/external/nist-sip/java/gov/nist/javax/sip/header/ |
Allow.java | 32 * Allow SIPHeader. 40 public final class Allow extends 53 public Allow() { 54 super(ALLOW); 60 public Allow(String m) { 61 super(ALLOW); 80 + ", Allow, setMethod(), the method parameter is null.");
|
SIPHeaderNames.java | 48 public static final String ALLOW = AllowHeader.NAME; //5
|
/system/netd/ |
FirewallController.h | 22 enum FirewallRule { ALLOW, DENY }; 29 * defined ALLOW rules.
|
FirewallController.cpp | 73 if (rule == ALLOW) { 92 if (rule == ALLOW) { 118 if (rule == ALLOW) { 137 if (rule == ALLOW) {
|
/external/nist-sip/java/gov/nist/javax/sip/parser/ |
AllowParser.java | 33 * Parser for Allow header. 45 * @param allow the header to parse 47 public AllowParser(String allow) { 48 super(allow); 60 * parse the Allow String header 71 headerName(TokenTypes.ALLOW); 73 Allow allow = new Allow(); local 74 allow.setHeaderName(SIPHeaderNames.ALLOW) [all...] |
TokenTypes.java | 58 public static final int ALLOW = START + 21;
|
/external/chromium_org/chrome/browser/managed_mode/ |
managed_mode_url_filter.cc | 171 : default_behavior_(ALLOW), 185 DCHECK_GE(behavior_value, ALLOW); 217 return ALLOW; 222 return url_it->second ? ALLOW : BLOCK; 228 return host_it->second ? ALLOW : BLOCK; 230 // If the default behavior is to allow, we don't need to check anything else. 231 if (default_behavior_ == ALLOW) 232 return ALLOW; 238 return ALLOW; 244 return ALLOW; [all...] |
managed_user_service_unittest.cc | 198 EXPECT_EQ(ManagedModeURLFilter::ALLOW, 214 EXPECT_EQ(ManagedModeURLFilter::ALLOW, 260 EXPECT_EQ(ManagedModeURLFilter::ALLOW, 291 EXPECT_EQ(ManagedModeURLFilter::ALLOW, 293 EXPECT_EQ(ManagedModeURLFilter::ALLOW, 312 EXPECT_EQ(ManagedModeURLFilter::ALLOW,
|
managed_mode_url_filter.h | 28 // * A default setting (allow, block or warn). 31 // * User-specified manual overrides (allow or block) for either sites 42 ALLOW, 74 // Sets the filtering behavior for pages not on a list (default is ALLOW).
|
managed_mode_url_filter_unittest.cc | 33 ManagedModeURLFilter::ALLOW; 47 // Allow domain and all subdomains, for any filtered scheme. 67 filter_->SetDefaultFilteringBehavior(ManagedModeURLFilter::ALLOW);
|
/packages/apps/Gallery/src/com/android/camera/ |
BitmapManager.java | 40 private static enum State {CANCEL, ALLOW} 42 public State mState = State.ALLOW; 50 } else if (mState == State.ALLOW) { 51 s = "Allow"; 101 // allow decoding by default 110 getOrCreateThreadStatus(t).mState = State.ALLOW;
|
/external/chromium_org/tools/checkdeps/ |
rules.py | 14 ALLOW, DISALLOW and TEMP_ALLOW. 18 # are also used as values for self.allow to indicate which type of 20 ALLOW = '+' 24 def __init__(self, allow, directory, source): 25 self.allow = allow 30 return '"%s%s" from %s.' % (self.allow, self._dir, self._source) 64 if not rule_string[0] in [Rule.ALLOW, Rule.DISALLOW, Rule.TEMP_ALLOW]:
|
/external/mdnsresponder/mDNSShared/ |
dnsextd_lexer.l | 64 allow-update return ALLOWUPDATE; 65 allow-query return ALLOWQUERY; 70 allow return ALLOW;
|
/external/chromium/net/http/ |
http_atom_list.h | 11 HTTP_ATOM(ALLOW)
|
/external/chromium_org/net/http/ |
http_atom_list.h | 11 HTTP_ATOM(ALLOW)
|
/external/chromium_org/content/browser/accessibility/ |
accessibility_tree_formatter.h | 61 ALLOW, 85 // is an allow-empty, allow or deny filter. Example: 87 // GetAllowEmptyString() -> "@MAC-ALLOW-EMPTY:" 88 // GetAllowString() -> "@MAC-ALLOW:" 92 // @MAC-ALLOW-EMPTY:description* 93 // @MAC-ALLOW:roleDescription*
|
dump_accessibility_tree_browsertest.cc | 89 filters->push_back(Filter(ASCIIToUTF16("FOCUSABLE"), Filter::ALLOW)); 90 filters->push_back(Filter(ASCIIToUTF16("READONLY"), Filter::ALLOW)); 114 Filter::ALLOW));
|
/external/guava/guava/src/com/google/common/net/ |
HttpHeaders.java | 116 /** The HTTP Access-Control-Allow-Headers header field name. */ 117 public static final String ACCESS_CONTROL_ALLOW_HEADERS = "Access-Control-Allow-Headers"; 118 /** The HTTP Access-Control-Allow-Methods header field name. */ 119 public static final String ACCESS_CONTROL_ALLOW_METHODS = "Access-Control-Allow-Methods"; 120 /** The HTTP Access-Control-Allow-Origin header field name. */ 121 public static final String ACCESS_CONTROL_ALLOW_ORIGIN = "Access-Control-Allow-Origin"; 122 /** The HTTP Access-Control-Allow-Credentials header field name. */ 123 public static final String ACCESS_CONTROL_ALLOW_CREDENTIALS = "Access-Control-Allow-Credentials"; 130 /** The HTTP Allow header field name. */ 131 public static final String ALLOW = "Allow" [all...] |
/external/chromium_org/chrome/test/functional/ |
prefs_ui.py | 45 behaviors_dict = {1: 'ALLOW', 2: 'BLOCK', 3: 'ASK'} 59 behavior: The exception to allow or block the hostname. 80 page.SetContentTypeOption(ContentTypes.GEOLOCATION, Behaviors.ALLOW) 97 # Allow all sites. 100 self._GetGeolocationContentSettingsBehavior(), Behaviors.ALLOW.upper(), 123 Behaviors.ALLOW) 151 new_behavior = Behaviors.ALLOW 153 self.assertEqual(page.GetExceptions()[pattern], Behaviors.ALLOW,
|
/ndk/sources/host-tools/sed-4.2.1/lib/ |
set-mode-acl.c | 317 entries[0].a_type = ALLOW; 321 entries[1].a_type = ALLOW; 325 entries[2].a_type = ALLOW;
|
/external/checkpolicy/ |
policy_scan.l | 137 ALLOW | 138 allow { return(ALLOW); }
|
/packages/apps/Email/src/com/android/email/ |
AttachmentInfo.java | 53 public static final int ALLOW = 0x00; 111 int denyFlags = ALLOW;
|
/external/chromium/testing/gmock/src/ |
gmock-spec-builders.cc | 249 case ALLOW: 348 reaction == ALLOW ? LogIsVisible(INFO) : 590 // Tells Google Mock to allow uninteresting calls on the given mock 594 SetReactionOnUninterestingCalls(mock_obj, internal::ALLOW);
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_tnc.c | 21 enum { ALLOW, ISOLATE, NO_ACCESS, NO_RECOMMENDATION } recommendation; 178 case ALLOW: 370 data->recommendation = ALLOW;
|
/external/chromium_org/chrome/browser/notifications/ |
notification_browsertest.cc | 59 ALLOW, 417 case ALLOW: { 599 // Tries to create a notification and clicks allow on the infobar. 606 ASSERT_TRUE(PerformActionOnInfoBar(browser(), ALLOW, 0, 0)); 757 // Verify that allow/deny origin preferences are not saved in incognito. 767 PerformActionOnInfoBar(incognito, ALLOW, 0, 0); 842 PerformActionOnInfoBar(browser, ALLOW, 0, 0); 884 PerformActionOnInfoBar(browser(), ALLOW, 0, 0); [all...] |