/frameworks/base/core/java/android/webkit/ |
H A D | GeolocationPermissions.java | 56 * @param allow whether or not the origin should be allowed to use the 62 public void invoke(String origin, boolean allow, boolean retain); argument 122 public void allow(String origin) { method in class:GeolocationPermissions
|
H A D | WebSettings.java | 177 * In this mode, the WebView will allow a secure origin to load content from any other origin, 186 * In this mode, the WebView will not allow a secure origin to load content from an insecure 314 public abstract void setAllowFileAccess(boolean allow); argument 328 public abstract void setAllowContentAccess(boolean allow); argument
|
/frameworks/webview/chromium/java/com/android/webview/chromium/ |
H A D | GeolocationPermissionsAdapter.java | 39 public void allow(String origin) { method in class:GeolocationPermissionsAdapter 40 mChromeGeolocationPermissions.allow(origin);
|
H A D | ContentSettingsAdapter.java | 90 public void setAllowFileAccess(boolean allow) { argument 91 if (TRACE) Log.d(LOGTAG, "setAllowFileAccess=" + allow); 92 mAwSettings.setAllowFileAccess(allow); 101 public void setAllowContentAccess(boolean allow) { argument 102 if (TRACE) Log.d(LOGTAG, "setAllowContentAccess=" + allow); 103 mAwSettings.setAllowContentAccess(allow);
|
/frameworks/base/core/java/android/os/ |
H A D | INetworkManagementService.aidl | 328 void setFirewallInterfaceRule(String iface, boolean allow); 329 void setFirewallEgressSourceRule(String addr, boolean allow); 330 void setFirewallEgressDestRule(String addr, int port, boolean allow); 331 void setFirewallUidRule(int uid, boolean allow);
|
/frameworks/base/packages/SystemUI/src/com/android/systemui/usb/ |
H A D | UsbDebuggingActivity.java | 74 // add "always allow" checkbox 120 boolean allow = (which == AlertDialog.BUTTON_POSITIVE); 121 boolean alwaysAllow = allow && mAlwaysAllow.isChecked(); 125 if (allow) {
|
/frameworks/base/core/java/android/app/backup/ |
H A D | IBackupManager.aidl | 203 void acknowledgeFullBackupOrRestore(int token, boolean allow,
|
/frameworks/base/packages/SystemUI/tests/ |
H A D | Android.mk | 36 # UI it doesn't own. This is necessary to allow screenshots to be taken
|
/frameworks/base/core/java/android/view/ |
H A D | Window.java | 337 * @return Return true to allow the menu to open, or false to prevent 715 * PixelFormat.UNKNOWN to allow the Window to select 1724 * @param allow true to start the enter transition when possible or false to 1728 public void setAllowEnterTransitionOverlap(boolean allow) {} argument 1750 * @param allow true to start the transition when possible or false to wait until the 1754 public void setAllowReturnTransitionOverlap(boolean allow) {} argument 1760 public void setAllowExitTransitionOverlap(boolean allow) { argument 1761 setAllowReturnTransitionOverlap(allow);
|
/frameworks/base/packages/BackupRestoreConfirmation/src/com/android/backupconfirm/ |
H A D | BackupRestoreConfirmation.java | 255 void sendAcknowledgement(int token, boolean allow, IFullBackupRestoreObserver observer) { argument 262 allow,
|
/frameworks/base/services/backup/java/com/android/server/backup/ |
H A D | Trampoline.java | 252 public void acknowledgeFullBackupOrRestore(int token, boolean allow, String curPassword, argument 257 svc.acknowledgeFullBackupOrRestore(token, allow,
|
/frameworks/base/services/core/java/com/android/server/net/ |
H A D | LockdownVpnTracker.java | 302 LinkAddress address, boolean allow) throws RemoteException { 306 mNetService.setFirewallEgressSourceRule(addrString, allow); 301 setFirewallEgressSourceRule( LinkAddress address, boolean allow) argument
|
/frameworks/base/core/java/android/net/ |
H A D | Uri.java | 1817 * allow argument. 1820 * @param allow set of additional characters to allow in the encoded form, 1825 public static String encode(String s, String allow) { argument 1845 && isAllowed(s.charAt(nextToEncode), allow)) { 1878 && !isAllowed(s.charAt(nextAllowed), allow)) { 1908 * @param allow characters to allow 1912 private static boolean isAllowed(char c, String allow) { argument 1917 || (allow ! [all...] |
H A D | UrlQuerySanitizer.java | 47 * unregistered parameter sanitizer does not allow any special characters, 414 * one that doesn't allow any special characters, similar to what 475 * Return a value sanitizer that does not allow any special characters, 476 * and also does not allow script URLs. 502 * encoded URLs. Does not allow script URLs. 512 * Does not allow script URLs. 519 * Return a value sanitizer that does not allow any special characters 520 * except ampersand ('&'). Does not allow script URLs. 527 * Return a value sanitizer that does not allow any special characters 528 * except ampersand ('&') and space (' '). Does not allow scrip [all...] |
/frameworks/base/services/core/java/com/android/server/ |
H A D | NetworkManagementService.java | 1806 public void setFirewallInterfaceRule(String iface, boolean allow) { argument 1809 final String rule = allow ? "allow" : "deny"; 1818 public void setFirewallEgressSourceRule(String addr, boolean allow) { argument 1821 final String rule = allow ? "allow" : "deny"; 1830 public void setFirewallEgressDestRule(String addr, int port, boolean allow) { argument 1833 final String rule = allow ? "allow" : "deny"; 1842 public void setFirewallUidRule(int uid, boolean allow) { argument [all...] |
H A D | LocationManagerService.java | 667 * @param allow If true receiver is currently active, if false it's been removed. 669 public void updateMonitoring(boolean allow) { argument 676 if (allow) { 2006 // also allow providers with a UID matching the 2127 // interval (i.e. don't allow an app to keep registering and unregistering for
|
/frameworks/opt/photoviewer/ |
H A D | Android.mk | 19 # This is to allow the library to be loaded dynamically in a context where
|
/frameworks/base/core/java/android/app/ |
H A D | Fragment.java | 464 // Set to true to allow the fragment's menu to be shown. 1156 * sense to re-parse the parameters each time, to allow them to change with 1538 * @return boolean Return false to allow normal menu processing to 1617 * @return boolean Return false to allow normal context menu processing to 1868 * @param allow true to start the enter transition when possible or false to 1872 public void setAllowEnterTransitionOverlap(boolean allow) { argument 1873 mAllowEnterTransitionOverlap = allow; 1894 * @param allow true to start the reenter transition when possible or false to wait until the 1898 public void setAllowReturnTransitionOverlap(boolean allow) { argument 1899 mAllowReturnTransitionOverlap = allow; [all...] |
H A D | DownloadManager.java | 674 * @param allowed whether to allow a roaming connection to be used 688 public Request setAllowedOverMetered(boolean allow) { argument 689 mMeteredAllowed = allow;
|
/frameworks/support/v4/java/android/support/v4/app/ |
H A D | Fragment.java | 278 // Set to true to allow the fragment's menu to be shown. 949 * sense to re-parse the parameters each time, to allow them to change with 1300 * @return boolean Return false to allow normal menu processing to 1379 * @return boolean Return false to allow normal context menu processing to 1601 * @param allow true to start the enter transition when possible or false to 1604 public void setAllowEnterTransitionOverlap(boolean allow) { argument 1605 mAllowEnterTransitionOverlap = allow; 1625 * @param allow true to start the reenter transition when possible or false to wait until the 1628 public void setAllowReturnTransitionOverlap(boolean allow) { argument 1629 mAllowReturnTransitionOverlap = allow; [all...] |
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/ |
H A D | WifiAutoJoinController.java | 67 /** Whether to allow connections to untrusted networks. */ 1181 void setAllowUntrustedConnections(boolean allow) { argument 1182 boolean changed = mAllowUntrustedConnections != allow; 1183 mAllowUntrustedConnections = allow; 1319 // mWifiNative.status() command, which allow us to know that 1469 // If the network is simply temporary disabled, don't allow reconnect until
|
/frameworks/base/media/java/android/media/ |
H A D | MediaPlayer.java | 968 * "android-allow-cross-domain-redirect" as the key and "0" or "1" as the value 969 * to disallow or allow cross domain redirection. 1260 * @param screenOn Supply true to keep the screen on, false to allow it 1387 * shorthands to allow/block all or no metadata. 1391 * @param allow Is the set of metadata the client is interested 1400 public int setMetadataFilter(Set<Integer> allow, Set<Integer> block) { argument 1412 int capacity = request.dataSize() + 4 * (1 + allow.size() + 1 + block.size()); 1418 request.writeInt(allow.size()); 1419 for(Integer t: allow) {
|
/frameworks/av/media/libmediaplayerservice/ |
H A D | MediaPlayerService.cpp | 875 media::Metadata::Filter allow, drop; local 877 if (unmarshallFilter(filter, &allow, &status) && 881 mMetadataAllow = allow; 1544 // slightly prematurely to allow time for the gapless track switch
|
/frameworks/base/docs/html/training/ |
H A D | training_toc.cs | 1415 "How to write apps that allow users to interact with the touch screen via touch gestures."
|
/frameworks/base/policy/src/com/android/internal/policy/impl/ |
H A D | PhoneWindow.java | 3362 // Don't allow an action bar if there is no title. 4253 public void setAllowEnterTransitionOverlap(boolean allow) { argument 4254 mAllowEnterTransitionOverlap = allow;
|