/external/apache-http/src/org/apache/http/client/params/ |
H A D | ClientParamBean.java | 74 public void setAllowCircularRedirects (final boolean allow) { argument 75 params.setBooleanParameter(ClientPNames.ALLOW_CIRCULAR_REDIRECTS, allow);
|
/external/chromium_org/android_webview/browser/ |
H A D | aw_cookie_access_policy.cc | 42 void AwCookieAccessPolicy::SetShouldAcceptCookies(bool allow) { argument 44 accept_cookies_ = allow; 120 // come from different origins so we use the 'allow all' cookie policy for
|
/external/chromium_org/android_webview/java/src/org/chromium/android_webview/ |
H A D | AwContents.java | 81 * (We define this class independent of the hidden WebViewProvider interfaces, to allow 112 * Interface that consumers of {@link AwContents} must implement to allow the proper 414 // will allow those to run in order. 1113 // allow access to file:// URLs (subject to OS level permission checks). 2003 public void invoke(final String origin, final boolean allow, final boolean retain) { argument 2008 if (allow) { 2009 mBrowserContext.getGeolocationPermissions().allow(origin); 2015 nativeInvokeGeolocationCallback(mNativeAwContents, allow, origin); 2030 // Allow if the origin has a retained allow
|
H A D | AwGeolocationPermissions.java | 34 public void allow(String origin) { method in class:AwGeolocationPermissions
|
H A D | AwSettings.java | 344 public void setAllowFileAccess(boolean allow) { argument 346 if (mAllowFileUrlAccess != allow) { 347 mAllowFileUrlAccess = allow; 364 public void setAllowContentAccess(boolean allow) { argument 366 if (mAllowContentUrlAccess != allow) { 367 mAllowContentUrlAccess = allow;
|
H A D | ClientCertLookupTable.java | 51 public void allow(String host, int port, AndroidPrivateKey privateKey, byte[][] chain) { method in class:ClientCertLookupTable
|
/external/chromium_org/android_webview/javatests/src/org/chromium/android_webview/test/ |
H A D | TestAwContentsClient.java | 159 public void setAllowSslError(boolean allow) { argument 160 mAllowSslError = allow;
|
/external/chromium_org/base/files/ |
H A D | file_path_watcher_browsertest.cc | 801 bool ChangeFilePermissions(const FilePath& path, Permission perm, bool allow) { argument 822 if (allow) {
|
/external/chromium_org/base/synchronization/ |
H A D | condition_variable_unittest.cc | 107 void SetAllowHelp(bool allow); 293 // Wait to allow the all workers to get done. 317 // Wait to allow the 3 workers to get done. 338 // Wait to allow the 3 workers to get done. 359 // Wait to allow the 10 workers to get done. 378 // Wait to allow the 10 workers to get done. 410 // Wait a bit more to allow threads to reach their wait state. 661 void WorkQueue::SetAllowHelp(bool allow) { argument 662 allow_help_requests_ = allow;
|
/external/chromium_org/cc/test/ |
H A D | fake_picture_layer_tiling_client.h | 48 void set_allow_create_tile(bool allow) { allow_create_tile_ = allow; } argument
|
/external/chromium_org/chrome/browser/apps/ |
H A D | web_view_browsertest.cc | 233 void DownloadDecided(bool allow) { argument 238 EXPECT_EQ(expect_allow_, allow); 243 last_download_allowed_ = allow; 593 // Runs media_access/allow tests. 1770 LoadAndLaunchPlatformApp("web_view/media_access/allow", "Launched"); 2111 mock_delegate->WaitForCanDownload(false); // Expect to not allow. 2117 mock_delegate->WaitForCanDownload(true); // Expect to allow. 2123 mock_delegate->WaitForCanDownload(false); // Expect to not allow.
|
/external/chromium_org/chrome/browser/ |
H A D | chrome_content_browser_client.cc | 364 // Do not allow URLs with paths empty before the first slash since we can't 994 // Do not allow chrome://chrome-signin navigate to other chrome:// URLs, since 1472 bool allow = io_data->GetCookieSettings()-> local 1478 render_frame_id, url, first_party, cookie_list, !allow, true)); 1479 return allow; 1493 bool allow = cookie_settings->IsSettingCookieAllowed(url, first_party); local 1506 !allow)); 1507 return allow; 1532 bool allow = cookie_settings->IsSettingCookieAllowed(url, url); local 1540 i->first, i->second, url, name, display_name, !allow)); 1554 bool allow = cookie_settings->IsSettingCookieAllowed(url, url); local 1564 GuestPermissionRequestHelper( const GURL& url, const std::vector<std::pair<int, int> >& render_frames, base::Callback<void(bool)> callback, bool allow) argument 1622 FileSystemAccessed( const GURL& url, const std::vector<std::pair<int, int> >& render_frames, base::Callback<void(bool)> callback, bool allow) argument 1647 bool allow = cookie_settings->IsSettingCookieAllowed(url, url); local [all...] |
/external/chromium_org/chrome/browser/chromeos/attestation/ |
H A D | platform_verification_flow_unittest.cc | 246 void SetUserConsent(const GURL& url, bool allow) { argument 249 allow);
|
/external/chromium_org/chrome/browser/chromeos/login/screens/ |
H A D | error_screen.cc | 139 void ErrorScreen::AllowGuestSignin(bool allow) { argument 141 actor_->AllowGuestSignin(allow); 163 // Only allow guest sessions if there is no owner yet.
|
/external/chromium_org/chrome/browser/chromeos/settings/ |
H A D | device_settings_provider.cc | 86 // Temporarily allow it until we fix http://crbug.com/62626 112 // No configured allow-new-users value, enforce whitelist if non-empty. 550 em::AllowNewUsersProto* allow = local 554 allow->set_allow_new_users(allow_value); 874 // the policy cache with "safe-mode" defaults which should allow the owner to
|
/external/chromium_org/chrome/browser/download/ |
H A D | download_request_limiter.cc | 225 void DownloadRequestLimiter::TabDownloadState::NotifyCallbacks(bool allow) { argument 226 set_download_status(allow ? 234 // don't close it. If allow is false, we send all the notifications to cancel 236 if (!allow || (callbacks_.size() < kMaxDownloadsAtOnce)) { 250 host_->ScheduleNotification(callbacks[i], allow); 326 // The WebContents was closed, don't allow the download. 358 const Callback& orig_callback, bool allow) { 362 if (!originating_contents || !allow) { 455 bool allow) { 457 BrowserThread::IO, FROM_HERE, base::Bind(callback, allow)); 354 OnCanDownloadDecided( int render_process_host_id, int render_view_id, const std::string& request_method, const Callback& orig_callback, bool allow) argument 454 ScheduleNotification(const Callback& callback, bool allow) argument [all...] |
H A D | download_request_limiter_unittest.cc | 167 void ContinueDownload(bool allow) { argument 168 if (allow) { 236 // Ask again. This triggers asking the delegate for allow/disallow. 258 // Do two downloads, allowing the second so that we end up with allow all. 270 // Navigate to a new URL with the same host, which shouldn't reset the allow 278 // Do a user gesture, because we're at allow all, this shouldn't change the 289 // Do two downloads, allowing the second so that we end up with allow all. 301 // Navigate to a new URL with the same host, which shouldn't reset the allow 320 // Do a user gesture, which should reset back to allow one. 325 // Ask twice, which triggers calling the delegate. Don't allow th [all...] |
H A D | download_resource_throttle.cc | 63 void DownloadResourceThrottle::ContinueDownload(bool allow) { argument 65 request_allowed_ = allow; 67 if (allow) { 77 if (allow) {
|
/external/chromium_org/chrome/browser/extensions/ |
H A D | extension_install_checker.cc | 73 bool allow = ExtensionSystem::Get(profile_)->management_policy()->UserMayLoad( local 75 OnManagementPolicyCheckDone(allow, base::UTF16ToUTF8(error));
|
H A D | extension_util.cc | 88 // If this is an existing component extension we always allow it to 146 // We allow the extension to see events and data from another profile iff it 174 bool allow) { 177 if (allow == AllowFileAccess(extension_id, context)) 180 ExtensionPrefs::Get(context)->SetAllowFileAccess(extension_id, allow); 172 SetAllowFileAccess(const std::string& extension_id, content::BrowserContext* context, bool allow) argument
|
/external/chromium_org/chrome/browser/guest_view/web_view/ |
H A D | chrome_web_view_permission_helper_delegate.cc | 114 bool allow, 116 if (allow) { 143 bool allow, 145 callback.Run(allow && web_view_guest()->attached()); 171 bool allow, 173 callback.Run(allow && web_view_guest()->attached()); 208 bool allow, 214 if (!allow || !web_view_guest()->attached()) { 270 bool allow, 272 callback.Run(allow 112 OnPermissionResponse( const std::string& identifier, bool allow, const std::string& input) argument 141 OnDownloadPermissionResponse( const base::Callback<void(bool)>& callback, bool allow, const std::string& user_input) argument 169 OnPointerLockPermissionResponse( const base::Callback<void(bool)>& callback, bool allow, const std::string& user_input) argument 204 OnGeolocationPermissionResponse( int bridge_id, bool user_gesture, const base::Callback<void(bool)>& callback, bool allow, const std::string& user_input) argument 268 OnFileSystemPermissionResponse( const base::Callback<void(bool)>& callback, bool allow, const std::string& user_input) argument [all...] |
/external/chromium_org/chrome/browser/services/gcm/ |
H A D | push_messaging_service_impl.cc | 264 bool allow) { 265 if (!allow) { 260 DidRequestPermission( const PushMessagingApplicationId& application_id, const std::string& sender_id, const content::PushMessagingService::RegisterCallback& register_callback, bool allow) argument
|
/external/chromium_org/chrome/browser/supervised_user/ |
H A D | supervised_user_service.cc | 606 // We allow requesting access if Sync is working or has a transient error. 630 bool allow = false; local 631 if (!dict->GetBooleanWithoutPathExpansion(hostname, &allow)) 634 return allow ? MANUAL_ALLOW : MANUAL_BLOCK; 643 bool allow = false; local 644 if (!dict->GetBooleanWithoutPathExpansion(normalized_url.spec(), &allow)) 647 return allow ? MANUAL_ALLOW : MANUAL_BLOCK; 895 bool allow = false; local 896 bool result = it.value().GetAsBoolean(&allow); 898 (*host_map)[it.key()] = allow; 911 bool allow = false; local [all...] |
/external/chromium_org/chrome/browser/ui/webui/ |
H A D | profiler_ui.cc | 84 base::ThreadRestrictions::ScopedAllowIO allow; variable
|
/external/chromium_org/chrome/installer/util/ |
H A D | legacy_firewall_manager_win.cc | 75 bool LegacyFirewallManager::SetAllowIncomingConnection(bool allow) { argument 83 CreateChromeAuthorization(allow); 113 LegacyFirewallManager::CreateChromeAuthorization(bool allow) { argument 129 chrome_application->put_Enabled(allow ? VARIANT_TRUE : VARIANT_FALSE);
|