/external/chromium_org/chrome/browser/apps/ |
H A D | web_view_browsertest.cc | 233 void DownloadDecided(bool allow) { argument 238 EXPECT_EQ(expect_allow_, allow); 243 last_download_allowed_ = allow; 593 // Runs media_access/allow tests. 1770 LoadAndLaunchPlatformApp("web_view/media_access/allow", "Launched"); 2111 mock_delegate->WaitForCanDownload(false); // Expect to not allow. 2117 mock_delegate->WaitForCanDownload(true); // Expect to allow. 2123 mock_delegate->WaitForCanDownload(false); // Expect to not allow.
|
/external/chromium_org/content/browser/android/ |
H A D | content_view_core_impl.cc | 1124 jboolean allow) { 1125 java_bridge_dispatcher_host_->SetAllowObjectContentsInspection(allow); 1121 SetAllowJavascriptInterfacesInspection( JNIEnv* env, jobject obj, jboolean allow) argument
|
/external/chromium_org/content/renderer/npapi/ |
H A D | webplugin_delegate_proxy.cc | 1236 void WebPluginDelegateProxy::OnURLRedirectResponse(bool allow, argument 1241 plugin_->URLRedirectResponse(allow, resource_id);
|
H A D | webplugin_impl.cc | 306 // Force a geometry update if needed to allow plugins like media player 700 // For security reasons, do not allow JavaScript on frames 798 void WebPluginImpl::URLRedirectResponse(bool allow, int resource_id) { argument 802 if (allow) {
|
/external/chromium_org/extensions/browser/guest_view/web_view/ |
H A D | web_view_guest.cc | 886 // Do not allow navigating a guest to schemes other than known safe schemes. 994 void WebViewGuest::SetAllowTransparency(bool allow) { argument 995 if (guest_opaque_ != allow) 998 guest_opaque_ = !allow; 1002 web_contents()->GetRenderViewHost()->GetView()->SetBackgroundOpaque(!allow); 1025 // Navigation also resumes resource loading which we don't want to allow 1147 bool allow, 1154 if (!allow) 1145 OnWebViewNewWindowResponse( int new_window_instance_id, bool allow, const std::string& user_input) argument
|
/external/chromium_org/net/socket/ |
H A D | socket_test_util.h | 292 void allow_unconsumed_reads(bool allow) { allow_unconsumed_reads_ = allow; } argument
|
/external/chromium_org/third_party/WebKit/Source/web/ |
H A D | WebSettingsImpl.cpp | 329 void WebSettingsImpl::setAllowScriptsToCloseWindows(bool allow) argument 331 m_settings->setAllowScriptsToCloseWindows(allow); 394 void WebSettingsImpl::setAllowUniversalAccessFromFileURLs(bool allow) argument 396 m_settings->setAllowUniversalAccessFromFileURLs(allow); 399 void WebSettingsImpl::setAllowFileAccessFromFileURLs(bool allow) argument 401 m_settings->setAllowFileAccessFromFileURLs(allow);
|
/external/chromium_org/third_party/boringssl/src/ssl/ |
H A D | t1_lib.c | 698 /* Set this to allow use of invalid curves for testing */ 841 /* Don't allow TLS 1.2 only ciphers if we don't suppport them */ 1490 to allow the application to position itself to the right context. 2579 const unsigned char *allow, size_t allowlen) 2590 for (j = 0, atmp = allow; j < allowlen; j+=2, atmp+=2) 2615 const unsigned char *pref, *allow, *conf; local 2642 allow = c->peer_sigalgs; 2647 allow = conf; 2652 nmatch = tls12_do_shared_sigalgs(NULL, pref, preflen, allow, allowlen); 2658 nmatch = tls12_do_shared_sigalgs(salgs, pref, preflen, allow, allowle 2577 tls12_do_shared_sigalgs(TLS_SIGALGS *shsig, const unsigned char *pref, size_t preflen, const unsigned char *allow, size_t allowlen) argument [all...] |
/external/chromium_org/third_party/libxml/src/ |
H A D | catalog.c | 3500 * @allow: what catalogs should be accepted 3506 xmlCatalogSetDefaults(xmlCatalogAllow allow) { argument 3508 switch (allow) { 3527 xmlCatalogDefaultAllow = allow;
|
H A D | parser.c | 180 * arbitrary depth limit for the XML documents that we allow to 1461 maxatts = 55; /* allow for 10 attrs by default */ 4955 xmlCatalogAllow allow = xmlCatalogGetDefaults(); local 4956 if ((allow == XML_CATA_ALLOW_DOCUMENT) || 4957 (allow == XML_CATA_ALLOW_ALL)) 8190 maxatts = 22; /* allow for 10 attrs by default */ 9706 * In practice allow [0-9].[0-9]+ at that level 11834 * To allow content encoding detection, @size should be >= 4
|
H A D | testapi.c | 1375 int legacy; /* whether to allow deprecated attributes */ 2194 int legacy; /* whether to allow deprecated elements (YES is faster here for Element nodes) */ 6362 xmlCatalogAllow allow; /* what catalogs should be accepted */ local 6367 allow = gen_xmlCatalogAllow(n_allow, 0); 6369 xmlCatalogSetDefaults(allow); 6371 des_xmlCatalogAllow(n_allow, allow, 0); 23850 int space; /* allow spaces in front and end of the string */ 23893 int space; /* allow spaces in front and end of the string */ 23936 int space; /* allow spaces in front and end of the string */ 23979 int space; /* allow space [all...] |
/external/libxml2/ |
H A D | catalog.c | 3496 * @allow: what catalogs should be accepted 3502 xmlCatalogSetDefaults(xmlCatalogAllow allow) { argument 3504 switch (allow) { 3523 xmlCatalogDefaultAllow = allow;
|
H A D | parser.c | 203 * arbitrary depth limit for the XML documents that we allow to 1391 * it sounds right to still allow Irregular i-xxx IANA and user codes too 1409 * Still allow IANA code and user code which were coming 1632 maxatts = 55; /* allow for 10 attrs by default */ 4120 * There we potentially risk an overflow, don't allow attribute value of 5277 xmlCatalogAllow allow = xmlCatalogGetDefaults(); local 5278 if ((allow == XML_CATA_ALLOW_DOCUMENT) || 5279 (allow == XML_CATA_ALLOW_ALL)) 8546 maxatts = 22; /* allow for 10 attrs by default */ 10105 * In practice allow [ [all...] |
/external/valgrind/main/coregrind/m_aspacemgr/ |
H A D | aspacemgr-linux.c | 109 so as to allow memory hungry applications to use the lowest 931 mode we allow the kernel to report execute permission when we weren't 985 allow segment to have X permission when we weren't expecting 1124 /* Hook to allow sanity checks to be done from aspacemgr-common.c. */ 1858 Bool allow = True; local 1867 allow = False; 1871 if (allow) { 1886 Bool allow = True; local 1892 allow = False; 1896 if (allow) { [all...] |
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
H A D | dbus_new_handlers.c | 1269 dbus_bool_t *allow, 1279 dbus_message_iter_get_basic(var, allow); 1267 wpas_dbus_get_scan_allow_roam(DBusMessage *message, DBusMessageIter *var, dbus_bool_t *allow, DBusMessage **reply) argument
|
/external/chromium_org/android_webview/java/src/org/chromium/android_webview/ |
H A D | AwSettings.java | 344 public void setAllowFileAccess(boolean allow) { argument 346 if (mAllowFileUrlAccess != allow) { 347 mAllowFileUrlAccess = allow; 364 public void setAllowContentAccess(boolean allow) { argument 366 if (mAllowContentUrlAccess != allow) { 367 mAllowContentUrlAccess = allow;
|
H A D | AwContents.java | 81 * (We define this class independent of the hidden WebViewProvider interfaces, to allow 112 * Interface that consumers of {@link AwContents} must implement to allow the proper 414 // will allow those to run in order. 1113 // allow access to file:// URLs (subject to OS level permission checks). 2003 public void invoke(final String origin, final boolean allow, final boolean retain) { argument 2008 if (allow) { 2009 mBrowserContext.getGeolocationPermissions().allow(origin); 2015 nativeInvokeGeolocationCallback(mNativeAwContents, allow, origin); 2030 // Allow if the origin has a retained allow
|
/external/chromium_org/chrome/browser/ |
H A D | chrome_content_browser_client.cc | 364 // Do not allow URLs with paths empty before the first slash since we can't 994 // Do not allow chrome://chrome-signin navigate to other chrome:// URLs, since 1472 bool allow = io_data->GetCookieSettings()-> local 1478 render_frame_id, url, first_party, cookie_list, !allow, true)); 1479 return allow; 1493 bool allow = cookie_settings->IsSettingCookieAllowed(url, first_party); local 1506 !allow)); 1507 return allow; 1532 bool allow = cookie_settings->IsSettingCookieAllowed(url, url); local 1540 i->first, i->second, url, name, display_name, !allow)); 1554 bool allow = cookie_settings->IsSettingCookieAllowed(url, url); local 1564 GuestPermissionRequestHelper( const GURL& url, const std::vector<std::pair<int, int> >& render_frames, base::Callback<void(bool)> callback, bool allow) argument 1622 FileSystemAccessed( const GURL& url, const std::vector<std::pair<int, int> >& render_frames, base::Callback<void(bool)> callback, bool allow) argument 1647 bool allow = cookie_settings->IsSettingCookieAllowed(url, url); local [all...] |
/external/chromium_org/extensions/browser/ |
H A D | extension_prefs.cc | 123 // A preference that, if true, will allow this extension to run in incognito 1177 bool allow) { 1179 new base::FundamentalValue(allow)); 1176 SetAllowFileAccess(const std::string& extension_id, bool allow) argument
|
/external/chromium_org/content/shell/renderer/test_runner/ |
H A D | test_runner.cc | 216 void SetAllowUniversalAccessFromFileURLs(bool allow); 217 void SetAllowFileAccessFromFileURLs(bool allow); 993 void TestRunnerBindings::SetAllowUniversalAccessFromFileURLs(bool allow) { argument 995 runner_->SetAllowUniversalAccessFromFileURLs(allow); 998 void TestRunnerBindings::SetAllowFileAccessFromFileURLs(bool allow) { argument 1000 runner_->SetAllowFileAccessFromFileURLs(allow); 2456 void TestRunner::SetAllowUniversalAccessFromFileURLs(bool allow) { argument 2457 delegate_->Preferences()->allow_universal_access_from_file_urls = allow; 2461 void TestRunner::SetAllowFileAccessFromFileURLs(bool allow) { argument 2462 delegate_->Preferences()->allow_file_access_from_file_urls = allow; [all...] |
/external/chromium_org/content/browser/web_contents/ |
H A D | web_contents_impl.cc | 134 // cancel all the pending logic. Otherwise we allow the pending RVH to send 1669 // to allow it to survive the trip without being hosted. 1735 // Only allow privileged mouse lock for fullscreen render widget, which is 2786 // future arrives, update this code to not allow this case. 3237 // from CreateRenderView and allow that to notify the RenderView for us. 3984 // pretend the beforeunload listeners have all fired and allow the delegate 4226 void WebContentsImpl::SetAllowOtherViews(bool allow) { argument 4227 view_->SetAllowOtherViews(allow);
|
/external/chromium_org/content/public/android/java/src/org/chromium/content/browser/ |
H A D | ContentViewCore.java | 147 * Interface that consumers of {@link ContentViewCore} must implement to allow the proper 598 // We do not require the containing view in the constructor to allow embedders to create a 602 // We supply the nativeWebContents pointer here rather than in the constructor to allow us 2348 * Attaches the native ImeAdapter object to the java ImeAdapter to allow communication via JNI. 2473 * @param allow Whether to allow JavaScript objects inspection. 2475 public void setAllowJavascriptInterfacesInspection(boolean allow) { argument 2476 nativeSetAllowJavascriptInterfacesInspection(mNativeContentViewCore, allow); 2512 * <li> addJavascriptInterface() can be used to allow JavaScript to control 2515 * untrusted content could allow a 3059 nativeSetAllowJavascriptInterfacesInspection( long nativeContentViewCoreImpl, boolean allow) argument [all...] |
/external/chromium_org/v8/src/ |
H A D | preparser.h | 110 void set_allow_lazy(bool allow) { allow_lazy_ = allow; } argument 111 void set_allow_natives_syntax(bool allow) { allow_natives_syntax_ = allow; } argument 112 void set_allow_arrow_functions(bool allow) { allow_arrow_functions_ = allow; } argument 113 void set_allow_modules(bool allow) { scanner()->SetHarmonyModules(allow); } argument 114 void set_allow_harmony_scoping(bool allow) { argument 115 scanner()->SetHarmonyScoping(allow); 117 set_allow_harmony_numeric_literals(bool allow) argument 120 set_allow_classes(bool allow) argument 121 set_allow_harmony_object_literals(bool allow) argument [all...] |
H A D | api.cc | 3285 // We do not allow exceptions thrown while setting the prototype 5276 void Context::AllowCodeGenerationFromStrings(bool allow) { argument 5281 allow ? isolate->heap()->true_value() : isolate->heap()->false_value());
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
H A D | javax.servlet_2.5.0.v200910301333.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |