Searched refs:allowed (Results 1 - 13 of 13) sorted by relevance

/frameworks/base/core/java/android/webkit/
H A DGeolocationPermissionsClassic.java50 private static final String ALLOWED = "allowed";
81 Boolean allowed = (Boolean) values.get(ALLOWED);
83 callback.onReceiveValue(allowed);
114 boolean allowed = nativeGetAllowed(origin);
117 retValues.put(ALLOWED, Boolean.valueOf(allowed));
192 boolean allowed = nativeGetAllowed(origin);
193 callback.onReceiveValue(Boolean.valueOf(allowed));
/frameworks/base/cmds/servicemanager/
H A Dservice_manager.c29 } allowed[] = { variable in typeref:struct:__anon955
84 for (n = 0; n < sizeof(allowed) / sizeof(allowed[0]); n++)
85 if ((uid == allowed[n].uid) && str16eq(name, allowed[n].name))
/frameworks/base/core/java/com/android/internal/os/
H A DZygoteConnection.java469 // Duplicate --rlimit arguments are specifically allowed.
652 boolean allowed = SELinux.checkSELinuxAccess(peerSecurityContext,
656 if (!allowed) {
716 boolean allowed = SELinux.checkSELinuxAccess(peerSecurityContext,
720 if (!allowed) {
747 boolean allowed = SELinux.checkSELinuxAccess(peerSecurityContext,
751 if (!allowed) {
816 boolean allowed = SELinux.checkSELinuxAccess(peerSecurityContext,
820 if (!allowed) {
850 boolean allowed
[all...]
/frameworks/base/packages/SystemUI/tests/
H A DAndroid.mk26 # sign this with platform cert, so this test is allowed to inject key events into
/frameworks/base/core/java/android/text/util/
H A DLinkify.java144 * what is allowed to match and become a link, and what is not.
370 boolean allowed = true;
373 allowed = matchFilter.acceptMatch(s, start, end);
376 if (allowed) {
/frameworks/base/core/java/android/view/
H A DLayoutInflater.java94 * Hook to allow clients of the LayoutInflater to restrict the set of Views that are allowed
101 * that are allowed to be inflated.
105 * @return True if this class is allowed to be inflated, or false otherwise
318 * that are allowed to be inflated.
326 * which is not allowed by the {@link Filter}, the {@link #inflate(int, ViewGroup)} call will
330 * @param filter The Filter which restricts the set of Views that are allowed to be inflated.
556 boolean allowed = mFilter.onLoadClass(clazz);
557 if (!allowed) {
569 // New class -- remember whether it is allowed
573 boolean allowed
[all...]
/frameworks/base/media/java/android/mtp/
H A DMtpDatabase.java231 boolean allowed = false;
233 for (int i = 0; i < mSubDirectories.length && !allowed; i++) {
239 allowed = true;
242 return allowed;
/frameworks/opt/telephony/src/java/com/android/internal/telephony/cdma/
H A DCdmaDataConnectionTracker.java225 boolean allowed =
238 if (!allowed && DBG) {
249 reason += " - concurrentVoiceAndData not allowed and state= " + mPhone.getState();
256 log("Data not allowed due to" + reason);
258 return allowed;
/frameworks/base/core/java/android/app/
H A DDownloadManager.java360 private int mAllowedNetworkTypes = ~0; // default to all network types allowed
624 * By default, all network types are allowed. Consider using
638 * allowed.
639 * @param allowed whether to allow a roaming connection to be used
642 public Request setAllowedOverRoaming(boolean allowed) { argument
643 mRoamingAllowed = allowed;
649 * connection. By default, metered networks are allowed.
/frameworks/base/core/java/android/service/wallpaper/
H A DWallpaperService.java398 public void setFixedSizeAllowed(boolean allowed) { argument
399 mFixedSizeAllowed = allowed;
/frameworks/base/services/java/com/android/server/pm/
H A DPackageManagerService.java2117 + " is not allowed to add to permission tree "
2167 "Not allowed to modify non-dynamic permission "
2215 "Not allowed to modify non-dynamic permission "
4803 boolean allowed;
4808 allowed = true;
4811 allowed = false;
4813 allowed = (compareSignatures(
4818 if (!allowed && (bp.protectionLevel
4829 allowed = true;
4831 allowed
[all...]
/frameworks/opt/telephony/src/java/com/android/internal/telephony/gsm/
H A DGsmDataConnectionTracker.java626 boolean allowed =
635 if (!allowed && DBG) {
644 reason += " - Concurrent voice and data not allowed";
652 if (DBG) log("isDataAllowed: not allowed due to" + reason);
654 return allowed;
/frameworks/base/services/java/com/android/server/am/
H A DActivityManagerService.java444 * Which uses have been started, so are allowed to run code.
2333 throw new SecurityException("Isolated process not allowed to call " + caller);
2522 // effectively saying that app switches are allowed at this point.
2553 // The caller is not allowed to change the data.
2745 // ask watcher if this is allowed
4595 + " is not allowed to send as package " + packageName;
4688 + " is not allowed to cancel packges "
4962 // track if unprotected read/write is allowed; any denied
5058 * if callingUid is not allowed to do this. Returns the uid of the target
5129 boolean allowed
[all...]

Completed in 449 milliseconds