/frameworks/base/core/java/android/service/oemlock/ |
H A D | OemLockManager.java | 47 * Sets whether the carrier has allowed this device to be OEM unlocked. 55 * @param allowed Whether the device should be allowed to be unlocked. 63 public void setOemUnlockAllowedByCarrier(boolean allowed, @Nullable byte[] signature) { argument 65 mService.setOemUnlockAllowedByCarrier(allowed, signature); 72 * Returns whether the carrier has allowed this device to be OEM unlocked. 73 * @return Whether OEM unlock is allowed by the carrier, or true if no OEM lock is present. 87 * Sets whether the user has allowed this device to be unlocked. 91 * @param allowed Whether the device should be allowed t 97 setOemUnlockAllowedByUser(boolean allowed) argument [all...] |
/frameworks/base/services/autofill/java/com/android/server/autofill/ui/ |
H A D | OverlayControl.java | 49 private void setOverlayAllowed(boolean allowed) { argument 51 mAppOpsManager.setUserRestrictionForUser(AppOpsManager.OP_SYSTEM_ALERT_WINDOW, !allowed, 53 mAppOpsManager.setUserRestrictionForUser(AppOpsManager.OP_TOAST_WINDOW, !allowed,
|
/frameworks/base/services/core/java/com/android/server/oemlock/ |
H A D | OemLock.java | 22 abstract void setOemUnlockAllowedByCarrier(boolean allowed, @Nullable byte[] signature); argument
|
H A D | PersistentDataBlockLock.java | 43 void setOemUnlockAllowedByCarrier(boolean allowed, @Nullable byte[] signature) { argument 51 UserManager.DISALLOW_OEM_UNLOCK, !allowed, UserHandle.SYSTEM); 53 if (!allowed) {
|
H A D | VendorLock.java | 58 void setOemUnlockAllowedByCarrier(boolean allowed, @Nullable byte[] signature) { argument 60 switch (mOemLock.setOemUnlockAllowedByCarrier(allowed, toByteArrayList(signature))) { 62 Slog.i(TAG, "Updated carrier allows OEM lock state to: " + allowed); 87 mOemLock.isOemUnlockAllowedByCarrier((status, allowed) -> { 89 allowedByCarrier[0] = allowed; 135 mOemLock.isOemUnlockAllowedByDevice((status, allowed) -> { 137 allowedByDevice[0] = allowed;
|
H A D | OemLockService.java | 116 public void setOemUnlockAllowedByCarrier(boolean allowed, @Nullable byte[] signature) { 122 mOemLock.setOemUnlockAllowedByCarrier(allowed, signature); 192 boolean allowed = mOemLock.isOemUnlockAllowedByCarrier() 194 setPersistentDataBlockOemUnlockAllowedBit(allowed); 195 return allowed; 219 private void setPersistentDataBlockOemUnlockAllowedBit(boolean allowed) { argument 224 Slog.i(TAG, "Update OEM Unlock bit in pst partition to " + allowed); 225 pdbmi.forceOemUnlockEnabled(allowed); 237 "Can't manage OEM unlock allowed by carrier"); 243 "Can't manage OEM unlock allowed b [all...] |
/frameworks/support/preference/src/main/java/androidx/preference/ |
H A D | PreferenceViewHolder.java | 78 * @return true if dividers are allowed above this item 92 * @param allowed false to prevent dividers being drawn above this item 94 public void setDividerAllowedAbove(boolean allowed) { argument 95 mDividerAllowedAbove = allowed; 102 * @return true if dividers are allowed below this item 116 * @param allowed false to prevent dividers being drawn below this item 118 public void setDividerAllowedBelow(boolean allowed) { argument 119 mDividerAllowedBelow = allowed;
|
/frameworks/base/services/core/java/com/android/server/am/ |
H A D | RunningTasks.java | 49 int callingUid, boolean allowed) { 64 callingUid, allowed); 47 getTasks(int maxNum, List<RunningTaskInfo> list, @ActivityType int ignoreActivityType, @WindowingMode int ignoreWindowingMode, SparseArray<ActivityDisplay> activityDisplays, int callingUid, boolean allowed) argument
|
/frameworks/base/core/jni/ |
H A D | android_os_Trace.cpp | 94 jclass clazz, jboolean allowed) { 95 ALOGV("%s: %d", __FUNCTION__, allowed); 97 atrace_set_debuggable(allowed); 93 android_os_Trace_nativeSetAppTracingAllowed(JNIEnv* env, jclass clazz, jboolean allowed) argument
|
/frameworks/base/services/core/java/com/android/server/accounts/ |
H A D | IAccountAuthenticatorCache.java | 75 void setBindInstantServiceAllowed(int userId, boolean allowed); argument
|
/frameworks/support/frameworks/support/samples/ViewPager2Demos/src/main/java/com/example/androidx/viewpager2/cards/ |
H A D | Card.java | 69 private static char checkValidValue(char value, Set<Character> allowed) { argument 70 if (allowed.contains(value)) { 77 * Creates a deck of all allowed cards
|
/frameworks/support/samples/ViewPager2Demos/src/main/java/com/example/androidx/viewpager2/cards/ |
H A D | Card.java | 69 private static char checkValidValue(char value, Set<Character> allowed) { argument 70 if (allowed.contains(value)) { 77 * Creates a deck of all allowed cards
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/dataconnection/ |
H A D | DataConnectionReasons.java | 31 // Adding a disallowed reason will clean up the allowed reason because they are 38 // Adding an allowed reason will clean up the disallowed reasons because they are 42 // Only higher priority allowed reason can overwrite the old one. See 58 reasonStr.append("Data allowed, reason:"); 69 boolean allowed() { method in class:DataConnectionReasons 100 // Disallowed reasons. There could be multiple reasons if data connection is not allowed. 131 // Data allowed reasons. There will be only one reason if data is allowed. 133 // Note that unlike disallowed reasons, we only have one allowed reason every time 134 // when we check data is allowed o [all...] |
H A D | ApnContext.java | 250 * Save the state indicating concurrent voice/data allowed. 251 * @param allowed True if concurrent voice/data is allowed 253 public synchronized void setConcurrentVoiceAndDataAllowed(boolean allowed) { argument 254 mConcurrentVoiceAndDataAllowed = allowed; 258 * Get the state indicating concurrent voice/data allowed. 259 * @return True if concurrent voice/data is allowed 333 * @return True if allowed, otherwise false.
|
/frameworks/av/services/oboeservice/ |
H A D | AAudioService.cpp | 193 bool allowed = callerOwnsIt || serverCalling || serverOwnsIt; local 194 if (!allowed) {
|
/frameworks/base/core/java/android/view/textclassifier/ |
H A D | TextSelection.java | 282 * @param allowed whether or not the TextClassifier should return selection suggestions 293 public Builder setDarkLaunchAllowed(boolean allowed) { argument 294 mDarkLaunchAllowed = allowed;
|
/frameworks/base/packages/SystemUI/src/com/android/systemui/qs/external/ |
H A D | TileServiceManager.java | 44 * of when it is allowed to bind based on decisions frome the {@link TileServices}. 149 public void setBindAllowed(boolean allowed) { argument 150 if (mBindAllowed == allowed) return; 151 mBindAllowed = allowed;
|
/frameworks/support/leanback/src/main/java/androidx/leanback/widget/ |
H A D | DetailsOverviewRow.java | 240 public void setImageScaleUpAllowed(boolean allowed) { argument 241 if (allowed != mImageScaleUpAllowed) { 242 mImageScaleUpAllowed = allowed;
|
/frameworks/base/core/java/android/os/ |
H A D | Trace.java | 106 private static native void nativeSetAppTracingAllowed(boolean allowed); argument 107 private static native void nativeSetTracingEnabled(boolean allowed); argument 192 * Set whether application tracing is allowed for this process. This is intended to be set 197 public static void setAppTracingAllowed(boolean allowed) { argument 198 nativeSetAppTracingAllowed(allowed); 200 // Setting whether app tracing is allowed may change the tags, so we update the cached
|
/frameworks/base/packages/SystemUI/src/com/android/systemui/statusbar/ |
H A D | NotificationBackgroundView.java | 286 public void setPressedAllowed(boolean allowed) { argument 287 mIsPressedAllowed = allowed;
|
/frameworks/base/services/print/java/com/android/server/print/ |
H A D | PrintManagerService.java | 754 public void setBindInstantServiceAllowed(@UserIdInt int userId, boolean allowed) { argument 767 userState.setBindInstantServiceAllowed(allowed);
|
/frameworks/native/cmds/servicemanager/ |
H A D | service_manager.c | 68 bool allowed; local 81 allowed = (result == 0); 84 return allowed; 94 bool allowed; local 107 allowed = check_mac_perms(spid, uid, tctx, perm, name); 109 return allowed;
|
/frameworks/av/drm/drmserver/ |
H A D | DrmManagerService.cpp | 75 bool allowed = (selinux_check_access(sctx, drmserver_context, selinux_class, local 79 return allowed;
|
/frameworks/base/core/java/android/bluetooth/ |
H A D | BluetoothHeadset.java | 739 * Sets whether audio routing is allowed. When set to {@code false}, the AG will not route any 745 * @param allowed {@code true} if the profile can reroute audio, {@code false} otherwise. 748 public void setAudioRouteAllowed(boolean allowed) { argument 753 service.setAudioRouteAllowed(allowed); 764 * Returns whether audio routing is allowed. see {@link #setAudioRouteAllowed(boolean)}. 1007 * <p>Currently only {@link #VENDOR_RESULT_CODE_COMMAND_ANDROID} is allowed as {@code command}. 1014 * @return {@code false} if there is no headset connected, or if the command is not an allowed
|
/frameworks/base/core/java/android/content/pm/ |
H A D | RegisteredServicesCache.java | 395 * @return whether the binding to service is allowed for instant apps. 409 * Set whether the binding to service is allowed or not for instant apps. 411 public void setBindInstantServiceAllowed(int userId, boolean allowed) { argument 418 user.mBindInstantServiceAllowed = allowed;
|