HomeSort by relevance Sort by last modified time
    Searched refs:allowed (Results 176 - 200 of 376) sorted by null

1 2 3 4 5 6 78 91011>>

  /external/chromium_org/v8/test/preparser/
nonstrict-eval.js 40 // Reading eval and arguments is allowed.
  /external/llvm/test/MC/ARM/
directive-arch_extension-crypto.s 13 @ CHECK-V7: error: architectural extension 'crypto' is not allowed for the current base architecture
54 @ CHECK-V7: error: architectural extension 'crypto' is not allowed for the current base architecture
diagnostics.s 426 @ CHECK-ERRORS: error: instruction with .n (narrow) qualifier not allowed in arm mode
460 @ CHECK-ERRORS: error: writeback register not allowed in register list
461 @ CHECK-ERRORS: error: writeback register not allowed in register list
462 @ CHECK-ERRORS: error: writeback register not allowed in register list
463 @ CHECK-ERRORS: error: writeback register not allowed in register list
485 @ CHECK-ERRORS: error: writeback register only allowed on system LDM if PC in register-list
  /external/wpa_supplicant_8/src/radius/
radius_das.c 39 u8 allowed[] = { local
64 attr = radius_msg_find_unlisted_attr(msg, allowed);
  /packages/apps/Browser/src/com/android/browser/preferences/
WebsiteSettingsFragment.java 522 public void onReceiveValue(Boolean allowed) {
523 if (allowed != null) {
524 if (allowed.booleanValue()) {
556 public void onReceiveValue(Boolean allowed) {
557 if (allowed != null) {
558 if (allowed.booleanValue()) {
  /external/libselinux/src/
avc.c 649 denied = requested & ~avd->allowed;
739 denied = requested & ~(ae->avd.allowed);
744 ae->avd.allowed |= requested;
864 node->ae.avd.allowed |= perms;
868 node->ae.avd.allowed &= ~perms;
  /external/qemu/distrib/libselinux/src/
avc.c 649 denied = requested & ~avd->allowed;
739 denied = requested & ~(ae->avd.allowed);
744 ae->avd.allowed |= requested;
864 node->ae.avd.allowed |= perms;
868 node->ae.avd.allowed &= ~perms;
  /frameworks/base/core/java/android/view/
LayoutInflater.java 103 * Hook to allow clients of the LayoutInflater to restrict the set of Views that are allowed
110 * that are allowed to be inflated.
114 * @return True if this class is allowed to be inflated, or false otherwise
331 * that are allowed to be inflated.
339 * which is not allowed by the {@link Filter}, the {@link #inflate(int, ViewGroup)} call will
343 * @param filter The Filter which restricts the set of Views that are allowed to be inflated.
575 boolean allowed = mFilter.onLoadClass(clazz);
576 if (!allowed) {
588 // New class -- remember whether it is allowed
592 boolean allowed = clazz != null && mFilter.onLoadClass(clazz)
    [all...]
  /external/chromium_org/chrome/browser/ui/website_settings/
website_settings.cc 635 cookie_info.allowed = allowed_objects.GetObjectCountForDomain(site_url_);
642 cookie_info.allowed = allowed_objects.GetObjectCount() - cookie_info.allowed;
  /external/chromium_org/content/public/android/javatests/src/org/chromium/content/browser/
JavaBridgeBasicsTest.java 614 public String allowed() { return "foo"; }
617 // Test calling a method of an explicitly inherited class (Base#allowed()).
618 assertEquals("foo", executeJavaScriptAndGetStringResult("testObject.allowed()"));
629 public String allowed() { return "foo"; }
640 // allowed() is marked with the @JavascriptInterface annotation and should be allowed to be
642 assertEquals("foo", executeJavaScriptAndGetStringResult("testObject.allowed()"));
764 public String allowed() { return "bar"; } method in class:JavaBridgeBasicsTest.Test
    [all...]
  /external/chromium_org/third_party/WebKit/Source/bindings/v8/
ScriptController.cpp 491 const bool allowed = m_frame->loader().client()->allowScript(settings && settings->scriptEnabled()); local
492 if (!allowed && reason == AboutToExecuteScript)
494 return allowed;
  /external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/
SSLEngineImplTest.java 95 // with the server not allowed to session creation
    [all...]
  /external/chromium_org/chrome/browser/devtools/
devtools_file_helper.cc 367 bool allowed) {
368 if (!allowed) {
  /external/chromium_org/chrome/browser/guest_view/web_view/
web_view_guest.h 247 // - Allowed if the embedder explicitly allowed it.
264 // - Allowed if the embedder explicitly allowed it.
335 bool allowed);
341 bool allowed);
  /external/chromium_org/chrome/browser/media/
media_stream_devices_controller.cc 128 // We start with setting the requested media type to allowed or blocked
192 // Tab capture is allowed for extensions only and infobar is not shown for
488 // The request from internal objects like chrome://URLs is always allowed.
593 void MediaStreamDevicesController::SetPermission(bool allowed) const {
602 ContentSetting content_setting = allowed ?
  /external/chromium_org/chrome/browser/resources/help/
help.js 294 // It's allowed to do powerwash only for customer devices,
324 $('allowed-connection-types-message').innerText = message;
331 $('allowed-connection-types-message').hidden = !visible;
423 * @param {boolean} isPowerwashAllowed True iff powerwash is allowed
  /external/chromium_org/chrome/browser/ui/webui/options/
manage_profile_handler.cc 487 base::FundamentalValue allowed(
490 "CreateProfileOverlay.updateManagedUsersAllowed", allowed);
  /external/chromium_org/remoting/webapp/
host_native_messaging.js 197 var allowed = getBooleanAttr(message, 'allowed');
199 onDone(supported, allowed, setByPolicy);
362 * the callback as booleans: supported, allowed, set-by-policy.
host_setup_dialog.js 188 * @param {boolean} allowed True if crash dump reporting is allowed.
192 function onGetConsent(supported, allowed, set_by_policy) {
194 that.usageStatsCheckbox_.checked = allowed;
  /external/chromium_org/v8/test/intl/date-format/
timezone.js 55 // : + - are not allowed, only / _ are.
  /external/chromium_org/v8/test/mjsunit/
override-read-only-property.js 31 // allowed to override read-only properties, not even if the read-only
  /external/chromium_org/v8/test/mjsunit/regress/
regress-crbug-163530.js 57 // values in strict mode (length is allowed to exceed stack size).
  /external/owasp/sanitizer/src/main/org/owasp/html/
HtmlPolicyBuilder.java 159 * {@code <img src=javascript:alert(1337)>} because its URL is not allowed
239 * By default, text content is allowed in any
240 * {@link #allowElements allowed elements} that can contain character data per
241 * the HTML5 spec, but text content is not allowed by default in elements that
267 * Assuming the given elements are allowed, allows them to appear without
371 * Adds to the set of protocols that are allowed in URL attributes.
372 * For each URL attribute that is allowed, we further constrain it by
375 * This is done regardless of whether any protocols have been allowed, so
385 // If there is at least one allowed protocol, then allow URLs and
451 * @param out receives calls to open only tags allowed b
    [all...]
  /developers/build/prebuilts/gradle/AppRestrictionEnforcer/Application/src/main/java/com/example/android/apprestrictionenforcer/
AppRestrictionEnforcerFragment.java 197 * Returns whether the AppRestrictionSchema is currently allowed to say hello to its user. Note
201 * @return True if the AppRestrictionSchema is allowed to say hello
227 Toast.makeText(activity, allow ? R.string.allowed : R.string.disallowed,
  /developers/samples/android/admin/AppRestrictionEnforcer/Application/src/main/java/com/example/android/apprestrictionenforcer/
AppRestrictionEnforcerFragment.java 197 * Returns whether the AppRestrictionSchema is currently allowed to say hello to its user. Note
201 * @return True if the AppRestrictionSchema is allowed to say hello
227 Toast.makeText(activity, allow ? R.string.allowed : R.string.disallowed,

Completed in 576 milliseconds

1 2 3 4 5 6 78 91011>>