Home
last modified time | relevance | path

Searched refs:allowed (Results 1 – 25 of 121) sorted by relevance

12345

/frameworks/base/services/core/java/com/android/server/oemlock/
DOemLockService.java129 public void setOemUnlockAllowedByCarrier(boolean allowed, @Nullable byte[] signature) {
135 mOemLock.setOemUnlockAllowedByCarrier(allowed, signature);
205 boolean allowed = mOemLock.isOemUnlockAllowedByCarrier()
207 setPersistentDataBlockOemUnlockAllowedBit(allowed);
208 return allowed;
232 private void setPersistentDataBlockOemUnlockAllowedBit(boolean allowed) { in setPersistentDataBlockOemUnlockAllowedBit() argument
237 Slog.i(TAG, "Update OEM Unlock bit in pst partition to " + allowed); in setPersistentDataBlockOemUnlockAllowedBit()
238 pdbmi.forceOemUnlockEnabled(allowed); in setPersistentDataBlockOemUnlockAllowedBit()
DVendorLock.java87 void setOemUnlockAllowedByCarrier(boolean allowed, @Nullable byte[] signature) { in setOemUnlockAllowedByCarrier() argument
90 switch (mOemLock.setOemUnlockAllowedByCarrier(allowed, signatureBytes)) { in setOemUnlockAllowedByCarrier()
92 Slog.i(TAG, "Updated carrier allows OEM lock state to: " + allowed); in setOemUnlockAllowedByCarrier()
120 mOemLock.isOemUnlockAllowedByCarrier((status, allowed) -> { in isOemUnlockAllowedByCarrier() argument
122 allowedByCarrier[0] = allowed; in isOemUnlockAllowedByCarrier()
168 mOemLock.isOemUnlockAllowedByDevice((status, allowed) -> { in isOemUnlockAllowedByDevice() argument
170 allowedByDevice[0] = allowed; in isOemUnlockAllowedByDevice()
DPersistentDataBlockLock.java49 void setOemUnlockAllowedByCarrier(boolean allowed, @Nullable byte[] signature) { in setOemUnlockAllowedByCarrier() argument
57 UserManager.DISALLOW_OEM_UNLOCK, !allowed, UserHandle.SYSTEM); in setOemUnlockAllowedByCarrier()
59 if (!allowed) { in setOemUnlockAllowedByCarrier()
DOemLock.java25 abstract void setOemUnlockAllowedByCarrier(boolean allowed, @Nullable byte[] signature); in setOemUnlockAllowedByCarrier() argument
/frameworks/base/core/java/android/service/oemlock/
DOemLockManager.java80 public void setOemUnlockAllowedByCarrier(boolean allowed, @Nullable byte[] signature) { in setOemUnlockAllowedByCarrier() argument
82 mService.setOemUnlockAllowedByCarrier(allowed, signature); in setOemUnlockAllowedByCarrier()
114 public void setOemUnlockAllowedByUser(boolean allowed) { in setOemUnlockAllowedByUser() argument
116 mService.setOemUnlockAllowedByUser(allowed); in setOemUnlockAllowedByUser()
DIOemLockService.aidl27 void setOemUnlockAllowedByCarrier(boolean allowed, in byte[] signature); in setOemUnlockAllowedByCarrier() argument
30 void setOemUnlockAllowedByUser(boolean allowed); in setOemUnlockAllowedByUser() argument
/frameworks/base/test-runner/api/
Dlint-baseline.txt139 …Protected methods not allowed; must be public: method android.test.ActivityInstrumentationTestCase…
141 …Protected methods not allowed; must be public: method android.test.ActivityInstrumentationTestCase…
143 …Protected methods not allowed; must be public: method android.test.ActivityInstrumentationTestCase…
145 …Protected methods not allowed; must be public: method android.test.ActivityInstrumentationTestCase…
147 …Protected methods not allowed; must be public: method android.test.ActivityInstrumentationTestCase…
149 Protected methods not allowed; must be public: method android.test.ActivityUnitTestCase.setUp()}
151 …Protected methods not allowed; must be public: method android.test.ActivityUnitTestCase.tearDown()}
153 Protected methods not allowed; must be public: method android.test.ApplicationTestCase.setUp()}
155 … Protected methods not allowed; must be public: method android.test.ApplicationTestCase.tearDown()}
157 Protected methods not allowed; must be public: method android.test.ProviderTestCase.setUp()}
[all …]
/frameworks/base/services/autofill/java/com/android/server/autofill/ui/
DOverlayControl.java49 private void setOverlayAllowed(boolean allowed) { in setOverlayAllowed() argument
51 mAppOpsManager.setUserRestrictionForUser(AppOpsManager.OP_SYSTEM_ALERT_WINDOW, !allowed, in setOverlayAllowed()
53 mAppOpsManager.setUserRestrictionForUser(AppOpsManager.OP_TOAST_WINDOW, !allowed, in setOverlayAllowed()
/frameworks/base/core/java/android/os/
DTrace.java119 private static native void nativeSetAppTracingAllowed(boolean allowed); in nativeSetAppTracingAllowed() argument
120 private static native void nativeSetTracingEnabled(boolean allowed); in nativeSetTracingEnabled() argument
173 public static void setAppTracingAllowed(boolean allowed) { in setAppTracingAllowed() argument
174 nativeSetAppTracingAllowed(allowed); in setAppTracingAllowed()
/frameworks/base/services/accessibility/java/com/android/server/accessibility/
DAccessibilityShellCommand.java66 final String allowed = getNextArgRequired(); in runSetBindInstantServiceAllowed() local
67 if (allowed == null) { in runSetBindInstantServiceAllowed()
72 Boolean.parseBoolean(allowed)); in runSetBindInstantServiceAllowed()
/frameworks/base/services/core/java/com/android/server/accounts/
DAccountManagerServiceShellCommand.java67 final String allowed = getNextArgRequired(); in runSetBindInstantServiceAllowed() local
68 if (allowed == null) { in runSetBindInstantServiceAllowed()
73 Boolean.parseBoolean(allowed)); in runSetBindInstantServiceAllowed()
/frameworks/base/services/print/java/com/android/server/print/
DPrintShellCommand.java73 final String allowed = getNextArgRequired(); in runSetBindInstantServiceAllowed() local
74 if (allowed == null) { in runSetBindInstantServiceAllowed()
79 mService.setBindInstantServiceAllowed(userId, Boolean.parseBoolean(allowed)); in runSetBindInstantServiceAllowed()
/frameworks/compile/slang/tests/F_union/
Dstderr.txt.expect2 union.rscript:9:14: error: unions containing RS object types are not allowed
3 union.rscript:16:11: error: unions containing RS object types are not allowed
/frameworks/base/core/proto/android/debug/
Denums.proto35 * The user allowed the adb connection from the system.
45 * The adb connection was automatically allowed without user interaction due to the system
46 * being previously allowed by the user with the 'always allow' option selected, and the adb
/frameworks/base/services/core/java/com/android/server/pm/permission/
DPermissionManagerService.java1619 boolean allowed = false; in isNewPlatformPermissionForPackage()
1626 allowed = true; in isNewPlatformPermissionForPackage()
1632 return allowed; in isNewPlatformPermissionForPackage()
1727 boolean allowed = in grantSignaturePermission()
1737 if (!allowed && (privilegedPermission || oemPermission)) { in grantSignaturePermission()
1754 allowed = true; in grantSignaturePermission()
1768 allowed = true; in grantSignaturePermission()
1783 allowed = true; in grantSignaturePermission()
1794 allowed = true; in grantSignaturePermission()
1804 allowed = (privilegedPermission && pkg.isPrivileged()) in grantSignaturePermission()
[all …]
/frameworks/base/services/core/java/com/android/server/vr/
DVrManagerService.java221 boolean allowed = (mSystemSleepFlags == FLAG_ALL || ignoreSleepFlags) && mUserUnlocked in updateVrModeAllowedLocked()
223 if (mVrModeAllowed != allowed) { in updateVrModeAllowedLocked()
224 mVrModeAllowed = allowed; in updateVrModeAllowedLocked()
225 if (DBG) Slog.d(TAG, "VR mode is " + ((allowed) ? "allowed" : "disallowed")); in updateVrModeAllowedLocked()
454 ArraySet<String> allowed = mAllowedPackages.get(currentUserId); in update() local
455 if (allowed == null) { in update()
456 allowed = new ArraySet<>(); in update()
472 for (String pkg : allowed) { in update()
481 if (!allowed.contains(pkg)) { in update()
489 allowed.clear(); in update()
[all …]
/frameworks/base/services/core/java/com/android/server/wm/
DRunningTasks.java44 int callingUid, boolean allowed, boolean crossUser, ArraySet<Integer> profileIds) { in getTasks() argument
59 callingUid, allowed, crossUser, profileIds); in getTasks()
/frameworks/base/core/jni/
Dandroid_os_Trace.cpp85 static void android_os_Trace_nativeSetAppTracingAllowed(JNIEnv*, jclass, jboolean allowed) { in android_os_Trace_nativeSetAppTracingAllowed() argument
86 atrace_set_debuggable(allowed); in android_os_Trace_nativeSetAppTracingAllowed()
/frameworks/base/packages/SystemUI/src/com/android/systemui/qs/external/
DTileServiceManager.java167 public void setBindAllowed(boolean allowed) { in setBindAllowed() argument
168 if (mBindAllowed == allowed) return; in setBindAllowed()
169 mBindAllowed = allowed; in setBindAllowed()
/frameworks/base/packages/SystemUI/src/com/android/systemui/statusbar/
DNotificationLockscreenUserManagerImpl.java379 final boolean allowed = allowedByUser && allowedByDpm; in userAllowsPrivateNotificationsInPublic()
380 mUsersAllowingPrivateNotifications.append(userHandle, allowed); in userAllowsPrivateNotificationsInPublic()
381 return allowed; in userAllowsPrivateNotificationsInPublic()
431 final boolean allowed = allowedByUser && allowedByDpm && allowedBySystem; in userAllowsNotificationsInPublic()
432 mUsersAllowingNotifications.append(userHandle, allowed); in userAllowsNotificationsInPublic()
433 return allowed; in userAllowsNotificationsInPublic()
/frameworks/native/cmds/servicemanager/
DAccess.cpp145 bool allowed = actionAllowed(sctx, tctx, perm, name); in actionAllowedFromLookup() local
147 return allowed; in actionAllowedFromLookup()
/frameworks/base/packages/SettingsLib/LayoutPreference/src/com/android/settingslib/widget/
DLayoutPreference.java164 public void setAllowDividerBelow(boolean allowed) { in setAllowDividerBelow() argument
165 mAllowDividerBelow = allowed; in setAllowDividerBelow()
/frameworks/base/services/core/java/com/android/server/clipboard/
DClipboardService.java769 boolean allowed = mWm.isUidFocused(uid) in clipboardAccessAllowed()
771 if (!allowed && mContentCaptureInternal != null) { in clipboardAccessAllowed()
778 allowed = mContentCaptureInternal.isContentCaptureServiceForUser(uid, userId); in clipboardAccessAllowed()
780 if (!allowed && mAutofillInternal != null) { in clipboardAccessAllowed()
787 allowed = mAutofillInternal.isAugmentedAutofillServiceForUser(uid, userId); in clipboardAccessAllowed()
789 if (!allowed) { in clipboardAccessAllowed()
794 return allowed; in clipboardAccessAllowed()
/frameworks/base/core/java/com/android/server/
DSystemConfig.java653 boolean allowed; in readPermissionsFromXml()
655 allowed = true; in readPermissionsFromXml()
658 allowed = !"true".equals(notLowRam); in readPermissionsFromXml()
663 } else if (allowed) { in readPermissionsFromXml()
954 String allowed = parser.getAttributeValue(null, "allowed"); in readPermissionsFromXml() local
955 if (allowed == null) { in readPermissionsFromXml()
962 allowed = allowed.intern(); in readPermissionsFromXml()
968 Slog.i(TAG, "Adding association: " + target + " <- " + allowed); in readPermissionsFromXml()
969 associations.add(allowed); in readPermissionsFromXml()
/frameworks/compile/slang/tests/F_kernel_static/
Dstderr.txt.expect1 kernel_static.rscript:14:14: error: Non-const static variables are not allowed in kernels: 'i'

12345