/frameworks/support/v7/preference/src/android/support/v7/preference/ |
D | PreferenceViewHolder.java | 86 public void setDividerAllowedAbove(boolean allowed) { in setDividerAllowedAbove() argument 87 mDividerAllowedAbove = allowed; in setDividerAllowedAbove() 110 public void setDividerAllowedBelow(boolean allowed) { in setDividerAllowedBelow() argument 111 mDividerAllowedBelow = allowed; in setDividerAllowedBelow()
|
/frameworks/base/core/java/android/os/ |
D | Trace.java | 97 private static native void nativeSetAppTracingAllowed(boolean allowed); in nativeSetAppTracingAllowed() argument 98 private static native void nativeSetTracingEnabled(boolean allowed); in nativeSetTracingEnabled() argument 176 public static void setAppTracingAllowed(boolean allowed) { in setAppTracingAllowed() argument 177 nativeSetAppTracingAllowed(allowed); in setAppTracingAllowed()
|
/frameworks/compile/slang/tests/F_union/ |
D | stderr.txt.expect | 2 union.rs:9:14: error: unions containing RS object types are not allowed 3 union.rs:16:11: error: unions containing RS object types are not allowed
|
/frameworks/native/cmds/servicemanager/ |
D | service_manager.c | 71 bool allowed; in check_mac_perms() local 84 allowed = (result == 0); in check_mac_perms() 87 return allowed; in check_mac_perms() 101 bool allowed; in check_mac_perms_from_lookup() local 118 allowed = check_mac_perms(spid, uid, tctx, perm, name); in check_mac_perms_from_lookup() 120 return allowed; in check_mac_perms_from_lookup()
|
/frameworks/base/core/jni/ |
D | android_os_Trace.cpp | 95 jclass clazz, jboolean allowed) { in android_os_Trace_nativeSetAppTracingAllowed() argument 96 ALOGV("%s: %d", __FUNCTION__, allowed); in android_os_Trace_nativeSetAppTracingAllowed() 98 atrace_set_debuggable(allowed); in android_os_Trace_nativeSetAppTracingAllowed()
|
/frameworks/opt/telephony/tests/telephonytests/src/com/android/internal/telephony/dataconnection/ |
D | DcTrackerTest.java | 415 boolean allowed = isDataAllowed(failureReason); in testDataSetup() 416 assertFalse(failureReason.getDataAllowFailReason(), allowed); in testDataSetup() local 453 allowed = isDataAllowed(failureReason); in testDataSetup() 454 assertTrue(failureReason.getDataAllowFailReason(), allowed); in testDataSetup() local 478 boolean allowed = isDataAllowed(failureReason); in testDataRetry() 479 assertFalse(failureReason.getDataAllowFailReason(), allowed); in testDataRetry() local 517 allowed = isDataAllowed(failureReason); in testDataRetry() 518 assertTrue(failureReason.getDataAllowFailReason(), allowed); in testDataRetry() local 717 boolean allowed = isDataAllowed(failureReason); in testDDSResetAutoAttach() 718 assertFalse(failureReason.getDataAllowFailReason(), allowed); in testDDSResetAutoAttach() local [all …]
|
/frameworks/support/v17/leanback/src/android/support/v17/leanback/widget/ |
D | DetailsOverviewRow.java | 241 public void setImageScaleUpAllowed(boolean allowed) { in setImageScaleUpAllowed() argument 242 if (allowed != mImageScaleUpAllowed) { in setImageScaleUpAllowed() 243 mImageScaleUpAllowed = allowed; in setImageScaleUpAllowed()
|
/frameworks/base/services/core/java/com/android/server/vr/ |
D | VrManagerService.java | 209 ArraySet<String> allowed = mAllowedPackages.get(currentUserId); in update() local 210 if (allowed == null) { in update() 211 allowed = new ArraySet<>(); in update() 227 for (String pkg : allowed) { in update() 236 if (!allowed.contains(pkg)) { in update() 244 allowed.clear(); in update() 245 allowed.addAll(packageNames); in update() 246 mAllowedPackages.put(currentUserId, allowed); in update() 692 String[] allowed = flat.split(":"); in getNotificationListeners() local 693 for (String s : allowed) { in getNotificationListeners()
|
/frameworks/base/packages/SystemUI/src/com/android/systemui/qs/external/ |
D | TileServiceManager.java | 150 public void setBindAllowed(boolean allowed) { in setBindAllowed() argument 151 if (mBindAllowed == allowed) return; in setBindAllowed() 152 mBindAllowed = allowed; in setBindAllowed()
|
/frameworks/compile/slang/tests/F_kernel_static/ |
D | stderr.txt.expect | 1 kernel_static.rs:14:14: error: Non-const static variables are not allowed in kernels: 'i'
|
/frameworks/base/core/java/com/android/server/ |
D | SystemConfig.java | 373 boolean allowed; in readPermissionsFromXml() 375 allowed = true; in readPermissionsFromXml() 378 allowed = !"true".equals(notLowRam); in readPermissionsFromXml() 383 } else if (allowed) { in readPermissionsFromXml()
|
/frameworks/base/core/java/android/view/ |
D | LayoutInflater.java | 613 boolean allowed = mFilter.onLoadClass(clazz); in createView() 614 if (!allowed) { in createView() 631 boolean allowed = clazz != null && mFilter.onLoadClass(clazz); in createView() 632 mFilterMap.put(name, allowed); in createView() 633 if (!allowed) { in createView()
|
/frameworks/base/docs/html/work/ |
D | managed-profiles.jd | 43 administrator can choose which apps are allowed for that profile, and can 53 that profile, and the intent is not allowed to cross to the other profile 76 allowed to cross from one profile to another. Since the administrator makes 78 to know in advance <em>which</em> intents are allowed to cross this boundary. The 90 allowed to cross to a handler on the other profile. (For more information about 185 <li>Configure which intents are allowed to cross from one profile to 204 intent is not allowed to cross between profiles, verify the app's behavior both
|
/frameworks/base/core/java/android/bluetooth/ |
D | IBluetoothHeadset.aidl | 53 void setAudioRouteAllowed(boolean allowed); in setAudioRouteAllowed() argument
|
D | IBluetoothHeadsetClient.aidl | 65 void setAudioRouteAllowed(boolean allowed); in setAudioRouteAllowed() argument
|
D | BluetoothHeadset.java | 738 public void setAudioRouteAllowed(boolean allowed) { in setAudioRouteAllowed() argument 742 mService.setAudioRouteAllowed(allowed); in setAudioRouteAllowed()
|
/frameworks/base/core/java/android/text/util/ |
D | Linkify.java | 459 boolean allowed = true; in addLinks() 462 allowed = matchFilter.acceptMatch(spannable, start, end); in addLinks() 465 if (allowed) { in addLinks()
|
/frameworks/support/compat/java/android/support/v4/text/util/ |
D | LinkifyCompat.java | 322 boolean allowed = true; in addLinks() 325 allowed = matchFilter.acceptMatch(spannable, start, end); in addLinks() 328 if (allowed) { in addLinks()
|
/frameworks/av/drm/drmserver/ |
D | DrmManagerService.cpp | 75 bool allowed = (selinux_check_access(sctx, drmserver_context, selinux_class, in selinuxIsProtectedCallAllowed() local 79 return allowed; in selinuxIsProtectedCallAllowed()
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/ |
D | WifiConnectivityManager.java | 1050 public void setUntrustedConnectionAllowed(boolean allowed) { in setUntrustedConnectionAllowed() argument 1051 Log.i(TAG, "setUntrustedConnectionAllowed: allowed=" + allowed); in setUntrustedConnectionAllowed() 1053 if (mUntrustedConnectionAllowed != allowed) { in setUntrustedConnectionAllowed() 1054 mUntrustedConnectionAllowed = allowed; in setUntrustedConnectionAllowed()
|
/frameworks/native/vulkan/ |
D | README.md | 7 … two spaces. In general, any C++ features supported by the prebuilt platform toolchain are allowed.
|
/frameworks/base/media/java/android/mtp/ |
D | MtpDatabase.java | 288 boolean allowed = false; in inStorageSubDirectory() 290 for (int i = 0; i < mSubDirectories.length && !allowed; i++) { in inStorageSubDirectory() 296 allowed = true; in inStorageSubDirectory() 299 return allowed; in inStorageSubDirectory()
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/dataconnection/ |
D | ApnContext.java | 255 public synchronized void setConcurrentVoiceAndDataAllowed(boolean allowed) { in setConcurrentVoiceAndDataAllowed() argument 256 mConcurrentVoiceAndDataAllowed = allowed; in setConcurrentVoiceAndDataAllowed()
|
/frameworks/base/docs/html/distribute/googleplay/families/ |
D | faq.jd | 271 Are ads allowed? Can you give me more details on the advertising policies for Designed for 276 Yes, ads are allowed as long as the adhere to the <a href= 299 Am I allowed to use house/first party ads and product placements within my app? 303 House ads are allowed, but they must comply with <a
|
/frameworks/av/services/audiopolicy/engineconfigurable/parameter-framework/examples/Settings/ |
D | device_for_strategy_rerouting.pfw | 229 … # Rerouting is similar to media and sonification (exept here: sonification is not allowed on HDMI)
|