/external/testng/src/test/java/test/ |
H A D | ReturnValueTest.java | 41 private void runTest(boolean allowed) { argument 48 if (allowed) {
|
/external/libchrome/base/threading/ |
H A D | thread_restrictions.cc | 29 bool ThreadRestrictions::SetIOAllowed(bool allowed) { argument 31 g_io_disallowed.Get().Set(!allowed); 40 "disallows IO! If this thread really should be allowed to " 48 bool ThreadRestrictions::SetSingletonAllowed(bool allowed) { argument 50 g_singleton_disallowed.Get().Set(!allowed); 57 NOTREACHED() << "LazyInstance/Singleton is not allowed to be used on this " 76 NOTREACHED() << "Waiting is not allowed to be used on this thread to " 81 bool ThreadRestrictions::SetWaitAllowed(bool allowed) { argument 83 g_wait_disallowed.Get().Set(!allowed);
|
H A D | thread_restrictions.h | 106 // 1) If a thread should not be allowed to make IO calls, mark it: 108 // By default, threads *are* allowed to make IO calls. 112 // current thread is allowed: 132 // Whether IO is allowed when the ScopedAllowIO was constructed. 140 // Threads start out in the *allowed* state. 142 static bool SetIOAllowed(bool allowed); 144 // Check whether the current thread is allowed to make IO calls, 151 static bool SetSingletonAllowed(bool allowed); 153 // Check whether the current thread is allowed to use singletons (Singleton / 157 // Disable waiting on the current thread. Threads start out in the *allowed* 166 SetIOAllowed(bool allowed) argument 168 SetSingletonAllowed(bool allowed) argument 231 SetWaitAllowed(bool allowed) argument [all...] |
/external/libese/esed/ |
H A D | OemLock.cpp | 38 bool allowed, const hidl_vec<uint8_t>& signature) { 39 LOG(INFO) << "Running OemLock::setOemUnlockAllowedByCarrier: " << allowed; 50 // "allowed" == unlocked == 0. 51 uint8_t lock_byte = allowed ? 0 : 1; 66 LOG(ERROR) << "Failed to change lock state (allowed=" 67 << allowed << "): " << res; 117 // if data[0] == 1, lock == true, so allowed == false. 122 Return<OemLockStatus> OemLock::setOemUnlockAllowedByDevice(bool allowed) { argument 123 LOG(INFO) << "Running OemLock::setOemUnlockAllowedByDevice: " << allowed; 126 // "allowed" 37 setOemUnlockAllowedByCarrier( bool allowed, const hidl_vec<uint8_t>& signature) argument [all...] |
/external/libmojo/mojo/public/cpp/bindings/lib/ |
H A D | sync_call_restrictions.cc | 23 bool allowed() const { function in class:mojo::__anon11835::SyncCallSettings 72 if (!SyncCallSettings::current()->allowed()) { 73 LOG(FATAL) << "Mojo sync calls are not allowed in this process because "
|
/external/selinux/libsepol/include/sepol/policydb/ |
H A D | flask_types.h | 58 sepol_access_vector_t allowed; member in struct:sepol_av_decision
|
/external/nos/host/android/hals/oemlock/ |
H A D | OemLock.cpp | 51 bool allowed, const hidl_vec<uint8_t>& signature) { 52 LOG(INFO) << "Running OemLock::setOemUnlockAllowedByCarrier: " << allowed; 54 if (!allowed) { 97 const bool allowed = response.locked() == 0; local 98 _hidl_cb(OemLockStatus::OK, allowed); 102 Return<OemLockStatus> OemLock::setOemUnlockAllowedByDevice(bool allowed) { argument 103 LOG(INFO) << "Running OemLock::setOemUnlockAllowedByDevice: " << allowed; 106 request.set_locked(allowed ? 0 : 1); 132 const bool allowed = response.locked() == 0; local 133 _hidl_cb(OemLockStatus::OK, allowed); 50 setOemUnlockAllowedByCarrier( bool allowed, const hidl_vec<uint8_t>& signature) argument [all...] |
/external/tensorflow/tensorflow/core/framework/ |
H A D | kernel_def_builder.cc | 38 const char* attr_name, gtl::ArraySlice<DataType> allowed) { 42 for (DataType dt : allowed) { 49 DataType allowed) { 52 constraint->mutable_allowed_values()->mutable_list()->add_type(allowed); 37 TypeConstraint( const char* attr_name, gtl::ArraySlice<DataType> allowed) argument 48 TypeConstraint(const char* attr_name, DataType allowed) argument
|
H A D | op_def_builder.cc | 124 bool ProcessCompoundType(const StringPiece type_string, AttrValue* allowed) { argument 127 allowed->mutable_list()->add_type(dt); 131 allowed->mutable_list()->add_type(dt); 136 allowed->mutable_list()->add_type(dt); 176 AttrValue* allowed = attr->mutable_allowed_values(); local 177 VERIFY(ProcessCompoundType(type_string, allowed), 181 AttrValue* allowed = attr->mutable_allowed_values(); local 189 "Trouble parsing allowed string at '", spec, "'"); 195 allowed->mutable_list()->add_s(unescaped); 210 if (ProcessCompoundType(type_string, allowed)) { [all...] |
/external/linux-kselftest/tools/testing/selftests/vm/ |
H A D | compaction_test.c | 56 char allowed; local 67 if (read(fd, &allowed, sizeof(char)) != sizeof(char)) { 75 if (allowed == '1')
|
/external/mesa3d/src/gallium/drivers/etnaviv/ |
H A D | etnaviv_screen.c | 461 unsigned allowed = 0; local 477 /* Validate MSAA; number of samples must be allowed, and render target 482 allowed |= PIPE_BIND_RENDER_TARGET; 485 allowed |= PIPE_BIND_RENDER_TARGET; 492 allowed |= PIPE_BIND_DEPTH_STENCIL; 502 allowed |= PIPE_BIND_SAMPLER_VIEW; 507 allowed |= PIPE_BIND_VERTEX_BUFFER; 515 allowed |= PIPE_BIND_INDEX_BUFFER; 519 /* Always allowed */ 520 allowed | [all...] |
/external/selinux/libselinux/include/selinux/ |
H A D | selinux.h | 129 access_vector_t allowed; member in struct:av_decision
|
/external/mesa3d/src/gallium/state_trackers/nine/ |
H A D | adapter9.c | 232 static const D3DFORMAT allowed[] = { local 242 for (i = 0; i < sizeof(allowed)/sizeof(D3DFORMAT); i++) { 243 if (fmt == allowed[i]) { return TRUE; }
|
H A D | nine_pipe.h | 204 static D3DFORMAT allowed[] = { local 221 for (i = 0; i < sizeof(allowed)/sizeof(D3DFORMAT); i++) { 222 if (fmt == allowed[i]) { return TRUE; }
|
/external/robolectric-shadows/shadows/framework/src/main/java/org/robolectric/shadows/ |
H A D | ShadowAppWidgetManager.java | 252 public void setAllowedToBindAppWidgets(boolean allowed) { argument 253 allowedToBindWidgets = allowed;
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | acs.c | 367 const int allowed[] = { 36, 44, 52, 60, 100, 108, 116, 124, 132, 149, local 371 for (i = 0; i < ARRAY_SIZE(allowed); i++) 372 if (chan->chan == allowed[i]) 381 const int allowed[] = { 36, 52, 100, 116, 132, 149 }; local 384 for (i = 0; i < ARRAY_SIZE(allowed); i++) 385 if (chan->chan == allowed[i]) 611 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not allowed as primary channel for HT40", 620 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not allowed as primary channel for VHT80",
|
H A D | dfs.c | 95 int *allowed = allowed_40; local 100 allowed = allowed_40; 104 allowed = allowed_80; 108 allowed = allowed_160; 117 if (chan->chan == allowed[i])
|
/external/wpa_supplicant_8/hostapd/src/radius/ |
H A D | radius_das.c | 40 u8 allowed[] = { local 66 attr = radius_msg_find_unlisted_attr(msg, allowed);
|
/external/wpa_supplicant_8/src/ap/ |
H A D | acs.c | 367 const int allowed[] = { 36, 44, 52, 60, 100, 108, 116, 124, 132, 149, local 371 for (i = 0; i < ARRAY_SIZE(allowed); i++) 372 if (chan->chan == allowed[i]) 381 const int allowed[] = { 36, 52, 100, 116, 132, 149 }; local 384 for (i = 0; i < ARRAY_SIZE(allowed); i++) 385 if (chan->chan == allowed[i]) 611 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not allowed as primary channel for HT40", 620 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not allowed as primary channel for VHT80",
|
/external/wpa_supplicant_8/src/radius/ |
H A D | radius_das.c | 40 u8 allowed[] = { local 66 attr = radius_msg_find_unlisted_attr(msg, allowed);
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | acs.c | 367 const int allowed[] = { 36, 44, 52, 60, 100, 108, 116, 124, 132, 149, local 371 for (i = 0; i < ARRAY_SIZE(allowed); i++) 372 if (chan->chan == allowed[i]) 381 const int allowed[] = { 36, 52, 100, 116, 132, 149 }; local 384 for (i = 0; i < ARRAY_SIZE(allowed); i++) 385 if (chan->chan == allowed[i]) 611 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not allowed as primary channel for HT40", 620 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not allowed as primary channel for VHT80",
|
/external/wpa_supplicant_8/wpa_supplicant/src/radius/ |
H A D | radius_das.c | 40 u8 allowed[] = { local 66 attr = radius_msg_find_unlisted_attr(msg, allowed);
|
/external/tensorflow/tensorflow/compiler/tf2xla/ |
H A D | xla_op_registry.cc | 203 // b) the types allowed by the OpDef, and 222 // Filter out types that aren't allowed by the OpDef. 234 // Passed all the filters, this type is allowed. 348 StringPiece attr_name, DataType allowed) { 351 types.insert(allowed); 356 StringPiece attr_name, gtl::ArraySlice<DataType> allowed) { 359 for (DataType t : allowed) { 347 TypeConstraint( StringPiece attr_name, DataType allowed) argument 355 TypeConstraint( StringPiece attr_name, gtl::ArraySlice<DataType> allowed) argument
|
/external/vixl/test/aarch64/ |
H A D | test-utils-aarch64.cc | 278 RegList allowed) { 282 if (((UINT64_C(1) << n) & allowed) != 0) { 283 // Only assign allowed registers. 309 RegList allowed) { 313 if (((UINT64_C(1) << n) & allowed) != 0) { 314 // Only assigned allowed registers. 273 PopulateRegisterArray(Register* w, Register* x, Register* r, int reg_size, int reg_count, RegList allowed) argument 304 PopulateFPRegisterArray(FPRegister* s, FPRegister* d, FPRegister* v, int reg_size, int reg_count, RegList allowed) argument
|
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | hw_features_common.c | 91 int allowed[] = { 36, 44, 52, 60, 100, 108, 116, 124, 132, 140, local 102 /* Verify that HT40 secondary channel is an allowed 20 MHz 114 wpa_printf(MSG_ERROR, "HT40 secondary channel %d not allowed", 120 * Verify that HT40 primary,secondary channel pair is allowed per 123 * the list of allowed channels (already checked above). 131 for (k = 0; k < ARRAY_SIZE(allowed); k++) { 132 if (first == allowed[k]) { 138 wpa_printf(MSG_ERROR, "HT40 channel pair (%d, %d) not allowed",
|