HomeSort by relevance Sort by last modified time
    Searched refs:allowed (Results 101 - 125 of 376) sorted by null

1 2 3 45 6 7 8 91011>>

  /external/chromium_org/remoting/host/setup/
daemon_controller_delegate_win.cc 298 consent.allowed = false;
315 BOOL allowed; local
317 hr = control2_->GetUsageStatsConsent(&allowed, &set_by_policy);
324 consent.allowed = !!allowed;
  /external/chromium_org/third_party/WebKit/Source/core/frame/csp/
ContentSecurityPolicy.cpp 230 template<bool (CSPDirectiveList::*allowed)(ContentSecurityPolicy::ReportingStatus) const>
234 if (!(policies[i].get()->*allowed)(reportingStatus))
240 template<bool (CSPDirectiveList::*allowed)(ScriptState* scriptState, ContentSecurityPolicy::ReportingStatus) const>
244 if (!(policies[i].get()->*allowed)(scriptState, reportingStatus))
250 template<bool (CSPDirectiveList::*allowed)(const String&, const WTF::OrdinalNumber&, ContentSecurityPolicy::ReportingStatus) const>
254 if (!(policies[i].get()->*allowed)(contextURL, contextLine, reportingStatus))
260 template<bool (CSPDirectiveList::*allowed)(const String&) const>
264 if (!(policies[i].get()->*allowed)(nonce))
270 template<bool (CSPDirectiveList::*allowed)(const CSPHashValue&) const>
274 if (!(policies[i].get()->*allowed)(hashValue)
    [all...]
  /external/chromium_org/content/shell/renderer/test_runner/
test_runner.cc 235 void SetImagesAllowed(bool allowed);
236 void SetMediaAllowed(bool allowed);
237 void SetScriptsAllowed(bool allowed);
238 void SetStorageAllowed(bool allowed);
239 void SetPluginsAllowed(bool allowed);
240 void SetAllowDisplayOfInsecureContent(bool allowed);
241 void SetAllowRunningOfInsecureContent(bool allowed);
    [all...]
  /external/chromium_org/remoting/webapp/
third_party_host_permissions.js 44 /** @param {boolean} allowed Whether this extension has this permission. */
45 function(allowed) {
46 if (allowed) {
  /external/wpa_supplicant_8/src/ap/
acs.c 359 const int allowed[] = { 36, 44, 52, 60, 100, 108, 116, 124, 132, 149, local
363 for (i = 0; i < ARRAY_SIZE(allowed); i++)
364 if (chan->chan == allowed[i])
373 const int allowed[] = { 36, 52, 100, 116, 132, 149 }; local
376 for (i = 0; i < ARRAY_SIZE(allowed); i++)
377 if (chan->chan == allowed[i])
553 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not allowed as primary channel for HT40",
562 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not allowed as primary channel for VHT80",
  /external/chromium_org/chrome/common/extensions/docs/examples/api/storage/stylizr/
popup.js 19 message.innerText = 'Not allowed to inject CSS into special page.';
  /external/chromium_org/chrome/renderer/
content_settings_observer.cc 188 // If the empty string is in here, it means all plug-ins are allowed.
409 bool allowed = false; local
414 GURL(frame->document().securityOrigin().toString()), &allowed));
416 return allowed;
420 bool allowed = false; local
424 GURL(frame->document().securityOrigin().toString()), &allowed));
426 return allowed;
632 bool allowed) {
640 if (allowed) {
  /external/chromium_org/chrome/renderer/resources/extensions/enterprise_platform_keys/
key_pair.js 17 * @param {KeyUsage[]} usages The allowed key usages.
  /external/chromium_org/chrome/renderer/resources/extensions/
gcm_custom_bindings.js 34 throw new Error("Payload exceeded allowed size limit. Payload size is: "
  /external/chromium_org/content/browser/webui/
url_data_manager_backend.cc 167 void StartAsync(bool allowed);
169 // Called on the UI thread to check if this request is allowed.
369 bool allowed = false; local
376 allowed = true;
379 allowed = true;
385 allowed = partition == process->GetStoragePartition();
392 base::Bind(&URLRequestChromeJob::StartAsync, job, allowed));
395 void URLRequestChromeJob::StartAsync(bool allowed) {
399 if (!allowed || !backend_->StartRequest(request_, this)) {
  /external/chromium_org/v8/test/cctest/
test-utils-arm64.h 196 // Populate the w, x and r arrays with registers from the 'allowed' mask. The
207 int reg_size, int reg_count, RegList allowed);
211 int reg_size, int reg_count, RegList allowed);
  /external/libselinux/src/
mapping.c 176 if (avd->allowed & current_mapping[tclass].perms[i])
178 avd->allowed = result;
  /external/llvm/test/MC/ARM/
directive-arch_extension-crc.s 11 @ CHECK-V7: error: architectural extension 'crc' is not allowed for the current base architecture
32 @ CHECK-V7: error: architectural extension 'crc' is not allowed for the current base architecture
directive-arch_extension-mp.s 17 @ CHECK-V6: error: architectural extension 'mp' is not allowed for the current base architecture
28 @ CHECK-V6: error: architectural extension 'mp' is not allowed for the current base architecture
  /external/qemu/distrib/libselinux/src/
mapping.c 176 if (avd->allowed & current_mapping[tclass].perms[i])
178 avd->allowed = result;
  /external/vixl/test/
test-utils-a64.h 191 // Populate the w, x and r arrays with registers from the 'allowed' mask. The
202 int reg_size, int reg_count, RegList allowed);
206 int reg_size, int reg_count, RegList allowed);
  /frameworks/base/core/java/com/android/internal/os/
ZygoteConnection.java 501 // Duplicate --rlimit arguments are specifically allowed.
690 boolean allowed = SELinux.checkSELinuxAccess(peerSecurityContext,
694 if (!allowed) {
754 boolean allowed = SELinux.checkSELinuxAccess(peerSecurityContext,
758 if (!allowed) {
789 boolean allowed = SELinux.checkSELinuxAccess(peerSecurityContext,
793 if (!allowed) {
823 boolean allowed = SELinux.checkSELinuxAccess(peerSecurityContext,
827 if (!allowed) {
    [all...]
  /frameworks/base/packages/SystemUI/tests/
Android.mk 26 # sign this with platform cert, so this test is allowed to inject key events into
  /device/asus/fugu/libaudio/
AudioHardwareOutput.h 77 bool allowed; member in struct:android::AudioHardwareOutput::OutputSettings
  /external/chromium_org/chrome/browser/devtools/
devtools_file_helper.h 123 bool allowed);
  /external/chromium_org/chrome/browser/extensions/
extension_util.h 63 // Returns true if the extension with |extension_id| is allowed to execute
71 // Sets whether the extension with |extension_id| is allowed to execute scripts
77 bool allowed);
  /external/chromium_org/chrome/browser/renderer_host/
chrome_extension_message_filter.cc 134 const GURL& origin, bool* allowed) {
135 *allowed = extension_info_map_->SecurityOriginHasAPIPermission(
140 const GURL& origin, bool* allowed) {
143 *allowed = (origin.SchemeIs(extensions::kExtensionScheme) ||
  /external/chromium_org/chrome/browser/ui/website_settings/
website_settings_ui.h 53 // The number of allowed cookies.
54 int allowed; member in struct:WebsiteSettingsUI::CookieInfo
114 // including why that action was taken. E.g. "Allowed by you",
  /external/bison/src/
reader.c 292 is allowed to shoot herself in the foot.
434 complain_at (loc, _("only one %s allowed per rule"), "%prec");
448 complain_at (loc, _("only one %s allowed per rule"), "%dprec");
461 complain_at (loc, _("only one %s allowed per rule"), "%merge");
  /external/chromium_org/chrome/browser/content_settings/
tab_specific_content_settings.h 197 // Returns whether a particular kind of content has been allowed. Currently
263 // allowed local shared objects like cookies, local storage, ... .
279 // Called to indicate whether access to the Pepper broker was allowed or
281 void SetPepperBrokerAllowed(bool allowed);
331 bool allowed);
334 bool allowed);
377 // Stores which content setting types actually were allowed.
383 // Stores the blocked/allowed cookies.

Completed in 1924 milliseconds

1 2 3 45 6 7 8 91011>>