/external/nist-sip/java/gov/nist/javax/sip/header/ |
Allow.java | 32 * Allow SIPHeader. 40 public final class Allow extends 53 public Allow() { 54 super(ALLOW); 60 public Allow(String m) { 61 super(ALLOW); 80 + ", Allow, setMethod(), the method parameter is null.");
|
/system/netd/ |
FirewallController.h | 22 enum FirewallRule { ALLOW, DENY }; 29 * defined ALLOW rules.
|
FirewallController.cpp | 73 if (rule == ALLOW) { 92 if (rule == ALLOW) { 118 if (rule == ALLOW) { 137 if (rule == ALLOW) {
|
/external/nist-sip/java/gov/nist/javax/sip/parser/ |
AllowParser.java | 33 * Parser for Allow header. 45 * @param allow the header to parse 47 public AllowParser(String allow) { 48 super(allow); 60 * parse the Allow String header 71 headerName(TokenTypes.ALLOW); 73 Allow allow = new Allow(); local 74 allow.setHeaderName(SIPHeaderNames.ALLOW) [all...] |
/packages/apps/Gallery/src/com/android/camera/ |
BitmapManager.java | 40 private static enum State {CANCEL, ALLOW} 42 public State mState = State.ALLOW; 50 } else if (mState == State.ALLOW) { 51 s = "Allow"; 101 // allow decoding by default 110 getOrCreateThreadStatus(t).mState = State.ALLOW;
|
/external/chromium_org/chrome/browser/managed_mode/ |
managed_mode_url_filter.cc | 172 : default_behavior_(ALLOW), 186 DCHECK_GE(behavior_value, ALLOW); 261 return ALLOW; 266 return url_it->second ? ALLOW : BLOCK; 272 return host_it->second ? ALLOW : BLOCK; 280 return host_it->second ? ALLOW : BLOCK; 284 // If the default behavior is to allow, we don't need to check anything else. 285 if (default_behavior_ == ALLOW) 286 return ALLOW; 292 return ALLOW; [all...] |
managed_mode_url_filter.h | 23 // * A default setting (allow, block or warn). 26 // * User-specified manual overrides (allow or block) for either sites 37 ALLOW, 84 // Sets the filtering behavior for pages not on a list (default is ALLOW).
|
managed_user_service_unittest.cc | 289 EXPECT_EQ(ManagedModeURLFilter::ALLOW, 303 EXPECT_EQ(ManagedModeURLFilter::ALLOW, 348 EXPECT_EQ(ManagedModeURLFilter::ALLOW, 377 EXPECT_EQ(ManagedModeURLFilter::ALLOW, 379 EXPECT_EQ(ManagedModeURLFilter::ALLOW, 396 EXPECT_EQ(ManagedModeURLFilter::ALLOW,
|
managed_mode_url_filter_unittest.cc | 33 ManagedModeURLFilter::ALLOW; 43 // Allow domain and all subdomains, for any filtered scheme. 67 filter_->SetDefaultFilteringBehavior(ManagedModeURLFilter::ALLOW); 316 // default (block). When we change the default to allow, the first rule is 331 filter_->SetDefaultFilteringBehavior(ManagedModeURLFilter::ALLOW);
|
supervised_user_pref_store.cc | 92 new FundamentalValue(ManagedModeURLFilter::ALLOW));
|
/external/mdnsresponder/mDNSShared/ |
dnsextd_lexer.l | 64 allow-update return ALLOWUPDATE; 65 allow-query return ALLOWQUERY; 70 allow return ALLOW;
|
/external/chromium/net/http/ |
http_atom_list.h | 11 HTTP_ATOM(ALLOW)
|
/external/chromium_org/net/http/ |
http_atom_list.h | 11 HTTP_ATOM(ALLOW)
|
/external/chromium_org/tools/checkdeps/ |
rules.py | 14 ALLOW, DISALLOW and TEMP_ALLOW. 18 # are also used as values for self.allow to indicate which type of 20 ALLOW = '+' 24 def __init__(self, allow, directory, dependent_directory, source): 25 self.allow = allow 31 return '"%s%s" from %s.' % (self.allow, self._dir, self._source) 34 """Returns a tuple (allow, dependent dir, dependee dir) for this rule, 38 return (self.allow, self._dependent_dir or '.', self._dir or '.') 72 if not rule_string[0] in [Rule.ALLOW, Rule.DISALLOW, Rule.TEMP_ALLOW] [all...] |
graphdeps.py | 151 # Pre-initialize the graph with src->(dst, allow) pairs. 152 for (allow, src, dst) in deps: 153 if allow == Rule.TEMP_ALLOW and self.ignore_temp_rules: 159 deps_graph[src].append((dst, allow)) 179 for (dst, allow) in deps_graph[parent_src]: 182 if ((dst, Rule.ALLOW) not in deps_graph[src]) and \ 185 deps_graph[src].append((dst, allow)) 197 for (dst, allow) in deps_graph[src]: 198 if allow == Rule.DISALLOW and self.hide_disallowed_deps: 201 if allow == Rule.ALLOW and src == dst [all...] |
/external/chromium_org/content/browser/accessibility/ |
accessibility_tree_formatter.h | 61 ALLOW, 85 // is an allow-empty, allow or deny filter. Example: 87 // GetAllowEmptyString() -> "@MAC-ALLOW-EMPTY:" 88 // GetAllowString() -> "@MAC-ALLOW:" 92 // @MAC-ALLOW-EMPTY:description* 93 // @MAC-ALLOW:roleDescription*
|
dump_accessibility_tree_browsertest.cc | 91 filters->push_back(Filter(ASCIIToUTF16("FOCUSABLE"), Filter::ALLOW)); 92 filters->push_back(Filter(ASCIIToUTF16("READONLY"), Filter::ALLOW)); 116 Filter::ALLOW));
|
/external/guava/guava/src/com/google/common/net/ |
HttpHeaders.java | 116 /** The HTTP Access-Control-Allow-Headers header field name. */ 117 public static final String ACCESS_CONTROL_ALLOW_HEADERS = "Access-Control-Allow-Headers"; 118 /** The HTTP Access-Control-Allow-Methods header field name. */ 119 public static final String ACCESS_CONTROL_ALLOW_METHODS = "Access-Control-Allow-Methods"; 120 /** The HTTP Access-Control-Allow-Origin header field name. */ 121 public static final String ACCESS_CONTROL_ALLOW_ORIGIN = "Access-Control-Allow-Origin"; 122 /** The HTTP Access-Control-Allow-Credentials header field name. */ 123 public static final String ACCESS_CONTROL_ALLOW_CREDENTIALS = "Access-Control-Allow-Credentials"; 130 /** The HTTP Allow header field name. */ 131 public static final String ALLOW = "Allow" [all...] |
/external/chromium_org/chrome/test/functional/ |
prefs_ui.py | 45 behaviors_dict = {1: 'ALLOW', 2: 'BLOCK', 3: 'ASK'} 59 behavior: The exception to allow or block the hostname. 80 page.SetContentTypeOption(ContentTypes.GEOLOCATION, Behaviors.ALLOW) 97 # Allow all sites. 100 self._GetGeolocationContentSettingsBehavior(), Behaviors.ALLOW.upper(), 123 Behaviors.ALLOW) 151 new_behavior = Behaviors.ALLOW 153 self.assertEqual(page.GetExceptions()[pattern], Behaviors.ALLOW,
|
/ndk/sources/host-tools/sed-4.2.1/lib/ |
set-mode-acl.c | 317 entries[0].a_type = ALLOW; 321 entries[1].a_type = ALLOW; 325 entries[2].a_type = ALLOW;
|
/external/checkpolicy/ |
policy_scan.l | 137 ALLOW | 138 allow { return(ALLOW); }
|
/packages/apps/Email/src/com/android/email/ |
AttachmentInfo.java | 53 public static final int ALLOW = 0x00; 111 int denyFlags = ALLOW;
|
/external/chromium/testing/gmock/src/ |
gmock-spec-builders.cc | 249 case ALLOW: 348 reaction == ALLOW ? LogIsVisible(INFO) : 590 // Tells Google Mock to allow uninteresting calls on the given mock 594 SetReactionOnUninterestingCalls(mock_obj, internal::ALLOW);
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_tnc.c | 21 enum { ALLOW, ISOLATE, NO_ACCESS, NO_RECOMMENDATION } recommendation; 178 case ALLOW: 370 data->recommendation = ALLOW;
|
/external/chromium_org/chrome/browser/guestview/webview/ |
webview_guest.h | 84 ALLOW, 139 bool allow);
|