Searched refs:allow (Results 1 - 25 of 25) sorted by relevance

/frameworks/base/core/java/android/webkit/
H A DMockGeolocation.java53 public void setPermission(boolean allow) { argument
55 nativeSetPermission(mWebViewCore, allow);
63 private static native void nativeSetPermission(WebViewCore webViewCore, boolean allow); argument
H A DGeolocationPermissions.java54 * @param allow whether or not the origin should be allowed to use the
60 public void invoke(String origin, boolean allow, boolean retain); argument
119 public void allow(String origin) { method in class:GeolocationPermissions
H A DWebSettings.java288 public void setAllowFileAccess(boolean allow) { argument
306 public void setAllowContentAccess(boolean allow) { argument
H A DGeolocationPermissionsClassic.java215 public void allow(String origin) { method in class:GeolocationPermissionsClassic
H A DWebSettingsClassic.java534 public void setAllowFileAccess(boolean allow) { argument
535 mAllowFileAccess = allow;
550 public void setAllowContentAccess(boolean allow) { argument
551 mAllowContentAccess = allow;
H A DWebViewCore.java459 // client to allow or deny quota is available.
508 public void invoke(String origin, boolean allow, boolean remember) {
511 data.mAllow = allow;
696 * Inform webcore that the user has decided whether to allow or deny new
708 * @param allow Whether Geolocation permissions are allowed.
713 String origin, boolean allow, boolean remember);
3062 public void setMockGeolocationPermission(boolean allow) { argument
3063 mMockGeolocation.setPermission(allow);
712 nativeGeolocationPermissionsProvide(int nativeClass, String origin, boolean allow, boolean remember) argument
H A DWebViewClassic.java582 // Since the text has changed, do not allow the IME to replace the
1669 // far we allow a touch be away from the edge of a link
4954 public void setMockGeolocationPermission(boolean allow) { argument
4955 mWebViewCore.setMockGeolocationPermission(allow);
5178 // There is no ActionMode, so do not allow the user to modify a
5869 // the start of a fling, allow it to add to the current
7884 // Interface to allow the profiled WebView to hook the page swap notifications.
8126 * and allow filtering.
8332 // filtered. Do not allow filtering on multiple lists until
/frameworks/base/core/java/android/os/
H A DINetworkManagementService.aidl368 void setFirewallInterfaceRule(String iface, boolean allow);
369 void setFirewallEgressSourceRule(String addr, boolean allow);
370 void setFirewallEgressDestRule(String addr, int port, boolean allow);
371 void setFirewallUidRule(int uid, boolean allow);
/frameworks/base/tests/DumpRenderTree/src/com/android/dumprendertree/
H A DLayoutTestController.java68 public void setGeolocationPermission(boolean allow); argument
H A DCallbackProxy.java505 public void setGeolocationPermission(boolean allow) { argument
508 mLayoutTestController.setGeolocationPermission(allow);
H A DTestShellActivity.java554 public void setGeolocationPermission(boolean allow) { argument
555 Log.v(LOGTAG, "setGeolocationPermission() allow=" + allow);
556 WebViewClassic.fromWebView(mWebView).setMockGeolocationPermission(allow);
795 // allow it's content to execute and be recorded by the test
/frameworks/base/tests/DumpRenderTree2/src/com/android/dumprendertree2/
H A DLayoutTestController.java94 public void setGeolocationPermission(boolean allow) { argument
95 mLayoutTestsExecutor.setGeolocationPermission(allow);
H A DLayoutTestsExecutor.java240 * We never display the new window, just create the view and allow it's content to
705 public void setGeolocationPermission(boolean allow) { argument
706 Log.i(LOG_TAG, mCurrentTestRelativePath + ": setGeolocationPermission(" + allow +
708 WebViewClassic.fromWebView(mCurrentWebView).setMockGeolocationPermission(allow);
/frameworks/base/packages/SystemUI/src/com/android/systemui/usb/
H A DUsbDebuggingActivity.java76 // add "always allow" checkbox
122 boolean allow = (which == AlertDialog.BUTTON_POSITIVE);
123 boolean alwaysAllow = allow && mAlwaysAllow.isChecked();
127 if (allow) {
/frameworks/base/core/java/android/app/backup/
H A DIBackupManager.aidl192 void acknowledgeFullBackupOrRestore(int token, boolean allow,
/frameworks/base/packages/SystemUI/tests/
H A DAndroid.mk27 # UI it doesn't own. This is necessary to allow screenshots to be taken
/frameworks/native/libs/utils/
H A DRefBase.cpp455 bool allow; local
461 allow = (impl->mFlags&OBJECT_LIFETIME_WEAK) != OBJECT_LIFETIME_WEAK
468 allow = (impl->mFlags&OBJECT_LIFETIME_WEAK) == OBJECT_LIFETIME_WEAK
471 if (!allow) {
/frameworks/base/services/java/com/android/server/
H A DNetworkManagementService.java99 private static final String ALLOW = "allow";
1457 public void setFirewallInterfaceRule(String iface, boolean allow) { argument
1460 final String rule = allow ? ALLOW : DENY;
1469 public void setFirewallEgressSourceRule(String addr, boolean allow) { argument
1472 final String rule = allow ? ALLOW : DENY;
1481 public void setFirewallEgressDestRule(String addr, int port, boolean allow) { argument
1484 final String rule = allow ? ALLOW : DENY;
1493 public void setFirewallUidRule(int uid, boolean allow) { argument
1496 final String rule = allow ? ALLOW : DENY;
H A DBackupManagerService.java2072 // to false to allow another pass to fire, because we're done with the
4082 // If the target resides on the system partition, we allow it to restore
4859 // !!! TODO: allow backup of ANY app?
4936 // !!! TODO: allow data-clear of ANY app?
5157 public void acknowledgeFullBackupOrRestore(int token, boolean allow, argument
5160 + " allow=" + allow);
5176 if (allow) {
/frameworks/base/packages/BackupRestoreConfirmation/src/com/android/backupconfirm/
H A DBackupRestoreConfirmation.java244 void sendAcknowledgement(int token, boolean allow, IFullBackupRestoreObserver observer) { argument
252 allow,
/frameworks/base/core/java/android/net/
H A DUri.java1814 * allow argument.
1817 * @param allow set of additional characters to allow in the encoded form,
1822 public static String encode(String s, String allow) { argument
1842 && isAllowed(s.charAt(nextToEncode), allow)) {
1875 && !isAllowed(s.charAt(nextAllowed), allow)) {
1905 * @param allow characters to allow
1909 private static boolean isAllowed(char c, String allow) { argument
1914 || (allow !
[all...]
H A DUrlQuerySanitizer.java46 * unregistered parameter sanitizer does not allow any special characters,
413 * one that doesn't allow any special characters, similar to what
474 * Return a value sanitizer that does not allow any special characters,
475 * and also does not allow script URLs.
501 * encoded URLs. Does not allow script URLs.
511 * Does not allow script URLs.
518 * Return a value sanitizer that does not allow any special characters
519 * except ampersand ('&'). Does not allow script URLs.
526 * Return a value sanitizer that does not allow any special characters
527 * except ampersand ('&') and space (' '). Does not allow scrip
[all...]
/frameworks/base/media/java/android/media/
H A DMediaPlayer.java1098 * @param screenOn Supply true to keep the screen on, false to allow it
1224 * shorthands to allow/block all or no metadata.
1228 * @param allow Is the set of metadata the client is interested
1237 public int setMetadataFilter(Set<Integer> allow, Set<Integer> block) { argument
1249 int capacity = request.dataSize() + 4 * (1 + allow.size() + 1 + block.size());
1255 request.writeInt(allow.size());
1256 for(Integer t: allow) {
/frameworks/base/core/java/android/app/
H A DDownloadManager.java639 * @param allowed whether to allow a roaming connection to be used
653 public Request setAllowedOverMetered(boolean allow) { argument
654 mMeteredAllowed = allow;
/frameworks/av/media/libmediaplayerservice/
H A DMediaPlayerService.cpp778 media::Metadata::Filter allow, drop; local
780 if (unmarshallFilter(filter, &allow, &status) &&
784 mMetadataAllow = allow;

Completed in 276 milliseconds