/external/nist-sip/java/gov/nist/javax/sip/parser/ |
H A D | AllowParser.java | 45 * @param allow the header to parse 47 public AllowParser(String allow) { argument 48 super(allow); 73 Allow allow = new Allow(); 74 allow.setHeaderName(SIPHeaderNames.ALLOW); 79 allow.setMethod(token.getTokenValue()); 81 list.add(allow); 87 allow = new Allow(); 90 allow.setMethod(token.getTokenValue()); 92 list.add(allow); [all...] |
/external/chromium_org/chrome/browser/download/ |
H A D | download_resource_throttle.cc | 59 void DownloadResourceThrottle::ContinueDownload(bool allow) { argument 61 request_allowed_ = allow; 63 if (allow) { 73 if (allow) {
|
H A D | download_request_limiter_unittest.cc | 116 void ContinueDownload(bool allow) { argument 117 if (allow) { 158 // Ask again. This triggers asking the delegate for allow/disallow. 180 // Do two downloads, allowing the second so that we end up with allow all. 192 // Navigate to a new URL with the same host, which shouldn't reset the allow 200 // Do a user gesture, because we're at allow all, this shouldn't change the 211 // Do two downloads, allowing the second so that we end up with allow all. 223 // Navigate to a new URL with the same host, which shouldn't reset the allow 242 // Do a user gesture, which should reset back to allow one. 247 // Ask twice, which triggers calling the delegate. Don't allow th [all...] |
H A D | download_request_limiter.cc | 204 void DownloadRequestLimiter::TabDownloadState::NotifyCallbacks(bool allow) { argument 205 set_download_status(allow ? 213 // don't close it. If allow is false, we send all the notifications to cancel 215 if (!allow || (callbacks_.size() < kMaxDownloadsAtOnce)) { 229 host_->ScheduleNotification(callbacks[i], allow); 305 // The WebContents was closed, don't allow the download. 339 const Callback& orig_callback, bool allow) { 343 if (!originating_contents || !allow) { 441 bool allow) { 443 BrowserThread::IO, FROM_HERE, base::Bind(callback, allow)); 334 OnCanDownloadDecided( int render_process_host_id, int render_view_id, int request_id, const std::string& request_method, const Callback& orig_callback, bool allow) argument 440 ScheduleNotification(const Callback& callback, bool allow) argument [all...] |
/external/chromium_org/remoting/host/ |
H A D | dns_blackhole_checker.cc | 34 bool allow = false; local 37 allow = true; 42 callback_.Run(allow);
|
H A D | signaling_connector.cc | 199 void SignalingConnector::OnDnsBlackholeCheckerDone(bool allow) { argument 202 // Unable to access the host talkgadget. Don't allow the connection, but 205 if (!allow) {
|
/external/chromium_org/android_webview/java/src/org/chromium/android_webview/ |
H A D | AwGeolocationPermissions.java | 34 public void allow(String origin) { method in class:AwGeolocationPermissions
|
/external/chromium_org/third_party/WebKit/Source/bindings/v8/ |
H A D | DateExtension.cpp | 77 void DateExtension::setAllowSleep(bool allow, v8::Isolate* isolate) argument 92 argv[0] = v8::Boolean::New(!allow);
|
/external/apache-http/src/org/apache/http/client/params/ |
H A D | ClientParamBean.java | 68 public void setAllowCircularRedirects (final boolean allow) { argument 69 params.setBooleanParameter(ClientPNames.ALLOW_CIRCULAR_REDIRECTS, allow);
|
/external/chromium/chrome/browser/chromeos/ |
H A D | plugin_selection_policy.cc | 79 if (line.find("allow") == 0) { 82 LOG(ERROR) << "Plugin policy file error: 'allow' out of context."; 152 bool allow = false; local 159 allow = policy_allow; 162 return allow; 165 // If it's not in the policy file, then we assume it's OK to allow
|
/external/chromium_org/android_webview/browser/ |
H A D | aw_cookie_access_policy.cc | 36 void AwCookieAccessPolicy::SetGlobalAllowAccess(bool allow) { argument 38 allow_access_ = allow;
|
/external/chromium_org/cc/test/ |
H A D | fake_picture_layer_tiling_client.h | 40 void set_allow_create_tile(bool allow) { allow_create_tile_ = allow; } argument
|
/external/chromium_org/chrome/browser/ui/webui/ |
H A D | profiler_ui.cc | 85 base::ThreadRestrictions::ScopedAllowIO allow; variable
|
/external/chromium_org/content/browser/ssl/ |
H A D | ssl_policy.cc | 148 bool allow) { 149 if (allow) { 147 OnAllowCertificate(scoped_refptr<SSLCertErrorHandler> handler, bool allow) argument
|
/external/chromium_org/ui/views/ |
H A D | accessible_pane_view.h | 91 // focus to another window if if |allow| is set and no previous view can be 93 void set_allow_deactivate_on_esc(bool allow) { argument 94 allow_deactivate_on_esc_ = allow;
|
/external/protobuf/src/google/protobuf/ |
H A D | text_format.h | 233 void AllowPartialMessage(bool allow) { argument 234 allow_partial_ = allow;
|
/external/chromium_org/chrome/browser/chromeos/extensions/file_manager/ |
H A D | private_api_misc.cc | 61 bool allow = true; local 63 chromeos::kAllowRedeemChromeOsRegistrationOffers, &allow)) { 64 allow = true; 66 value->SetBoolean("allowRedeemOffers", allow);
|
/external/chromium/base/files/ |
H A D | file_path_watcher_browsertest.cc | 89 // reset expectations while the file watcher is running. In order to allow this, 497 bool ChangeFilePermissions(const FilePath& path, Permission perm, bool allow) { argument 519 if (allow) { 554 change.grfAccessMode = allow ? GRANT_ACCESS : DENY_ACCESS;
|
/external/chromium/chrome/browser/download/ |
H A D | download_request_limiter.cc | 140 void DownloadRequestLimiter::TabDownloadState::NotifyCallbacks(bool allow) { argument 141 status_ = allow ? 149 // don't close it. If allow is false, we send all the notifications to cancel 151 if (!allow || (callbacks_.size() < kMaxDownloadsAtOnce)) { 168 host_->ScheduleNotification(callbacks[i], allow); 245 // The tab was closed, don't allow the download. 303 bool allow) { 307 this, &DownloadRequestLimiter::NotifyCallback, callback, allow)); 310 void DownloadRequestLimiter::NotifyCallback(Callback* callback, bool allow) { argument 312 if (allow) 302 ScheduleNotification(Callback* callback, bool allow) argument [all...] |
/external/chromium/third_party/libjingle/source/talk/base/ |
H A D | firewallsocketserver.cc | 142 void FirewallSocketServer::AddRule(bool allow, FirewallProtocol p, argument 151 AddRule(allow, p, src, dst); 155 void FirewallSocketServer::AddRule(bool allow, FirewallProtocol p, argument 159 r.allow = allow; 188 return r.allow; 229 void FirewallManager::AddRule(bool allow, FirewallProtocol p, argument 234 (*it)->AddRule(allow, p, d, addr);
|
H A D | firewallsocketserver.h | 68 void AddRule(bool allow, FirewallProtocol p = FP_ANY, 71 void AddRule(bool allow, FirewallProtocol p, 98 bool allow; member in struct:talk_base::FirewallSocketServer::Rule 121 void AddRule(bool allow, FirewallProtocol p = FP_ANY,
|
/external/chromium_org/chrome/browser/automation/ |
H A D | automation_provider_win.cc | 165 bool allow, 185 if (allow && AddExternalTab(external_tab_container)) { 164 ConnectExternalTab(uint64 cookie, bool allow, HWND parent_window, HWND* tab_container_window, HWND* tab_window, int* tab_handle, int* session_id) argument
|
/external/chromium_org/chrome/renderer/ |
H A D | content_settings_observer.cc | 186 bool allow = enabled_per_settings; local 195 allow = GetContentSettingFromRules( 200 if (!allow) 202 return allow; 240 bool allow = true; 246 allow = setting != CONTENT_SETTING_BLOCK; 248 allow = allow || IsWhitelistedForContentSettings(frame); 250 cached_script_permissions_[frame] = allow; 251 return allow; [all...] |
/external/chromium_org/content/browser/accessibility/ |
H A D | accessibility_tree_formatter.cc | 156 bool allow = default_result; local 160 allow = true; 162 allow = (!MatchPattern(text, UTF8ToUTF16("*=''"))); 164 allow = false; 167 return allow;
|
/external/chromium_org/gpu/command_buffer/service/ |
H A D | buffer_manager.h | 216 void set_allow_buffers_on_multiple_targets(bool allow) { argument 217 allow_buffers_on_multiple_targets_ = allow;
|