/frameworks/base/core/java/android/webkit/ |
H A D | GeolocationPermissions.java | 56 * @param allow whether or not the origin should be allowed to use the 62 public void invoke(String origin, boolean allow, boolean retain); argument 122 public void allow(String origin) { method in class:GeolocationPermissions
|
H A D | WebSettings.java | 177 * In this mode, the WebView will allow a secure origin to load content from any other origin, 186 * In this mode, the WebView will not allow a secure origin to load content from an insecure 314 public abstract void setAllowFileAccess(boolean allow); argument 328 public abstract void setAllowContentAccess(boolean allow); argument
|
/frameworks/av/media/libstagefright/foundation/ |
H A D | ADebug.cpp | 127 bool allow, const char *name, uint64_t modulo, 130 // default to 2 to allow 0/1 specification 135 return allow && (level != 0); 183 bool enable = allow && (counter % modulo < limit); 126 getExperimentFlag( bool allow, const char *name, uint64_t modulo, uint64_t limit, uint64_t plus, uint64_t timeDivisor) argument
|
/frameworks/base/packages/BackupRestoreConfirmation/src/com/android/backupconfirm/ |
H A D | BackupRestoreConfirmation.java | 255 void sendAcknowledgement(int token, boolean allow, IFullBackupRestoreObserver observer) { argument 262 allow,
|
/frameworks/base/services/core/java/com/android/server/net/ |
H A D | LockdownVpnTracker.java | 306 LinkAddress address, boolean allow) throws RemoteException { 310 mNetService.setFirewallEgressSourceRule(addrString, allow); 305 setFirewallEgressSourceRule( LinkAddress address, boolean allow) argument
|
/frameworks/native/services/surfaceflinger/ |
H A D | MonitoredProducer.cpp | 113 status_t MonitoredProducer::allowAllocation(bool allow) { argument 114 return mProducer->allowAllocation(allow);
|
/frameworks/base/services/backup/java/com/android/server/backup/ |
H A D | Trampoline.java | 252 public void acknowledgeFullBackupOrRestore(int token, boolean allow, String curPassword, argument 257 svc.acknowledgeFullBackupOrRestore(token, allow,
|
H A D | BackupManagerService.java | 2732 // to false to allow another pass to fire, because we're done with the 3851 // Only allow encrypted backups of encrypted devices 7117 // If the target resides on the system partition, we allow it to restore 7188 // If the target resides on the system partition, we allow it to restore 7461 * 4. does the metadata for this package allow us to restore it? 8529 // !!! TODO: allow data-clear of ANY app? 8812 public void acknowledgeFullBackupOrRestore(int token, boolean allow, argument 8815 + " allow=" + allow); 8831 if (allow) { [all...] |
/frameworks/native/libs/gui/ |
H A D | IGraphicBufferProducer.cpp | 278 virtual status_t allowAllocation(bool allow) { argument 281 data.writeInt32(static_cast<int32_t>(allow)); 470 bool allow = static_cast<bool>(data.readInt32()); local 471 status_t result = allowAllocation(allow);
|
H A D | BufferQueueProducer.cpp | 1074 status_t BufferQueueProducer::allowAllocation(bool allow) { argument 1076 BQ_LOGV("allowAllocation: %s", allow ? "true" : "false"); 1079 mCore->mAllowAllocation = allow;
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/ |
H A D | WifiAutoJoinController.java | 73 * Whether to allow connections to untrusted networks. 1210 void setAllowUntrustedConnections(boolean allow) { argument 1211 boolean changed = mAllowUntrustedConnections != allow; 1212 mAllowUntrustedConnections = allow; 1290 // mWifiNative.status() command, which allow us to know that 1548 // If the network is simply temporary disabled, don't allow reconnect until
|
/frameworks/base/core/java/android/net/ |
H A D | Uri.java | 1822 * allow argument. 1825 * @param allow set of additional characters to allow in the encoded form, 1830 public static String encode(String s, String allow) { argument 1850 && isAllowed(s.charAt(nextToEncode), allow)) { 1883 && !isAllowed(s.charAt(nextAllowed), allow)) { 1913 * @param allow characters to allow 1917 private static boolean isAllowed(char c, String allow) { argument 1922 || (allow ! [all...] |
/frameworks/av/media/libmediaplayerservice/ |
H A D | MediaPlayerService.cpp | 875 media::Metadata::Filter allow, drop; local 877 if (unmarshallFilter(filter, &allow, &status) && 881 mMetadataAllow = allow; 1496 // do not allow direct stream type modification if attributes have been set 1516 // slightly prematurely to allow time for the gapless track switch 1815 usleep(5 * 1000 /* usec */); // allow callback to use AudioOutput
|
/frameworks/base/core/java/android/app/ |
H A D | DownloadManager.java | 674 * @param allowed whether to allow a roaming connection to be used 688 public Request setAllowedOverMetered(boolean allow) { argument 689 mMeteredAllowed = allow;
|
H A D | Fragment.java | 466 // Set to true to allow the fragment's menu to be shown. 1295 * sense to re-parse the parameters each time, to allow them to change with 1704 * @return boolean Return false to allow normal menu processing to 1783 * @return boolean Return false to allow normal context menu processing to 2034 * @param allow true to start the enter transition when possible or false to 2038 public void setAllowEnterTransitionOverlap(boolean allow) { argument 2039 mAllowEnterTransitionOverlap = allow; 2060 * @param allow true to start the reenter transition when possible or false to wait until the 2064 public void setAllowReturnTransitionOverlap(boolean allow) { argument 2065 mAllowReturnTransitionOverlap = allow; [all...] |
/frameworks/base/services/core/java/com/android/server/ |
H A D | LocationManagerService.java | 696 * @param allow If true receiver is currently active, if false it's been removed. 698 public void updateMonitoring(boolean allow) { argument 705 if (allow) { 2076 // also allow providers with a UID matching the 2197 // interval (i.e. don't allow an app to keep registering and unregistering for
|
H A D | NetworkManagementService.java | 1987 public void setFirewallInterfaceRule(String iface, boolean allow) { argument 1990 final String rule = allow ? "allow" : "deny"; 1999 public void setFirewallEgressSourceRule(String addr, boolean allow) { argument 2002 final String rule = allow ? "allow" : "deny"; 2011 public void setFirewallEgressDestRule(String addr, int port, boolean allow) { argument 2014 final String rule = allow ? "allow" : "deny"; 2138 ruleName = "allow"; [all...] |
/frameworks/support/v4/java/android/support/v4/app/ |
H A D | Fragment.java | 279 // Set to true to allow the fragment's menu to be shown. 1092 * sense to re-parse the parameters each time, to allow them to change with 1474 * @return boolean Return false to allow normal menu processing to 1554 * @return boolean Return false to allow normal context menu processing to 1776 * @param allow true to start the enter transition when possible or false to 1779 public void setAllowEnterTransitionOverlap(boolean allow) { argument 1780 mAllowEnterTransitionOverlap = allow; 1800 * @param allow true to start the reenter transition when possible or false to wait until the 1803 public void setAllowReturnTransitionOverlap(boolean allow) { argument 1804 mAllowReturnTransitionOverlap = allow; [all...] |
/frameworks/base/core/java/android/view/ |
H A D | Window.java | 340 * @return Return true to allow the menu to open, or false to prevent 757 * PixelFormat.UNKNOWN to allow the Window to select 1767 * @param allow true to start the enter transition when possible or false to 1771 public void setAllowEnterTransitionOverlap(boolean allow) {} argument 1793 * @param allow true to start the transition when possible or false to wait until the 1797 public void setAllowReturnTransitionOverlap(boolean allow) {} argument
|
/frameworks/base/media/java/android/media/ |
H A D | MediaPlayer.java | 979 * "android-allow-cross-domain-redirect" as the key and "0" or "1" as the value 980 * to disallow or allow cross domain redirection. 1286 * @param screenOn Supply true to keep the screen on, false to allow it 1381 * Try to keep audio pitch when changing the playback rate, but allow the 1574 * shorthands to allow/block all or no metadata. 1578 * @param allow Is the set of metadata the client is interested 1587 public int setMetadataFilter(Set<Integer> allow, Set<Integer> block) { argument 1599 int capacity = request.dataSize() + 4 * (1 + allow.size() + 1 + block.size()); 1605 request.writeInt(allow.size()); 1606 for(Integer t: allow) { [all...] |
/frameworks/base/core/java/com/android/internal/policy/ |
H A D | PhoneWindow.java | 3676 // Don't allow an action bar if there is no title. 4564 public void setAllowEnterTransitionOverlap(boolean allow) { argument 4565 mAllowEnterTransitionOverlap = allow;
|