/cts/tests/tests/security/native/encryption/ |
D | FileBasedEncryptionPolicyTest.cpp | 85 bool allowed; in isAdiantumEncryptionAllowed() local 95 allowed = true; in isAdiantumEncryptionAllowed() 101 allowed = false; in isAdiantumEncryptionAllowed() 106 return allowed; in isAdiantumEncryptionAllowed() 114 bool allowed = false; in validateEncryptionModes() local 118 allowed = true; in validateEncryptionModes() 125 allowed = allow_legacy_modes; in validateEncryptionModes() 126 if (allowed) { in validateEncryptionModes() 131 if (!allowed) { in validateEncryptionModes() 135 allowed = false; in validateEncryptionModes() [all …]
|
/cts/hostsidetests/seccomp/app/ |
D | gen_blocklist.py | 173 allowed = {} 179 allowed[arch] = create_syscall_name_to_number_map( 184 with open(args.allowed, 'w') as f: 186 json.dump(allowed, f, sort_keys=True, indent=2)
|
/cts/hostsidetests/appsecurity/src/android/appsecurity/cts/ |
D | DeviceIdentifierTest.java | 70 private void setDeviceIdentifierAccessAppOp(String packageName, boolean allowed) in setDeviceIdentifierAccessAppOp() argument 74 + "READ_DEVICE_IDENTIFIERS " + (allowed ? "allow" : "deny"); in setDeviceIdentifierAccessAppOp()
|
/cts/common/device-side/util-axt/src/com/android/compatibility/common/util/ |
D | ShellUtils.java | 124 public static void setOverlayPermissions(@NonNull String packageName, boolean allowed) { in setOverlayPermissions() argument 125 final String action = allowed ? "allow" : "ignore"; in setOverlayPermissions()
|
/cts/tests/app/src/android/app/cts/ |
D | ActivityOptionsTest.java | 90 ActivityOptions options, boolean allowed, int mode) { in checkPendingIntentBackgroundActivityStartModeBeforeAndAfterBundle() argument 91 assertThat(options.isPendingIntentBackgroundActivityLaunchAllowed()).isEqualTo(allowed); in checkPendingIntentBackgroundActivityStartModeBeforeAndAfterBundle()
|
/cts/tests/location/location_gnss/src/android/location/cts/gnss/asn1/supl2/supl_notify_response/ |
D | NotificationResponse.java | 38 allowed(0), enumConstant
|
/cts/tests/inputmethod/mockime/src/com/android/cts/mockime/ |
D | ImeSettings.java | 443 public Builder setHardKeyboardConfigurationBehaviorAllowed(boolean allowed) { in setHardKeyboardConfigurationBehaviorAllowed() argument 444 mBundle.putBoolean(HARD_KEYBOARD_CONFIGURATION_BEHAVIOR_ALLOWED, allowed); in setHardKeyboardConfigurationBehaviorAllowed()
|
/cts/tests/tests/os/assets/minijail/ |
D | isolated-common.policy | 44 … FUTEX_WAKE_OP,FUTEX_WAIT_BITSET,FUTEX_WAKE_BITSET} with only these flags allowed:
|
/cts/tests/framework/base/windowmanager/jetpack/src/android/server/wm/jetpack/area/ |
D | ExtensionRearDisplayPresentationTest.java | 459 final boolean allowed = mActivityManager.isActivityStartAllowedOnDisplay( in testStartActivityOnRearDisplay_whileRearPresentationSessionStarted() 461 assertFalse("Should not be allowed to launch", allowed); in testStartActivityOnRearDisplay_whileRearPresentationSessionStarted()
|
/cts/common/device-side/bedstead/nene/src/main/java/com/android/bedstead/nene/packages/ |
D | Package.java | 1141 public void setAllowTestApiAccess(boolean allowed) { in setAllowTestApiAccess() argument 1143 .addOperand(allowed ? "enable" : "disable") in setAllowTestApiAccess() 1146 .validate(s -> s.startsWith(allowed ? "Enabled change" : "Disabled change")) in setAllowTestApiAccess()
|
/cts/tests/tests/telephony/current/src/android/telephony/satellite/cts/ |
D | SatelliteManagerTestBase.java | 691 public void onSatelliteCommunicationAllowedStateChanged(boolean allowed) { in onSatelliteCommunicationAllowedStateChanged() argument 692 logd("onSatelliteCommunicationAllowedStateChanged: isAllowed=" + allowed); in onSatelliteCommunicationAllowedStateChanged() 693 isAllowed = allowed; in onSatelliteCommunicationAllowedStateChanged()
|
D | SatelliteManagerTestOnMockService.java | 5200 private void verifyIsSatelliteAllowed(boolean allowed) { in verifyIsSatelliteAllowed() argument 5205 assertEquals(allowed, result.first); in verifyIsSatelliteAllowed() 5228 private static void requestMockLocationPermission(boolean allowed) { in requestMockLocationPermission() argument 5232 allowed ? AppOpsManager.MODE_ALLOWED : AppOpsManager.MODE_ERRORED)); in requestMockLocationPermission()
|
/cts/hostsidetests/devicepolicy/app/DeviceAndProfileOwner/src/com/android/cts/deviceandprofileowner/ |
D | SecurityLoggingTest.java | 536 private void assertOneOf(Set<String> allowed, String s) { in assertOneOf() argument 537 assertTrue(String.format("\"%s\" is not one of [%s]", s, String.join(", ", allowed)), in assertOneOf() 538 allowed.contains(s)); in assertOneOf()
|
/cts/tests/tests/notification/src/android/app/notification/current/cts/ |
D | NotificationManagerBubbleTest.java | 212 private void setBubblesChannelAllowed(boolean allowed) throws Exception { in setBubblesChannelAllowed() argument 217 + " " + allowed in setBubblesChannelAllowed()
|
/cts/hostsidetests/devicepolicy/src/com/android/cts/devicepolicy/ |
D | DeviceAndProfileOwnerTest.java | 1162 private void setInstallPackageAppOps(String packageName, boolean allowed, int userId) in setInstallPackageAppOps() argument 1166 + (allowed ? "allow" : "default"); in setInstallPackageAppOps()
|
/cts/hostsidetests/appsecurity/test-apps/tinyapp/ |
D | Android.bp | 140 // ancestors are not allowed to be installed in the same sharedUserId. 257 // ancestors are not allowed to be installed in the same sharedUserId.
|
/cts/tests/tests/renderscript/src/android/renderscript/cts/ |
D | single_source_alloc.rscript | 366 _RS_ASSERT(rsIsObject(rsCreateType(I32_3, 0))); // x = 0 is allowed
|
/cts/tests/tests/telephony/current/src/android/telephony/cts/ |
D | SubscriptionManagerTest.java | 1725 private void setIdentifierAccess(boolean allowed) { in setIdentifierAccess() argument 1730 int mode = allowed ? AppOpsManager.MODE_ALLOWED : AppOpsManager.opToDefaultMode(op); in setIdentifierAccess()
|
D | TelephonyManagerTest.java | 5917 private void setAppOpsPermissionAllowed(boolean allowed, String op) { in setAppOpsPermissionAllowed() argument 5919 int mode = allowed ? AppOpsManager.MODE_ALLOWED : AppOpsManager.opToDefaultMode(op); in setAppOpsPermissionAllowed()
|
/cts/tests/tests/security/jni/ |
D | android_security_cts_cve_2019_2213_Test.c | 1080 u32 allowed; member 1089 n.allowed = ~0u; in grant()
|
/cts/hostsidetests/sustainedperf/dhrystone/ |
D | Rationale | 289 o Other optimizations are allowed, but they should be indicated
|
/cts/tests/mediapc/requirements/ |
D | requirements.txtpb | 928 description: "The encoding is allowed to include b-frames."
|