Searched refs:allowed (Results 1 - 13 of 13) sorted by relevance
/frameworks/base/core/java/android/webkit/ |
H A D | GeolocationPermissionsClassic.java | 50 private static final String ALLOWED = "allowed"; 81 Boolean allowed = (Boolean) values.get(ALLOWED); 83 callback.onReceiveValue(allowed); 114 boolean allowed = nativeGetAllowed(origin); 117 retValues.put(ALLOWED, Boolean.valueOf(allowed)); 192 boolean allowed = nativeGetAllowed(origin); 193 callback.onReceiveValue(Boolean.valueOf(allowed));
|
/frameworks/base/cmds/servicemanager/ |
H A D | service_manager.c | 29 } allowed[] = { variable in typeref:struct:__anon955 84 for (n = 0; n < sizeof(allowed) / sizeof(allowed[0]); n++) 85 if ((uid == allowed[n].uid) && str16eq(name, allowed[n].name))
|
/frameworks/base/core/java/com/android/internal/os/ |
H A D | ZygoteConnection.java | 469 // Duplicate --rlimit arguments are specifically allowed. 652 boolean allowed = SELinux.checkSELinuxAccess(peerSecurityContext, 656 if (!allowed) { 716 boolean allowed = SELinux.checkSELinuxAccess(peerSecurityContext, 720 if (!allowed) { 747 boolean allowed = SELinux.checkSELinuxAccess(peerSecurityContext, 751 if (!allowed) { 816 boolean allowed = SELinux.checkSELinuxAccess(peerSecurityContext, 820 if (!allowed) { 850 boolean allowed [all...] |
/frameworks/base/packages/SystemUI/tests/ |
H A D | Android.mk | 26 # sign this with platform cert, so this test is allowed to inject key events into
|
/frameworks/base/core/java/android/text/util/ |
H A D | Linkify.java | 144 * what is allowed to match and become a link, and what is not. 370 boolean allowed = true; 373 allowed = matchFilter.acceptMatch(s, start, end); 376 if (allowed) {
|
/frameworks/base/core/java/android/view/ |
H A D | LayoutInflater.java | 94 * Hook to allow clients of the LayoutInflater to restrict the set of Views that are allowed 101 * that are allowed to be inflated. 105 * @return True if this class is allowed to be inflated, or false otherwise 318 * that are allowed to be inflated. 326 * which is not allowed by the {@link Filter}, the {@link #inflate(int, ViewGroup)} call will 330 * @param filter The Filter which restricts the set of Views that are allowed to be inflated. 556 boolean allowed = mFilter.onLoadClass(clazz); 557 if (!allowed) { 569 // New class -- remember whether it is allowed 573 boolean allowed [all...] |
/frameworks/base/media/java/android/mtp/ |
H A D | MtpDatabase.java | 231 boolean allowed = false; 233 for (int i = 0; i < mSubDirectories.length && !allowed; i++) { 239 allowed = true; 242 return allowed;
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/cdma/ |
H A D | CdmaDataConnectionTracker.java | 225 boolean allowed = 238 if (!allowed && DBG) { 249 reason += " - concurrentVoiceAndData not allowed and state= " + mPhone.getState(); 256 log("Data not allowed due to" + reason); 258 return allowed;
|
/frameworks/base/core/java/android/app/ |
H A D | DownloadManager.java | 360 private int mAllowedNetworkTypes = ~0; // default to all network types allowed 624 * By default, all network types are allowed. Consider using 638 * allowed. 639 * @param allowed whether to allow a roaming connection to be used 642 public Request setAllowedOverRoaming(boolean allowed) { argument 643 mRoamingAllowed = allowed; 649 * connection. By default, metered networks are allowed.
|
/frameworks/base/core/java/android/service/wallpaper/ |
H A D | WallpaperService.java | 398 public void setFixedSizeAllowed(boolean allowed) { argument 399 mFixedSizeAllowed = allowed;
|
/frameworks/base/services/java/com/android/server/pm/ |
H A D | PackageManagerService.java | 2117 + " is not allowed to add to permission tree " 2167 "Not allowed to modify non-dynamic permission " 2215 "Not allowed to modify non-dynamic permission " 4803 boolean allowed; 4808 allowed = true; 4811 allowed = false; 4813 allowed = (compareSignatures( 4818 if (!allowed && (bp.protectionLevel 4829 allowed = true; 4831 allowed [all...] |
/frameworks/opt/telephony/src/java/com/android/internal/telephony/gsm/ |
H A D | GsmDataConnectionTracker.java | 626 boolean allowed = 635 if (!allowed && DBG) { 644 reason += " - Concurrent voice and data not allowed"; 652 if (DBG) log("isDataAllowed: not allowed due to" + reason); 654 return allowed;
|
/frameworks/base/services/java/com/android/server/am/ |
H A D | ActivityManagerService.java | 444 * Which uses have been started, so are allowed to run code. 2333 throw new SecurityException("Isolated process not allowed to call " + caller); 2522 // effectively saying that app switches are allowed at this point. 2553 // The caller is not allowed to change the data. 2745 // ask watcher if this is allowed 4595 + " is not allowed to send as package " + packageName; 4688 + " is not allowed to cancel packges " 4962 // track if unprotected read/write is allowed; any denied 5058 * if callingUid is not allowed to do this. Returns the uid of the target 5129 boolean allowed [all...] |
Completed in 449 milliseconds