/external/chromium-libpac/ |
Android.mk | 26 # DO NOT COPY without permission from WebView Owners
|
/external/chromium_org/base/test/ |
test_file_util_posix.cc | 24 // Deny |permission| on the file |path|. 25 bool DenyFilePermission(const FilePath& path, mode_t permission) { 29 stat_buf.st_mode &= ~permission; 35 // Gets a blob indicating the permission information for |path|. 53 // Restores the permission information for |path|, given the blob retrieved
|
/external/chromium_org/content/ppapi_plugin/ |
broker_process_dispatcher.cc | 64 ppapi::FlashSiteSetting(sites[i].site, sites[i].permission)); 192 PP_Flash_BrowserOperations_Permission permission, 196 SetDefaultPermission(plugin_data_path, setting_type, permission, 275 PP_Flash_BrowserOperations_Permission permission, 280 data_str.c_str(), setting_type, permission, 287 data_str.c_str(), setting_type, permission, 307 site_array[i].permission = sites[i].permission;
|
broker_process_dispatcher.h | 55 PP_Flash_BrowserOperations_Permission permission, 76 PP_Flash_BrowserOperations_Permission permission,
|
/external/chromium_org/extensions/browser/ |
info_map.h | 75 // |process_id| with the specified |permission|. 79 extensions::APIPermission::ID permission, 83 // |origin| in |process_id| with |permission|. 86 extensions::APIPermission::ID permission)
|
info_map.cc | 135 APIPermission::ID permission, 143 extension->permissions_data()->HasAPIPermission(permission) && 154 (*i)->permissions_data()->HasAPIPermission(permission)) { 162 APIPermission::ID permission) 166 origin, process_id, permission, &extensions);
|
/external/chromium_org/extensions/common/api/sockets/ |
sockets_manifest_permission.cc | 33 SocketsManifestPermission* permission, 44 permission->AddPermission(entry); 49 SocketsManifestPermission* permission, 58 permission, operation_type, *host_patterns->as_string, error); 66 if (!ParseHostPattern(permission, operation_type, *it, error)) { 75 const SocketsManifestPermission* permission, 80 permission->entries().begin(); 81 it != permission->entries().end();
|
/external/chromium_org/extensions/common/permissions/ |
extensions_api_permissions.cc | 24 APIPermission* CreateAPIPermission(const APIPermissionInfo* permission) { 25 return new T(permission); 49 // Because warning messages for the "socket" permission vary based 73 // appear in the install permission dialogue, so we need a fake 74 // permission for it. See http://crbug.com/247857.
|
settings_override_permission.cc | 14 const APIPermissionInfo* permission, 16 : APIPermission(permission), setting_value_(setting_value) {}
|
permissions_data.cc | 143 bool PermissionsData::HasAPIPermission(APIPermission::ID permission) const { 144 return active_permissions()->HasAPIPermission(permission); 154 APIPermission::ID permission) const { 155 if (HasAPIPermission(permission)) 164 return tab_permissions.get() && tab_permissions->HasAPIPermission(permission); 168 APIPermission::ID permission, 170 return active_permissions()->CheckAPIPermissionWithParam(permission, param);
|
permissions_data.h | 67 // Returns true if the |extension| can silently increase its permission level. 105 // Returns true if the |extension| has the given |permission|. Prefer 107 // api that requires a permission they didn't know about, e.g. open web apis. 108 // Note this does not include APIs with no corresponding permission, like 111 bool HasAPIPermission(APIPermission::ID permission) const; 113 bool HasAPIPermissionForTab(int tab_id, APIPermission::ID permission) const; 115 APIPermission::ID permission, 132 // permission grants access to all hosts (like <all_urls>) or an api 133 // permission that effectively grants access to all hosts (e.g. proxy, 137 // Returns the full list of permission messages that should display a [all...] |
/external/chromium_org/ppapi/api/private/ |
ppb_talk_private.idl | 20 * Request permission for screencast. 24 * Request permission for Remote Desktop. 28 * Request permission for continuing Remote Desktop. 76 * permission, or 0 if the user denied. 90 * Requests permission from the user using a system modal dialog. 92 * <code>permission</code> specifies the type of permission to request from 96 * as the result if the user gave permission, or 0 if the user denied. 105 [in] PP_TalkPermission permission,
|
/external/chromium_org/ppapi/proxy/ |
talk_resource.cc | 28 PP_TalkPermission permission, 37 PpapiHostMsg_Talk_RequestPermission(permission),
|
/external/chromium_org/third_party/WebKit/Source/modules/notifications/ |
Notification.idl | 17 * this software without specific prior written permission. 40 [CallWith=ExecutionContext, MeasureAs=NotificationPermission] static readonly attribute DOMString permission;
|
Notification.cpp | 16 * this software without specific prior written permission. 138 const String& Notification::permissionString(NotificationClient::Permission permission) 144 switch (permission) { 157 const String& Notification::permission(ExecutionContext* context) function in class:blink::Notification
|
/external/chromium_org/chrome/browser/renderer_host/pepper/ |
pepper_talk_host.cc | 32 PP_TalkPermission permission, 49 switch (permission) { 170 PP_TalkPermission permission) { 171 if (permission < PP_TALKPERMISSION_SCREENCAST || 172 permission >= PP_TALKPERMISSION_NUM_PERMISSIONS) 184 permission,
|
/external/chromium_org/extensions/common/manifest_handlers/ |
permissions_parser.cc | 49 // Custom checks for the experimental permission that can't be expressed in 100 // Parses the host and api permissions from the specified permission |key| 141 // two systems should be updated together whenever a permission is added. 189 // Check if it's a host pattern permission. 236 // It's probably an unknown API permission. Do not throw an error so 308 APIPermission::ID permission) { 311 ->initial_required_permissions_->api_permissions.insert(permission); 316 APIPermission* permission) { 319 ->initial_required_permissions_->api_permissions.insert(permission); 324 APIPermission::ID permission) { [all...] |
/external/chromium_org/chrome/browser/media/ |
media_stream_devices_controller.cc | 90 Permission permission, const std::string& requested_device_id): 91 permission(permission), requested_device_id(requested_device_id) {} 94 MediaStreamTypeSettings(): permission(MEDIA_NONE) {} 116 // case take a ride on the MEDIA_DEVICE_*_CAPTURE permission. Should be fixed. 327 // TODO(raymes): We currently set the content permission for non-https 508 request_permissions_[content::MEDIA_DEVICE_AUDIO_CAPTURE].permission = 521 request_permissions_[content::MEDIA_DEVICE_VIDEO_CAPTURE].permission = 591 request_permissions_[content::MEDIA_DEVICE_AUDIO_CAPTURE].permission [all...] |
/external/chromium_org/chrome/browser/resources/cryptotoken/ |
gnubbydevice.js | 79 /** Permission denied */ 136 var permission = permissions[i]; 137 if (typeof permission === 'object' && 138 permission.hasOwnProperty('usbDevices')) { 139 for (var j = 0; j < permission['usbDevices'].length; j++) { 140 var dev = permission['usbDevices'][j];
|
/external/chromium_org/chrome/browser/resources/options/ |
website_settings.css | 46 .permission-name { 52 #website-settings-edit-page .permission-selection-option { 58 #website-settings-permission-column { 101 .origin-permission-list { 164 .permission-option {
|
/development/apps/Development/src/com/android/development/ |
ShowActivity.java | 63 mPermission = (TextView)findViewById(R.id.permission); 105 mPermission.setText(mActivityInfo.permission != null 106 ? mActivityInfo.permission : getText(R.string.none));
|
/cts/tests/tests/content/src/android/content/pm/cts/ |
ActivityInfoTest.java | 61 assertEquals(mActivityInfo.permission, info.permission);
|
ApplicationInfoTest.java | 59 assertEquals(mApplicationInfo.permission, info.permission);
|
/external/chromium_org/chrome/browser/extensions/api/preference/ |
preference_helpers.cc | 90 APIPermission::ID permission, 104 (*it)->permissions_data()->HasAPIPermission(permission) &&
|
/external/chromium_org/chrome/common/extensions/docs/examples/api/idle/idle_simple/ |
background.js | 20 * Used window.open because I didn't want the tabs permission.
|