/frameworks/base/core/java/android/service/oemlock/ |
H A D | OemLockManager.java | 47 * Sets whether the carrier has allowed this device to be OEM unlocked. 55 * @param allowed Whether the device should be allowed to be unlocked. 63 public void setOemUnlockAllowedByCarrier(boolean allowed, @Nullable byte[] signature) { argument 65 mService.setOemUnlockAllowedByCarrier(allowed, signature); 72 * Returns whether the carrier has allowed this device to be OEM unlocked. 73 * @return Whether OEM unlock is allowed by the carrier, or true if no OEM lock is present. 87 * Sets whether the user has allowed this device to be unlocked. 96 public void setOemUnlockAllowedByUser(boolean allowed) { argument 98 mService.setOemUnlockAllowedByUser(allowed); [all...] |
/frameworks/base/services/autofill/java/com/android/server/autofill/ui/ |
H A D | OverlayControl.java | 48 private void setOverlayAllowed(boolean allowed) { argument 51 AppOpsManager.OP_SYSTEM_ALERT_WINDOW, !allowed, mToken); 53 AppOpsManager.OP_TOAST_WINDOW, !allowed, mToken);
|
/frameworks/support/v7/preference/src/android/support/v7/preference/ |
H A D | PreferenceViewHolder.java | 77 * @return true if dividers are allowed above this item 91 * @param allowed false to prevent dividers being drawn above this item 93 public void setDividerAllowedAbove(boolean allowed) { argument 94 mDividerAllowedAbove = allowed; 101 * @return true if dividers are allowed below this item 115 * @param allowed false to prevent dividers being drawn below this item 117 public void setDividerAllowedBelow(boolean allowed) { argument 118 mDividerAllowedBelow = allowed;
|
/frameworks/base/core/jni/ |
H A D | android_os_Trace.cpp | 94 jclass clazz, jboolean allowed) { 95 ALOGV("%s: %d", __FUNCTION__, allowed); 97 atrace_set_debuggable(allowed); 93 android_os_Trace_nativeSetAppTracingAllowed(JNIEnv* env, jclass clazz, jboolean allowed) argument
|
/frameworks/base/core/java/android/os/ |
H A D | Trace.java | 98 private static native void nativeSetAppTracingAllowed(boolean allowed); argument 99 private static native void nativeSetTracingEnabled(boolean allowed); argument 183 * Set whether application tracing is allowed for this process. This is intended to be set 188 public static void setAppTracingAllowed(boolean allowed) { argument 189 nativeSetAppTracingAllowed(allowed); 191 // Setting whether app tracing is allowed may change the tags, so we update the cached
|
/frameworks/base/packages/SystemUI/src/com/android/systemui/qs/external/ |
H A D | TileServiceManager.java | 46 * of when it is allowed to bind based on decisions frome the {@link TileServices}. 151 public void setBindAllowed(boolean allowed) { argument 152 if (mBindAllowed == allowed) return; 153 mBindAllowed = allowed;
|
/frameworks/native/cmds/servicemanager/ |
H A D | service_manager.c | 69 bool allowed; local 82 allowed = (result == 0); 85 return allowed; 95 bool allowed; local 108 allowed = check_mac_perms(spid, uid, tctx, perm, name); 110 return allowed;
|
/frameworks/support/v17/leanback/src/android/support/v17/leanback/widget/ |
H A D | DetailsOverviewRow.java | 240 public void setImageScaleUpAllowed(boolean allowed) { argument 241 if (allowed != mImageScaleUpAllowed) { 242 mImageScaleUpAllowed = allowed;
|
/frameworks/av/drm/drmserver/ |
H A D | DrmManagerService.cpp | 75 bool allowed = (selinux_check_access(sctx, drmserver_context, selinux_class, local 79 return allowed;
|
/frameworks/base/core/java/android/bluetooth/ |
H A D | BluetoothHeadset.java | 729 * Sets whether audio routing is allowed. When set to {@code false}, the AG will not route any 735 * @param allowed {@code true} if the profile can reroute audio, {@code false} otherwise. 739 public void setAudioRouteAllowed(boolean allowed) { argument 743 mService.setAudioRouteAllowed(allowed); 752 * Returns whether audio routing is allowed. see {@link #setAudioRouteAllowed(boolean)}. 936 * <p>Currently only {@link #VENDOR_RESULT_CODE_COMMAND_ANDROID} is allowed as {@code command}. 943 * @return {@code false} if there is no headset connected, or if the command is not an allowed
|
H A D | BluetoothHeadsetClient.java | 986 * Sets whether audio routing is allowed. 989 * @param allowed if routing is allowed to the device 992 public void setAudioRouteAllowed(BluetoothDevice device, boolean allowed) { argument 996 mService.setAudioRouteAllowed(device, allowed); 1005 * Returns whether audio routing is allowed.
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/dataconnection/ |
H A D | ApnContext.java | 252 * Save the state indicating concurrent voice/data allowed. 253 * @param allowed True if concurrent voice/data is allowed 255 public synchronized void setConcurrentVoiceAndDataAllowed(boolean allowed) { argument 256 mConcurrentVoiceAndDataAllowed = allowed; 260 * Get the state indicating concurrent voice/data allowed. 261 * @return True if concurrent voice/data is allowed 332 * @return True if allowed, otherwise false.
|
/frameworks/base/services/core/java/com/android/server/vr/ |
H A D | VrManagerService.java | 152 * If VR mode is not allowed to be enabled, calls to set VR mode will be cached. When VR mode 153 * is again allowed to be enabled, the most recent cached state will be applied. 155 * @param allowed {@code true} if calling any of the setVrMode methods may cause the device to 158 private void setVrModeAllowedLocked(boolean allowed) { argument 159 if (mVrModeAllowed != allowed) { 160 mVrModeAllowed = allowed; 161 if (DBG) Slog.d(TAG, "VR mode is " + ((allowed) ? "allowed" : "disallowed")); 165 // Disable persistent mode when VR mode isn't allowed, allows an escape hatch to 298 ArraySet<String> allowed [all...] |
/frameworks/base/services/core/java/com/android/server/wm/ |
H A D | Session.java | 626 void setShowingAlertWindowNotificationAllowed(boolean allowed) { argument 627 mShowingAlertWindowNotificationAllowed = allowed; 629 if (allowed) {
|
/frameworks/base/core/java/android/app/ |
H A D | DownloadManager.java | 390 private int mAllowedNetworkTypes = ~0; // default to all network types allowed 679 * By default, all network types are allowed. Consider using 697 * allowed. 698 * @param allowed whether to allow a roaming connection to be used 701 public Request setAllowedOverRoaming(boolean allowed) { argument 702 mRoamingAllowed = allowed; 708 * connection. By default, metered networks are allowed.
|
/frameworks/base/core/java/android/service/wallpaper/ |
H A D | WallpaperService.java | 431 public void setFixedSizeAllowed(boolean allowed) { argument 432 mFixedSizeAllowed = allowed;
|
/frameworks/base/services/core/java/com/android/server/am/ |
H A D | ActiveServices.java | 368 // Before going further -- if this app is not allowed to start services in the 370 final int allowed = mAm.getAppStartModeLocked(r.appInfo.uid, r.packageName, 372 if (allowed != ActivityManager.APP_START_MODE_NORMAL) { 373 Slog.w(TAG, "Background start not allowed: service " 377 if (allowed == ActivityManager.APP_START_MODE_DELAYED) { 383 // allowed, so tell it what has happened. 2457 // brought down before actually showing a notification. That is not allowed. 3243 int callingUid, boolean allowed, boolean canInteractAcrossUsers) { 3272 if (allowed || (sr.app != null && sr.app.uid == callingUid)) { 3280 && (allowed || ( 3242 getRunningServiceInfoLocked(int maxNum, int flags, int callingUid, boolean allowed, boolean canInteractAcrossUsers) argument [all...] |
H A D | ActivityStack.java | 3365 * @param allowFocusSelf Is the focus allowed to remain on the same stack. 3883 // ask watcher if this is allowed 4596 // ask watcher if this is allowed 4927 void getTasksLocked(List<RunningTaskInfo> list, int callingUid, boolean allowed) { argument 4941 if (!allowed && !task.isHomeTask() && task.effectiveUid != callingUid) {
|
H A D | ActivityStackSupervisor.java | 408 * At that point the system is allowed to actually sleep. 493 /** Check if placing task or activity on specified display is allowed. */ 1230 void getTasksLocked(int maxNum, List<RunningTaskInfo> list, int callingUid, boolean allowed) { argument 1241 stack.getTasksLocked(stackTaskList, callingUid, allowed); 1340 // We only set the visibility to true if the activity is allowed to be visible based on 1673 /** Check if caller is allowed to launch activities on specified display. */ 3089 "Skipping stack: (new task not allowed) " + stack);
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/ |
H A D | WifiConnectivityManager.java | 1066 * Handler when user toggles whether untrusted connection is allowed 1068 public void setUntrustedConnectionAllowed(boolean allowed) { argument 1069 localLog("setUntrustedConnectionAllowed: allowed=" + allowed); 1071 if (mUntrustedConnectionAllowed != allowed) { 1072 mUntrustedConnectionAllowed = allowed;
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/ |
H A D | BaseCommands.java | 848 public void setDataAllowed(boolean allowed, Message response) { argument
|
H A D | CommandsInterface.java | 1219 * 4 CLIR temporary mode presentation allowed 1914 * Tells the modem if data is allowed or not. 1916 * @param allowed 1917 * true = allowed, false = not alowed 1922 public void setDataAllowed(boolean allowed, Message result); argument 2017 * Set allowed carriers 2025 * Get allowed carriers 2027 * @param result Callback message contains the allowed carriers
|
H A D | RIL.java | 3281 public void setDataAllowed(boolean allowed, Message result) { argument 3289 + " allowed = " + allowed); 3293 radioProxy.setDataAllowed(rr.mSerial, allowed); 3546 for (CarrierIdentifier ci : carriers) { /* allowed carriers */
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/test/ |
H A D | SimulatedCommands.java | 1255 * 4 CLIR temporary mode presentation allowed 2082 public void setDataAllowed(boolean allowed, Message result) { argument 2083 log("setDataAllowed = " + allowed); 2084 mAllowed.set(allowed);
|
H A D | SimulatedCommandsVerifier.java | 1281 public void setDataAllowed(boolean allowed, Message result) { argument
|