Searched defs:allow (Results 76 - 100 of 111) sorted by relevance

12345

/external/chromium_org/chrome/browser/apps/
H A Dweb_view_browsertest.cc233 void DownloadDecided(bool allow) { argument
238 EXPECT_EQ(expect_allow_, allow);
243 last_download_allowed_ = allow;
593 // Runs media_access/allow tests.
1770 LoadAndLaunchPlatformApp("web_view/media_access/allow", "Launched");
2111 mock_delegate->WaitForCanDownload(false); // Expect to not allow.
2117 mock_delegate->WaitForCanDownload(true); // Expect to allow.
2123 mock_delegate->WaitForCanDownload(false); // Expect to not allow.
/external/chromium_org/content/browser/android/
H A Dcontent_view_core_impl.cc1124 jboolean allow) {
1125 java_bridge_dispatcher_host_->SetAllowObjectContentsInspection(allow);
1121 SetAllowJavascriptInterfacesInspection( JNIEnv* env, jobject obj, jboolean allow) argument
/external/chromium_org/content/renderer/npapi/
H A Dwebplugin_delegate_proxy.cc1236 void WebPluginDelegateProxy::OnURLRedirectResponse(bool allow, argument
1241 plugin_->URLRedirectResponse(allow, resource_id);
H A Dwebplugin_impl.cc306 // Force a geometry update if needed to allow plugins like media player
700 // For security reasons, do not allow JavaScript on frames
798 void WebPluginImpl::URLRedirectResponse(bool allow, int resource_id) { argument
802 if (allow) {
/external/chromium_org/extensions/browser/guest_view/web_view/
H A Dweb_view_guest.cc886 // Do not allow navigating a guest to schemes other than known safe schemes.
994 void WebViewGuest::SetAllowTransparency(bool allow) { argument
995 if (guest_opaque_ != allow)
998 guest_opaque_ = !allow;
1002 web_contents()->GetRenderViewHost()->GetView()->SetBackgroundOpaque(!allow);
1025 // Navigation also resumes resource loading which we don't want to allow
1147 bool allow,
1154 if (!allow)
1145 OnWebViewNewWindowResponse( int new_window_instance_id, bool allow, const std::string& user_input) argument
/external/chromium_org/net/socket/
H A Dsocket_test_util.h292 void allow_unconsumed_reads(bool allow) { allow_unconsumed_reads_ = allow; } argument
/external/chromium_org/third_party/WebKit/Source/web/
H A DWebSettingsImpl.cpp329 void WebSettingsImpl::setAllowScriptsToCloseWindows(bool allow) argument
331 m_settings->setAllowScriptsToCloseWindows(allow);
394 void WebSettingsImpl::setAllowUniversalAccessFromFileURLs(bool allow) argument
396 m_settings->setAllowUniversalAccessFromFileURLs(allow);
399 void WebSettingsImpl::setAllowFileAccessFromFileURLs(bool allow) argument
401 m_settings->setAllowFileAccessFromFileURLs(allow);
/external/chromium_org/third_party/boringssl/src/ssl/
H A Dt1_lib.c698 /* Set this to allow use of invalid curves for testing */
841 /* Don't allow TLS 1.2 only ciphers if we don't suppport them */
1490 to allow the application to position itself to the right context.
2579 const unsigned char *allow, size_t allowlen)
2590 for (j = 0, atmp = allow; j < allowlen; j+=2, atmp+=2)
2615 const unsigned char *pref, *allow, *conf; local
2642 allow = c->peer_sigalgs;
2647 allow = conf;
2652 nmatch = tls12_do_shared_sigalgs(NULL, pref, preflen, allow, allowlen);
2658 nmatch = tls12_do_shared_sigalgs(salgs, pref, preflen, allow, allowle
2577 tls12_do_shared_sigalgs(TLS_SIGALGS *shsig, const unsigned char *pref, size_t preflen, const unsigned char *allow, size_t allowlen) argument
[all...]
/external/chromium_org/third_party/libxml/src/
H A Dcatalog.c3500 * @allow: what catalogs should be accepted
3506 xmlCatalogSetDefaults(xmlCatalogAllow allow) { argument
3508 switch (allow) {
3527 xmlCatalogDefaultAllow = allow;
H A Dparser.c180 * arbitrary depth limit for the XML documents that we allow to
1461 maxatts = 55; /* allow for 10 attrs by default */
4955 xmlCatalogAllow allow = xmlCatalogGetDefaults(); local
4956 if ((allow == XML_CATA_ALLOW_DOCUMENT) ||
4957 (allow == XML_CATA_ALLOW_ALL))
8190 maxatts = 22; /* allow for 10 attrs by default */
9706 * In practice allow [0-9].[0-9]+ at that level
11834 * To allow content encoding detection, @size should be >= 4
H A Dtestapi.c1375 int legacy; /* whether to allow deprecated attributes */
2194 int legacy; /* whether to allow deprecated elements (YES is faster here for Element nodes) */
6362 xmlCatalogAllow allow; /* what catalogs should be accepted */ local
6367 allow = gen_xmlCatalogAllow(n_allow, 0);
6369 xmlCatalogSetDefaults(allow);
6371 des_xmlCatalogAllow(n_allow, allow, 0);
23850 int space; /* allow spaces in front and end of the string */
23893 int space; /* allow spaces in front and end of the string */
23936 int space; /* allow spaces in front and end of the string */
23979 int space; /* allow space
[all...]
/external/libxml2/
H A Dcatalog.c3496 * @allow: what catalogs should be accepted
3502 xmlCatalogSetDefaults(xmlCatalogAllow allow) { argument
3504 switch (allow) {
3523 xmlCatalogDefaultAllow = allow;
H A Dparser.c203 * arbitrary depth limit for the XML documents that we allow to
1391 * it sounds right to still allow Irregular i-xxx IANA and user codes too
1409 * Still allow IANA code and user code which were coming
1632 maxatts = 55; /* allow for 10 attrs by default */
4120 * There we potentially risk an overflow, don't allow attribute value of
5277 xmlCatalogAllow allow = xmlCatalogGetDefaults(); local
5278 if ((allow == XML_CATA_ALLOW_DOCUMENT) ||
5279 (allow == XML_CATA_ALLOW_ALL))
8546 maxatts = 22; /* allow for 10 attrs by default */
10105 * In practice allow [
[all...]
/external/valgrind/main/coregrind/m_aspacemgr/
H A Daspacemgr-linux.c109 so as to allow memory hungry applications to use the lowest
931 mode we allow the kernel to report execute permission when we weren't
985 allow segment to have X permission when we weren't expecting
1124 /* Hook to allow sanity checks to be done from aspacemgr-common.c. */
1858 Bool allow = True; local
1867 allow = False;
1871 if (allow) {
1886 Bool allow = True; local
1892 allow = False;
1896 if (allow) {
[all...]
/external/wpa_supplicant_8/wpa_supplicant/dbus/
H A Ddbus_new_handlers.c1269 dbus_bool_t *allow,
1279 dbus_message_iter_get_basic(var, allow);
1267 wpas_dbus_get_scan_allow_roam(DBusMessage *message, DBusMessageIter *var, dbus_bool_t *allow, DBusMessage **reply) argument
/external/chromium_org/android_webview/java/src/org/chromium/android_webview/
H A DAwSettings.java344 public void setAllowFileAccess(boolean allow) { argument
346 if (mAllowFileUrlAccess != allow) {
347 mAllowFileUrlAccess = allow;
364 public void setAllowContentAccess(boolean allow) { argument
366 if (mAllowContentUrlAccess != allow) {
367 mAllowContentUrlAccess = allow;
H A DAwContents.java81 * (We define this class independent of the hidden WebViewProvider interfaces, to allow
112 * Interface that consumers of {@link AwContents} must implement to allow the proper
414 // will allow those to run in order.
1113 // allow access to file:// URLs (subject to OS level permission checks).
2003 public void invoke(final String origin, final boolean allow, final boolean retain) { argument
2008 if (allow) {
2009 mBrowserContext.getGeolocationPermissions().allow(origin);
2015 nativeInvokeGeolocationCallback(mNativeAwContents, allow, origin);
2030 // Allow if the origin has a retained allow
/external/chromium_org/chrome/browser/
H A Dchrome_content_browser_client.cc364 // Do not allow URLs with paths empty before the first slash since we can't
994 // Do not allow chrome://chrome-signin navigate to other chrome:// URLs, since
1472 bool allow = io_data->GetCookieSettings()-> local
1478 render_frame_id, url, first_party, cookie_list, !allow, true));
1479 return allow;
1493 bool allow = cookie_settings->IsSettingCookieAllowed(url, first_party); local
1506 !allow));
1507 return allow;
1532 bool allow = cookie_settings->IsSettingCookieAllowed(url, url); local
1540 i->first, i->second, url, name, display_name, !allow));
1554 bool allow = cookie_settings->IsSettingCookieAllowed(url, url); local
1564 GuestPermissionRequestHelper( const GURL& url, const std::vector<std::pair<int, int> >& render_frames, base::Callback<void(bool)> callback, bool allow) argument
1622 FileSystemAccessed( const GURL& url, const std::vector<std::pair<int, int> >& render_frames, base::Callback<void(bool)> callback, bool allow) argument
1647 bool allow = cookie_settings->IsSettingCookieAllowed(url, url); local
[all...]
/external/chromium_org/extensions/browser/
H A Dextension_prefs.cc123 // A preference that, if true, will allow this extension to run in incognito
1177 bool allow) {
1179 new base::FundamentalValue(allow));
1176 SetAllowFileAccess(const std::string& extension_id, bool allow) argument
/external/chromium_org/content/shell/renderer/test_runner/
H A Dtest_runner.cc216 void SetAllowUniversalAccessFromFileURLs(bool allow);
217 void SetAllowFileAccessFromFileURLs(bool allow);
993 void TestRunnerBindings::SetAllowUniversalAccessFromFileURLs(bool allow) { argument
995 runner_->SetAllowUniversalAccessFromFileURLs(allow);
998 void TestRunnerBindings::SetAllowFileAccessFromFileURLs(bool allow) { argument
1000 runner_->SetAllowFileAccessFromFileURLs(allow);
2456 void TestRunner::SetAllowUniversalAccessFromFileURLs(bool allow) { argument
2457 delegate_->Preferences()->allow_universal_access_from_file_urls = allow;
2461 void TestRunner::SetAllowFileAccessFromFileURLs(bool allow) { argument
2462 delegate_->Preferences()->allow_file_access_from_file_urls = allow;
[all...]
/external/chromium_org/content/browser/web_contents/
H A Dweb_contents_impl.cc134 // cancel all the pending logic. Otherwise we allow the pending RVH to send
1669 // to allow it to survive the trip without being hosted.
1735 // Only allow privileged mouse lock for fullscreen render widget, which is
2786 // future arrives, update this code to not allow this case.
3237 // from CreateRenderView and allow that to notify the RenderView for us.
3984 // pretend the beforeunload listeners have all fired and allow the delegate
4226 void WebContentsImpl::SetAllowOtherViews(bool allow) { argument
4227 view_->SetAllowOtherViews(allow);
/external/chromium_org/content/public/android/java/src/org/chromium/content/browser/
H A DContentViewCore.java147 * Interface that consumers of {@link ContentViewCore} must implement to allow the proper
598 // We do not require the containing view in the constructor to allow embedders to create a
602 // We supply the nativeWebContents pointer here rather than in the constructor to allow us
2348 * Attaches the native ImeAdapter object to the java ImeAdapter to allow communication via JNI.
2473 * @param allow Whether to allow JavaScript objects inspection.
2475 public void setAllowJavascriptInterfacesInspection(boolean allow) { argument
2476 nativeSetAllowJavascriptInterfacesInspection(mNativeContentViewCore, allow);
2512 * <li> addJavascriptInterface() can be used to allow JavaScript to control
2515 * untrusted content could allow a
3059 nativeSetAllowJavascriptInterfacesInspection( long nativeContentViewCoreImpl, boolean allow) argument
[all...]
/external/chromium_org/v8/src/
H A Dpreparser.h110 void set_allow_lazy(bool allow) { allow_lazy_ = allow; } argument
111 void set_allow_natives_syntax(bool allow) { allow_natives_syntax_ = allow; } argument
112 void set_allow_arrow_functions(bool allow) { allow_arrow_functions_ = allow; } argument
113 void set_allow_modules(bool allow) { scanner()->SetHarmonyModules(allow); } argument
114 void set_allow_harmony_scoping(bool allow) { argument
115 scanner()->SetHarmonyScoping(allow);
117 set_allow_harmony_numeric_literals(bool allow) argument
120 set_allow_classes(bool allow) argument
121 set_allow_harmony_object_literals(bool allow) argument
[all...]
H A Dapi.cc3285 // We do not allow exceptions thrown while setting the prototype
5276 void Context::AllowCodeGenerationFromStrings(bool allow) { argument
5281 allow ? isolate->heap()->true_value() : isolate->heap()->false_value());
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/
H A Djavax.servlet_2.5.0.v200910301333.jarMETA-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ...

Completed in 669 milliseconds

12345