Searched refs:allowed (Results 1 - 25 of 43) sorted by relevance

12

/frameworks/base/core/java/android/service/oemlock/
H A DIOemLockService.aidl25 void setOemUnlockAllowedByCarrier(boolean allowed, in byte[] signature);
28 void setOemUnlockAllowedByUser(boolean allowed);
H A DOemLockManager.java47 * Sets whether the carrier has allowed this device to be OEM unlocked.
55 * @param allowed Whether the device should be allowed to be unlocked.
63 public void setOemUnlockAllowedByCarrier(boolean allowed, @Nullable byte[] signature) { argument
65 mService.setOemUnlockAllowedByCarrier(allowed, signature);
72 * Returns whether the carrier has allowed this device to be OEM unlocked.
73 * @return Whether OEM unlock is allowed by the carrier, or true if no OEM lock is present.
87 * Sets whether the user has allowed this device to be unlocked.
96 public void setOemUnlockAllowedByUser(boolean allowed) { argument
98 mService.setOemUnlockAllowedByUser(allowed);
[all...]
/frameworks/base/services/autofill/java/com/android/server/autofill/ui/
H A DOverlayControl.java48 private void setOverlayAllowed(boolean allowed) { argument
51 AppOpsManager.OP_SYSTEM_ALERT_WINDOW, !allowed, mToken);
53 AppOpsManager.OP_TOAST_WINDOW, !allowed, mToken);
/frameworks/support/v7/preference/src/android/support/v7/preference/
H A DPreferenceViewHolder.java77 * @return true if dividers are allowed above this item
91 * @param allowed false to prevent dividers being drawn above this item
93 public void setDividerAllowedAbove(boolean allowed) { argument
94 mDividerAllowedAbove = allowed;
101 * @return true if dividers are allowed below this item
115 * @param allowed false to prevent dividers being drawn below this item
117 public void setDividerAllowedBelow(boolean allowed) { argument
118 mDividerAllowedBelow = allowed;
/frameworks/base/core/java/android/os/
H A DTrace.java98 private static native void nativeSetAppTracingAllowed(boolean allowed); argument
99 private static native void nativeSetTracingEnabled(boolean allowed); argument
183 * Set whether application tracing is allowed for this process. This is intended to be set
188 public static void setAppTracingAllowed(boolean allowed) { argument
189 nativeSetAppTracingAllowed(allowed);
191 // Setting whether app tracing is allowed may change the tags, so we update the cached
/frameworks/base/services/core/java/com/android/server/
H A DOemLockService.java71 public void setOemUnlockAllowedByCarrier(boolean allowed, @Nullable byte[] signature) {
82 .setUserRestriction(UserManager.DISALLOW_OEM_UNLOCK, !allowed, userHandle);
127 "Can't manage OEM unlock allowed by carrier");
133 "Can't manage OEM unlock allowed by user");
/frameworks/base/core/jni/
H A Dandroid_os_Trace.cpp94 jclass clazz, jboolean allowed) {
95 ALOGV("%s: %d", __FUNCTION__, allowed);
97 atrace_set_debuggable(allowed);
93 android_os_Trace_nativeSetAppTracingAllowed(JNIEnv* env, jclass clazz, jboolean allowed) argument
/frameworks/support/v17/leanback/src/android/support/v17/leanback/widget/
H A DDetailsOverviewRow.java240 public void setImageScaleUpAllowed(boolean allowed) { argument
241 if (allowed != mImageScaleUpAllowed) {
242 mImageScaleUpAllowed = allowed;
/frameworks/native/cmds/servicemanager/
H A Dservice_manager.c69 bool allowed; local
82 allowed = (result == 0);
85 return allowed;
95 bool allowed; local
108 allowed = check_mac_perms(spid, uid, tctx, perm, name);
110 return allowed;
/frameworks/base/core/java/android/bluetooth/
H A DIBluetoothHeadset.aidl53 void setAudioRouteAllowed(boolean allowed);
H A DIBluetoothHeadsetClient.aidl60 void setAudioRouteAllowed(in BluetoothDevice device, boolean allowed);
H A DBluetoothHeadset.java729 * Sets whether audio routing is allowed. When set to {@code false}, the AG will not route any
735 * @param allowed {@code true} if the profile can reroute audio, {@code false} otherwise.
739 public void setAudioRouteAllowed(boolean allowed) { argument
743 mService.setAudioRouteAllowed(allowed);
752 * Returns whether audio routing is allowed. see {@link #setAudioRouteAllowed(boolean)}.
936 * <p>Currently only {@link #VENDOR_RESULT_CODE_COMMAND_ANDROID} is allowed as {@code command}.
943 * @return {@code false} if there is no headset connected, or if the command is not an allowed
H A DBluetoothHeadsetClient.java986 * Sets whether audio routing is allowed.
989 * @param allowed if routing is allowed to the device
992 public void setAudioRouteAllowed(BluetoothDevice device, boolean allowed) { argument
996 mService.setAudioRouteAllowed(device, allowed);
1005 * Returns whether audio routing is allowed.
/frameworks/base/services/core/java/com/android/server/vr/
H A DVrManagerService.java152 * If VR mode is not allowed to be enabled, calls to set VR mode will be cached. When VR mode
153 * is again allowed to be enabled, the most recent cached state will be applied.
155 * @param allowed {@code true} if calling any of the setVrMode methods may cause the device to
158 private void setVrModeAllowedLocked(boolean allowed) { argument
159 if (mVrModeAllowed != allowed) {
160 mVrModeAllowed = allowed;
161 if (DBG) Slog.d(TAG, "VR mode is " + ((allowed) ? "allowed" : "disallowed"));
165 // Disable persistent mode when VR mode isn't allowed, allows an escape hatch to
298 ArraySet<String> allowed
[all...]
/frameworks/base/packages/SystemUI/src/com/android/systemui/qs/external/
H A DTileServiceManager.java46 * of when it is allowed to bind based on decisions frome the {@link TileServices}.
151 public void setBindAllowed(boolean allowed) { argument
152 if (mBindAllowed == allowed) return;
153 mBindAllowed = allowed;
/frameworks/opt/telephony/tests/telephonytests/src/com/android/internal/telephony/dataconnection/
H A DDcTrackerTest.java427 boolean allowed = isDataAllowed(failureReason);
428 assertFalse(failureReason.getDataAllowFailReason(), allowed);
465 allowed = isDataAllowed(failureReason);
466 assertTrue(failureReason.getDataAllowFailReason(), allowed);
492 boolean allowed = isDataAllowed(failureReason);
493 assertFalse(failureReason.getDataAllowFailReason(), allowed);
531 allowed = isDataAllowed(failureReason);
532 assertTrue(failureReason.getDataAllowFailReason(), allowed);
735 boolean allowed = isDataAllowed(failureReason);
736 assertFalse(failureReason.getDataAllowFailReason(), allowed);
[all...]
/frameworks/base/core/java/android/text/util/
H A DLinkify.java164 * what is allowed to match and become a link, and what is not.
458 boolean allowed = true;
461 allowed = matchFilter.acceptMatch(spannable, start, end);
464 if (allowed) {
/frameworks/support/compat/java/android/support/v4/text/util/
H A DLinkifyCompat.java327 boolean allowed = true;
330 allowed = matchFilter.acceptMatch(spannable, start, end);
333 if (allowed) {
/frameworks/base/core/java/com/android/server/
H A DSystemConfig.java57 // permission flag, determines which types of configuration are allowed to be read
406 boolean allowed;
408 allowed = true;
411 allowed = !"true".equals(notLowRam);
416 } else if (allowed) {
/frameworks/av/drm/drmserver/
H A DDrmManagerService.cpp75 bool allowed = (selinux_check_access(sctx, drmserver_context, selinux_class, local
79 return allowed;
/frameworks/base/core/java/android/view/
H A DLayoutInflater.java112 * Hook to allow clients of the LayoutInflater to restrict the set of Views that are allowed
119 * that are allowed to be inflated.
123 * @return True if this class is allowed to be inflated, or false otherwise
340 * that are allowed to be inflated.
348 * which is not allowed by the {@link Filter}, the {@link #inflate(int, ViewGroup)} call will
352 * @param filter The Filter which restricts the set of Views that are allowed to be inflated.
610 boolean allowed = mFilter.onLoadClass(clazz);
611 if (!allowed) {
624 // New class -- remember whether it is allowed
628 boolean allowed
[all...]
/frameworks/base/services/core/java/com/android/server/wm/
H A DSession.java626 void setShowingAlertWindowNotificationAllowed(boolean allowed) { argument
627 mShowingAlertWindowNotificationAllowed = allowed;
629 if (allowed) {
/frameworks/base/media/java/android/mtp/
H A DMtpDatabase.java292 boolean allowed = false;
294 for (int i = 0; i < mSubDirectories.length && !allowed; i++) {
300 allowed = true;
303 return allowed;
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/
H A DWifiConnectivityManager.java1066 * Handler when user toggles whether untrusted connection is allowed
1068 public void setUntrustedConnectionAllowed(boolean allowed) { argument
1069 localLog("setUntrustedConnectionAllowed: allowed=" + allowed);
1071 if (mUntrustedConnectionAllowed != allowed) {
1072 mUntrustedConnectionAllowed = allowed;
/frameworks/base/packages/SystemUI/tests/
H A DAndroid.mk63 # sign this with platform cert, so this test is allowed to inject key events into

Completed in 2035 milliseconds

12