Home
last modified time | relevance | path

Searched refs:allowed (Results 1 – 22 of 22) sorted by relevance

/cts/tests/tests/security/native/encryption/
DFileBasedEncryptionPolicyTest.cpp85 bool allowed; in isAdiantumEncryptionAllowed() local
95 allowed = true; in isAdiantumEncryptionAllowed()
101 allowed = false; in isAdiantumEncryptionAllowed()
106 return allowed; in isAdiantumEncryptionAllowed()
114 bool allowed = false; in validateEncryptionModes() local
118 allowed = true; in validateEncryptionModes()
125 allowed = allow_legacy_modes; in validateEncryptionModes()
126 if (allowed) { in validateEncryptionModes()
131 if (!allowed) { in validateEncryptionModes()
135 allowed = false; in validateEncryptionModes()
[all …]
/cts/hostsidetests/seccomp/app/
Dgen_blocklist.py173 allowed = {}
179 allowed[arch] = create_syscall_name_to_number_map(
184 with open(args.allowed, 'w') as f:
186 json.dump(allowed, f, sort_keys=True, indent=2)
/cts/hostsidetests/appsecurity/src/android/appsecurity/cts/
DDeviceIdentifierTest.java70 private void setDeviceIdentifierAccessAppOp(String packageName, boolean allowed) in setDeviceIdentifierAccessAppOp() argument
74 + "READ_DEVICE_IDENTIFIERS " + (allowed ? "allow" : "deny"); in setDeviceIdentifierAccessAppOp()
/cts/common/device-side/util-axt/src/com/android/compatibility/common/util/
DShellUtils.java124 public static void setOverlayPermissions(@NonNull String packageName, boolean allowed) { in setOverlayPermissions() argument
125 final String action = allowed ? "allow" : "ignore"; in setOverlayPermissions()
/cts/tests/app/src/android/app/cts/
DActivityOptionsTest.java90 ActivityOptions options, boolean allowed, int mode) { in checkPendingIntentBackgroundActivityStartModeBeforeAndAfterBundle() argument
91 assertThat(options.isPendingIntentBackgroundActivityLaunchAllowed()).isEqualTo(allowed); in checkPendingIntentBackgroundActivityStartModeBeforeAndAfterBundle()
/cts/tests/location/location_gnss/src/android/location/cts/gnss/asn1/supl2/supl_notify_response/
DNotificationResponse.java38 allowed(0), enumConstant
/cts/tests/inputmethod/mockime/src/com/android/cts/mockime/
DImeSettings.java443 public Builder setHardKeyboardConfigurationBehaviorAllowed(boolean allowed) { in setHardKeyboardConfigurationBehaviorAllowed() argument
444 mBundle.putBoolean(HARD_KEYBOARD_CONFIGURATION_BEHAVIOR_ALLOWED, allowed); in setHardKeyboardConfigurationBehaviorAllowed()
/cts/tests/tests/os/assets/minijail/
Disolated-common.policy44 … FUTEX_WAKE_OP,FUTEX_WAIT_BITSET,FUTEX_WAKE_BITSET} with only these flags allowed:
/cts/tests/framework/base/windowmanager/jetpack/src/android/server/wm/jetpack/area/
DExtensionRearDisplayPresentationTest.java459 final boolean allowed = mActivityManager.isActivityStartAllowedOnDisplay( in testStartActivityOnRearDisplay_whileRearPresentationSessionStarted()
461 assertFalse("Should not be allowed to launch", allowed); in testStartActivityOnRearDisplay_whileRearPresentationSessionStarted()
/cts/common/device-side/bedstead/nene/src/main/java/com/android/bedstead/nene/packages/
DPackage.java1141 public void setAllowTestApiAccess(boolean allowed) { in setAllowTestApiAccess() argument
1143 .addOperand(allowed ? "enable" : "disable") in setAllowTestApiAccess()
1146 .validate(s -> s.startsWith(allowed ? "Enabled change" : "Disabled change")) in setAllowTestApiAccess()
/cts/tests/tests/telephony/current/src/android/telephony/satellite/cts/
DSatelliteManagerTestBase.java691 public void onSatelliteCommunicationAllowedStateChanged(boolean allowed) { in onSatelliteCommunicationAllowedStateChanged() argument
692 logd("onSatelliteCommunicationAllowedStateChanged: isAllowed=" + allowed); in onSatelliteCommunicationAllowedStateChanged()
693 isAllowed = allowed; in onSatelliteCommunicationAllowedStateChanged()
DSatelliteManagerTestOnMockService.java5200 private void verifyIsSatelliteAllowed(boolean allowed) { in verifyIsSatelliteAllowed() argument
5205 assertEquals(allowed, result.first); in verifyIsSatelliteAllowed()
5228 private static void requestMockLocationPermission(boolean allowed) { in requestMockLocationPermission() argument
5232 allowed ? AppOpsManager.MODE_ALLOWED : AppOpsManager.MODE_ERRORED)); in requestMockLocationPermission()
/cts/hostsidetests/devicepolicy/app/DeviceAndProfileOwner/src/com/android/cts/deviceandprofileowner/
DSecurityLoggingTest.java536 private void assertOneOf(Set<String> allowed, String s) { in assertOneOf() argument
537 assertTrue(String.format("\"%s\" is not one of [%s]", s, String.join(", ", allowed)), in assertOneOf()
538 allowed.contains(s)); in assertOneOf()
/cts/tests/tests/notification/src/android/app/notification/current/cts/
DNotificationManagerBubbleTest.java212 private void setBubblesChannelAllowed(boolean allowed) throws Exception { in setBubblesChannelAllowed() argument
217 + " " + allowed in setBubblesChannelAllowed()
/cts/hostsidetests/devicepolicy/src/com/android/cts/devicepolicy/
DDeviceAndProfileOwnerTest.java1162 private void setInstallPackageAppOps(String packageName, boolean allowed, int userId) in setInstallPackageAppOps() argument
1166 + (allowed ? "allow" : "default"); in setInstallPackageAppOps()
/cts/hostsidetests/appsecurity/test-apps/tinyapp/
DAndroid.bp140 // ancestors are not allowed to be installed in the same sharedUserId.
257 // ancestors are not allowed to be installed in the same sharedUserId.
/cts/tests/tests/renderscript/src/android/renderscript/cts/
Dsingle_source_alloc.rscript366 _RS_ASSERT(rsIsObject(rsCreateType(I32_3, 0))); // x = 0 is allowed
/cts/tests/tests/telephony/current/src/android/telephony/cts/
DSubscriptionManagerTest.java1725 private void setIdentifierAccess(boolean allowed) { in setIdentifierAccess() argument
1730 int mode = allowed ? AppOpsManager.MODE_ALLOWED : AppOpsManager.opToDefaultMode(op); in setIdentifierAccess()
DTelephonyManagerTest.java5917 private void setAppOpsPermissionAllowed(boolean allowed, String op) { in setAppOpsPermissionAllowed() argument
5919 int mode = allowed ? AppOpsManager.MODE_ALLOWED : AppOpsManager.opToDefaultMode(op); in setAppOpsPermissionAllowed()
/cts/tests/tests/security/jni/
Dandroid_security_cts_cve_2019_2213_Test.c1080 u32 allowed; member
1089 n.allowed = ~0u; in grant()
/cts/hostsidetests/sustainedperf/dhrystone/
DRationale289 o Other optimizations are allowed, but they should be indicated
/cts/tests/mediapc/requirements/
Drequirements.txtpb928 description: "The encoding is allowed to include b-frames."