/frameworks/base/services/core/java/com/android/server/oemlock/ |
D | VendorLock.java | 87 void setOemUnlockAllowedByCarrier(boolean allowed, @Nullable byte[] signature) { in setOemUnlockAllowedByCarrier() argument 90 switch (mOemLock.setOemUnlockAllowedByCarrier(allowed, signatureBytes)) { in setOemUnlockAllowedByCarrier() 92 Slog.i(TAG, "Updated carrier allows OEM lock state to: " + allowed); in setOemUnlockAllowedByCarrier() 120 mOemLock.isOemUnlockAllowedByCarrier((status, allowed) -> { in isOemUnlockAllowedByCarrier() argument 122 allowedByCarrier[0] = allowed; in isOemUnlockAllowedByCarrier() 168 mOemLock.isOemUnlockAllowedByDevice((status, allowed) -> { in isOemUnlockAllowedByDevice() argument 170 allowedByDevice[0] = allowed; in isOemUnlockAllowedByDevice()
|
D | OemLockService.java | 129 public void setOemUnlockAllowedByCarrier(boolean allowed, @Nullable byte[] signature) { 135 mOemLock.setOemUnlockAllowedByCarrier(allowed, signature); 205 boolean allowed = mOemLock.isOemUnlockAllowedByCarrier() 207 setPersistentDataBlockOemUnlockAllowedBit(allowed); 208 return allowed; 232 private void setPersistentDataBlockOemUnlockAllowedBit(boolean allowed) { in setPersistentDataBlockOemUnlockAllowedBit() argument 237 Slog.i(TAG, "Update OEM Unlock bit in pst partition to " + allowed); in setPersistentDataBlockOemUnlockAllowedBit() 238 pdbmi.forceOemUnlockEnabled(allowed); in setPersistentDataBlockOemUnlockAllowedBit()
|
D | PersistentDataBlockLock.java | 49 void setOemUnlockAllowedByCarrier(boolean allowed, @Nullable byte[] signature) { in setOemUnlockAllowedByCarrier() argument 57 UserManager.DISALLOW_OEM_UNLOCK, !allowed, UserHandle.SYSTEM); in setOemUnlockAllowedByCarrier() 59 if (!allowed) { in setOemUnlockAllowedByCarrier()
|
D | OemLock.java | 25 abstract void setOemUnlockAllowedByCarrier(boolean allowed, @Nullable byte[] signature); in setOemUnlockAllowedByCarrier() argument
|
/frameworks/base/core/java/android/service/oemlock/ |
D | OemLockManager.java | 80 public void setOemUnlockAllowedByCarrier(boolean allowed, @Nullable byte[] signature) { in setOemUnlockAllowedByCarrier() argument 82 mService.setOemUnlockAllowedByCarrier(allowed, signature); in setOemUnlockAllowedByCarrier() 114 public void setOemUnlockAllowedByUser(boolean allowed) { in setOemUnlockAllowedByUser() argument 116 mService.setOemUnlockAllowedByUser(allowed); in setOemUnlockAllowedByUser()
|
D | IOemLockService.aidl | 27 void setOemUnlockAllowedByCarrier(boolean allowed, in byte[] signature); in setOemUnlockAllowedByCarrier() argument 30 void setOemUnlockAllowedByUser(boolean allowed); in setOemUnlockAllowedByUser() argument
|
/frameworks/base/services/autofill/java/com/android/server/autofill/ui/ |
D | OverlayControl.java | 49 private void setOverlayAllowed(boolean allowed) { in setOverlayAllowed() argument 51 mAppOpsManager.setUserRestrictionForUser(AppOpsManager.OP_SYSTEM_ALERT_WINDOW, !allowed, in setOverlayAllowed() 53 mAppOpsManager.setUserRestrictionForUser(AppOpsManager.OP_TOAST_WINDOW, !allowed, in setOverlayAllowed()
|
/frameworks/base/services/core/java/com/android/server/accounts/ |
D | AccountManagerServiceShellCommand.java | 66 final String allowed = getNextArgRequired(); in runSetBindInstantServiceAllowed() local 67 if (allowed == null) { in runSetBindInstantServiceAllowed() 72 Boolean.parseBoolean(allowed)); in runSetBindInstantServiceAllowed()
|
/frameworks/base/services/accessibility/java/com/android/server/accessibility/ |
D | AccessibilityShellCommand.java | 66 final String allowed = getNextArgRequired(); in runSetBindInstantServiceAllowed() local 67 if (allowed == null) { in runSetBindInstantServiceAllowed() 72 Boolean.parseBoolean(allowed)); in runSetBindInstantServiceAllowed()
|
/frameworks/base/core/java/android/os/ |
D | Trace.java | 117 private static native void nativeSetAppTracingAllowed(boolean allowed); in nativeSetAppTracingAllowed() argument 118 private static native void nativeSetTracingEnabled(boolean allowed); in nativeSetTracingEnabled() argument 211 public static void setAppTracingAllowed(boolean allowed) { in setAppTracingAllowed() argument 212 nativeSetAppTracingAllowed(allowed); in setAppTracingAllowed()
|
/frameworks/base/services/print/java/com/android/server/print/ |
D | PrintShellCommand.java | 73 final String allowed = getNextArgRequired(); in runSetBindInstantServiceAllowed() local 74 if (allowed == null) { in runSetBindInstantServiceAllowed() 79 mService.setBindInstantServiceAllowed(userId, Boolean.parseBoolean(allowed)); in runSetBindInstantServiceAllowed()
|
/frameworks/compile/slang/tests/F_union/ |
D | stderr.txt.expect | 2 union.rs:9:14: error: unions containing RS object types are not allowed 3 union.rs:16:11: error: unions containing RS object types are not allowed
|
/frameworks/native/cmds/servicemanager/ |
D | service_manager.c | 68 bool allowed; in check_mac_perms() local 85 allowed = (result == 0); in check_mac_perms() 88 return allowed; in check_mac_perms() 98 bool allowed; in check_mac_perms_from_lookup() local 111 allowed = check_mac_perms(spid, sid, uid, tctx, perm, name); in check_mac_perms_from_lookup() 113 return allowed; in check_mac_perms_from_lookup()
|
/frameworks/base/core/proto/android/debug/ |
D | enums.proto | 35 * The user allowed the adb connection from the system. 45 * The adb connection was automatically allowed without user interaction due to the system 46 * being previously allowed by the user with the 'always allow' option selected, and the adb
|
/frameworks/base/services/core/java/com/android/server/pm/permission/ |
D | PermissionManagerService.java | 1615 boolean allowed = false; in isNewPlatformPermissionForPackage() 1622 allowed = true; in isNewPlatformPermissionForPackage() 1628 return allowed; in isNewPlatformPermissionForPackage() 1722 boolean allowed = in grantSignaturePermission() 1732 if (!allowed && (privilegedPermission || oemPermission)) { in grantSignaturePermission() 1749 allowed = true; in grantSignaturePermission() 1763 allowed = true; in grantSignaturePermission() 1778 allowed = true; in grantSignaturePermission() 1789 allowed = true; in grantSignaturePermission() 1799 allowed = (privilegedPermission && pkg.isPrivileged()) in grantSignaturePermission() [all …]
|
/frameworks/base/services/core/java/com/android/server/wm/ |
D | RunningTasks.java | 43 int callingUid, boolean allowed) { in getTasks() argument 58 callingUid, allowed); in getTasks()
|
/frameworks/base/services/core/java/com/android/server/vr/ |
D | VrManagerService.java | 221 boolean allowed = (mSystemSleepFlags == FLAG_ALL || ignoreSleepFlags) && mUserUnlocked in updateVrModeAllowedLocked() 223 if (mVrModeAllowed != allowed) { in updateVrModeAllowedLocked() 224 mVrModeAllowed = allowed; in updateVrModeAllowedLocked() 225 if (DBG) Slog.d(TAG, "VR mode is " + ((allowed) ? "allowed" : "disallowed")); in updateVrModeAllowedLocked() 454 ArraySet<String> allowed = mAllowedPackages.get(currentUserId); in update() local 455 if (allowed == null) { in update() 456 allowed = new ArraySet<>(); in update() 472 for (String pkg : allowed) { in update() 481 if (!allowed.contains(pkg)) { in update() 489 allowed.clear(); in update() [all …]
|
/frameworks/base/core/jni/ |
D | android_os_Trace.cpp | 89 static void android_os_Trace_nativeSetAppTracingAllowed(JNIEnv*, jclass, jboolean allowed) { in android_os_Trace_nativeSetAppTracingAllowed() argument 90 atrace_set_debuggable(allowed); in android_os_Trace_nativeSetAppTracingAllowed()
|
/frameworks/base/packages/SystemUI/src/com/android/systemui/statusbar/ |
D | NotificationLockscreenUserManagerImpl.java | 374 final boolean allowed = allowedByUser && allowedByDpm; in userAllowsPrivateNotificationsInPublic() 375 mUsersAllowingPrivateNotifications.append(userHandle, allowed); in userAllowsPrivateNotificationsInPublic() 376 return allowed; in userAllowsPrivateNotificationsInPublic() 426 final boolean allowed = allowedByUser && allowedByDpm && allowedBySystem; in userAllowsNotificationsInPublic() 427 mUsersAllowingNotifications.append(userHandle, allowed); in userAllowsNotificationsInPublic() 428 return allowed; in userAllowsNotificationsInPublic()
|
/frameworks/base/packages/SystemUI/src/com/android/systemui/qs/external/ |
D | TileServiceManager.java | 167 public void setBindAllowed(boolean allowed) { in setBindAllowed() argument 168 if (mBindAllowed == allowed) return; in setBindAllowed() 169 mBindAllowed = allowed; in setBindAllowed()
|
/frameworks/base/packages/SettingsLib/LayoutPreference/src/com/android/settingslib/widget/ |
D | LayoutPreference.java | 164 public void setAllowDividerBelow(boolean allowed) { in setAllowDividerBelow() argument 165 mAllowDividerBelow = allowed; in setAllowDividerBelow()
|
/frameworks/base/core/java/com/android/server/ |
D | SystemConfig.java | 611 boolean allowed; in readPermissionsFromXml() 613 allowed = true; in readPermissionsFromXml() 616 allowed = !"true".equals(notLowRam); in readPermissionsFromXml() 621 } else if (allowed) { in readPermissionsFromXml() 912 String allowed = parser.getAttributeValue(null, "allowed"); in readPermissionsFromXml() local 913 if (allowed == null) { in readPermissionsFromXml() 920 allowed = allowed.intern(); in readPermissionsFromXml() 926 Slog.i(TAG, "Adding association: " + target + " <- " + allowed); in readPermissionsFromXml() 927 associations.add(allowed); in readPermissionsFromXml()
|
/frameworks/base/services/core/java/com/android/server/clipboard/ |
D | ClipboardService.java | 769 boolean allowed = mWm.isUidFocused(uid) in clipboardAccessAllowed() 771 if (!allowed && mContentCaptureInternal != null) { in clipboardAccessAllowed() 778 allowed = mContentCaptureInternal.isContentCaptureServiceForUser(uid, userId); in clipboardAccessAllowed() 780 if (!allowed && mAutofillInternal != null) { in clipboardAccessAllowed() 787 allowed = mAutofillInternal.isAugmentedAutofillServiceForUser(uid, userId); in clipboardAccessAllowed() 789 if (!allowed) { in clipboardAccessAllowed() 794 return allowed; in clipboardAccessAllowed()
|
/frameworks/opt/gamesdk/third_party/protobuf-3.0.0/src/google/protobuf/ |
D | unittest_proto3_lite.proto | 74 // Groups are not allowed in proto3. 86 // Omitted (compared to unittest.proto) because proto2 enums are not allowed 117 // Groups are not allowed in proto3. 129 // Omitted (compared to unittest.proto) because proto2 enums are not allowed
|
D | unittest_proto3_arena.proto | 74 // Groups are not allowed in proto3. 86 // Omitted (compared to unittest.proto) because proto2 enums are not allowed 117 // Groups are not allowed in proto3. 129 // Omitted (compared to unittest.proto) because proto2 enums are not allowed
|