/frameworks/base/core/java/android/webkit/ |
H A D | MockGeolocation.java | 53 public void setPermission(boolean allow) { argument 55 nativeSetPermission(mWebViewCore, allow); 63 private static native void nativeSetPermission(WebViewCore webViewCore, boolean allow); argument
|
H A D | GeolocationPermissions.java | 54 * @param allow whether or not the origin should be allowed to use the 60 public void invoke(String origin, boolean allow, boolean retain); argument 119 public void allow(String origin) { method in class:GeolocationPermissions
|
H A D | WebSettings.java | 288 public void setAllowFileAccess(boolean allow) { argument 306 public void setAllowContentAccess(boolean allow) { argument
|
H A D | GeolocationPermissionsClassic.java | 215 public void allow(String origin) { method in class:GeolocationPermissionsClassic
|
H A D | WebSettingsClassic.java | 534 public void setAllowFileAccess(boolean allow) { argument 535 mAllowFileAccess = allow; 550 public void setAllowContentAccess(boolean allow) { argument 551 mAllowContentAccess = allow;
|
H A D | WebViewCore.java | 459 // client to allow or deny quota is available. 508 public void invoke(String origin, boolean allow, boolean remember) { 511 data.mAllow = allow; 696 * Inform webcore that the user has decided whether to allow or deny new 708 * @param allow Whether Geolocation permissions are allowed. 713 String origin, boolean allow, boolean remember); 3062 public void setMockGeolocationPermission(boolean allow) { argument 3063 mMockGeolocation.setPermission(allow); 712 nativeGeolocationPermissionsProvide(int nativeClass, String origin, boolean allow, boolean remember) argument
|
H A D | WebViewClassic.java | 582 // Since the text has changed, do not allow the IME to replace the 1669 // far we allow a touch be away from the edge of a link 4954 public void setMockGeolocationPermission(boolean allow) { argument 4955 mWebViewCore.setMockGeolocationPermission(allow); 5178 // There is no ActionMode, so do not allow the user to modify a 5869 // the start of a fling, allow it to add to the current 7884 // Interface to allow the profiled WebView to hook the page swap notifications. 8126 * and allow filtering. 8332 // filtered. Do not allow filtering on multiple lists until
|
/frameworks/base/core/java/android/os/ |
H A D | INetworkManagementService.aidl | 368 void setFirewallInterfaceRule(String iface, boolean allow); 369 void setFirewallEgressSourceRule(String addr, boolean allow); 370 void setFirewallEgressDestRule(String addr, int port, boolean allow); 371 void setFirewallUidRule(int uid, boolean allow);
|
/frameworks/base/tests/DumpRenderTree/src/com/android/dumprendertree/ |
H A D | LayoutTestController.java | 68 public void setGeolocationPermission(boolean allow); argument
|
H A D | CallbackProxy.java | 505 public void setGeolocationPermission(boolean allow) { argument 508 mLayoutTestController.setGeolocationPermission(allow);
|
H A D | TestShellActivity.java | 554 public void setGeolocationPermission(boolean allow) { argument 555 Log.v(LOGTAG, "setGeolocationPermission() allow=" + allow); 556 WebViewClassic.fromWebView(mWebView).setMockGeolocationPermission(allow); 795 // allow it's content to execute and be recorded by the test
|
/frameworks/base/tests/DumpRenderTree2/src/com/android/dumprendertree2/ |
H A D | LayoutTestController.java | 94 public void setGeolocationPermission(boolean allow) { argument 95 mLayoutTestsExecutor.setGeolocationPermission(allow);
|
H A D | LayoutTestsExecutor.java | 240 * We never display the new window, just create the view and allow it's content to 705 public void setGeolocationPermission(boolean allow) { argument 706 Log.i(LOG_TAG, mCurrentTestRelativePath + ": setGeolocationPermission(" + allow + 708 WebViewClassic.fromWebView(mCurrentWebView).setMockGeolocationPermission(allow);
|
/frameworks/base/packages/SystemUI/src/com/android/systemui/usb/ |
H A D | UsbDebuggingActivity.java | 76 // add "always allow" checkbox 122 boolean allow = (which == AlertDialog.BUTTON_POSITIVE); 123 boolean alwaysAllow = allow && mAlwaysAllow.isChecked(); 127 if (allow) {
|
/frameworks/base/core/java/android/app/backup/ |
H A D | IBackupManager.aidl | 192 void acknowledgeFullBackupOrRestore(int token, boolean allow,
|
/frameworks/base/packages/SystemUI/tests/ |
H A D | Android.mk | 27 # UI it doesn't own. This is necessary to allow screenshots to be taken
|
/frameworks/native/libs/utils/ |
H A D | RefBase.cpp | 455 bool allow; local 461 allow = (impl->mFlags&OBJECT_LIFETIME_WEAK) != OBJECT_LIFETIME_WEAK 468 allow = (impl->mFlags&OBJECT_LIFETIME_WEAK) == OBJECT_LIFETIME_WEAK 471 if (!allow) {
|
/frameworks/base/services/java/com/android/server/ |
H A D | NetworkManagementService.java | 99 private static final String ALLOW = "allow"; 1457 public void setFirewallInterfaceRule(String iface, boolean allow) { argument 1460 final String rule = allow ? ALLOW : DENY; 1469 public void setFirewallEgressSourceRule(String addr, boolean allow) { argument 1472 final String rule = allow ? ALLOW : DENY; 1481 public void setFirewallEgressDestRule(String addr, int port, boolean allow) { argument 1484 final String rule = allow ? ALLOW : DENY; 1493 public void setFirewallUidRule(int uid, boolean allow) { argument 1496 final String rule = allow ? ALLOW : DENY;
|
H A D | BackupManagerService.java | 2072 // to false to allow another pass to fire, because we're done with the 4082 // If the target resides on the system partition, we allow it to restore 4859 // !!! TODO: allow backup of ANY app? 4936 // !!! TODO: allow data-clear of ANY app? 5157 public void acknowledgeFullBackupOrRestore(int token, boolean allow, argument 5160 + " allow=" + allow); 5176 if (allow) {
|
/frameworks/base/packages/BackupRestoreConfirmation/src/com/android/backupconfirm/ |
H A D | BackupRestoreConfirmation.java | 244 void sendAcknowledgement(int token, boolean allow, IFullBackupRestoreObserver observer) { argument 252 allow,
|
/frameworks/base/core/java/android/net/ |
H A D | Uri.java | 1814 * allow argument. 1817 * @param allow set of additional characters to allow in the encoded form, 1822 public static String encode(String s, String allow) { argument 1842 && isAllowed(s.charAt(nextToEncode), allow)) { 1875 && !isAllowed(s.charAt(nextAllowed), allow)) { 1905 * @param allow characters to allow 1909 private static boolean isAllowed(char c, String allow) { argument 1914 || (allow ! [all...] |
H A D | UrlQuerySanitizer.java | 46 * unregistered parameter sanitizer does not allow any special characters, 413 * one that doesn't allow any special characters, similar to what 474 * Return a value sanitizer that does not allow any special characters, 475 * and also does not allow script URLs. 501 * encoded URLs. Does not allow script URLs. 511 * Does not allow script URLs. 518 * Return a value sanitizer that does not allow any special characters 519 * except ampersand ('&'). Does not allow script URLs. 526 * Return a value sanitizer that does not allow any special characters 527 * except ampersand ('&') and space (' '). Does not allow scrip [all...] |
/frameworks/base/media/java/android/media/ |
H A D | MediaPlayer.java | 1098 * @param screenOn Supply true to keep the screen on, false to allow it 1224 * shorthands to allow/block all or no metadata. 1228 * @param allow Is the set of metadata the client is interested 1237 public int setMetadataFilter(Set<Integer> allow, Set<Integer> block) { argument 1249 int capacity = request.dataSize() + 4 * (1 + allow.size() + 1 + block.size()); 1255 request.writeInt(allow.size()); 1256 for(Integer t: allow) {
|
/frameworks/base/core/java/android/app/ |
H A D | DownloadManager.java | 639 * @param allowed whether to allow a roaming connection to be used 653 public Request setAllowedOverMetered(boolean allow) { argument 654 mMeteredAllowed = allow;
|
/frameworks/av/media/libmediaplayerservice/ |
H A D | MediaPlayerService.cpp | 778 media::Metadata::Filter allow, drop; local 780 if (unmarshallFilter(filter, &allow, &status) && 784 mMetadataAllow = allow;
|