HomeSort by relevance Sort by last modified time
    Searched refs:ALLOW (Results 1 - 25 of 37) sorted by null

1 2

  /external/nist-sip/java/gov/nist/javax/sip/header/
Allow.java 32 * Allow SIPHeader.
40 public final class Allow extends
53 public Allow() {
54 super(ALLOW);
60 public Allow(String m) {
61 super(ALLOW);
80 + ", Allow, setMethod(), the method parameter is null.");
SIPHeaderNames.java 48 public static final String ALLOW = AllowHeader.NAME; //5
  /external/nist-sip/java/gov/nist/javax/sip/parser/
AllowParser.java 33 * Parser for Allow header.
45 * @param allow the header to parse
47 public AllowParser(String allow) {
48 super(allow);
60 * parse the Allow String header
71 headerName(TokenTypes.ALLOW);
73 Allow allow = new Allow(); local
74 allow.setHeaderName(SIPHeaderNames.ALLOW)
    [all...]
TokenTypes.java 58 public static final int ALLOW = START + 21;
Lexer.java 152 addKeyword(AllowHeader.NAME.toUpperCase(), TokenTypes.ALLOW);
  /external/chromium_org/chrome/browser/supervised_user/
supervised_user_url_filter.cc 180 : default_behavior_(ALLOW),
195 DCHECK_GE(behavior_value, ALLOW);
270 return ALLOW;
275 return url_it->second ? ALLOW : BLOCK;
281 return host_it->second ? ALLOW : BLOCK;
289 return host_it->second ? ALLOW : BLOCK;
293 // If there's no blacklist and the default behavior is to allow, we don't need
295 if (!blacklist_ && default_behavior_ == ALLOW)
296 return ALLOW;
302 return ALLOW;
    [all...]
supervised_user_url_filter.h 24 // * A default setting (allow, block or warn).
27 // * User-specified manual overrides (allow or block) for either sites
38 ALLOW,
85 // Sets the filtering behavior for pages not on a list (default is ALLOW).
supervised_user_service_unittest.cc 311 EXPECT_EQ(SupervisedUserURLFilter::ALLOW,
325 EXPECT_EQ(SupervisedUserURLFilter::ALLOW,
372 EXPECT_EQ(SupervisedUserURLFilter::ALLOW,
401 EXPECT_EQ(SupervisedUserURLFilter::ALLOW,
403 EXPECT_EQ(SupervisedUserURLFilter::ALLOW,
420 EXPECT_EQ(SupervisedUserURLFilter::ALLOW,
supervised_user_url_filter_unittest.cc 33 SupervisedUserURLFilter::ALLOW;
43 // Allow domain and all subdomains, for any filtered scheme.
67 filter_->SetDefaultFilteringBehavior(SupervisedUserURLFilter::ALLOW);
326 // default (block). When we change the default to allow, the first rule is
341 filter_->SetDefaultFilteringBehavior(SupervisedUserURLFilter::ALLOW);
supervised_user_pref_store.cc 96 new FundamentalValue(SupervisedUserURLFilter::ALLOW));
  /external/mdnsresponder/mDNSShared/
dnsextd_lexer.l 64 allow-update return ALLOWUPDATE;
65 allow-query return ALLOWQUERY;
70 allow return ALLOW;
dnsextd_parser.y 118 %token ALLOW
472 // Fill in the allow-update keys
506 // Fill in the allow-query keys
  /external/chromium_org/net/http/
http_atom_list.h 11 HTTP_ATOM(ALLOW)
  /external/chromium_org/content/browser/accessibility/
accessibility_tree_formatter.h 61 ALLOW,
85 // is an allow-empty, allow or deny filter. Example:
87 // GetAllowEmptyString() -> "@MAC-ALLOW-EMPTY:"
88 // GetAllowString() -> "@MAC-ALLOW:"
92 // @MAC-ALLOW-EMPTY:description*
93 // @MAC-ALLOW:roleDescription*
dump_accessibility_tree_browsertest.cc 92 filters->push_back(Filter(base::ASCIIToUTF16("FOCUSABLE"), Filter::ALLOW));
93 filters->push_back(Filter(base::ASCIIToUTF16("READONLY"), Filter::ALLOW));
102 // run through filters before being appended to the string. An "allow"
105 // @MAC-ALLOW:AXSubrole=* means that the AXSubrole attribute should be
106 // printed, while @MAC-ALLOW:AXSubrole=AXList* means that any subrole
138 Filter::ALLOW));
accessibility_tree_formatter.cc 146 bool allow = default_result; local
150 allow = true;
151 else if (iter->type == Filter::ALLOW)
152 allow = (!MatchPattern(text, base::UTF8ToUTF16("*=''")));
154 allow = false;
157 return allow;
accessibility_ui.cc 232 AccessibilityTreeFormatter::Filter::ALLOW));
  /external/guava/guava/src/com/google/common/net/
HttpHeaders.java 116 /** The HTTP Access-Control-Allow-Headers header field name. */
117 public static final String ACCESS_CONTROL_ALLOW_HEADERS = "Access-Control-Allow-Headers";
118 /** The HTTP Access-Control-Allow-Methods header field name. */
119 public static final String ACCESS_CONTROL_ALLOW_METHODS = "Access-Control-Allow-Methods";
120 /** The HTTP Access-Control-Allow-Origin header field name. */
121 public static final String ACCESS_CONTROL_ALLOW_ORIGIN = "Access-Control-Allow-Origin";
122 /** The HTTP Access-Control-Allow-Credentials header field name. */
123 public static final String ACCESS_CONTROL_ALLOW_CREDENTIALS = "Access-Control-Allow-Credentials";
130 /** The HTTP Allow header field name. */
131 public static final String ALLOW = "Allow"
    [all...]
  /external/checkpolicy/
policy_scan.l 137 ALLOW |
138 allow { return(ALLOW); }
policy_parse.y 122 %token ALLOW
420 cond_allow_def : ALLOW names names ':' names names ';'
457 allow_def : ALLOW names names ':' names names ';'
488 role_allow_def : ALLOW names names ';'
  /external/chromium_org/extensions/browser/guest_view/web_view/
web_view_permission_helper.h 33 void(bool /* allow */, const std::string& /* user_input */)>
118 enum PermissionResponseAction { DENY, ALLOW, DEFAULT };
140 bool allow,
web_view_permission_helper.cc 49 bool allow) {
50 if (allow) {
51 // Note that |allow| == true means the embedder explicitly allowed the
213 bool allow,
215 if (!allow) {
304 // after creation. This is to allow those same objects to be accessed again
355 bool allow = (action == ALLOW) || local
358 info.callback.Run(allow, user_input);
362 RecordUserInitiatedUMA(info, allow);
    [all...]
  /external/chromium_org/chrome/browser/notifications/
notification_browsertest.cc 56 ALLOW,
306 case ALLOW: {
456 // Tries to create a notification and clicks allow on the infobar.
463 ASSERT_TRUE(PerformActionOnInfoBar(browser(), ALLOW, 0, 0));
611 // Verify that allow/deny origin preferences are not saved in incognito.
621 PerformActionOnInfoBar(incognito, ALLOW, 0, 0);
677 PerformActionOnInfoBar(browser, ALLOW, 0, 0);
718 PerformActionOnInfoBar(browser(), ALLOW, 0, 0);
  /external/chromium_org/extensions/browser/api/web_view/
web_view_internal_api.cc 205 guest->SetAllowTransparency(params->allow);
343 action = WebViewPermissionHelper::ALLOW;
  /external/chromium_org/chrome/browser/resources/google_now/
utility.js 55 * Conditionally allow console.log output based off of the debug mode.
645 /** Allow promise rejection */
646 ALLOW: 1
653 * PromiseRejection.ALLOW, allow promise rejection on errors, otherwise the
679 } else if (opt_allowPromiseRejection === PromiseRejection.ALLOW) {
927 return fillFromChromeLocalStorage(request, PromiseRejection.ALLOW)
    [all...]

Completed in 775 milliseconds

1 2