Home
last modified time | relevance | path

Searched refs:allowed (Results 1 – 25 of 94) sorted by relevance

1234

/frameworks/support/v7/preference/src/android/support/v7/preference/
DPreferenceViewHolder.java86 public void setDividerAllowedAbove(boolean allowed) { in setDividerAllowedAbove() argument
87 mDividerAllowedAbove = allowed; in setDividerAllowedAbove()
110 public void setDividerAllowedBelow(boolean allowed) { in setDividerAllowedBelow() argument
111 mDividerAllowedBelow = allowed; in setDividerAllowedBelow()
/frameworks/base/core/java/android/os/
DTrace.java97 private static native void nativeSetAppTracingAllowed(boolean allowed); in nativeSetAppTracingAllowed() argument
98 private static native void nativeSetTracingEnabled(boolean allowed); in nativeSetTracingEnabled() argument
176 public static void setAppTracingAllowed(boolean allowed) { in setAppTracingAllowed() argument
177 nativeSetAppTracingAllowed(allowed); in setAppTracingAllowed()
/frameworks/compile/slang/tests/F_union/
Dstderr.txt.expect2 union.rs:9:14: error: unions containing RS object types are not allowed
3 union.rs:16:11: error: unions containing RS object types are not allowed
/frameworks/native/cmds/servicemanager/
Dservice_manager.c71 bool allowed; in check_mac_perms() local
84 allowed = (result == 0); in check_mac_perms()
87 return allowed; in check_mac_perms()
101 bool allowed; in check_mac_perms_from_lookup() local
118 allowed = check_mac_perms(spid, uid, tctx, perm, name); in check_mac_perms_from_lookup()
120 return allowed; in check_mac_perms_from_lookup()
/frameworks/base/core/jni/
Dandroid_os_Trace.cpp95 jclass clazz, jboolean allowed) { in android_os_Trace_nativeSetAppTracingAllowed() argument
96 ALOGV("%s: %d", __FUNCTION__, allowed); in android_os_Trace_nativeSetAppTracingAllowed()
98 atrace_set_debuggable(allowed); in android_os_Trace_nativeSetAppTracingAllowed()
/frameworks/opt/telephony/tests/telephonytests/src/com/android/internal/telephony/dataconnection/
DDcTrackerTest.java415 boolean allowed = isDataAllowed(failureReason); in testDataSetup()
416 assertFalse(failureReason.getDataAllowFailReason(), allowed); in testDataSetup() local
453 allowed = isDataAllowed(failureReason); in testDataSetup()
454 assertTrue(failureReason.getDataAllowFailReason(), allowed); in testDataSetup() local
478 boolean allowed = isDataAllowed(failureReason); in testDataRetry()
479 assertFalse(failureReason.getDataAllowFailReason(), allowed); in testDataRetry() local
517 allowed = isDataAllowed(failureReason); in testDataRetry()
518 assertTrue(failureReason.getDataAllowFailReason(), allowed); in testDataRetry() local
717 boolean allowed = isDataAllowed(failureReason); in testDDSResetAutoAttach()
718 assertFalse(failureReason.getDataAllowFailReason(), allowed); in testDDSResetAutoAttach() local
[all …]
/frameworks/support/v17/leanback/src/android/support/v17/leanback/widget/
DDetailsOverviewRow.java241 public void setImageScaleUpAllowed(boolean allowed) { in setImageScaleUpAllowed() argument
242 if (allowed != mImageScaleUpAllowed) { in setImageScaleUpAllowed()
243 mImageScaleUpAllowed = allowed; in setImageScaleUpAllowed()
/frameworks/base/services/core/java/com/android/server/vr/
DVrManagerService.java209 ArraySet<String> allowed = mAllowedPackages.get(currentUserId); in update() local
210 if (allowed == null) { in update()
211 allowed = new ArraySet<>(); in update()
227 for (String pkg : allowed) { in update()
236 if (!allowed.contains(pkg)) { in update()
244 allowed.clear(); in update()
245 allowed.addAll(packageNames); in update()
246 mAllowedPackages.put(currentUserId, allowed); in update()
692 String[] allowed = flat.split(":"); in getNotificationListeners() local
693 for (String s : allowed) { in getNotificationListeners()
/frameworks/base/packages/SystemUI/src/com/android/systemui/qs/external/
DTileServiceManager.java150 public void setBindAllowed(boolean allowed) { in setBindAllowed() argument
151 if (mBindAllowed == allowed) return; in setBindAllowed()
152 mBindAllowed = allowed; in setBindAllowed()
/frameworks/compile/slang/tests/F_kernel_static/
Dstderr.txt.expect1 kernel_static.rs:14:14: error: Non-const static variables are not allowed in kernels: 'i'
/frameworks/base/core/java/com/android/server/
DSystemConfig.java373 boolean allowed; in readPermissionsFromXml()
375 allowed = true; in readPermissionsFromXml()
378 allowed = !"true".equals(notLowRam); in readPermissionsFromXml()
383 } else if (allowed) { in readPermissionsFromXml()
/frameworks/base/core/java/android/view/
DLayoutInflater.java613 boolean allowed = mFilter.onLoadClass(clazz); in createView()
614 if (!allowed) { in createView()
631 boolean allowed = clazz != null && mFilter.onLoadClass(clazz); in createView()
632 mFilterMap.put(name, allowed); in createView()
633 if (!allowed) { in createView()
/frameworks/base/docs/html/work/
Dmanaged-profiles.jd43 administrator can choose which apps are allowed for that profile, and can
53 that profile, and the intent is not allowed to cross to the other profile
76 allowed to cross from one profile to another. Since the administrator makes
78 to know in advance <em>which</em> intents are allowed to cross this boundary. The
90 allowed to cross to a handler on the other profile. (For more information about
185 <li>Configure which intents are allowed to cross from one profile to
204 intent is not allowed to cross between profiles, verify the app's behavior both
/frameworks/base/core/java/android/bluetooth/
DIBluetoothHeadset.aidl53 void setAudioRouteAllowed(boolean allowed); in setAudioRouteAllowed() argument
DIBluetoothHeadsetClient.aidl65 void setAudioRouteAllowed(boolean allowed); in setAudioRouteAllowed() argument
DBluetoothHeadset.java738 public void setAudioRouteAllowed(boolean allowed) { in setAudioRouteAllowed() argument
742 mService.setAudioRouteAllowed(allowed); in setAudioRouteAllowed()
/frameworks/base/core/java/android/text/util/
DLinkify.java459 boolean allowed = true; in addLinks()
462 allowed = matchFilter.acceptMatch(spannable, start, end); in addLinks()
465 if (allowed) { in addLinks()
/frameworks/support/compat/java/android/support/v4/text/util/
DLinkifyCompat.java322 boolean allowed = true; in addLinks()
325 allowed = matchFilter.acceptMatch(spannable, start, end); in addLinks()
328 if (allowed) { in addLinks()
/frameworks/av/drm/drmserver/
DDrmManagerService.cpp75 bool allowed = (selinux_check_access(sctx, drmserver_context, selinux_class, in selinuxIsProtectedCallAllowed() local
79 return allowed; in selinuxIsProtectedCallAllowed()
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/
DWifiConnectivityManager.java1050 public void setUntrustedConnectionAllowed(boolean allowed) { in setUntrustedConnectionAllowed() argument
1051 Log.i(TAG, "setUntrustedConnectionAllowed: allowed=" + allowed); in setUntrustedConnectionAllowed()
1053 if (mUntrustedConnectionAllowed != allowed) { in setUntrustedConnectionAllowed()
1054 mUntrustedConnectionAllowed = allowed; in setUntrustedConnectionAllowed()
/frameworks/native/vulkan/
DREADME.md7 … two spaces. In general, any C++ features supported by the prebuilt platform toolchain are allowed.
/frameworks/base/media/java/android/mtp/
DMtpDatabase.java288 boolean allowed = false; in inStorageSubDirectory()
290 for (int i = 0; i < mSubDirectories.length && !allowed; i++) { in inStorageSubDirectory()
296 allowed = true; in inStorageSubDirectory()
299 return allowed; in inStorageSubDirectory()
/frameworks/opt/telephony/src/java/com/android/internal/telephony/dataconnection/
DApnContext.java255 public synchronized void setConcurrentVoiceAndDataAllowed(boolean allowed) { in setConcurrentVoiceAndDataAllowed() argument
256 mConcurrentVoiceAndDataAllowed = allowed; in setConcurrentVoiceAndDataAllowed()
/frameworks/base/docs/html/distribute/googleplay/families/
Dfaq.jd271 Are ads allowed? Can you give me more details on the advertising policies for Designed for
276 Yes, ads are allowed as long as the adhere to the <a href=
299 Am I allowed to use house/first party ads and product placements within my app?
303 House ads are allowed, but they must comply with <a
/frameworks/av/services/audiopolicy/engineconfigurable/parameter-framework/examples/Settings/
Ddevice_for_strategy_rerouting.pfw229 … # Rerouting is similar to media and sonification (exept here: sonification is not allowed on HDMI)

1234