Searched refs:allowed (Results 1 - 25 of 38) sorted by relevance

12

/frameworks/support/v7/preference/src/android/support/v7/preference/
H A DPreferenceViewHolder.java70 * @return true if dividers are allowed above this item
84 * @param allowed false to prevent dividers being drawn above this item
86 public void setDividerAllowedAbove(boolean allowed) { argument
87 mDividerAllowedAbove = allowed;
94 * @return true if dividers are allowed below this item
108 * @param allowed false to prevent dividers being drawn below this item
110 public void setDividerAllowedBelow(boolean allowed) { argument
111 mDividerAllowedBelow = allowed;
/frameworks/base/core/java/android/os/
H A DTrace.java99 private static native void nativeSetAppTracingAllowed(boolean allowed); argument
100 private static native void nativeSetTracingEnabled(boolean allowed); argument
173 * Set whether application tracing is allowed for this process. This is intended to be set
178 public static void setAppTracingAllowed(boolean allowed) { argument
179 nativeSetAppTracingAllowed(allowed);
181 // Setting whether app tracing is allowed may change the tags, so we update the cached
/frameworks/base/core/jni/
H A Dandroid_os_Trace.cpp95 jclass clazz, jboolean allowed) {
96 ALOGV("%s: %d", __FUNCTION__, allowed);
98 atrace_set_debuggable(allowed);
94 android_os_Trace_nativeSetAppTracingAllowed(JNIEnv* env, jclass clazz, jboolean allowed) argument
/frameworks/support/v17/leanback/src/android/support/v17/leanback/widget/
H A DDetailsOverviewRow.java241 public void setImageScaleUpAllowed(boolean allowed) { argument
242 if (allowed != mImageScaleUpAllowed) {
243 mImageScaleUpAllowed = allowed;
/frameworks/native/cmds/servicemanager/
H A Dservice_manager.c71 bool allowed; local
84 allowed = (result == 0);
87 return allowed;
101 bool allowed; local
118 allowed = check_mac_perms(spid, uid, tctx, perm, name);
120 return allowed;
/frameworks/base/core/java/android/bluetooth/
H A DIBluetoothHeadset.aidl53 void setAudioRouteAllowed(boolean allowed);
H A DIBluetoothHeadsetClient.aidl65 void setAudioRouteAllowed(boolean allowed);
H A DBluetoothHeadset.java728 * Sets whether audio routing is allowed. When set to {@code false}, the AG will not route any
734 * @param allowed {@code true} if the profile can reroute audio, {@code false} otherwise.
738 public void setAudioRouteAllowed(boolean allowed) { argument
742 mService.setAudioRouteAllowed(allowed);
751 * Returns whether audio routing is allowed. see {@link #setAudioRouteAllowed(boolean)}.
935 * <p>Currently only {@link #VENDOR_RESULT_CODE_COMMAND_ANDROID} is allowed as {@code command}.
942 * @return {@code false} if there is no headset connected, or if the command is not an allowed
H A DBluetoothHeadsetClient.java1062 * Sets whether audio routing is allowed.
1066 public void setAudioRouteAllowed(boolean allowed) { argument
1070 mService.setAudioRouteAllowed(allowed);
1079 * Returns whether audio routing is allowed.
/frameworks/base/packages/SystemUI/src/com/android/systemui/qs/external/
H A DTileServiceManager.java46 * of when it is allowed to bind based on decisions frome the {@link TileServices}.
150 public void setBindAllowed(boolean allowed) { argument
151 if (mBindAllowed == allowed) return;
152 mBindAllowed = allowed;
/frameworks/opt/telephony/tests/telephonytests/src/com/android/internal/telephony/dataconnection/
H A DDcTrackerTest.java419 boolean allowed = isDataAllowed(failureReason);
420 assertFalse(failureReason.getDataAllowFailReason(), allowed);
457 allowed = isDataAllowed(failureReason);
458 assertTrue(failureReason.getDataAllowFailReason(), allowed);
482 boolean allowed = isDataAllowed(failureReason);
483 assertFalse(failureReason.getDataAllowFailReason(), allowed);
521 allowed = isDataAllowed(failureReason);
522 assertTrue(failureReason.getDataAllowFailReason(), allowed);
722 boolean allowed = isDataAllowed(failureReason);
723 assertFalse(failureReason.getDataAllowFailReason(), allowed);
[all...]
/frameworks/base/services/core/java/com/android/server/vr/
H A DVrManagerService.java209 ArraySet<String> allowed = mAllowedPackages.get(currentUserId);
210 if (allowed == null) {
211 allowed = new ArraySet<>();
227 for (String pkg : allowed) {
236 if (!allowed.contains(pkg)) {
244 allowed.clear();
245 allowed.addAll(packageNames);
246 mAllowedPackages.put(currentUserId, allowed);
692 String[] allowed = flat.split(":");
693 for (String s : allowed) {
[all...]
/frameworks/base/core/java/android/text/util/
H A DLinkify.java165 * what is allowed to match and become a link, and what is not.
459 boolean allowed = true;
462 allowed = matchFilter.acceptMatch(spannable, start, end);
465 if (allowed) {
/frameworks/support/compat/java/android/support/v4/text/util/
H A DLinkifyCompat.java322 boolean allowed = true;
325 allowed = matchFilter.acceptMatch(spannable, start, end);
328 if (allowed) {
/frameworks/base/core/java/com/android/server/
H A DSystemConfig.java56 // permission flag, determines which types of configuration are allowed to be read
373 boolean allowed;
375 allowed = true;
378 allowed = !"true".equals(notLowRam);
383 } else if (allowed) {
/frameworks/av/drm/drmserver/
H A DDrmManagerService.cpp75 bool allowed = (selinux_check_access(sctx, drmserver_context, selinux_class, local
79 return allowed;
/frameworks/base/core/java/android/view/
H A DLayoutInflater.java115 * Hook to allow clients of the LayoutInflater to restrict the set of Views that are allowed
122 * that are allowed to be inflated.
126 * @return True if this class is allowed to be inflated, or false otherwise
343 * that are allowed to be inflated.
351 * which is not allowed by the {@link Filter}, the {@link #inflate(int, ViewGroup)} call will
355 * @param filter The Filter which restricts the set of Views that are allowed to be inflated.
613 boolean allowed = mFilter.onLoadClass(clazz);
614 if (!allowed) {
627 // New class -- remember whether it is allowed
631 boolean allowed
[all...]
/frameworks/base/media/java/android/mtp/
H A DMtpDatabase.java288 boolean allowed = false;
290 for (int i = 0; i < mSubDirectories.length && !allowed; i++) {
296 allowed = true;
299 return allowed;
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/
H A DWifiConnectivityManager.java1065 * Handler when user toggles whether untrusted connection is allowed
1067 public void setUntrustedConnectionAllowed(boolean allowed) { argument
1068 Log.i(TAG, "setUntrustedConnectionAllowed: allowed=" + allowed);
1070 if (mUntrustedConnectionAllowed != allowed) {
1071 mUntrustedConnectionAllowed = allowed;
/frameworks/base/packages/SystemUI/tests/
H A DAndroid.mk57 # sign this with platform cert, so this test is allowed to inject key events into
/frameworks/opt/telephony/src/java/com/android/internal/telephony/dataconnection/
H A DApnContext.java252 * Save the state indicating concurrent voice/data allowed.
253 * @param allowed True if concurrent voice/data is allowed
255 public synchronized void setConcurrentVoiceAndDataAllowed(boolean allowed) { argument
256 mConcurrentVoiceAndDataAllowed = allowed;
260 * Get the state indicating concurrent voice/data allowed.
261 * @return True if concurrent voice/data is allowed
332 * @return True if allowed, otherwise false.
/frameworks/base/services/core/java/com/android/server/am/
H A DBroadcastQueue.java595 final int allowed = mService.checkAllowBackgroundLocked(filter.receiverList.uid,
597 if (allowed == ActivityManager.APP_START_MODE_DISABLED) {
598 Slog.w(TAG, "Background execution not allowed: receiving "
1142 // this information now to evaluate whether it is going to be allowed to run.
1154 final int allowed = mService.checkAllowBackgroundLocked(
1157 if (allowed != ActivityManager.APP_START_MODE_NORMAL) {
1162 if (allowed == ActivityManager.APP_START_MODE_DISABLED) {
1172 Slog.w(TAG, "Background execution not allowed: receiving "
/frameworks/base/packages/SystemUI/src/com/android/systemui/statusbar/
H A DBaseStatusBar.java336 // point, so make sure new activity switches are now allowed.
1448 final boolean allowed = 0 != Settings.Secure.getIntForUser(
1451 mUsersAllowingNotifications.append(userHandle, allowed);
1452 return allowed;
1472 final boolean allowed = allowedByUser && allowedByDpm;
1473 mUsersAllowingPrivateNotifications.append(userHandle, allowed);
1474 return allowed;
1832 // point, so make sure new activity switches are now allowed.
1943 // point, so make sure new activity switches are now allowed.
/frameworks/base/core/java/android/app/
H A DDownloadManager.java386 private int mAllowedNetworkTypes = ~0; // default to all network types allowed
675 * By default, all network types are allowed. Consider using
693 * allowed.
694 * @param allowed whether to allow a roaming connection to be used
697 public Request setAllowedOverRoaming(boolean allowed) { argument
698 mRoamingAllowed = allowed;
704 * connection. By default, metered networks are allowed.
/frameworks/opt/telephony/src/java/com/android/internal/telephony/test/
H A DSimulatedCommands.java1258 * 4 CLIR temporary mode presentation allowed
2086 public void setDataAllowed(boolean allowed, Message result) { argument
2087 log("setDataAllowed = " + allowed);
2088 mAllowed.set(allowed);

Completed in 1847 milliseconds

12