/frameworks/support/v7/preference/src/android/support/v7/preference/ |
H A D | PreferenceViewHolder.java | 70 * @return true if dividers are allowed above this item 84 * @param allowed false to prevent dividers being drawn above this item 86 public void setDividerAllowedAbove(boolean allowed) { argument 87 mDividerAllowedAbove = allowed; 94 * @return true if dividers are allowed below this item 108 * @param allowed false to prevent dividers being drawn below this item 110 public void setDividerAllowedBelow(boolean allowed) { argument 111 mDividerAllowedBelow = allowed;
|
/frameworks/base/core/java/android/os/ |
H A D | Trace.java | 99 private static native void nativeSetAppTracingAllowed(boolean allowed); argument 100 private static native void nativeSetTracingEnabled(boolean allowed); argument 173 * Set whether application tracing is allowed for this process. This is intended to be set 178 public static void setAppTracingAllowed(boolean allowed) { argument 179 nativeSetAppTracingAllowed(allowed); 181 // Setting whether app tracing is allowed may change the tags, so we update the cached
|
/frameworks/base/core/jni/ |
H A D | android_os_Trace.cpp | 95 jclass clazz, jboolean allowed) { 96 ALOGV("%s: %d", __FUNCTION__, allowed); 98 atrace_set_debuggable(allowed); 94 android_os_Trace_nativeSetAppTracingAllowed(JNIEnv* env, jclass clazz, jboolean allowed) argument
|
/frameworks/support/v17/leanback/src/android/support/v17/leanback/widget/ |
H A D | DetailsOverviewRow.java | 241 public void setImageScaleUpAllowed(boolean allowed) { argument 242 if (allowed != mImageScaleUpAllowed) { 243 mImageScaleUpAllowed = allowed;
|
/frameworks/native/cmds/servicemanager/ |
H A D | service_manager.c | 71 bool allowed; local 84 allowed = (result == 0); 87 return allowed; 101 bool allowed; local 118 allowed = check_mac_perms(spid, uid, tctx, perm, name); 120 return allowed;
|
/frameworks/base/core/java/android/bluetooth/ |
H A D | IBluetoothHeadset.aidl | 53 void setAudioRouteAllowed(boolean allowed);
|
H A D | IBluetoothHeadsetClient.aidl | 65 void setAudioRouteAllowed(boolean allowed);
|
H A D | BluetoothHeadset.java | 728 * Sets whether audio routing is allowed. When set to {@code false}, the AG will not route any 734 * @param allowed {@code true} if the profile can reroute audio, {@code false} otherwise. 738 public void setAudioRouteAllowed(boolean allowed) { argument 742 mService.setAudioRouteAllowed(allowed); 751 * Returns whether audio routing is allowed. see {@link #setAudioRouteAllowed(boolean)}. 935 * <p>Currently only {@link #VENDOR_RESULT_CODE_COMMAND_ANDROID} is allowed as {@code command}. 942 * @return {@code false} if there is no headset connected, or if the command is not an allowed
|
H A D | BluetoothHeadsetClient.java | 1062 * Sets whether audio routing is allowed. 1066 public void setAudioRouteAllowed(boolean allowed) { argument 1070 mService.setAudioRouteAllowed(allowed); 1079 * Returns whether audio routing is allowed.
|
/frameworks/base/packages/SystemUI/src/com/android/systemui/qs/external/ |
H A D | TileServiceManager.java | 46 * of when it is allowed to bind based on decisions frome the {@link TileServices}. 150 public void setBindAllowed(boolean allowed) { argument 151 if (mBindAllowed == allowed) return; 152 mBindAllowed = allowed;
|
/frameworks/opt/telephony/tests/telephonytests/src/com/android/internal/telephony/dataconnection/ |
H A D | DcTrackerTest.java | 419 boolean allowed = isDataAllowed(failureReason); 420 assertFalse(failureReason.getDataAllowFailReason(), allowed); 457 allowed = isDataAllowed(failureReason); 458 assertTrue(failureReason.getDataAllowFailReason(), allowed); 482 boolean allowed = isDataAllowed(failureReason); 483 assertFalse(failureReason.getDataAllowFailReason(), allowed); 521 allowed = isDataAllowed(failureReason); 522 assertTrue(failureReason.getDataAllowFailReason(), allowed); 722 boolean allowed = isDataAllowed(failureReason); 723 assertFalse(failureReason.getDataAllowFailReason(), allowed); [all...] |
/frameworks/base/services/core/java/com/android/server/vr/ |
H A D | VrManagerService.java | 209 ArraySet<String> allowed = mAllowedPackages.get(currentUserId); 210 if (allowed == null) { 211 allowed = new ArraySet<>(); 227 for (String pkg : allowed) { 236 if (!allowed.contains(pkg)) { 244 allowed.clear(); 245 allowed.addAll(packageNames); 246 mAllowedPackages.put(currentUserId, allowed); 692 String[] allowed = flat.split(":"); 693 for (String s : allowed) { [all...] |
/frameworks/base/core/java/android/text/util/ |
H A D | Linkify.java | 165 * what is allowed to match and become a link, and what is not. 459 boolean allowed = true; 462 allowed = matchFilter.acceptMatch(spannable, start, end); 465 if (allowed) {
|
/frameworks/support/compat/java/android/support/v4/text/util/ |
H A D | LinkifyCompat.java | 322 boolean allowed = true; 325 allowed = matchFilter.acceptMatch(spannable, start, end); 328 if (allowed) {
|
/frameworks/base/core/java/com/android/server/ |
H A D | SystemConfig.java | 56 // permission flag, determines which types of configuration are allowed to be read 373 boolean allowed; 375 allowed = true; 378 allowed = !"true".equals(notLowRam); 383 } else if (allowed) {
|
/frameworks/av/drm/drmserver/ |
H A D | DrmManagerService.cpp | 75 bool allowed = (selinux_check_access(sctx, drmserver_context, selinux_class, local 79 return allowed;
|
/frameworks/base/core/java/android/view/ |
H A D | LayoutInflater.java | 115 * Hook to allow clients of the LayoutInflater to restrict the set of Views that are allowed 122 * that are allowed to be inflated. 126 * @return True if this class is allowed to be inflated, or false otherwise 343 * that are allowed to be inflated. 351 * which is not allowed by the {@link Filter}, the {@link #inflate(int, ViewGroup)} call will 355 * @param filter The Filter which restricts the set of Views that are allowed to be inflated. 613 boolean allowed = mFilter.onLoadClass(clazz); 614 if (!allowed) { 627 // New class -- remember whether it is allowed 631 boolean allowed [all...] |
/frameworks/base/media/java/android/mtp/ |
H A D | MtpDatabase.java | 288 boolean allowed = false; 290 for (int i = 0; i < mSubDirectories.length && !allowed; i++) { 296 allowed = true; 299 return allowed;
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/ |
H A D | WifiConnectivityManager.java | 1065 * Handler when user toggles whether untrusted connection is allowed 1067 public void setUntrustedConnectionAllowed(boolean allowed) { argument 1068 Log.i(TAG, "setUntrustedConnectionAllowed: allowed=" + allowed); 1070 if (mUntrustedConnectionAllowed != allowed) { 1071 mUntrustedConnectionAllowed = allowed;
|
/frameworks/base/packages/SystemUI/tests/ |
H A D | Android.mk | 57 # sign this with platform cert, so this test is allowed to inject key events into
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/dataconnection/ |
H A D | ApnContext.java | 252 * Save the state indicating concurrent voice/data allowed. 253 * @param allowed True if concurrent voice/data is allowed 255 public synchronized void setConcurrentVoiceAndDataAllowed(boolean allowed) { argument 256 mConcurrentVoiceAndDataAllowed = allowed; 260 * Get the state indicating concurrent voice/data allowed. 261 * @return True if concurrent voice/data is allowed 332 * @return True if allowed, otherwise false.
|
/frameworks/base/services/core/java/com/android/server/am/ |
H A D | BroadcastQueue.java | 595 final int allowed = mService.checkAllowBackgroundLocked(filter.receiverList.uid, 597 if (allowed == ActivityManager.APP_START_MODE_DISABLED) { 598 Slog.w(TAG, "Background execution not allowed: receiving " 1142 // this information now to evaluate whether it is going to be allowed to run. 1154 final int allowed = mService.checkAllowBackgroundLocked( 1157 if (allowed != ActivityManager.APP_START_MODE_NORMAL) { 1162 if (allowed == ActivityManager.APP_START_MODE_DISABLED) { 1172 Slog.w(TAG, "Background execution not allowed: receiving "
|
/frameworks/base/packages/SystemUI/src/com/android/systemui/statusbar/ |
H A D | BaseStatusBar.java | 336 // point, so make sure new activity switches are now allowed. 1448 final boolean allowed = 0 != Settings.Secure.getIntForUser( 1451 mUsersAllowingNotifications.append(userHandle, allowed); 1452 return allowed; 1472 final boolean allowed = allowedByUser && allowedByDpm; 1473 mUsersAllowingPrivateNotifications.append(userHandle, allowed); 1474 return allowed; 1832 // point, so make sure new activity switches are now allowed. 1943 // point, so make sure new activity switches are now allowed.
|
/frameworks/base/core/java/android/app/ |
H A D | DownloadManager.java | 386 private int mAllowedNetworkTypes = ~0; // default to all network types allowed 675 * By default, all network types are allowed. Consider using 693 * allowed. 694 * @param allowed whether to allow a roaming connection to be used 697 public Request setAllowedOverRoaming(boolean allowed) { argument 698 mRoamingAllowed = allowed; 704 * connection. By default, metered networks are allowed.
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/test/ |
H A D | SimulatedCommands.java | 1258 * 4 CLIR temporary mode presentation allowed 2086 public void setDataAllowed(boolean allowed, Message result) { argument 2087 log("setDataAllowed = " + allowed); 2088 mAllowed.set(allowed);
|