/aosp14/frameworks/base/tools/aapt/ |
H A D | pseudolocalize.cpp | 364 bool escape = false; in text() local 368 if (!escape && c == ESCAPE_CHAR) { in text() 369 escape = true; in text() 372 space = (!escape && is_space(c)) || (escape && (c == 'n' || c == 't')); in text() 381 if (escape) { in text() 383 escape=false; in text()
|
/aosp14/frameworks/base/tools/aapt2/compile/ |
H A D | Pseudolocalizer.cpp | 456 bool escape = false; in Text() local 460 if (!escape && c == ESCAPE_CHAR) { in Text() 461 escape = true; in Text() 464 space = (!escape && isspace(c)) || (escape && (c == 'n' || c == 't')); in Text() 473 if (escape) { in Text() 475 escape=false; in Text()
|
/aosp14/frameworks/base/core/java/com/android/internal/util/ |
H A D | FastXmlSerializer.java | 160 String escape = escapes[c]; in escapeAndAppendString() local 161 if (escape == null) continue; in escapeAndAppendString() 164 append(escape); in escapeAndAppendString() 178 String escape = escapes[c]; in escapeAndAppendString() local 179 if (escape == null) continue; in escapeAndAppendString() 182 append(escape); in escapeAndAppendString()
|
/aosp14/frameworks/base/tools/preload-check/src/com/android/preload/check/ |
H A D | PreloadCheck.java | 115 sb.append(' ').append(escape(arg)); in run() 121 private static String escape(String input) { in escape() method in PreloadCheck
|
/aosp14/frameworks/base/services/tests/servicestests/src/com/android/server/pm/dex/ |
H A D | PackageDynamicCodeLoadingTests.java | 20 import static com.android.server.pm.dex.PackageDynamicCodeLoading.escape; 427 assertSame(TRIVIAL_STRING, escape(TRIVIAL_STRING)); in testEscape_trivialCase_returnsSameString() 434 assertEquals(expected, escape(input)); in testEscape() 468 assertEquals(original, unescape(escape(original))); in assertRoundTripsWithEscape()
|
/aosp14/frameworks/base/media/java/android/media/tv/ |
H A D | TvContract.java | 2923 boolean escape = false; in decode() 2928 if (!escape) { in decode() 2929 escape = true; in decode() 2934 if (!escape) { in decode() 2945 escape = false; in decode()
|
/aosp14/frameworks/base/core/sysprop/ |
H A D | WatchdogProperties.sysprop | 18 # To escape the watchdog timeout loop, fatal reboot the system when
|
/aosp14/frameworks/base/services/core/java/com/android/server/pm/dex/ |
H A D | PackageDynamicCodeLoading.java | 327 writer.println(escape(path)); in write() 434 static String escape(String path) { in escape() method in PackageDynamicCodeLoading
|
/aosp14/frameworks/base/media/java/android/media/ |
H A D | WebVttRenderer.java | 194 private boolean replaceEscape(String escape, String replacement, int pos) { in replaceEscape() argument 195 if (mLine.startsWith(escape, pos)) { in replaceEscape() 198 mHandledLen = pos + escape.length(); in replaceEscape()
|
/aosp14/system/core/fastboot/ |
H A D | README.md | 110 * Command parameters are indicated by printf-style escape sequences.
|
/aosp14/frameworks/base/media/native/midi/include/ |
H A D | Doxyfile | 1587 # using the <cursor keys>. Press <Enter> to select an item or <escape> to cancel 1590 # to select a filter and <Enter> or <escape> to activate or cancel the filter
|
/aosp14/frameworks/base/boot/ |
H A D | boot-image-profile.txt | 9207 HSPLandroid/icu/impl/number/AffixUtils;->escape(Ljava/lang/CharSequence;)Ljava/lang/String;
|
/aosp14/frameworks/base/config/ |
H A D | boot-image-profile.txt | 9210 HSPLandroid/icu/impl/number/AffixUtils;->escape(Ljava/lang/CharSequence;)Ljava/lang/String;
|