/external/nist-sip/java/gov/nist/javax/sip/parser/ |
H A D | AllowParser.java | 45 * @param allow the header to parse 47 public AllowParser(String allow) { argument 48 super(allow); 73 Allow allow = new Allow(); 74 allow.setHeaderName(SIPHeaderNames.ALLOW); 79 allow.setMethod(token.getTokenValue()); 81 list.add(allow); 87 allow = new Allow(); 90 allow.setMethod(token.getTokenValue()); 92 list.add(allow); [all...] |
/external/chromium_org/remoting/host/ |
H A D | dns_blackhole_checker.cc | 35 bool allow = false; local 38 allow = true; 43 callback_.Run(allow);
|
/external/chromium_org/android_webview/java/src/org/chromium/android_webview/ |
H A D | AwGeolocationPermissions.java | 34 public void allow(String origin) { method in class:AwGeolocationPermissions
|
/external/chromium_org/chrome/browser/download/ |
H A D | download_resource_throttle.cc | 63 void DownloadResourceThrottle::ContinueDownload(bool allow) { argument 65 request_allowed_ = allow; 67 if (allow) { 77 if (allow) {
|
H A D | download_request_limiter_unittest.cc | 114 void ContinueDownload(bool allow) { argument 115 if (allow) { 165 // Ask again. This triggers asking the delegate for allow/disallow. 187 // Do two downloads, allowing the second so that we end up with allow all. 199 // Navigate to a new URL with the same host, which shouldn't reset the allow 207 // Do a user gesture, because we're at allow all, this shouldn't change the 218 // Do two downloads, allowing the second so that we end up with allow all. 230 // Navigate to a new URL with the same host, which shouldn't reset the allow 249 // Do a user gesture, which should reset back to allow one. 254 // Ask twice, which triggers calling the delegate. Don't allow th [all...] |
H A D | download_request_limiter.cc | 202 void DownloadRequestLimiter::TabDownloadState::NotifyCallbacks(bool allow) { argument 203 set_download_status(allow ? 211 // don't close it. If allow is false, we send all the notifications to cancel 213 if (!allow || (callbacks_.size() < kMaxDownloadsAtOnce)) { 227 host_->ScheduleNotification(callbacks[i], allow); 303 // The WebContents was closed, don't allow the download. 337 const Callback& orig_callback, bool allow) { 341 if (!originating_contents || !allow) { 436 bool allow) { 438 BrowserThread::IO, FROM_HERE, base::Bind(callback, allow)); 332 OnCanDownloadDecided( int render_process_host_id, int render_view_id, int request_id, const std::string& request_method, const Callback& orig_callback, bool allow) argument 435 ScheduleNotification(const Callback& callback, bool allow) argument [all...] |
/external/chromium_org/chrome/browser/extensions/ |
H A D | extension_util.cc | 30 // If this is an existing component extension we always allow it to 86 // We allow the extension to see events and data from another profile iff it 113 bool allow) { 117 if (allow == old_allow) 120 service->extension_prefs()->SetAllowFileAccess(extension->id(), allow); 111 SetAllowFileAccess(const Extension* extension, ExtensionService* service, bool allow) argument
|
/external/apache-http/src/org/apache/http/client/params/ |
H A D | ClientParamBean.java | 68 public void setAllowCircularRedirects (final boolean allow) { argument 69 params.setBooleanParameter(ClientPNames.ALLOW_CIRCULAR_REDIRECTS, allow);
|
/external/chromium/chrome/browser/chromeos/ |
H A D | plugin_selection_policy.cc | 79 if (line.find("allow") == 0) { 82 LOG(ERROR) << "Plugin policy file error: 'allow' out of context."; 152 bool allow = false; local 159 allow = policy_allow; 162 return allow; 165 // If it's not in the policy file, then we assume it's OK to allow
|
/external/chromium_org/android_webview/browser/ |
H A D | aw_cookie_access_policy.cc | 36 void AwCookieAccessPolicy::SetGlobalAllowAccess(bool allow) { argument 38 allow_access_ = allow;
|
/external/chromium_org/cc/test/ |
H A D | fake_picture_layer_tiling_client.h | 41 void set_allow_create_tile(bool allow) { allow_create_tile_ = allow; } argument
|
/external/chromium_org/chrome/browser/guestview/webview/ |
H A D | plugin_permission_helper.cc | 102 bool allow, 104 if (allow) { 101 OnPermissionResponse(const std::string& identifier, bool allow, const std::string& input) argument
|
/external/chromium_org/chrome/browser/ui/webui/ |
H A D | profiler_ui.cc | 85 base::ThreadRestrictions::ScopedAllowIO allow; variable
|
/external/chromium_org/content/browser/renderer_host/input/ |
H A D | mock_input_router_client.h | 45 void set_allow_send_event(bool allow) { argument
|
/external/chromium_org/content/browser/ssl/ |
H A D | ssl_policy.cc | 151 bool allow) { 152 if (allow) { 150 OnAllowCertificate(scoped_refptr<SSLCertErrorHandler> handler, bool allow) argument
|
/external/chromium_org/ui/views/ |
H A D | accessible_pane_view.h | 91 // focus to another window if if |allow| is set and no previous view can be 93 void set_allow_deactivate_on_esc(bool allow) { argument 94 allow_deactivate_on_esc_ = allow;
|
/external/protobuf/src/google/protobuf/ |
H A D | text_format.h | 233 void AllowPartialMessage(bool allow) { argument 234 allow_partial_ = allow;
|
/external/chromium_org/content/child/npapi/ |
H A D | plugin_stream_url.cc | 34 void PluginStreamUrl::URLRedirectResponse(bool allow) { argument 36 plugin_url_fetcher_->URLRedirectResponse(allow); 38 instance()->webplugin()->URLRedirectResponse(allow, id_); 41 if (allow)
|
/external/chromium/base/files/ |
H A D | file_path_watcher_browsertest.cc | 89 // reset expectations while the file watcher is running. In order to allow this, 497 bool ChangeFilePermissions(const FilePath& path, Permission perm, bool allow) { argument 519 if (allow) { 554 change.grfAccessMode = allow ? GRANT_ACCESS : DENY_ACCESS;
|
/external/chromium/chrome/browser/download/ |
H A D | download_request_limiter.cc | 140 void DownloadRequestLimiter::TabDownloadState::NotifyCallbacks(bool allow) { argument 141 status_ = allow ? 149 // don't close it. If allow is false, we send all the notifications to cancel 151 if (!allow || (callbacks_.size() < kMaxDownloadsAtOnce)) { 168 host_->ScheduleNotification(callbacks[i], allow); 245 // The tab was closed, don't allow the download. 303 bool allow) { 307 this, &DownloadRequestLimiter::NotifyCallback, callback, allow)); 310 void DownloadRequestLimiter::NotifyCallback(Callback* callback, bool allow) { argument 312 if (allow) 302 ScheduleNotification(Callback* callback, bool allow) argument [all...] |
/external/chromium/third_party/libjingle/source/talk/base/ |
H A D | firewallsocketserver.cc | 142 void FirewallSocketServer::AddRule(bool allow, FirewallProtocol p, argument 151 AddRule(allow, p, src, dst); 155 void FirewallSocketServer::AddRule(bool allow, FirewallProtocol p, argument 159 r.allow = allow; 188 return r.allow; 229 void FirewallManager::AddRule(bool allow, FirewallProtocol p, argument 234 (*it)->AddRule(allow, p, d, addr);
|
H A D | firewallsocketserver.h | 68 void AddRule(bool allow, FirewallProtocol p = FP_ANY, 71 void AddRule(bool allow, FirewallProtocol p, 98 bool allow; member in struct:talk_base::FirewallSocketServer::Rule 121 void AddRule(bool allow, FirewallProtocol p = FP_ANY,
|
/external/chromium_org/base/files/ |
H A D | file_path_watcher_browsertest.cc | 772 bool ChangeFilePermissions(const FilePath& path, Permission perm, bool allow) { argument 793 if (allow) {
|
/external/chromium_org/chrome/browser/automation/ |
H A D | automation_provider_win.cc | 165 bool allow, 185 if (allow && AddExternalTab(external_tab_container)) { 164 ConnectExternalTab(uint64 cookie, bool allow, HWND parent_window, HWND* tab_container_window, HWND* tab_window, int* tab_handle, int* session_id) argument
|
/external/chromium_org/content/browser/accessibility/ |
H A D | accessibility_tree_formatter.cc | 149 bool allow = default_result; local 153 allow = true; 155 allow = (!MatchPattern(text, UTF8ToUTF16("*=''"))); 157 allow = false; 160 return allow;
|