/frameworks/base/core/java/android/webkit/ |
H A D | GeolocationPermissions.java | 54 * @param allow whether or not the origin should be allowed to use the 60 public void invoke(String origin, boolean allow, boolean retain); argument 120 public void allow(String origin) { method in class:GeolocationPermissions
|
H A D | WebSettings.java | 308 public void setAllowFileAccess(boolean allow) { argument 326 public void setAllowContentAccess(boolean allow) { argument
|
/frameworks/webview/chromium/java/com/android/webview/chromium/ |
H A D | GeolocationPermissionsAdapter.java | 39 public void allow(String origin) { method in class:GeolocationPermissionsAdapter 40 mChromeGeolocationPermissions.allow(origin);
|
H A D | ContentSettingsAdapter.java | 86 public void setAllowFileAccess(boolean allow) { argument 87 mAwSettings.setAllowFileAccess(allow); 96 public void setAllowContentAccess(boolean allow) { argument 97 mAwSettings.setAllowContentAccess(allow);
|
/frameworks/base/core/java/android/os/ |
H A D | INetworkManagementService.aidl | 345 void setFirewallInterfaceRule(String iface, boolean allow); 346 void setFirewallEgressSourceRule(String addr, boolean allow); 347 void setFirewallEgressDestRule(String addr, int port, boolean allow); 348 void setFirewallUidRule(int uid, boolean allow);
|
/frameworks/base/packages/SystemUI/src/com/android/systemui/usb/ |
H A D | UsbDebuggingActivity.java | 75 // add "always allow" checkbox 121 boolean allow = (which == AlertDialog.BUTTON_POSITIVE); 122 boolean alwaysAllow = allow && mAlwaysAllow.isChecked(); 126 if (allow) {
|
/frameworks/base/core/java/android/app/backup/ |
H A D | IBackupManager.aidl | 195 void acknowledgeFullBackupOrRestore(int token, boolean allow,
|
/frameworks/base/packages/SystemUI/tests/ |
H A D | Android.mk | 27 # UI it doesn't own. This is necessary to allow screenshots to be taken
|
/frameworks/base/packages/BackupRestoreConfirmation/src/com/android/backupconfirm/ |
H A D | BackupRestoreConfirmation.java | 244 void sendAcknowledgement(int token, boolean allow, IFullBackupRestoreObserver observer) { argument 252 allow,
|
/frameworks/base/core/java/android/net/ |
H A D | Uri.java | 1814 * allow argument. 1817 * @param allow set of additional characters to allow in the encoded form, 1822 public static String encode(String s, String allow) { argument 1842 && isAllowed(s.charAt(nextToEncode), allow)) { 1875 && !isAllowed(s.charAt(nextAllowed), allow)) { 1905 * @param allow characters to allow 1909 private static boolean isAllowed(char c, String allow) { argument 1914 || (allow ! [all...] |
H A D | UrlQuerySanitizer.java | 47 * unregistered parameter sanitizer does not allow any special characters, 414 * one that doesn't allow any special characters, similar to what 475 * Return a value sanitizer that does not allow any special characters, 476 * and also does not allow script URLs. 502 * encoded URLs. Does not allow script URLs. 512 * Does not allow script URLs. 519 * Return a value sanitizer that does not allow any special characters 520 * except ampersand ('&'). Does not allow script URLs. 527 * Return a value sanitizer that does not allow any special characters 528 * except ampersand ('&') and space (' '). Does not allow scrip [all...] |
/frameworks/base/services/java/com/android/server/ |
H A D | NetworkManagementService.java | 103 private static final String ALLOW = "allow"; 1628 public void setFirewallInterfaceRule(String iface, boolean allow) { argument 1631 final String rule = allow ? ALLOW : DENY; 1640 public void setFirewallEgressSourceRule(String addr, boolean allow) { argument 1643 final String rule = allow ? ALLOW : DENY; 1652 public void setFirewallEgressDestRule(String addr, int port, boolean allow) { argument 1655 final String rule = allow ? ALLOW : DENY; 1664 public void setFirewallUidRule(int uid, boolean allow) { argument 1667 final String rule = allow ? ALLOW : DENY;
|
H A D | LocationManagerService.java | 555 * @param allow If true receiver is currently active, if false it's been removed. 557 public void updateMonitoring(boolean allow) { argument 564 if (allow) { 1828 // also allow providers with a UID matching the 1945 // interval (i.e. don't allow an app to keep registering and unregistering for
|
H A D | BackupManagerService.java | 2181 // to false to allow another pass to fire, because we're done with the 4326 // If the target resides on the system partition, we allow it to restore 5103 // !!! TODO: allow backup of ANY app? 5180 // !!! TODO: allow data-clear of ANY app? 5411 public void acknowledgeFullBackupOrRestore(int token, boolean allow, argument 5414 + " allow=" + allow); 5430 if (allow) {
|
/frameworks/base/media/java/android/media/ |
H A D | MediaPlayer.java | 1137 * @param screenOn Supply true to keep the screen on, false to allow it 1264 * shorthands to allow/block all or no metadata. 1268 * @param allow Is the set of metadata the client is interested 1277 public int setMetadataFilter(Set<Integer> allow, Set<Integer> block) { argument 1289 int capacity = request.dataSize() + 4 * (1 + allow.size() + 1 + block.size()); 1295 request.writeInt(allow.size()); 1296 for(Integer t: allow) {
|
/frameworks/base/core/java/android/app/ |
H A D | DownloadManager.java | 674 * @param allowed whether to allow a roaming connection to be used 688 public Request setAllowedOverMetered(boolean allow) { argument 689 mMeteredAllowed = allow;
|
/frameworks/av/media/libmediaplayerservice/ |
H A D | MediaPlayerService.cpp | 794 media::Metadata::Filter allow, drop; local 796 if (unmarshallFilter(filter, &allow, &status) && 800 mMetadataAllow = allow; 1421 // slightly prematurely to allow time for the gapless track switch
|