/external/nist-sip/java/gov/nist/javax/sip/header/ |
AllowList.java | 36 * List of ALLOW headers. The sip message can have multiple Allow headers 43 public class AllowList extends SIPHeaderList<Allow> { 62 super(Allow.class, AllowHeader.NAME); 68 * Iterator if no methods are defined in this Allow Header. 82 for ( Iterator<Allow> it = this.hlist.iterator(); it.hasNext();) { 83 Allow a = (Allow)it.next(); 108 Allow allow = new Allow() local [all...] |
Allow.java | 32 * Allow SIPHeader. 40 public final class Allow extends 53 public Allow() { 54 super(ALLOW); 60 public Allow(String m) { 61 super(ALLOW); 80 + ", Allow, setMethod(), the method parameter is null.");
|
NameMap.java | 87 putNameMap(Allow.NAME, Allow.class.getName()); // 5
|
/external/nist-sip/java/gov/nist/javax/sip/parser/ |
AllowParser.java | 33 * Parser for Allow header. 45 * @param allow the header to parse 47 public AllowParser(String allow) { 48 super(allow); 60 * parse the Allow String header 71 headerName(TokenTypes.ALLOW); 73 Allow allow = new Allow(); local 74 allow.setHeaderName(SIPHeaderNames.ALLOW) [all...] |
/external/chromium_org/content/browser/ssl/ |
ssl_host_state.cc | 54 cert_policy_for_host_[host].Allow(cert, error);
|
/external/chromium_org/chrome/browser/policy/ |
url_blacklist_manager_unittest.cc | 63 scoped_ptr<base::ListValue> allow(new base::ListValue); 64 URLBlacklistManager::UpdateOnIO(block.Pass(), allow.Pass()); 399 blacklist.Allow(allowed.get()); 426 blacklist.Allow(allowed.get()); 434 blacklist.Allow(allowed.get()); 445 blacklist.Allow(allowed.get()); 457 blacklist.Allow(allowed.get()); 471 blacklist.Allow(allowed.get()); 484 blacklist.Allow(allowed.get()); 500 blacklist.Allow(allowed.get()) [all...] |
/external/chromium_org/ppapi/native_client/tests/nacl_browser/browser_dynamic_library/ |
nacl.scons | 20 # Allow resolving a URL to the toolchain/ directory (instead of staging).
|
/external/chromium_org/net/cert/ |
x509_cert_types.h | 97 // Causes the policy to allow this certificate for a given |error|. 98 void Allow(X509Certificate* cert, CertStatus error);
|
x509_cert_types.cc | 87 void CertPolicy::Allow(X509Certificate* cert, CertStatus error) {
|
x509_certificate_unittest.cc | 564 policy.Allow(google_cert.get(), CERT_STATUS_DATE_INVALID); 578 policy.Allow(google_cert.get(), CERT_STATUS_AUTHORITY_INVALID); 589 policy.Allow(google_cert.get(), 621 policy.Allow(webkit_cert.get(), CERT_STATUS_COMMON_NAME_INVALID); 630 policy.Allow(google_cert.get(), 642 policy.Allow(webkit_cert.get(), CERT_STATUS_COMMON_NAME_INVALID); [all...] |
/external/chromium_org/v8/test/mjsunit/ |
date-parse.js | 84 // Allow missing space between month and day. 87 // Allow year/month/day format. 89 // Allow month/day/year format. 91 // Allow month/day year format. 93 // Allow comma instead of space after day, month and year. 102 // Allow AM/PM after the time. 198 // Allow missing time. 210 // Allow timezone ommision.
|
newline-in-string.js | 38 // Allow CR+LF in multiline string literals. 42 // Allow LF+CR in multiline string literals.
|
/external/nist-sip/java/gov/nist/javax/sip/parser/ims/ |
PAssociatedURIParser.java | 40 import gov.nist.javax.sip.header.Allow;
|
/external/chromium_org/chrome/common/extensions/docs/server2/ |
app_yaml_helper.py | 35 Allow overriding the key to parse e.g. the cron file ('target').
|
/external/chromium_org/components/policy/core/browser/ |
url_blacklist_manager.h | 40 // Contains a set of filters to block and allow certain URLs, and matches GURLs 51 // Allows or blocks URLs matching one of the filters, depending on |allow|. 52 void AddFilters(bool allow, const base::ListValue* filters); 60 // Blocked and Allowed, Allow takes precedence. 61 void Allow(const base::ListValue* filters); 91 // matches that condition set. |allow| indicates if it is a white-list (true) 102 bool allow); 190 // |block| and |allow|. Protected for testing. 192 scoped_ptr<base::ListValue> allow);
|
url_blacklist_manager.cc | 45 scoped_ptr<base::ListValue> allow, 49 blacklist->Allow(allow.get()); 58 bool allow, 71 allow ? URLQueryElementMatcherCondition::MATCH_ALL 104 FilterComponents() : port(0), match_subdomains(true), allow(true) {} 114 bool allow; member in struct:policy::URLBlacklist::FilterComponents 122 void URLBlacklist::AddFilters(bool allow, 131 components.allow = allow; [all...] |
/external/chromium_org/chrome/browser/resources/chromeos/chromevox/chromevox/injected/ui/ |
overlay_widget.js | 61 // Allow the base class to handle all keys first.
|
/external/chromium_org/chrome/browser/resources/chromeos/chromevox/host/testing/ |
msgs.js | 64 // Allow tests to substitute the string 'dummy' if they don't know
|
/external/chromium_org/chrome/common/extensions/docs/examples/extensions/plugin_settings/js/ |
chrome_stubs.js | 7 * regular web pages, to allow tests to run. 43 'allowRule': 'Allow',
|
/external/nist-sip/java/gov/nist/javax/sip/message/ |
ListMap.java | 44 // Entries in this table allow you to look up the list form of a header 97 headerListTable.put(Allow.class, AllowList.class);
|
/external/chromium_org/chrome/browser/resources/hotword_helper/ |
optin_client.js | 25 // Allow hotword opt-in message bubble to be displayed.
|
/external/chromium_org/chrome/browser/resources/safe_browsing/ |
malware_block_v2.js | 93 // Allow jsdisplay elements to be visible now.
|
/external/chromium_org/tools/python/google/httpd_config/ |
httpd2_mac.conf | 50 Order allow,deny 51 Allow from all 59 Order allow,deny 64 Order allow,deny
|
/external/chromium_org/chrome/browser/resources/chromeos/chromevox/chromevox/injected/ |
initial_speech.js | 43 // Allow the web author to disable reading the page title on load
|
/external/chromium_org/chrome/browser/resources/net_export/ |
net_export.js | 92 // Allow making a new log. 96 // If there's an existing log, allow sending it.
|