/frameworks/base/services/core/java/com/android/server/oemlock/ |
D | OemLockService.java | 129 public void setOemUnlockAllowedByCarrier(boolean allowed, @Nullable byte[] signature) { 135 mOemLock.setOemUnlockAllowedByCarrier(allowed, signature); 205 boolean allowed = mOemLock.isOemUnlockAllowedByCarrier() 207 setPersistentDataBlockOemUnlockAllowedBit(allowed); 208 return allowed; 232 private void setPersistentDataBlockOemUnlockAllowedBit(boolean allowed) { in setPersistentDataBlockOemUnlockAllowedBit() argument 237 Slog.i(TAG, "Update OEM Unlock bit in pst partition to " + allowed); in setPersistentDataBlockOemUnlockAllowedBit() 238 pdbmi.forceOemUnlockEnabled(allowed); in setPersistentDataBlockOemUnlockAllowedBit()
|
D | VendorLock.java | 87 void setOemUnlockAllowedByCarrier(boolean allowed, @Nullable byte[] signature) { in setOemUnlockAllowedByCarrier() argument 90 switch (mOemLock.setOemUnlockAllowedByCarrier(allowed, signatureBytes)) { in setOemUnlockAllowedByCarrier() 92 Slog.i(TAG, "Updated carrier allows OEM lock state to: " + allowed); in setOemUnlockAllowedByCarrier() 120 mOemLock.isOemUnlockAllowedByCarrier((status, allowed) -> { in isOemUnlockAllowedByCarrier() argument 122 allowedByCarrier[0] = allowed; in isOemUnlockAllowedByCarrier() 168 mOemLock.isOemUnlockAllowedByDevice((status, allowed) -> { in isOemUnlockAllowedByDevice() argument 170 allowedByDevice[0] = allowed; in isOemUnlockAllowedByDevice()
|
D | PersistentDataBlockLock.java | 49 void setOemUnlockAllowedByCarrier(boolean allowed, @Nullable byte[] signature) { in setOemUnlockAllowedByCarrier() argument 57 UserManager.DISALLOW_OEM_UNLOCK, !allowed, UserHandle.SYSTEM); in setOemUnlockAllowedByCarrier() 59 if (!allowed) { in setOemUnlockAllowedByCarrier()
|
D | OemLock.java | 25 abstract void setOemUnlockAllowedByCarrier(boolean allowed, @Nullable byte[] signature); in setOemUnlockAllowedByCarrier() argument
|
/frameworks/base/core/java/android/service/oemlock/ |
D | OemLockManager.java | 80 public void setOemUnlockAllowedByCarrier(boolean allowed, @Nullable byte[] signature) { in setOemUnlockAllowedByCarrier() argument 82 mService.setOemUnlockAllowedByCarrier(allowed, signature); in setOemUnlockAllowedByCarrier() 114 public void setOemUnlockAllowedByUser(boolean allowed) { in setOemUnlockAllowedByUser() argument 116 mService.setOemUnlockAllowedByUser(allowed); in setOemUnlockAllowedByUser()
|
D | IOemLockService.aidl | 27 void setOemUnlockAllowedByCarrier(boolean allowed, in byte[] signature); in setOemUnlockAllowedByCarrier() argument 30 void setOemUnlockAllowedByUser(boolean allowed); in setOemUnlockAllowedByUser() argument
|
/frameworks/base/test-runner/api/ |
D | lint-baseline.txt | 139 …Protected methods not allowed; must be public: method android.test.ActivityInstrumentationTestCase… 141 …Protected methods not allowed; must be public: method android.test.ActivityInstrumentationTestCase… 143 …Protected methods not allowed; must be public: method android.test.ActivityInstrumentationTestCase… 145 …Protected methods not allowed; must be public: method android.test.ActivityInstrumentationTestCase… 147 …Protected methods not allowed; must be public: method android.test.ActivityInstrumentationTestCase… 149 Protected methods not allowed; must be public: method android.test.ActivityUnitTestCase.setUp()} 151 …Protected methods not allowed; must be public: method android.test.ActivityUnitTestCase.tearDown()} 153 Protected methods not allowed; must be public: method android.test.ApplicationTestCase.setUp()} 155 … Protected methods not allowed; must be public: method android.test.ApplicationTestCase.tearDown()} 157 Protected methods not allowed; must be public: method android.test.ProviderTestCase.setUp()} [all …]
|
/frameworks/base/services/autofill/java/com/android/server/autofill/ui/ |
D | OverlayControl.java | 49 private void setOverlayAllowed(boolean allowed) { in setOverlayAllowed() argument 51 mAppOpsManager.setUserRestrictionForUser(AppOpsManager.OP_SYSTEM_ALERT_WINDOW, !allowed, in setOverlayAllowed() 53 mAppOpsManager.setUserRestrictionForUser(AppOpsManager.OP_TOAST_WINDOW, !allowed, in setOverlayAllowed()
|
/frameworks/base/core/java/android/os/ |
D | Trace.java | 119 private static native void nativeSetAppTracingAllowed(boolean allowed); in nativeSetAppTracingAllowed() argument 120 private static native void nativeSetTracingEnabled(boolean allowed); in nativeSetTracingEnabled() argument 173 public static void setAppTracingAllowed(boolean allowed) { in setAppTracingAllowed() argument 174 nativeSetAppTracingAllowed(allowed); in setAppTracingAllowed()
|
/frameworks/base/services/accessibility/java/com/android/server/accessibility/ |
D | AccessibilityShellCommand.java | 66 final String allowed = getNextArgRequired(); in runSetBindInstantServiceAllowed() local 67 if (allowed == null) { in runSetBindInstantServiceAllowed() 72 Boolean.parseBoolean(allowed)); in runSetBindInstantServiceAllowed()
|
/frameworks/base/services/core/java/com/android/server/accounts/ |
D | AccountManagerServiceShellCommand.java | 67 final String allowed = getNextArgRequired(); in runSetBindInstantServiceAllowed() local 68 if (allowed == null) { in runSetBindInstantServiceAllowed() 73 Boolean.parseBoolean(allowed)); in runSetBindInstantServiceAllowed()
|
/frameworks/base/services/print/java/com/android/server/print/ |
D | PrintShellCommand.java | 73 final String allowed = getNextArgRequired(); in runSetBindInstantServiceAllowed() local 74 if (allowed == null) { in runSetBindInstantServiceAllowed() 79 mService.setBindInstantServiceAllowed(userId, Boolean.parseBoolean(allowed)); in runSetBindInstantServiceAllowed()
|
/frameworks/compile/slang/tests/F_union/ |
D | stderr.txt.expect | 2 union.rscript:9:14: error: unions containing RS object types are not allowed 3 union.rscript:16:11: error: unions containing RS object types are not allowed
|
/frameworks/base/core/proto/android/debug/ |
D | enums.proto | 35 * The user allowed the adb connection from the system. 45 * The adb connection was automatically allowed without user interaction due to the system 46 * being previously allowed by the user with the 'always allow' option selected, and the adb
|
/frameworks/base/services/core/java/com/android/server/pm/permission/ |
D | PermissionManagerService.java | 1619 boolean allowed = false; in isNewPlatformPermissionForPackage() 1626 allowed = true; in isNewPlatformPermissionForPackage() 1632 return allowed; in isNewPlatformPermissionForPackage() 1727 boolean allowed = in grantSignaturePermission() 1737 if (!allowed && (privilegedPermission || oemPermission)) { in grantSignaturePermission() 1754 allowed = true; in grantSignaturePermission() 1768 allowed = true; in grantSignaturePermission() 1783 allowed = true; in grantSignaturePermission() 1794 allowed = true; in grantSignaturePermission() 1804 allowed = (privilegedPermission && pkg.isPrivileged()) in grantSignaturePermission() [all …]
|
/frameworks/base/services/core/java/com/android/server/vr/ |
D | VrManagerService.java | 221 boolean allowed = (mSystemSleepFlags == FLAG_ALL || ignoreSleepFlags) && mUserUnlocked in updateVrModeAllowedLocked() 223 if (mVrModeAllowed != allowed) { in updateVrModeAllowedLocked() 224 mVrModeAllowed = allowed; in updateVrModeAllowedLocked() 225 if (DBG) Slog.d(TAG, "VR mode is " + ((allowed) ? "allowed" : "disallowed")); in updateVrModeAllowedLocked() 454 ArraySet<String> allowed = mAllowedPackages.get(currentUserId); in update() local 455 if (allowed == null) { in update() 456 allowed = new ArraySet<>(); in update() 472 for (String pkg : allowed) { in update() 481 if (!allowed.contains(pkg)) { in update() 489 allowed.clear(); in update() [all …]
|
/frameworks/base/services/core/java/com/android/server/wm/ |
D | RunningTasks.java | 44 int callingUid, boolean allowed, boolean crossUser, ArraySet<Integer> profileIds) { in getTasks() argument 59 callingUid, allowed, crossUser, profileIds); in getTasks()
|
/frameworks/base/core/jni/ |
D | android_os_Trace.cpp | 85 static void android_os_Trace_nativeSetAppTracingAllowed(JNIEnv*, jclass, jboolean allowed) { in android_os_Trace_nativeSetAppTracingAllowed() argument 86 atrace_set_debuggable(allowed); in android_os_Trace_nativeSetAppTracingAllowed()
|
/frameworks/base/packages/SystemUI/src/com/android/systemui/qs/external/ |
D | TileServiceManager.java | 167 public void setBindAllowed(boolean allowed) { in setBindAllowed() argument 168 if (mBindAllowed == allowed) return; in setBindAllowed() 169 mBindAllowed = allowed; in setBindAllowed()
|
/frameworks/base/packages/SystemUI/src/com/android/systemui/statusbar/ |
D | NotificationLockscreenUserManagerImpl.java | 379 final boolean allowed = allowedByUser && allowedByDpm; in userAllowsPrivateNotificationsInPublic() 380 mUsersAllowingPrivateNotifications.append(userHandle, allowed); in userAllowsPrivateNotificationsInPublic() 381 return allowed; in userAllowsPrivateNotificationsInPublic() 431 final boolean allowed = allowedByUser && allowedByDpm && allowedBySystem; in userAllowsNotificationsInPublic() 432 mUsersAllowingNotifications.append(userHandle, allowed); in userAllowsNotificationsInPublic() 433 return allowed; in userAllowsNotificationsInPublic()
|
/frameworks/native/cmds/servicemanager/ |
D | Access.cpp | 145 bool allowed = actionAllowed(sctx, tctx, perm, name); in actionAllowedFromLookup() local 147 return allowed; in actionAllowedFromLookup()
|
/frameworks/base/packages/SettingsLib/LayoutPreference/src/com/android/settingslib/widget/ |
D | LayoutPreference.java | 164 public void setAllowDividerBelow(boolean allowed) { in setAllowDividerBelow() argument 165 mAllowDividerBelow = allowed; in setAllowDividerBelow()
|
/frameworks/base/services/core/java/com/android/server/clipboard/ |
D | ClipboardService.java | 769 boolean allowed = mWm.isUidFocused(uid) in clipboardAccessAllowed() 771 if (!allowed && mContentCaptureInternal != null) { in clipboardAccessAllowed() 778 allowed = mContentCaptureInternal.isContentCaptureServiceForUser(uid, userId); in clipboardAccessAllowed() 780 if (!allowed && mAutofillInternal != null) { in clipboardAccessAllowed() 787 allowed = mAutofillInternal.isAugmentedAutofillServiceForUser(uid, userId); in clipboardAccessAllowed() 789 if (!allowed) { in clipboardAccessAllowed() 794 return allowed; in clipboardAccessAllowed()
|
/frameworks/base/core/java/com/android/server/ |
D | SystemConfig.java | 653 boolean allowed; in readPermissionsFromXml() 655 allowed = true; in readPermissionsFromXml() 658 allowed = !"true".equals(notLowRam); in readPermissionsFromXml() 663 } else if (allowed) { in readPermissionsFromXml() 954 String allowed = parser.getAttributeValue(null, "allowed"); in readPermissionsFromXml() local 955 if (allowed == null) { in readPermissionsFromXml() 962 allowed = allowed.intern(); in readPermissionsFromXml() 968 Slog.i(TAG, "Adding association: " + target + " <- " + allowed); in readPermissionsFromXml() 969 associations.add(allowed); in readPermissionsFromXml()
|
/frameworks/compile/slang/tests/F_kernel_static/ |
D | stderr.txt.expect | 1 kernel_static.rscript:14:14: error: Non-const static variables are not allowed in kernels: 'i'
|