/frameworks/base/core/java/android/os/ |
D | Trace.java | 91 private static native void nativeSetAppTracingAllowed(boolean allowed); in nativeSetAppTracingAllowed() argument 92 private static native void nativeSetTracingEnabled(boolean allowed); in nativeSetTracingEnabled() argument 170 public static void setAppTracingAllowed(boolean allowed) { in setAppTracingAllowed() argument 171 nativeSetAppTracingAllowed(allowed); in setAppTracingAllowed()
|
/frameworks/compile/slang/tests/F_union/ |
D | stderr.txt.expect | 2 union.rs:9:14: error: unions containing RS object types are not allowed 3 union.rs:16:11: error: unions containing RS object types are not allowed
|
/frameworks/native/cmds/servicemanager/ |
D | service_manager.c | 63 bool allowed; in check_mac_perms() local 71 allowed = (result == 0); in check_mac_perms() 74 return allowed; in check_mac_perms() 88 bool allowed; in check_mac_perms_from_lookup() local 105 allowed = check_mac_perms(spid, tctx, perm, name); in check_mac_perms_from_lookup() 107 return allowed; in check_mac_perms_from_lookup()
|
/frameworks/base/core/jni/ |
D | android_os_Trace.cpp | 96 jclass clazz, jboolean allowed) { in android_os_Trace_nativeSetAppTracingAllowed() argument 97 ALOGV("%s: %d", __FUNCTION__, allowed); in android_os_Trace_nativeSetAppTracingAllowed() 99 atrace_set_debuggable(allowed); in android_os_Trace_nativeSetAppTracingAllowed()
|
/frameworks/support/v17/leanback/src/android/support/v17/leanback/widget/ |
D | DetailsOverviewRow.java | 88 public void setImageScaleUpAllowed(boolean allowed) { in setImageScaleUpAllowed() argument 89 mImageScaleUpAllowed = allowed; in setImageScaleUpAllowed()
|
/frameworks/base/core/java/com/android/internal/os/ |
D | ZygoteConnection.java | 690 boolean allowed = SELinux.checkSELinuxAccess(peerSecurityContext, in applyUidSecurityPolicy() 694 if (!allowed) { in applyUidSecurityPolicy() 754 boolean allowed = SELinux.checkSELinuxAccess(peerSecurityContext, in applyRlimitSecurityPolicy() 758 if (!allowed) { in applyRlimitSecurityPolicy() 789 boolean allowed = SELinux.checkSELinuxAccess(peerSecurityContext, in applyInvokeWithSecurityPolicy() 793 if (!allowed) { in applyInvokeWithSecurityPolicy() 823 boolean allowed = SELinux.checkSELinuxAccess(peerSecurityContext, in applyseInfoSecurityPolicy() 827 if (!allowed) { in applyseInfoSecurityPolicy()
|
/frameworks/base/services/core/java/com/android/server/ |
D | SystemConfig.java | 292 boolean allowed; in readPermissionsFromXml() 294 allowed = true; in readPermissionsFromXml() 297 allowed = !"true".equals(notLowRam); in readPermissionsFromXml() 302 } else if (allowed) { in readPermissionsFromXml()
|
/frameworks/compile/slang/tests/F_kernel_static/ |
D | stderr.txt.expect | 1 kernel_static.rs:14:14: error: Non-const static variables are not allowed in kernels: 'i'
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/dataconnection/ |
D | ApnContext.java | 179 public synchronized void setConcurrentVoiceAndDataAllowed(boolean allowed) { in setConcurrentVoiceAndDataAllowed() argument 180 mConcurrentVoiceAndDataAllowed = allowed; in setConcurrentVoiceAndDataAllowed()
|
/frameworks/base/core/java/android/text/util/ |
D | Linkify.java | 374 boolean allowed = true; in addLinks() 377 allowed = matchFilter.acceptMatch(s, start, end); in addLinks() 380 if (allowed) { in addLinks()
|
/frameworks/base/core/java/android/view/ |
D | LayoutInflater.java | 575 boolean allowed = mFilter.onLoadClass(clazz); in createView() 576 if (!allowed) { in createView() 592 boolean allowed = clazz != null && mFilter.onLoadClass(clazz); in createView() 593 mFilterMap.put(name, allowed); in createView() 594 if (!allowed) { in createView()
|
/frameworks/base/docs/html/training/enterprise/ |
D | app-compatibility.jd | 48 administrator can choose which apps are allowed for that profile, and can 58 that profile, and the intent is not allowed to cross to the other profile 81 allowed to cross from one profile to another. Since the administrator makes 83 to know in advance <em>which</em> intents are allowed to cross this boundary. The 95 allowed to cross to a handler on the other profile. (For more information about 190 <li>Configure which intents are allowed to cross from one profile to 209 intent is not allowed to cross between profiles, verify the app's behavior both
|
/frameworks/base/docs/html/tools/testing/ |
D | index.jd | 24 declaring what you’re not allowed to do on that thread, and what the penalty is if you violate the
|
D | activity_testing.jd | 246 on the UI thread. Methods that do not interact with the UI are not allowed; for example, you 259 <code>waitForIdleSync</code> and <code>sendKeys</code> aren't allowed to run on the UI thread:
|
/frameworks/base/media/java/android/mtp/ |
D | MtpDatabase.java | 282 boolean allowed = false; in inStorageSubDirectory() 284 for (int i = 0; i < mSubDirectories.length && !allowed; i++) { in inStorageSubDirectory() 290 allowed = true; in inStorageSubDirectory() 293 return allowed; in inStorageSubDirectory()
|
/frameworks/base/docs/html/design/building-blocks/ |
D | text-fields.jd | 38 what kind of characters are allowed inside the field, and may prompt the virtual keyboard to
|
/frameworks/base/docs/html/tools/help/ |
D | draw9patch.jd | 54 (purple is the area in which content is allowed).</li>
|
D | MonkeyImage.jd | 126 difference that is allowed for the two images to be "equal". 359 difference that is allowed for the two images to be "equal".
|
/frameworks/base/docs/html/google/gcm/ |
D | server-ref.jd | 88 …<p>Multicast messages (sending to more than 1 registration IDs) are allowed using HTTP JSON format… 101 The maximum number of members allowed for a {@code notification_key} is 20.</p> 126 <p>Note: A maximum of 4 different collapse keys is allowed at any given time. This means a 212 …<p>Multicast messaging (sending to more than one registration ID) is allowed using HTTP JSON forma… 601 are allowed to be sent to the connection, but existing messages in the pipeline will 675 for GCM, it must specify which senders are allowed to send messages. You should use one 701 are also used by GCM but are allowed in the payload, in which case the payload value
|
/frameworks/base/core/java/android/app/ |
D | DownloadManager.java | 677 public Request setAllowedOverRoaming(boolean allowed) { in setAllowedOverRoaming() argument 678 mRoamingAllowed = allowed; in setAllowedOverRoaming()
|
/frameworks/base/services/core/java/com/android/server/pm/ |
D | PackageManagerService.java | 5950 boolean allowed = false; in scanPackageDirtyLI() 5967 allowed = true; in scanPackageDirtyLI() 5968 allowed = true; in scanPackageDirtyLI() 5974 allowed = true; in scanPackageDirtyLI() 5976 if (allowed) { in scanPackageDirtyLI() 7077 boolean allowed; in grantPermissionsLPw() 7099 allowed = (required || origPermissions.contains(perm) in grantPermissionsLPw() 7103 allowed = false; in grantPermissionsLPw() 7105 allowed = grantSignaturePermission(perm, pkg, bp, origPermissions); in grantPermissionsLPw() 7106 if (allowed) { in grantPermissionsLPw() [all …]
|
/frameworks/base/core/java/android/service/wallpaper/ |
D | WallpaperService.java | 409 public void setFixedSizeAllowed(boolean allowed) { in setFixedSizeAllowed() argument 410 mFixedSizeAllowed = allowed; in setFixedSizeAllowed()
|
/frameworks/base/docs/html/guide/topics/manifest/ |
D | compatible-screens-element.jd | 24 of the {@code <compatible-screens>} element is allowed in the manifest, but it can
|
/frameworks/native/opengl/specs/ |
D | EGL_ANDROID_blob_cache.txt | 126 functions from different threads is also allowed.
|
/frameworks/base/packages/SystemUI/src/com/android/systemui/statusbar/ |
D | BaseStatusBar.java | 1192 final boolean allowed = 0 != Settings.Secure.getIntForUser( 1199 mUsersAllowingPrivateNotifications.append(userHandle, allowed && allowedByDpm); 1200 return allowed;
|