/external/nist-sip/java/gov/nist/javax/sip/header/ |
Allow.java | 32 * Allow SIPHeader. 40 public final class Allow extends 53 public Allow() { 54 super(ALLOW); 60 public Allow(String m) { 61 super(ALLOW); 80 + ", Allow, setMethod(), the method parameter is null.");
|
SIPHeaderNames.java | 48 public static final String ALLOW = AllowHeader.NAME; //5
|
/system/netd/server/ |
FirewallController.h | 22 enum FirewallRule { ALLOW, DENY }; 29 * defined ALLOW rules.
|
FirewallController.cpp | 78 if (rule == ALLOW) { 97 if (rule == ALLOW) { 123 if (rule == ALLOW) { 142 if (rule == ALLOW) {
|
/external/nist-sip/java/gov/nist/javax/sip/parser/ |
AllowParser.java | 33 * Parser for Allow header. 45 * @param allow the header to parse 47 public AllowParser(String allow) { 48 super(allow); 60 * parse the Allow String header 71 headerName(TokenTypes.ALLOW); 73 Allow allow = new Allow(); local 74 allow.setHeaderName(SIPHeaderNames.ALLOW) [all...] |
TokenTypes.java | 58 public static final int ALLOW = START + 21;
|
/packages/apps/Gallery/src/com/android/camera/ |
BitmapManager.java | 40 private static enum State {CANCEL, ALLOW} 42 public State mState = State.ALLOW; 50 } else if (mState == State.ALLOW) { 51 s = "Allow"; 101 // allow decoding by default 110 getOrCreateThreadStatus(t).mState = State.ALLOW;
|
/external/chromium_org/chrome/browser/supervised_user/ |
supervised_user_url_filter.cc | 180 : default_behavior_(ALLOW), 195 DCHECK_GE(behavior_value, ALLOW); 270 return ALLOW; 275 return url_it->second ? ALLOW : BLOCK; 281 return host_it->second ? ALLOW : BLOCK; 289 return host_it->second ? ALLOW : BLOCK; 293 // If there's no blacklist and the default behavior is to allow, we don't need 295 if (!blacklist_ && default_behavior_ == ALLOW) 296 return ALLOW; 302 return ALLOW; [all...] |
supervised_user_url_filter.h | 24 // * A default setting (allow, block or warn). 27 // * User-specified manual overrides (allow or block) for either sites 38 ALLOW, 85 // Sets the filtering behavior for pages not on a list (default is ALLOW).
|
supervised_user_service_unittest.cc | 311 EXPECT_EQ(SupervisedUserURLFilter::ALLOW, 325 EXPECT_EQ(SupervisedUserURLFilter::ALLOW, 372 EXPECT_EQ(SupervisedUserURLFilter::ALLOW, 401 EXPECT_EQ(SupervisedUserURLFilter::ALLOW, 403 EXPECT_EQ(SupervisedUserURLFilter::ALLOW, 420 EXPECT_EQ(SupervisedUserURLFilter::ALLOW,
|
supervised_user_url_filter_unittest.cc | 33 SupervisedUserURLFilter::ALLOW; 43 // Allow domain and all subdomains, for any filtered scheme. 67 filter_->SetDefaultFilteringBehavior(SupervisedUserURLFilter::ALLOW); 326 // default (block). When we change the default to allow, the first rule is 341 filter_->SetDefaultFilteringBehavior(SupervisedUserURLFilter::ALLOW);
|
supervised_user_pref_store.cc | 96 new FundamentalValue(SupervisedUserURLFilter::ALLOW));
|
/external/mdnsresponder/mDNSShared/ |
dnsextd_lexer.l | 64 allow-update return ALLOWUPDATE; 65 allow-query return ALLOWQUERY; 70 allow return ALLOW;
|
/external/chromium_org/net/http/ |
http_atom_list.h | 11 HTTP_ATOM(ALLOW)
|
/external/chromium_org/content/browser/accessibility/ |
accessibility_tree_formatter.h | 61 ALLOW, 85 // is an allow-empty, allow or deny filter. Example: 87 // GetAllowEmptyString() -> "@MAC-ALLOW-EMPTY:" 88 // GetAllowString() -> "@MAC-ALLOW:" 92 // @MAC-ALLOW-EMPTY:description* 93 // @MAC-ALLOW:roleDescription*
|
dump_accessibility_tree_browsertest.cc | 92 filters->push_back(Filter(base::ASCIIToUTF16("FOCUSABLE"), Filter::ALLOW)); 93 filters->push_back(Filter(base::ASCIIToUTF16("READONLY"), Filter::ALLOW)); 102 // run through filters before being appended to the string. An "allow" 105 // @MAC-ALLOW:AXSubrole=* means that the AXSubrole attribute should be 106 // printed, while @MAC-ALLOW:AXSubrole=AXList* means that any subrole 138 Filter::ALLOW));
|
accessibility_tree_formatter.cc | 146 bool allow = default_result; local 150 allow = true; 151 else if (iter->type == Filter::ALLOW) 152 allow = (!MatchPattern(text, base::UTF8ToUTF16("*=''"))); 154 allow = false; 157 return allow;
|
/external/guava/guava/src/com/google/common/net/ |
HttpHeaders.java | 116 /** The HTTP Access-Control-Allow-Headers header field name. */ 117 public static final String ACCESS_CONTROL_ALLOW_HEADERS = "Access-Control-Allow-Headers"; 118 /** The HTTP Access-Control-Allow-Methods header field name. */ 119 public static final String ACCESS_CONTROL_ALLOW_METHODS = "Access-Control-Allow-Methods"; 120 /** The HTTP Access-Control-Allow-Origin header field name. */ 121 public static final String ACCESS_CONTROL_ALLOW_ORIGIN = "Access-Control-Allow-Origin"; 122 /** The HTTP Access-Control-Allow-Credentials header field name. */ 123 public static final String ACCESS_CONTROL_ALLOW_CREDENTIALS = "Access-Control-Allow-Credentials"; 130 /** The HTTP Allow header field name. */ 131 public static final String ALLOW = "Allow" [all...] |
/ndk/sources/host-tools/sed-4.2.1/lib/ |
set-mode-acl.c | 317 entries[0].a_type = ALLOW; 321 entries[1].a_type = ALLOW; 325 entries[2].a_type = ALLOW;
|
/external/checkpolicy/ |
policy_scan.l | 137 ALLOW | 138 allow { return(ALLOW); }
|
policy_parse.y | 122 %token ALLOW 420 cond_allow_def : ALLOW names names ':' names names ';' 457 allow_def : ALLOW names names ':' names names ';' 488 role_allow_def : ALLOW names names ';'
|
/external/chromium_org/extensions/browser/guest_view/web_view/ |
web_view_permission_helper.h | 33 void(bool /* allow */, const std::string& /* user_input */)> 118 enum PermissionResponseAction { DENY, ALLOW, DEFAULT }; 140 bool allow,
|
/packages/apps/Email/provider_src/com/android/email/ |
AttachmentInfo.java | 60 public static final int ALLOW = 0x00; 118 int denyFlags = ALLOW;
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_tnc.c | 21 enum { ALLOW, ISOLATE, NO_ACCESS, NO_RECOMMENDATION } recommendation; 178 case ALLOW: 370 data->recommendation = ALLOW;
|
/external/chromium_org/chrome/browser/notifications/ |
notification_browsertest.cc | 56 ALLOW, 306 case ALLOW: { 456 // Tries to create a notification and clicks allow on the infobar. 463 ASSERT_TRUE(PerformActionOnInfoBar(browser(), ALLOW, 0, 0)); 611 // Verify that allow/deny origin preferences are not saved in incognito. 621 PerformActionOnInfoBar(incognito, ALLOW, 0, 0); 677 PerformActionOnInfoBar(browser, ALLOW, 0, 0); 718 PerformActionOnInfoBar(browser(), ALLOW, 0, 0);
|