpp | 68 bool allowed = client()->allowDisplayingInsecureContent(settings && settings->allowDisplayOfInsecureContent(), securityOrigin, url); local 69 logWarning(allowed, url, type); 71 if (allowed) 74 return allowed; 84 bool allowed = client()->allowRunningInsecureContent(allowedPerSettings, securityOrigin, url); local 85 logWarning(allowed, url, type); 87 if (allowed) 90 return allowed; 104 void MixedContentChecker::logWarning(bool allowed, const KURL& target, const MixedContentType type) const 107 message.append((allowed ? "" : "[blocked] ")) [all...] |
/external/libsepol/include/sepol/policydb/ |
flask_types.h | 55 sepol_access_vector_t allowed; member in struct:sepol_av_decision
|
/external/chromium_org/chrome/browser/ |
pepper_broker_infobar_delegate.cc | 65 bool allowed = (setting == CONTENT_SETTING_ALLOW); local 66 content::RecordAction(allowed ? 69 tab_content_settings->SetPepperBrokerAllowed(allowed); 70 callback.Run(allowed);
|
/external/chromium_org/chrome/browser/renderer_host/ |
chrome_render_message_filter.cc | 173 bool* allowed) { 174 *allowed = 180 display_name, !*allowed)); 187 bool* allowed) { 188 *allowed = 195 !*allowed)); 203 bool allowed = local 218 !allowed, 224 allowed); 234 !allowed)); 244 bool allowed = local [all...] |
/external/chromium_org/chrome/browser/ui/website_settings/ |
website_settings_ui.h | 53 // The number of allowed cookies. 54 int allowed; member in struct:WebsiteSettingsUI::CookieInfo 114 // including why that action was taken. E.g. "Allowed by you",
|
/external/chromium_org/content/shell/renderer/test_runner/ |
web_permissions.cc | 22 bool allowed = enabled_per_settings && images_allowed_; local 26 (allowed ? "true" : "false") + "\n"); 28 return allowed; 32 bool allowed = media_allowed_; local 36 (allowed ? "true" : "false") + "\n"); 37 return allowed; 42 bool allowed = enabled_per_settings && scripts_allowed_; local 47 (allowed ? "true" : "false") + "\n"); 49 return allowed; 94 void WebPermissions::SetDisplayingInsecureContentAllowed(bool allowed) { [all...] |
/external/chromium_org/third_party/WebKit/Source/modules/geolocation/testing/ |
GeolocationClientMock.cpp | 70 void GeolocationClientMock::setPermission(bool allowed) 72 m_permissionState = allowed ? PermissionStateAllowed : PermissionStateDenied; 117 bool allowed = m_permissionState == PermissionStateAllowed; local 125 (*it)->setIsAllowed(allowed);
|
/device/asus/fugu/libaudio/ |
AudioHardwareOutput.h | 77 bool allowed; member in struct:android::AudioHardwareOutput::OutputSettings
|
/external/chromium_org/android_webview/native/permission/ |
permission_request_handler_unittest.cc | 33 // Notify the permission request is allowed or not. 34 virtual void NotifyRequestResult(bool allowed) OVERRIDE { 35 callback_.Run(allowed); 127 void NotifyRequestResult(bool allowed) { 128 allowed_ = allowed; 164 bool allowed() { function in class:android_webview::PermissionRequestHandlerTest 191 EXPECT_TRUE(allowed()); 211 EXPECT_FALSE(allowed()); 283 EXPECT_TRUE(allowed()); 295 EXPECT_TRUE(allowed()); [all...] |
/external/chromium_org/chrome/browser/ui/content_settings/ |
content_setting_image_model.cc | 200 // If any embedded site has access the allowed icon takes priority over the 204 bool allowed = local 206 set_icon(allowed ? IDR_ALLOWED_LOCATION : IDR_BLOCKED_LOCATION); 207 set_tooltip(l10n_util::GetStringUTF8(allowed ? 336 // If any embedded site has access the allowed icon takes priority over the 340 bool allowed = local 342 set_icon(allowed ? IDR_ALLOWED_MIDI_SYSEX : IDR_BLOCKED_MIDI_SYSEX); 343 set_tooltip(l10n_util::GetStringUTF8(allowed ?
|
/external/chromium_org/components/data_reduction_proxy/browser/ |
data_reduction_proxy_params.h | 56 // data reduction proxy configuration is allowed to be used. If 59 // configuration is allowed to be used. This alternative configuration would 138 bool allowed() const { function in class:data_reduction_proxy::DataReductionProxyParams 154 // This is idependent of whether the data reduction proxy is allowed. 155 // TODO(bengr): maybe tie to whether proxy is allowed. 171 // corresponding definitions for the allowed configurations. 172 bool Init(bool allowed, bool fallback_allowed, bool alt_allowed);
|
/external/chromium_org/remoting/host/setup/ |
daemon_controller.h | 92 // Indicates if crash dump reporting is allowed by the user. 93 bool allowed; member in struct:remoting::DaemonController::UsageStatsConsent
|
daemon_controller_delegate_win.cc | 298 consent.allowed = false; 315 BOOL allowed; local 317 hr = control2_->GetUsageStatsConsent(&allowed, &set_by_policy); 324 consent.allowed = !!allowed;
|
/external/libselinux/include/selinux/ |
selinux.h | 110 access_vector_t allowed; member in struct:av_decision
|
/external/qemu/distrib/libselinux/include/selinux/ |
selinux.h | 110 access_vector_t allowed; member in struct:av_decision
|
/external/wpa_supplicant_8/src/radius/ |
radius_das.c | 39 u8 allowed[] = { local 64 attr = radius_msg_find_unlisted_attr(msg, allowed);
|
/external/chromium_org/chrome/browser/geolocation/ |
geolocation_permission_context_unittest.cc | 123 bool allowed); 124 void CheckPermissionMessageSent(int bridge_id, bool allowed); 125 void CheckPermissionMessageSentForTab(int tab, int bridge_id, bool allowed); 128 bool allowed); 138 // whether the requested permission was allowed. 184 bool allowed) { 185 responses_[id.render_process_id()] = std::make_pair(id.bridge_id(), allowed); 190 bool allowed) { 191 CheckPermissionMessageSentInternal(process(), bridge_id, allowed); local 197 bool allowed) { [all...] |
/external/chromium_org/chrome/browser/speech/ |
chrome_speech_recognition_manager_delegate.cc | 404 bool allowed = false; local 409 allowed = true; 412 base::Bind(callback, check_permission, allowed)); 422 allowed = true; 434 allowed = true; 439 base::Bind(callback, check_permission, allowed));
|