/external/chromium_org/third_party/tcmalloc/chromium/src/ |
profile-handler.h | 140 bool allowed; /* Profiling is allowed */ member in struct:ProfileHandlerState
|
/external/chromium_org/third_party/tcmalloc/vendor/src/ |
profile-handler.h | 140 bool allowed; /* Profiling is allowed */ member in struct:ProfileHandlerState
|
/external/chromium_org/chrome/installer/util/ |
legacy_firewall_manager_win_unittest.cc | 56 bool allowed = false; local 57 EXPECT_TRUE(manager_.GetAllowIncomingConnection(&allowed)); 58 EXPECT_TRUE(allowed); 67 bool allowed = true; local 68 EXPECT_TRUE(manager_.GetAllowIncomingConnection(&allowed)); 69 EXPECT_FALSE(allowed);
|
/external/chromium_org/remoting/host/ |
usage_stats_consent_mac.cc | 17 bool GetUsageStatsConsent(bool* allowed, bool* set_by_policy) { 19 *allowed = false; 30 return host_config.GetBoolean(kUsageStatsConsentConfigPath, allowed); 37 bool allowed; local 39 return GetUsageStatsConsent(&allowed, &set_by_policy) && allowed; 42 bool SetUsageStatsConsent(bool allowed) {
|
usage_stats_consent_win.cc | 44 bool GetUsageStatsConsent(bool* allowed, bool* set_by_policy) { 54 *allowed = value != 0; 58 *allowed = value != 0; 68 bool allowed; local 70 return GetUsageStatsConsent(&allowed, &set_by_policy) && allowed; 73 bool SetUsageStatsConsent(bool allowed) { 74 DWORD value = allowed;
|
/external/libsepol/include/sepol/policydb/ |
flask_types.h | 55 sepol_access_vector_t allowed; member in struct:sepol_av_decision
|
/external/chromium_org/chrome/browser/ |
pepper_broker_infobar_delegate.cc | 66 bool allowed = (setting == CONTENT_SETTING_ALLOW); local 67 content::RecordAction(allowed ? 70 tab_content_settings->SetPepperBrokerAllowed(allowed); 71 callback.Run(allowed);
|
/external/chromium_org/chrome/browser/ui/website_settings/ |
website_settings_ui.h | 53 // The number of allowed cookies. 54 int allowed; member in struct:WebsiteSettingsUI::CookieInfo 120 // including why that action was taken. E.g. "Allowed by you",
|
/external/chromium_org/content/shell/renderer/test_runner/ |
web_permissions.cc | 22 bool allowed = enabled_per_settings && images_allowed_; local 26 (allowed ? "true" : "false") + "\n"); 28 return allowed; 32 bool allowed = media_allowed_; local 36 (allowed ? "true" : "false") + "\n"); 37 return allowed; 42 bool allowed = enabled_per_settings && scripts_allowed_; local 47 (allowed ? "true" : "false") + "\n"); 49 return allowed; 94 void WebPermissions::SetDisplayingInsecureContentAllowed(bool allowed) { [all...] |
/external/chromium_org/third_party/WebKit/Source/core/loader/ |
MixedContentChecker.cpp | 205 void MixedContentChecker::logToConsole(LocalFrame* frame, const KURL& url, WebURLRequest::RequestContext requestContext, bool allowed) 210 allowed ? "This content should also be served over HTTPS." : "This request has been blocked; the content must be served over HTTPS."); 211 MessageLevel messageLevel = allowed ? WarningMessageLevel : ErrorMessageLevel; 246 bool allowed = false; local 254 allowed = client->allowDisplayingInsecureContent(settings && settings->allowDisplayOfInsecureContent(), securityOrigin, url); 255 if (allowed) 260 allowed = client->allowRunningInsecureContent(settings && settings->allowRunningOfInsecureContent(), securityOrigin, url); 261 if (allowed) 274 logToConsole(frame, url, resourceRequest.requestContext(), allowed); 275 return !allowed; 300 bool allowed = client()->allowDisplayingInsecureContent(settings && settings->allowDisplayOfInsecureContent(), securityOrigin, url); local 332 bool allowed = client()->allowRunningInsecureContent(allowedPerSettings, securityOrigin, url); local [all...] |
/external/chromium_org/third_party/WebKit/Source/modules/geolocation/testing/ |
GeolocationClientMock.cpp | 70 void GeolocationClientMock::setPermission(bool allowed) 72 m_permissionState = allowed ? PermissionStateAllowed : PermissionStateDenied; 117 bool allowed = m_permissionState == PermissionStateAllowed; local 125 (*it)->setIsAllowed(allowed);
|
/device/asus/fugu/libaudio/ |
AudioHardwareOutput.h | 77 bool allowed; member in struct:android::AudioHardwareOutput::OutputSettings
|
/external/chromium_org/android_webview/native/permission/ |
permission_request_handler_unittest.cc | 33 // Notify the permission request is allowed or not. 34 virtual void NotifyRequestResult(bool allowed) OVERRIDE { 35 callback_.Run(allowed); 127 void NotifyRequestResult(bool allowed) { 128 allowed_ = allowed; 164 bool allowed() { function in class:android_webview::PermissionRequestHandlerTest 191 EXPECT_TRUE(allowed()); 211 EXPECT_FALSE(allowed()); 283 EXPECT_TRUE(allowed()); 295 EXPECT_TRUE(allowed()); [all...] |
/external/chromium_org/chrome/browser/extensions/ |
chrome_extensions_browser_client.cc | 137 bool allowed = false; local 139 request, is_incognito, extension, extension_info_map, &allowed)) 140 return allowed; 142 // Couldn't determine if resource is allowed. Block the load.
|
extension_util.cc | 187 bool allowed = false; local 191 &allowed) && 192 allowed; 197 bool allowed) { 198 if (allowed == AllowedScriptingOnAllUrls(extension_id, context)) 204 allowed ? new base::FundamentalValue(true) : NULL); 211 if (allowed)
|
extension_management_unittest.cc | 37 " \"installation_mode\": \"allowed\"," 428 updater.SetBlacklistedByDefault(false); // Allowed by default. 527 const char* allowed = kTargetExtension; local 534 EXPECT_TRUE(extension_management_->IsInstallationExplicitlyAllowed(allowed)); 549 EXPECT_TRUE(extension_management_->IsInstallationExplicitlyAllowed(allowed));
|
/external/chromium_org/chrome/browser/renderer_host/ |
chrome_render_message_filter.cc | 173 bool* allowed) { 174 *allowed = 180 display_name, !*allowed)); 187 bool* allowed) { 188 *allowed = 195 !*allowed)); 217 bool allowed) { 219 allowed); 264 bool allowed) { 266 render_frame_id, request_id, allowed)); 276 bool allowed = local [all...] |
/external/chromium_org/chrome/browser/ui/content_settings/ |
content_setting_image_model.cc | 200 // If any embedded site has access the allowed icon takes priority over the 204 bool allowed = local 206 set_icon(allowed ? IDR_ALLOWED_LOCATION : IDR_BLOCKED_LOCATION); 207 set_tooltip(l10n_util::GetStringUTF8(allowed ? 336 // If any embedded site has access the allowed icon takes priority over the 340 bool allowed = local 342 set_icon(allowed ? IDR_ALLOWED_MIDI_SYSEX : IDR_BLOCKED_MIDI_SYSEX); 343 set_tooltip(l10n_util::GetStringUTF8(allowed ?
|
/external/chromium_org/components/data_reduction_proxy/browser/ |
data_reduction_proxy_params_unittest.cc | 27 EXPECT_EQ(expected_allowed, params.allowed()); 119 bool allowed; member in struct:data_reduction_proxy::__anon11058 513 if (tests[i].allowed) 737 bool allowed; member in struct:data_reduction_proxy::__anon11060 1082 if (tests[i].allowed)
|
/external/chromium_org/extensions/shell/browser/ |
shell_extensions_browser_client.cc | 126 bool allowed = false; local 128 request, is_incognito, extension, extension_info_map, &allowed)) { 129 return allowed; 132 // Couldn't determine if resource is allowed. Block the load.
|
/external/chromium_org/remoting/host/setup/ |
daemon_controller.h | 92 // Indicates if crash dump reporting is allowed by the user. 93 bool allowed; member in struct:remoting::DaemonController::UsageStatsConsent
|
daemon_controller_delegate_win.cc | 298 consent.allowed = false; 315 BOOL allowed; local 317 hr = control2_->GetUsageStatsConsent(&allowed, &set_by_policy); 324 consent.allowed = !!allowed;
|
/external/libselinux/include/selinux/ |
selinux.h | 110 access_vector_t allowed; member in struct:av_decision
|
/cts/hostsidetests/net/app/src/com/android/cts/net/hostside/ |
MyVpnService.java | 87 String allowed = intent.getStringExtra(packageName + ".allowedapplications"); local 88 if (allowed != null) { 89 String[] packageArray = allowed.split(","); 124 + " allowedApplications=" + allowed
|
/external/chromium_org/chrome/browser/geolocation/ |
geolocation_permission_context_unittest.cc | 128 bool allowed); 129 void CheckPermissionMessageSent(int bridge_id, bool allowed); 130 void CheckPermissionMessageSentForTab(int tab, int bridge_id, bool allowed); 133 bool allowed); 143 // whether the requested permission was allowed. 188 bool allowed) { 189 responses_[id.render_process_id()] = std::make_pair(id.bridge_id(), allowed); 194 bool allowed) { 195 CheckPermissionMessageSentInternal(process(), bridge_id, allowed); local 201 bool allowed) { [all...] |