HomeSort by relevance Sort by last modified time
    Searched refs:ALLOWED (Results 1 - 25 of 31) sorted by null

1 2

  /external/clang/test/Sema/
format-strings-gnu.c 19 #ifndef ALLOWED
34 #ifdef ALLOWED
format-strings-darwin.c 24 #ifdef ALLOWED
41 #ifdef ALLOWED
  /external/chromium_org/content/public/browser/
ssl_host_state_delegate.h 30 ALLOWED
42 // Queries whether |cert| is allowed for |host| and |error|. Returns true in
  /external/chromium_org/chrome/browser/chromeos/login/users/
multi_profile_user_controller_unittest.cc 48 MultiProfileUserController::ALLOWED, MultiProfileUserController::ALLOWED,
53 MultiProfileUserController::ALLOWED,
59 MultiProfileUserController::ALLOWED,
65 MultiProfileUserController::ALLOWED, MultiProfileUserController::ALLOWED,
70 MultiProfileUserController::ALLOWED,
76 MultiProfileUserController::ALLOWED,
218 // Tests that everyone is allowed before a session starts.
230 EXPECT_EQ(MultiProfileUserController::ALLOWED, reason) << "Case " << i
    [all...]
multi_profile_user_controller.cc 43 return value == MultiProfileUserController::ALLOWED;
51 const char MultiProfileUserController::kBehaviorNotAllowed[] = "not-allowed";
98 return ALLOWED;
110 return ALLOWED;
120 // No user is allowed if the primary user policy forbids it.
126 return ALLOWED;
143 return SetUserAllowedReason(reason, ALLOWED);
145 // Owner is not allowed to be secondary user.
155 if (primary_user_policy != ALLOWED)
162 behavior == kBehaviorUnrestricted ? ALLOWED : NOT_ALLOWED_POLICY_FORBIDS)
    [all...]
multi_profile_user_controller.h 27 // MultiProfileUserController decides whether a user is allowed to be in a
35 // User is allowed in multi-profile session.
36 ALLOWED,
38 // Owner of the device is not allowed to be added as a secondary user.
41 // Not allowed since it is potentially "tainted" with policy-pushed
45 // Not allowed since primary user is already "tainted" with policy-pushed
49 // Not allowed since primary user policy forbids it to be part of
53 // Not allowed since user policy forbids this user being part of
54 // multi-profiles session. Either 'primary-only' or 'not-allowed'.
73 // Returns true if user allowed to be in the current session. If |reason| no
    [all...]
  /external/chromium_org/chrome/browser/web_resource/
resource_request_allowed_notifier.h 35 // Observes resource request allowed state changes.
41 // Specifies the resource request allowed state.
43 ALLOWED,
58 // Returns whether resource requests are allowed, per the various criteria.
66 // GetResourceRequestsAllowedState() == ALLOWED.
resource_request_allowed_notifier_test_util.cc 22 void TestRequestAllowedNotifier::SetRequestsAllowedOverride(bool allowed) {
24 requests_allowed_ = allowed;
28 // Force the allowed state and requested state to true. This forces
40 return requests_allowed_ ? ALLOWED : DISALLOWED_NETWORK_DOWN;
resource_request_allowed_notifier.cc 52 return ALLOWED;
58 return GetResourceRequestsAllowedState() == ALLOWED;
  /external/chromium_org/third_party/fips181/
fips181.h 45 #define ALLOWED(flag) (digram[units_in_syllable[current_unit -1]][unit] & (flag))
fips181.cc     [all...]
  /external/chromium_org/chrome/browser/ssl/
chrome_ssl_host_state_delegate_test.cc 89 // Verify that only kWWWGoogleHost is allowed and that the other two certs
91 EXPECT_EQ(content::SSLHostStateDelegate::ALLOWED,
114 EXPECT_EQ(content::SSLHostStateDelegate::ALLOWED,
124 EXPECT_EQ(content::SSLHostStateDelegate::ALLOWED,
254 // After allowing the certificate, a query should say that it is allowed and
258 EXPECT_EQ(content::SSLHostStateDelegate::ALLOWED,
325 EXPECT_EQ(content::SSLHostStateDelegate::ALLOWED,
359 EXPECT_EQ(content::SSLHostStateDelegate::ALLOWED,
399 EXPECT_EQ(content::SSLHostStateDelegate::ALLOWED,
485 EXPECT_EQ(content::SSLHostStateDelegate::ALLOWED,
    [all...]
chrome_ssl_host_state_delegate.cc 304 cert_dict->SetIntegerWithoutPathExpansion(GetKey(cert, error), ALLOWED);
355 // ALLOWED, return the valid value. Otherwise, return DENIED.
356 if (success && policy_decision == ALLOWED)
357 return ALLOWED;
421 if (success && (static_cast<CertJudgment>(policy_decision) == ALLOWED))
  /external/chromium_org/remoting/host/
pam_authorization_factory_posix.cc 46 enum { NOT_CHECKED, ALLOWED, DISALLOWED } local_login_status_;
105 local_login_status_ = IsLocalLoginAllowed() ? ALLOWED : DISALLOWED;
  /external/chromium_org/android_webview/browser/
aw_ssl_host_state_delegate.cc 27 // allowed cert if the |error| is an exact match to or subset of the errors
85 ? SSLHostStateDelegate::ALLOWED
  /external/chromium_org/content/browser/ssl/
ssl_policy.cc 44 if (judgment == SSLHostStateDelegate::ALLOWED) {
  /external/wpa_supplicant_8/src/pae/
ieee802_1x_cp.c 150 SM_STATE(CP, ALLOWED)
152 SM_ENTRY(CP, ALLOWED);
353 SM_ENTER(CP, ALLOWED);
  /external/chromium_org/chrome/browser/metrics/variations/
variations_service.cc 120 // on a thread where IO is allowed.
160 // Records UMA histogram with the current resource requests allowed state.
177 case ResourceRequestAllowedNotifier::ALLOWED:
496 if (state != ResourceRequestAllowedNotifier::ALLOWED) {
497 DVLOG(1) << "Resource requests were not allowed. Waiting for notification.";
  /external/chromium_org/chrome/browser/ui/ash/
session_state_delegate_chromeos.cc 231 chromeos::MultiProfileUserController::ALLOWED;
  /external/wpa_supplicant_8/wpa_supplicant/
p2p_supplicant.c     [all...]
  /prebuilts/devtools/tools/lib/
bcpkix-jdk15on-1.48.jar 
  /prebuilts/tools/common/m2/repository/org/bouncycastle/bcpkix-jdk15on/1.48/
bcpkix-jdk15on-1.48.jar 
  /external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/
org.eclipse.osgi_3.6.1.R36x_v20100806.jar 
org.eclipse.osgi_3.6.2.R36x_v20101103.jar 
  /prebuilts/eclipse/mavenplugins/tycho/tycho-dependencies-m2repo/org/eclipse/tycho/org.eclipse.osgi/3.9.1.v20130814-1242/
org.eclipse.osgi-3.9.1.v20130814-1242.jar 

Completed in 524 milliseconds

1 2