/frameworks/base/core/java/android/service/oemlock/ |
H A D | IOemLockService.aidl | 25 void setOemUnlockAllowedByCarrier(boolean allowed, in byte[] signature); 28 void setOemUnlockAllowedByUser(boolean allowed);
|
H A D | OemLockManager.java | 47 * Sets whether the carrier has allowed this device to be OEM unlocked. 55 * @param allowed Whether the device should be allowed to be unlocked. 63 public void setOemUnlockAllowedByCarrier(boolean allowed, @Nullable byte[] signature) { argument 65 mService.setOemUnlockAllowedByCarrier(allowed, signature); 72 * Returns whether the carrier has allowed this device to be OEM unlocked. 73 * @return Whether OEM unlock is allowed by the carrier, or true if no OEM lock is present. 87 * Sets whether the user has allowed this device to be unlocked. 96 public void setOemUnlockAllowedByUser(boolean allowed) { argument 98 mService.setOemUnlockAllowedByUser(allowed); [all...] |
/frameworks/base/services/autofill/java/com/android/server/autofill/ui/ |
H A D | OverlayControl.java | 48 private void setOverlayAllowed(boolean allowed) { argument 51 AppOpsManager.OP_SYSTEM_ALERT_WINDOW, !allowed, mToken); 53 AppOpsManager.OP_TOAST_WINDOW, !allowed, mToken);
|
/frameworks/support/v7/preference/src/android/support/v7/preference/ |
H A D | PreferenceViewHolder.java | 77 * @return true if dividers are allowed above this item 91 * @param allowed false to prevent dividers being drawn above this item 93 public void setDividerAllowedAbove(boolean allowed) { argument 94 mDividerAllowedAbove = allowed; 101 * @return true if dividers are allowed below this item 115 * @param allowed false to prevent dividers being drawn below this item 117 public void setDividerAllowedBelow(boolean allowed) { argument 118 mDividerAllowedBelow = allowed;
|
/frameworks/base/core/java/android/os/ |
H A D | Trace.java | 98 private static native void nativeSetAppTracingAllowed(boolean allowed); argument 99 private static native void nativeSetTracingEnabled(boolean allowed); argument 183 * Set whether application tracing is allowed for this process. This is intended to be set 188 public static void setAppTracingAllowed(boolean allowed) { argument 189 nativeSetAppTracingAllowed(allowed); 191 // Setting whether app tracing is allowed may change the tags, so we update the cached
|
/frameworks/base/services/core/java/com/android/server/ |
H A D | OemLockService.java | 71 public void setOemUnlockAllowedByCarrier(boolean allowed, @Nullable byte[] signature) { 82 .setUserRestriction(UserManager.DISALLOW_OEM_UNLOCK, !allowed, userHandle); 127 "Can't manage OEM unlock allowed by carrier"); 133 "Can't manage OEM unlock allowed by user");
|
/frameworks/base/core/jni/ |
H A D | android_os_Trace.cpp | 94 jclass clazz, jboolean allowed) { 95 ALOGV("%s: %d", __FUNCTION__, allowed); 97 atrace_set_debuggable(allowed); 93 android_os_Trace_nativeSetAppTracingAllowed(JNIEnv* env, jclass clazz, jboolean allowed) argument
|
/frameworks/support/v17/leanback/src/android/support/v17/leanback/widget/ |
H A D | DetailsOverviewRow.java | 240 public void setImageScaleUpAllowed(boolean allowed) { argument 241 if (allowed != mImageScaleUpAllowed) { 242 mImageScaleUpAllowed = allowed;
|
/frameworks/native/cmds/servicemanager/ |
H A D | service_manager.c | 69 bool allowed; local 82 allowed = (result == 0); 85 return allowed; 95 bool allowed; local 108 allowed = check_mac_perms(spid, uid, tctx, perm, name); 110 return allowed;
|
/frameworks/base/core/java/android/bluetooth/ |
H A D | IBluetoothHeadset.aidl | 53 void setAudioRouteAllowed(boolean allowed);
|
H A D | IBluetoothHeadsetClient.aidl | 60 void setAudioRouteAllowed(in BluetoothDevice device, boolean allowed);
|
H A D | BluetoothHeadset.java | 729 * Sets whether audio routing is allowed. When set to {@code false}, the AG will not route any 735 * @param allowed {@code true} if the profile can reroute audio, {@code false} otherwise. 739 public void setAudioRouteAllowed(boolean allowed) { argument 743 mService.setAudioRouteAllowed(allowed); 752 * Returns whether audio routing is allowed. see {@link #setAudioRouteAllowed(boolean)}. 936 * <p>Currently only {@link #VENDOR_RESULT_CODE_COMMAND_ANDROID} is allowed as {@code command}. 943 * @return {@code false} if there is no headset connected, or if the command is not an allowed
|
H A D | BluetoothHeadsetClient.java | 986 * Sets whether audio routing is allowed. 989 * @param allowed if routing is allowed to the device 992 public void setAudioRouteAllowed(BluetoothDevice device, boolean allowed) { argument 996 mService.setAudioRouteAllowed(device, allowed); 1005 * Returns whether audio routing is allowed.
|
/frameworks/base/services/core/java/com/android/server/vr/ |
H A D | VrManagerService.java | 152 * If VR mode is not allowed to be enabled, calls to set VR mode will be cached. When VR mode 153 * is again allowed to be enabled, the most recent cached state will be applied. 155 * @param allowed {@code true} if calling any of the setVrMode methods may cause the device to 158 private void setVrModeAllowedLocked(boolean allowed) { argument 159 if (mVrModeAllowed != allowed) { 160 mVrModeAllowed = allowed; 161 if (DBG) Slog.d(TAG, "VR mode is " + ((allowed) ? "allowed" : "disallowed")); 165 // Disable persistent mode when VR mode isn't allowed, allows an escape hatch to 298 ArraySet<String> allowed [all...] |
/frameworks/base/packages/SystemUI/src/com/android/systemui/qs/external/ |
H A D | TileServiceManager.java | 46 * of when it is allowed to bind based on decisions frome the {@link TileServices}. 151 public void setBindAllowed(boolean allowed) { argument 152 if (mBindAllowed == allowed) return; 153 mBindAllowed = allowed;
|
/frameworks/opt/telephony/tests/telephonytests/src/com/android/internal/telephony/dataconnection/ |
H A D | DcTrackerTest.java | 427 boolean allowed = isDataAllowed(failureReason); 428 assertFalse(failureReason.getDataAllowFailReason(), allowed); 465 allowed = isDataAllowed(failureReason); 466 assertTrue(failureReason.getDataAllowFailReason(), allowed); 492 boolean allowed = isDataAllowed(failureReason); 493 assertFalse(failureReason.getDataAllowFailReason(), allowed); 531 allowed = isDataAllowed(failureReason); 532 assertTrue(failureReason.getDataAllowFailReason(), allowed); 735 boolean allowed = isDataAllowed(failureReason); 736 assertFalse(failureReason.getDataAllowFailReason(), allowed); [all...] |
/frameworks/base/core/java/android/text/util/ |
H A D | Linkify.java | 164 * what is allowed to match and become a link, and what is not. 458 boolean allowed = true; 461 allowed = matchFilter.acceptMatch(spannable, start, end); 464 if (allowed) {
|
/frameworks/support/compat/java/android/support/v4/text/util/ |
H A D | LinkifyCompat.java | 327 boolean allowed = true; 330 allowed = matchFilter.acceptMatch(spannable, start, end); 333 if (allowed) {
|
/frameworks/base/core/java/com/android/server/ |
H A D | SystemConfig.java | 57 // permission flag, determines which types of configuration are allowed to be read 406 boolean allowed; 408 allowed = true; 411 allowed = !"true".equals(notLowRam); 416 } else if (allowed) {
|
/frameworks/av/drm/drmserver/ |
H A D | DrmManagerService.cpp | 75 bool allowed = (selinux_check_access(sctx, drmserver_context, selinux_class, local 79 return allowed;
|
/frameworks/base/core/java/android/view/ |
H A D | LayoutInflater.java | 112 * Hook to allow clients of the LayoutInflater to restrict the set of Views that are allowed 119 * that are allowed to be inflated. 123 * @return True if this class is allowed to be inflated, or false otherwise 340 * that are allowed to be inflated. 348 * which is not allowed by the {@link Filter}, the {@link #inflate(int, ViewGroup)} call will 352 * @param filter The Filter which restricts the set of Views that are allowed to be inflated. 610 boolean allowed = mFilter.onLoadClass(clazz); 611 if (!allowed) { 624 // New class -- remember whether it is allowed 628 boolean allowed [all...] |
/frameworks/base/services/core/java/com/android/server/wm/ |
H A D | Session.java | 626 void setShowingAlertWindowNotificationAllowed(boolean allowed) { argument 627 mShowingAlertWindowNotificationAllowed = allowed; 629 if (allowed) {
|
/frameworks/base/media/java/android/mtp/ |
H A D | MtpDatabase.java | 292 boolean allowed = false; 294 for (int i = 0; i < mSubDirectories.length && !allowed; i++) { 300 allowed = true; 303 return allowed;
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/ |
H A D | WifiConnectivityManager.java | 1066 * Handler when user toggles whether untrusted connection is allowed 1068 public void setUntrustedConnectionAllowed(boolean allowed) { argument 1069 localLog("setUntrustedConnectionAllowed: allowed=" + allowed); 1071 if (mUntrustedConnectionAllowed != allowed) { 1072 mUntrustedConnectionAllowed = allowed;
|
/frameworks/base/packages/SystemUI/tests/ |
H A D | Android.mk | 63 # sign this with platform cert, so this test is allowed to inject key events into
|