Searched defs:allow (Results 26 - 50 of 111) sorted by relevance

12345

/external/chromium_org/chrome/browser/chromeos/login/screens/
H A Derror_screen.cc139 void ErrorScreen::AllowGuestSignin(bool allow) { argument
141 actor_->AllowGuestSignin(allow);
163 // Only allow guest sessions if there is no owner yet.
/external/chromium_org/chrome/browser/download/
H A Ddownload_request_limiter.cc225 void DownloadRequestLimiter::TabDownloadState::NotifyCallbacks(bool allow) { argument
226 set_download_status(allow ?
234 // don't close it. If allow is false, we send all the notifications to cancel
236 if (!allow || (callbacks_.size() < kMaxDownloadsAtOnce)) {
250 host_->ScheduleNotification(callbacks[i], allow);
326 // The WebContents was closed, don't allow the download.
358 const Callback& orig_callback, bool allow) {
362 if (!originating_contents || !allow) {
455 bool allow) {
457 BrowserThread::IO, FROM_HERE, base::Bind(callback, allow));
354 OnCanDownloadDecided( int render_process_host_id, int render_view_id, const std::string& request_method, const Callback& orig_callback, bool allow) argument
454 ScheduleNotification(const Callback& callback, bool allow) argument
[all...]
H A Ddownload_request_limiter_unittest.cc167 void ContinueDownload(bool allow) { argument
168 if (allow) {
236 // Ask again. This triggers asking the delegate for allow/disallow.
258 // Do two downloads, allowing the second so that we end up with allow all.
270 // Navigate to a new URL with the same host, which shouldn't reset the allow
278 // Do a user gesture, because we're at allow all, this shouldn't change the
289 // Do two downloads, allowing the second so that we end up with allow all.
301 // Navigate to a new URL with the same host, which shouldn't reset the allow
320 // Do a user gesture, which should reset back to allow one.
325 // Ask twice, which triggers calling the delegate. Don't allow th
[all...]
/external/chromium_org/chrome/browser/extensions/
H A Dextension_util.cc88 // If this is an existing component extension we always allow it to
146 // We allow the extension to see events and data from another profile iff it
174 bool allow) {
177 if (allow == AllowFileAccess(extension_id, context))
180 ExtensionPrefs::Get(context)->SetAllowFileAccess(extension_id, allow);
172 SetAllowFileAccess(const std::string& extension_id, content::BrowserContext* context, bool allow) argument
/external/chromium_org/chrome/browser/guest_view/web_view/
H A Dchrome_web_view_permission_helper_delegate.cc114 bool allow,
116 if (allow) {
143 bool allow,
145 callback.Run(allow && web_view_guest()->attached());
171 bool allow,
173 callback.Run(allow && web_view_guest()->attached());
208 bool allow,
214 if (!allow || !web_view_guest()->attached()) {
270 bool allow,
272 callback.Run(allow
112 OnPermissionResponse( const std::string& identifier, bool allow, const std::string& input) argument
141 OnDownloadPermissionResponse( const base::Callback<void(bool)>& callback, bool allow, const std::string& user_input) argument
169 OnPointerLockPermissionResponse( const base::Callback<void(bool)>& callback, bool allow, const std::string& user_input) argument
204 OnGeolocationPermissionResponse( int bridge_id, bool user_gesture, const base::Callback<void(bool)>& callback, bool allow, const std::string& user_input) argument
268 OnFileSystemPermissionResponse( const base::Callback<void(bool)>& callback, bool allow, const std::string& user_input) argument
[all...]
/external/chromium_org/chrome/browser/services/gcm/
H A Dpush_messaging_service_impl.cc264 bool allow) {
265 if (!allow) {
260 DidRequestPermission( const PushMessagingApplicationId& application_id, const std::string& sender_id, const content::PushMessagingService::RegisterCallback& register_callback, bool allow) argument
/external/chromium_org/content/browser/accessibility/
H A Daccessibility_tree_formatter.cc146 bool allow = default_result; local
150 allow = true;
152 allow = (!MatchPattern(text, base::UTF8ToUTF16("*=''")));
154 allow = false;
157 return allow;
/external/chromium_org/content/browser/android/java/
H A Dgin_java_bridge_dispatcher_host.cc274 void GinJavaBridgeDispatcherHost::SetAllowObjectContentsInspection(bool allow) { argument
280 this, allow));
283 allow_object_contents_inspection_ = allow;
/external/chromium_org/content/child/npapi/
H A Dplugin_stream_url.cc35 void PluginStreamUrl::URLRedirectResponse(bool allow) { argument
37 plugin_url_fetcher_->URLRedirectResponse(allow);
39 instance()->webplugin()->URLRedirectResponse(allow, id_);
42 if (allow)
/external/chromium_org/extensions/browser/guest_view/web_view/
H A Dweb_view_permission_helper.cc49 bool allow) {
50 if (allow) {
51 // Note that |allow| == true means the embedder explicitly allowed the
213 bool allow,
215 if (!allow) {
304 // after creation. This is to allow those same objects to be accessed again
355 bool allow = (action == ALLOW) || local
358 info.callback.Run(allow, user_input);
362 RecordUserInitiatedUMA(info, allow);
366 return allow
47 RecordUserInitiatedUMA( const WebViewPermissionHelper::PermissionResponseInfo& info, bool allow) argument
210 OnMediaPermissionResponse( const content::MediaStreamRequest& request, const content::MediaResponseCallback& callback, bool allow, const std::string& user_input) argument
[all...]
/external/chromium_org/extensions/renderer/resources/
H A Dweb_view_events.js249 WebView.setPermission(getGuestInstanceId(), requestId, 'allow',
374 guestInstanceId, requestId, attached ? 'allow' : 'deny');
482 allow: function() {
484 WebView.setPermission(getGuestInstanceId(), requestId, 'allow');
/external/chromium_org/gpu/command_buffer/service/
H A Dbuffer_manager.h216 void set_allow_buffers_on_multiple_targets(bool allow) { argument
217 allow_buffers_on_multiple_targets_ = allow;
/external/chromium_org/net/spdy/
H A Dhpack_encoder_test.cc51 void set_allow_huffman_compression(bool allow) { argument
52 encoder_->allow_huffman_compression_ = allow;
/external/chromium_org/third_party/WebKit/Source/modules/webdatabase/
H A DDatabaseAuthorizer.cpp422 int allow = denyBasedOnTableName(tableName); local
423 if (allow)
425 return allow;
/external/chromium_org/third_party/protobuf/src/google/protobuf/
H A Dtext_format.h313 void AllowPartialMessage(bool allow) { argument
314 allow_partial_ = allow;
/external/chromium_org/third_party/skia/src/pathops/
H A DSkDQuadLineIntersection.cpp101 i->setMax(3); // allow short partial coincidence plus discrete intersection
104 void allowNear(bool allow) { argument
105 fAllowNear = allow;
/external/chromium_org/third_party/webrtc/base/
H A Dfirewallsocketserver.cc126 void FirewallSocketServer::AddRule(bool allow, FirewallProtocol p, argument
135 AddRule(allow, p, src, dst);
139 void FirewallSocketServer::AddRule(bool allow, FirewallProtocol p, argument
143 r.allow = allow;
172 return r.allow;
222 void FirewallManager::AddRule(bool allow, FirewallProtocol p, argument
227 (*it)->AddRule(allow, p, d, addr);
H A Dfirewallsocketserver.h51 void AddRule(bool allow, FirewallProtocol p = FP_ANY,
54 void AddRule(bool allow, FirewallProtocol p,
85 bool allow; member in struct:rtc::FirewallSocketServer::Rule
108 void AddRule(bool allow, FirewallProtocol p = FP_ANY,
/external/chromium_org/v8/src/
H A Dassert-scope.h44 void set(PerThreadAssertType type, bool allow) { argument
45 assert_states_[type] = allow;
99 template <PerThreadAssertType type, bool allow>
104 data_->set(type, allow);
128 template <PerIsolateAssertType type, bool allow>
134 SetData(isolate_, DataBit::update(old_data_, allow));
155 template <PerThreadAssertType type, bool allow>
158 PerThreadAssertScope<type, allow> {
167 template <PerIsolateAssertType type, bool allow>
170 PerIsolateAssertScope<type, allow> {
[all...]
/external/robolectric/src/main/java/android/webkit/
H A DTestWebSettings.java43 public void setAllowFileAccessFromFileURLs(boolean allow) { argument
44 allowFileAccessFromFile = allow;
48 public void setAllowUniversalAccessFromFileURLs(boolean allow) { argument
49 allowUniversalAccessFromFile = allow;
58 public void setAllowFileAccess(boolean allow) { argument
59 allowFileAccess = allow;
/external/skia/src/pathops/
H A DSkDQuadLineIntersection.cpp101 i->setMax(3); // allow short partial coincidence plus discrete intersection
104 void allowNear(bool allow) { argument
105 fAllowNear = allow;
/external/smack/src/org/jivesoftware/smack/packet/
H A DPrivacyItem.java34 /** allow is the action associated with the item, it can allow or deny the communication. */
35 private boolean allow; field in class:PrivacyItem
38 /** rule hold the kind of communication ([jid|group|subscription]) it will allow or block and
61 public PrivacyItem(String type, boolean allow, int order) { argument
63 this.setAllow(allow);
68 * Returns the action associated with the item, it MUST be filled and will allow or deny
71 * @return the allow communication status.
74 return allow;
78 * Sets the action associated with the item, it can allow o
82 setAllow(boolean allow) argument
[all...]
/external/chromium_org/base/files/
H A Dfile_path_watcher_browsertest.cc801 bool ChangeFilePermissions(const FilePath& path, Permission perm, bool allow) { argument
822 if (allow) {
/external/chromium_org/base/synchronization/
H A Dcondition_variable_unittest.cc107 void SetAllowHelp(bool allow);
293 // Wait to allow the all workers to get done.
317 // Wait to allow the 3 workers to get done.
338 // Wait to allow the 3 workers to get done.
359 // Wait to allow the 10 workers to get done.
378 // Wait to allow the 10 workers to get done.
410 // Wait a bit more to allow threads to reach their wait state.
661 void WorkQueue::SetAllowHelp(bool allow) { argument
662 allow_help_requests_ = allow;
/external/chromium_org/chrome/browser/chromeos/attestation/
H A Dplatform_verification_flow_unittest.cc246 void SetUserConsent(const GURL& url, bool allow) { argument
249 allow);

Completed in 506 milliseconds

12345