Home
last modified time | relevance | path

Searched refs:allowed (Results 1 – 25 of 80) sorted by relevance

1234

/frameworks/base/core/java/android/os/
DTrace.java91 private static native void nativeSetAppTracingAllowed(boolean allowed); in nativeSetAppTracingAllowed() argument
92 private static native void nativeSetTracingEnabled(boolean allowed); in nativeSetTracingEnabled() argument
170 public static void setAppTracingAllowed(boolean allowed) { in setAppTracingAllowed() argument
171 nativeSetAppTracingAllowed(allowed); in setAppTracingAllowed()
/frameworks/compile/slang/tests/F_union/
Dstderr.txt.expect2 union.rs:9:14: error: unions containing RS object types are not allowed
3 union.rs:16:11: error: unions containing RS object types are not allowed
/frameworks/native/cmds/servicemanager/
Dservice_manager.c63 bool allowed; in check_mac_perms() local
71 allowed = (result == 0); in check_mac_perms()
74 return allowed; in check_mac_perms()
88 bool allowed; in check_mac_perms_from_lookup() local
105 allowed = check_mac_perms(spid, tctx, perm, name); in check_mac_perms_from_lookup()
107 return allowed; in check_mac_perms_from_lookup()
/frameworks/base/core/jni/
Dandroid_os_Trace.cpp96 jclass clazz, jboolean allowed) { in android_os_Trace_nativeSetAppTracingAllowed() argument
97 ALOGV("%s: %d", __FUNCTION__, allowed); in android_os_Trace_nativeSetAppTracingAllowed()
99 atrace_set_debuggable(allowed); in android_os_Trace_nativeSetAppTracingAllowed()
/frameworks/support/v17/leanback/src/android/support/v17/leanback/widget/
DDetailsOverviewRow.java88 public void setImageScaleUpAllowed(boolean allowed) { in setImageScaleUpAllowed() argument
89 mImageScaleUpAllowed = allowed; in setImageScaleUpAllowed()
/frameworks/base/core/java/com/android/internal/os/
DZygoteConnection.java690 boolean allowed = SELinux.checkSELinuxAccess(peerSecurityContext, in applyUidSecurityPolicy()
694 if (!allowed) { in applyUidSecurityPolicy()
754 boolean allowed = SELinux.checkSELinuxAccess(peerSecurityContext, in applyRlimitSecurityPolicy()
758 if (!allowed) { in applyRlimitSecurityPolicy()
789 boolean allowed = SELinux.checkSELinuxAccess(peerSecurityContext, in applyInvokeWithSecurityPolicy()
793 if (!allowed) { in applyInvokeWithSecurityPolicy()
823 boolean allowed = SELinux.checkSELinuxAccess(peerSecurityContext, in applyseInfoSecurityPolicy()
827 if (!allowed) { in applyseInfoSecurityPolicy()
/frameworks/base/services/core/java/com/android/server/
DSystemConfig.java292 boolean allowed; in readPermissionsFromXml()
294 allowed = true; in readPermissionsFromXml()
297 allowed = !"true".equals(notLowRam); in readPermissionsFromXml()
302 } else if (allowed) { in readPermissionsFromXml()
/frameworks/compile/slang/tests/F_kernel_static/
Dstderr.txt.expect1 kernel_static.rs:14:14: error: Non-const static variables are not allowed in kernels: 'i'
/frameworks/opt/telephony/src/java/com/android/internal/telephony/dataconnection/
DApnContext.java179 public synchronized void setConcurrentVoiceAndDataAllowed(boolean allowed) { in setConcurrentVoiceAndDataAllowed() argument
180 mConcurrentVoiceAndDataAllowed = allowed; in setConcurrentVoiceAndDataAllowed()
/frameworks/base/core/java/android/text/util/
DLinkify.java374 boolean allowed = true; in addLinks()
377 allowed = matchFilter.acceptMatch(s, start, end); in addLinks()
380 if (allowed) { in addLinks()
/frameworks/base/core/java/android/view/
DLayoutInflater.java575 boolean allowed = mFilter.onLoadClass(clazz); in createView()
576 if (!allowed) { in createView()
592 boolean allowed = clazz != null && mFilter.onLoadClass(clazz); in createView()
593 mFilterMap.put(name, allowed); in createView()
594 if (!allowed) { in createView()
/frameworks/base/docs/html/training/enterprise/
Dapp-compatibility.jd48 administrator can choose which apps are allowed for that profile, and can
58 that profile, and the intent is not allowed to cross to the other profile
81 allowed to cross from one profile to another. Since the administrator makes
83 to know in advance <em>which</em> intents are allowed to cross this boundary. The
95 allowed to cross to a handler on the other profile. (For more information about
190 <li>Configure which intents are allowed to cross from one profile to
209 intent is not allowed to cross between profiles, verify the app's behavior both
/frameworks/base/docs/html/tools/testing/
Dindex.jd24 declaring what you’re not allowed to do on that thread, and what the penalty is if you violate the
Dactivity_testing.jd246 on the UI thread. Methods that do not interact with the UI are not allowed; for example, you
259 <code>waitForIdleSync</code> and <code>sendKeys</code> aren't allowed to run on the UI thread:
/frameworks/base/media/java/android/mtp/
DMtpDatabase.java282 boolean allowed = false; in inStorageSubDirectory()
284 for (int i = 0; i < mSubDirectories.length && !allowed; i++) { in inStorageSubDirectory()
290 allowed = true; in inStorageSubDirectory()
293 return allowed; in inStorageSubDirectory()
/frameworks/base/docs/html/design/building-blocks/
Dtext-fields.jd38 what kind of characters are allowed inside the field, and may prompt the virtual keyboard to
/frameworks/base/docs/html/tools/help/
Ddraw9patch.jd54 (purple is the area in which content is allowed).</li>
DMonkeyImage.jd126 difference that is allowed for the two images to be "equal".
359 difference that is allowed for the two images to be "equal".
/frameworks/base/docs/html/google/gcm/
Dserver-ref.jd88 …<p>Multicast messages (sending to more than 1 registration IDs) are allowed using HTTP JSON format…
101 The maximum number of members allowed for a {@code notification_key} is 20.</p>
126 <p>Note: A maximum of 4 different collapse keys is allowed at any given time. This means a
212 …<p>Multicast messaging (sending to more than one registration ID) is allowed using HTTP JSON forma…
601 are allowed to be sent to the connection, but existing messages in the pipeline will
675 for GCM, it must specify which senders are allowed to send messages. You should use one
701 are also used by GCM but are allowed in the payload, in which case the payload value
/frameworks/base/core/java/android/app/
DDownloadManager.java677 public Request setAllowedOverRoaming(boolean allowed) { in setAllowedOverRoaming() argument
678 mRoamingAllowed = allowed; in setAllowedOverRoaming()
/frameworks/base/services/core/java/com/android/server/pm/
DPackageManagerService.java5950 boolean allowed = false; in scanPackageDirtyLI()
5967 allowed = true; in scanPackageDirtyLI()
5968 allowed = true; in scanPackageDirtyLI()
5974 allowed = true; in scanPackageDirtyLI()
5976 if (allowed) { in scanPackageDirtyLI()
7077 boolean allowed; in grantPermissionsLPw()
7099 allowed = (required || origPermissions.contains(perm) in grantPermissionsLPw()
7103 allowed = false; in grantPermissionsLPw()
7105 allowed = grantSignaturePermission(perm, pkg, bp, origPermissions); in grantPermissionsLPw()
7106 if (allowed) { in grantPermissionsLPw()
[all …]
/frameworks/base/core/java/android/service/wallpaper/
DWallpaperService.java409 public void setFixedSizeAllowed(boolean allowed) { in setFixedSizeAllowed() argument
410 mFixedSizeAllowed = allowed; in setFixedSizeAllowed()
/frameworks/base/docs/html/guide/topics/manifest/
Dcompatible-screens-element.jd24 of the {@code &lt;compatible-screens&gt;} element is allowed in the manifest, but it can
/frameworks/native/opengl/specs/
DEGL_ANDROID_blob_cache.txt126 functions from different threads is also allowed.
/frameworks/base/packages/SystemUI/src/com/android/systemui/statusbar/
DBaseStatusBar.java1192 final boolean allowed = 0 != Settings.Secure.getIntForUser(
1199 mUsersAllowingPrivateNotifications.append(userHandle, allowed && allowedByDpm);
1200 return allowed;

1234