/external/chromium_org/chrome/browser/chromeos/login/screens/ |
H A D | error_screen.cc | 139 void ErrorScreen::AllowGuestSignin(bool allow) { argument 141 actor_->AllowGuestSignin(allow); 163 // Only allow guest sessions if there is no owner yet.
|
/external/chromium_org/chrome/browser/download/ |
H A D | download_request_limiter.cc | 225 void DownloadRequestLimiter::TabDownloadState::NotifyCallbacks(bool allow) { argument 226 set_download_status(allow ? 234 // don't close it. If allow is false, we send all the notifications to cancel 236 if (!allow || (callbacks_.size() < kMaxDownloadsAtOnce)) { 250 host_->ScheduleNotification(callbacks[i], allow); 326 // The WebContents was closed, don't allow the download. 358 const Callback& orig_callback, bool allow) { 362 if (!originating_contents || !allow) { 455 bool allow) { 457 BrowserThread::IO, FROM_HERE, base::Bind(callback, allow)); 354 OnCanDownloadDecided( int render_process_host_id, int render_view_id, const std::string& request_method, const Callback& orig_callback, bool allow) argument 454 ScheduleNotification(const Callback& callback, bool allow) argument [all...] |
H A D | download_request_limiter_unittest.cc | 167 void ContinueDownload(bool allow) { argument 168 if (allow) { 236 // Ask again. This triggers asking the delegate for allow/disallow. 258 // Do two downloads, allowing the second so that we end up with allow all. 270 // Navigate to a new URL with the same host, which shouldn't reset the allow 278 // Do a user gesture, because we're at allow all, this shouldn't change the 289 // Do two downloads, allowing the second so that we end up with allow all. 301 // Navigate to a new URL with the same host, which shouldn't reset the allow 320 // Do a user gesture, which should reset back to allow one. 325 // Ask twice, which triggers calling the delegate. Don't allow th [all...] |
/external/chromium_org/chrome/browser/extensions/ |
H A D | extension_util.cc | 88 // If this is an existing component extension we always allow it to 146 // We allow the extension to see events and data from another profile iff it 174 bool allow) { 177 if (allow == AllowFileAccess(extension_id, context)) 180 ExtensionPrefs::Get(context)->SetAllowFileAccess(extension_id, allow); 172 SetAllowFileAccess(const std::string& extension_id, content::BrowserContext* context, bool allow) argument
|
/external/chromium_org/chrome/browser/guest_view/web_view/ |
H A D | chrome_web_view_permission_helper_delegate.cc | 114 bool allow, 116 if (allow) { 143 bool allow, 145 callback.Run(allow && web_view_guest()->attached()); 171 bool allow, 173 callback.Run(allow && web_view_guest()->attached()); 208 bool allow, 214 if (!allow || !web_view_guest()->attached()) { 270 bool allow, 272 callback.Run(allow 112 OnPermissionResponse( const std::string& identifier, bool allow, const std::string& input) argument 141 OnDownloadPermissionResponse( const base::Callback<void(bool)>& callback, bool allow, const std::string& user_input) argument 169 OnPointerLockPermissionResponse( const base::Callback<void(bool)>& callback, bool allow, const std::string& user_input) argument 204 OnGeolocationPermissionResponse( int bridge_id, bool user_gesture, const base::Callback<void(bool)>& callback, bool allow, const std::string& user_input) argument 268 OnFileSystemPermissionResponse( const base::Callback<void(bool)>& callback, bool allow, const std::string& user_input) argument [all...] |
/external/chromium_org/chrome/browser/services/gcm/ |
H A D | push_messaging_service_impl.cc | 264 bool allow) { 265 if (!allow) { 260 DidRequestPermission( const PushMessagingApplicationId& application_id, const std::string& sender_id, const content::PushMessagingService::RegisterCallback& register_callback, bool allow) argument
|
/external/chromium_org/content/browser/accessibility/ |
H A D | accessibility_tree_formatter.cc | 146 bool allow = default_result; local 150 allow = true; 152 allow = (!MatchPattern(text, base::UTF8ToUTF16("*=''"))); 154 allow = false; 157 return allow;
|
/external/chromium_org/content/browser/android/java/ |
H A D | gin_java_bridge_dispatcher_host.cc | 274 void GinJavaBridgeDispatcherHost::SetAllowObjectContentsInspection(bool allow) { argument 280 this, allow)); 283 allow_object_contents_inspection_ = allow;
|
/external/chromium_org/content/child/npapi/ |
H A D | plugin_stream_url.cc | 35 void PluginStreamUrl::URLRedirectResponse(bool allow) { argument 37 plugin_url_fetcher_->URLRedirectResponse(allow); 39 instance()->webplugin()->URLRedirectResponse(allow, id_); 42 if (allow)
|
/external/chromium_org/extensions/browser/guest_view/web_view/ |
H A D | web_view_permission_helper.cc | 49 bool allow) { 50 if (allow) { 51 // Note that |allow| == true means the embedder explicitly allowed the 213 bool allow, 215 if (!allow) { 304 // after creation. This is to allow those same objects to be accessed again 355 bool allow = (action == ALLOW) || local 358 info.callback.Run(allow, user_input); 362 RecordUserInitiatedUMA(info, allow); 366 return allow 47 RecordUserInitiatedUMA( const WebViewPermissionHelper::PermissionResponseInfo& info, bool allow) argument 210 OnMediaPermissionResponse( const content::MediaStreamRequest& request, const content::MediaResponseCallback& callback, bool allow, const std::string& user_input) argument [all...] |
/external/chromium_org/extensions/renderer/resources/ |
H A D | web_view_events.js | 249 WebView.setPermission(getGuestInstanceId(), requestId, 'allow', 374 guestInstanceId, requestId, attached ? 'allow' : 'deny'); 482 allow: function() { 484 WebView.setPermission(getGuestInstanceId(), requestId, 'allow');
|
/external/chromium_org/gpu/command_buffer/service/ |
H A D | buffer_manager.h | 216 void set_allow_buffers_on_multiple_targets(bool allow) { argument 217 allow_buffers_on_multiple_targets_ = allow;
|
/external/chromium_org/net/spdy/ |
H A D | hpack_encoder_test.cc | 51 void set_allow_huffman_compression(bool allow) { argument 52 encoder_->allow_huffman_compression_ = allow;
|
/external/chromium_org/third_party/WebKit/Source/modules/webdatabase/ |
H A D | DatabaseAuthorizer.cpp | 422 int allow = denyBasedOnTableName(tableName); local 423 if (allow) 425 return allow;
|
/external/chromium_org/third_party/protobuf/src/google/protobuf/ |
H A D | text_format.h | 313 void AllowPartialMessage(bool allow) { argument 314 allow_partial_ = allow;
|
/external/chromium_org/third_party/skia/src/pathops/ |
H A D | SkDQuadLineIntersection.cpp | 101 i->setMax(3); // allow short partial coincidence plus discrete intersection 104 void allowNear(bool allow) { argument 105 fAllowNear = allow;
|
/external/chromium_org/third_party/webrtc/base/ |
H A D | firewallsocketserver.cc | 126 void FirewallSocketServer::AddRule(bool allow, FirewallProtocol p, argument 135 AddRule(allow, p, src, dst); 139 void FirewallSocketServer::AddRule(bool allow, FirewallProtocol p, argument 143 r.allow = allow; 172 return r.allow; 222 void FirewallManager::AddRule(bool allow, FirewallProtocol p, argument 227 (*it)->AddRule(allow, p, d, addr);
|
H A D | firewallsocketserver.h | 51 void AddRule(bool allow, FirewallProtocol p = FP_ANY, 54 void AddRule(bool allow, FirewallProtocol p, 85 bool allow; member in struct:rtc::FirewallSocketServer::Rule 108 void AddRule(bool allow, FirewallProtocol p = FP_ANY,
|
/external/chromium_org/v8/src/ |
H A D | assert-scope.h | 44 void set(PerThreadAssertType type, bool allow) { argument 45 assert_states_[type] = allow; 99 template <PerThreadAssertType type, bool allow> 104 data_->set(type, allow); 128 template <PerIsolateAssertType type, bool allow> 134 SetData(isolate_, DataBit::update(old_data_, allow)); 155 template <PerThreadAssertType type, bool allow> 158 PerThreadAssertScope<type, allow> { 167 template <PerIsolateAssertType type, bool allow> 170 PerIsolateAssertScope<type, allow> { [all...] |
/external/robolectric/src/main/java/android/webkit/ |
H A D | TestWebSettings.java | 43 public void setAllowFileAccessFromFileURLs(boolean allow) { argument 44 allowFileAccessFromFile = allow; 48 public void setAllowUniversalAccessFromFileURLs(boolean allow) { argument 49 allowUniversalAccessFromFile = allow; 58 public void setAllowFileAccess(boolean allow) { argument 59 allowFileAccess = allow;
|
/external/skia/src/pathops/ |
H A D | SkDQuadLineIntersection.cpp | 101 i->setMax(3); // allow short partial coincidence plus discrete intersection 104 void allowNear(bool allow) { argument 105 fAllowNear = allow;
|
/external/smack/src/org/jivesoftware/smack/packet/ |
H A D | PrivacyItem.java | 34 /** allow is the action associated with the item, it can allow or deny the communication. */
35 private boolean allow;
field in class:PrivacyItem 38 /** rule hold the kind of communication ([jid|group|subscription]) it will allow or block and
61 public PrivacyItem(String type, boolean allow, int order) {
argument 63 this.setAllow(allow);
68 * Returns the action associated with the item, it MUST be filled and will allow or deny
71 * @return the allow communication status.
74 return allow;
78 * Sets the action associated with the item, it can allow o 82 setAllow(boolean allow) argument [all...] |
/external/chromium_org/base/files/ |
H A D | file_path_watcher_browsertest.cc | 801 bool ChangeFilePermissions(const FilePath& path, Permission perm, bool allow) { argument 822 if (allow) {
|
/external/chromium_org/base/synchronization/ |
H A D | condition_variable_unittest.cc | 107 void SetAllowHelp(bool allow); 293 // Wait to allow the all workers to get done. 317 // Wait to allow the 3 workers to get done. 338 // Wait to allow the 3 workers to get done. 359 // Wait to allow the 10 workers to get done. 378 // Wait to allow the 10 workers to get done. 410 // Wait a bit more to allow threads to reach their wait state. 661 void WorkQueue::SetAllowHelp(bool allow) { argument 662 allow_help_requests_ = allow;
|
/external/chromium_org/chrome/browser/chromeos/attestation/ |
H A D | platform_verification_flow_unittest.cc | 246 void SetUserConsent(const GURL& url, bool allow) { argument 249 allow);
|