/cts/tests/inputmethod/mockime/src/com/android/cts/mockime/ |
D | ImeSettings.java | 130 public Builder setFullscreenModeAllowed(boolean allowed) { in setFullscreenModeAllowed() argument 131 mBundle.putBoolean(FULLSCREEN_MODE_ALLOWED, allowed); in setFullscreenModeAllowed() 213 public Builder setHardKeyboardConfigurationBehaviorAllowed(boolean allowed) { in setHardKeyboardConfigurationBehaviorAllowed() argument 214 mBundle.putBoolean(HARD_KEYBOARD_CONFIGURATION_BEHAVIOR_ALLOWED, allowed); in setHardKeyboardConfigurationBehaviorAllowed()
|
/cts/hostsidetests/seccomp/app/ |
D | gen_blacklist.py | 169 allowed = {} 175 allowed[arch] = create_syscall_name_to_number_map( 180 with open(args.allowed, 'w') as f: 182 json.dump(allowed, f, sort_keys=True, indent=2)
|
/cts/hostsidetests/net/app/src/com/android/cts/net/hostside/ |
D | MyVpnService.java | 93 String allowed = intent.getStringExtra(packageName + ".allowedapplications"); in start() local 94 if (allowed != null) { in start() 95 String[] packageArray = allowed.split(","); in start() 144 + " allowedApplications=" + allowed in start()
|
/cts/hostsidetests/appsecurity/src/android/appsecurity/cts/ |
D | DeviceIdentifierTest.java | 67 private void setDeviceIdentifierAccessAppOp(String packageName, boolean allowed) in setDeviceIdentifierAccessAppOp() argument 71 + "READ_DEVICE_IDENTIFIERS " + (allowed ? "allow" : "deny"); in setDeviceIdentifierAccessAppOp()
|
/cts/common/device-side/util/src/com/android/compatibility/common/util/ |
D | ShellUtils.java | 82 public static void setOverlayPermissions(@NonNull String packageName, boolean allowed) { in setOverlayPermissions() argument 83 final String action = allowed ? "allow" : "ignore"; in setOverlayPermissions()
|
/cts/common/device-side/util-axt/src/com/android/compatibility/common/util/ |
D | ShellUtils.java | 82 public static void setOverlayPermissions(@NonNull String packageName, boolean allowed) { in setOverlayPermissions() argument 83 final String action = allowed ? "allow" : "ignore"; in setOverlayPermissions()
|
/cts/tests/tests/location/src/android/location/cts/asn1/supl2/supl_notify_response/ |
D | NotificationResponse.java | 38 allowed(0), enumConstant
|
/cts/tests/tests/os/assets/minijail/ |
D | isolated-common.policy | 44 … FUTEX_WAKE_OP,FUTEX_WAIT_BITSET,FUTEX_WAKE_BITSET} with only these flags allowed:
|
/cts/hostsidetests/devicepolicy/app/DeviceOwner/src/com/android/cts/deviceowner/ |
D | SecurityLoggingTest.java | 417 private void assertOneOf(Set<String> allowed, String s) { in assertOneOf() argument 418 assertTrue(String.format("\"%s\" is not one of [%s]", s, String.join(", ", allowed)), in assertOneOf() 419 allowed.contains(s)); in assertOneOf()
|
/cts/hostsidetests/devicepolicy/src/com/android/cts/devicepolicy/ |
D | DeviceAndProfileOwnerTest.java | 1952 private void setInstallPackageAppOps(String packageName, boolean allowed, int userId) in setInstallPackageAppOps() argument 1956 + (allowed ? "allow" : "default"); in setInstallPackageAppOps()
|
/cts/tests/tests/renderscript/src/android/renderscript/cts/ |
D | single_source_alloc.rscript | 366 _RS_ASSERT(rsIsObject(rsCreateType(I32_3, 0))); // x = 0 is allowed
|
/cts/tests/tests/security/jni/ |
D | android_security_cts_cve_2019_2213_Test.c | 1079 u32 allowed; member 1088 n.allowed = ~0u; in grant()
|
/cts/apps/CameraITS/build/scripts/ |
D | gpylint_rcfile | 224 # Regexp for a line that is allowed to be longer than the limit.
|
/cts/hostsidetests/sustainedperf/dhrystone/ |
D | Rationale | 289 o Other optimizations are allowed, but they should be indicated
|