/external/clang/test/Sema/ |
format-strings-gnu.c | 19 #ifndef ALLOWED 34 #ifdef ALLOWED
|
format-strings-darwin.c | 24 #ifdef ALLOWED 41 #ifdef ALLOWED
|
/external/chromium_org/content/public/browser/ |
ssl_host_state_delegate.h | 30 ALLOWED 42 // Queries whether |cert| is allowed for |host| and |error|. Returns true in
|
/external/chromium_org/chrome/browser/chromeos/login/users/ |
multi_profile_user_controller_unittest.cc | 48 MultiProfileUserController::ALLOWED, MultiProfileUserController::ALLOWED, 53 MultiProfileUserController::ALLOWED, 59 MultiProfileUserController::ALLOWED, 65 MultiProfileUserController::ALLOWED, MultiProfileUserController::ALLOWED, 70 MultiProfileUserController::ALLOWED, 76 MultiProfileUserController::ALLOWED, 218 // Tests that everyone is allowed before a session starts. 230 EXPECT_EQ(MultiProfileUserController::ALLOWED, reason) << "Case " << i [all...] |
multi_profile_user_controller.cc | 43 return value == MultiProfileUserController::ALLOWED; 51 const char MultiProfileUserController::kBehaviorNotAllowed[] = "not-allowed"; 98 return ALLOWED; 110 return ALLOWED; 120 // No user is allowed if the primary user policy forbids it. 126 return ALLOWED; 143 return SetUserAllowedReason(reason, ALLOWED); 145 // Owner is not allowed to be secondary user. 155 if (primary_user_policy != ALLOWED) 162 behavior == kBehaviorUnrestricted ? ALLOWED : NOT_ALLOWED_POLICY_FORBIDS) [all...] |
multi_profile_user_controller.h | 27 // MultiProfileUserController decides whether a user is allowed to be in a 35 // User is allowed in multi-profile session. 36 ALLOWED, 38 // Owner of the device is not allowed to be added as a secondary user. 41 // Not allowed since it is potentially "tainted" with policy-pushed 45 // Not allowed since primary user is already "tainted" with policy-pushed 49 // Not allowed since primary user policy forbids it to be part of 53 // Not allowed since user policy forbids this user being part of 54 // multi-profiles session. Either 'primary-only' or 'not-allowed'. 73 // Returns true if user allowed to be in the current session. If |reason| no [all...] |
/external/chromium_org/chrome/browser/web_resource/ |
resource_request_allowed_notifier.h | 35 // Observes resource request allowed state changes. 41 // Specifies the resource request allowed state. 43 ALLOWED, 58 // Returns whether resource requests are allowed, per the various criteria. 66 // GetResourceRequestsAllowedState() == ALLOWED.
|
resource_request_allowed_notifier_test_util.cc | 22 void TestRequestAllowedNotifier::SetRequestsAllowedOverride(bool allowed) { 24 requests_allowed_ = allowed; 28 // Force the allowed state and requested state to true. This forces 40 return requests_allowed_ ? ALLOWED : DISALLOWED_NETWORK_DOWN;
|
resource_request_allowed_notifier.cc | 52 return ALLOWED; 58 return GetResourceRequestsAllowedState() == ALLOWED;
|
/external/chromium_org/third_party/fips181/ |
fips181.h | 45 #define ALLOWED(flag) (digram[units_in_syllable[current_unit -1]][unit] & (flag))
|
fips181.cc | [all...] |
/external/chromium_org/chrome/browser/ssl/ |
chrome_ssl_host_state_delegate_test.cc | 89 // Verify that only kWWWGoogleHost is allowed and that the other two certs 91 EXPECT_EQ(content::SSLHostStateDelegate::ALLOWED, 114 EXPECT_EQ(content::SSLHostStateDelegate::ALLOWED, 124 EXPECT_EQ(content::SSLHostStateDelegate::ALLOWED, 254 // After allowing the certificate, a query should say that it is allowed and 258 EXPECT_EQ(content::SSLHostStateDelegate::ALLOWED, 325 EXPECT_EQ(content::SSLHostStateDelegate::ALLOWED, 359 EXPECT_EQ(content::SSLHostStateDelegate::ALLOWED, 399 EXPECT_EQ(content::SSLHostStateDelegate::ALLOWED, 485 EXPECT_EQ(content::SSLHostStateDelegate::ALLOWED, [all...] |
chrome_ssl_host_state_delegate.cc | 304 cert_dict->SetIntegerWithoutPathExpansion(GetKey(cert, error), ALLOWED); 355 // ALLOWED, return the valid value. Otherwise, return DENIED. 356 if (success && policy_decision == ALLOWED) 357 return ALLOWED; 421 if (success && (static_cast<CertJudgment>(policy_decision) == ALLOWED))
|
/external/chromium_org/remoting/host/ |
pam_authorization_factory_posix.cc | 46 enum { NOT_CHECKED, ALLOWED, DISALLOWED } local_login_status_; 105 local_login_status_ = IsLocalLoginAllowed() ? ALLOWED : DISALLOWED;
|
/external/chromium_org/android_webview/browser/ |
aw_ssl_host_state_delegate.cc | 27 // allowed cert if the |error| is an exact match to or subset of the errors 85 ? SSLHostStateDelegate::ALLOWED
|
/external/chromium_org/content/browser/ssl/ |
ssl_policy.cc | 44 if (judgment == SSLHostStateDelegate::ALLOWED) {
|
/external/wpa_supplicant_8/src/pae/ |
ieee802_1x_cp.c | 150 SM_STATE(CP, ALLOWED) 152 SM_ENTRY(CP, ALLOWED); 353 SM_ENTER(CP, ALLOWED);
|
/external/chromium_org/chrome/browser/metrics/variations/ |
variations_service.cc | 120 // on a thread where IO is allowed. 160 // Records UMA histogram with the current resource requests allowed state. 177 case ResourceRequestAllowedNotifier::ALLOWED: 496 if (state != ResourceRequestAllowedNotifier::ALLOWED) { 497 DVLOG(1) << "Resource requests were not allowed. Waiting for notification.";
|
/external/chromium_org/chrome/browser/ui/ash/ |
session_state_delegate_chromeos.cc | 231 chromeos::MultiProfileUserController::ALLOWED;
|
/external/wpa_supplicant_8/wpa_supplicant/ |
p2p_supplicant.c | [all...] |
/prebuilts/devtools/tools/lib/ |
bcpkix-jdk15on-1.48.jar | |
/prebuilts/tools/common/m2/repository/org/bouncycastle/bcpkix-jdk15on/1.48/ |
bcpkix-jdk15on-1.48.jar | |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
org.eclipse.osgi_3.6.1.R36x_v20100806.jar | |
org.eclipse.osgi_3.6.2.R36x_v20101103.jar | |
/prebuilts/eclipse/mavenplugins/tycho/tycho-dependencies-m2repo/org/eclipse/tycho/org.eclipse.osgi/3.9.1.v20130814-1242/ |
org.eclipse.osgi-3.9.1.v20130814-1242.jar | |