/aosp12/hardware/interfaces/oemlock/aidl/vts/ |
H A D | VtsHalOemLockTargetTest.cpp | 56 bool allowed; in TEST_P() local 68 bool allowed; in TEST_P() local 73 const bool originallyAllowed = allowed; in TEST_P() 81 ASSERT_EQ(allowed, !originallyAllowed); in TEST_P() 89 ASSERT_EQ(allowed, originallyAllowed); in TEST_P() 96 bool allowed; in TEST_P() local 113 bool allowed; in TEST_P() local 119 const bool originallyAllowed = allowed; in TEST_P() 137 ASSERT_EQ(allowed, originallyAllowed); in TEST_P() 142 ASSERT_EQ(allowed, !originallyAllowed); in TEST_P() [all …]
|
/aosp12/hardware/interfaces/oemlock/1.0/vts/functional/ |
H A D | VtsHalOemLockV1_0TargetTest.cpp | 63 bool allowed; in TEST_P() local 70 allowed = a; in TEST_P() 83 bool allowed; in TEST_P() local 88 allowed = a; in TEST_P() 95 const bool originallyAllowed = allowed; in TEST_P() 104 ASSERT_EQ(allowed, !originallyAllowed); in TEST_P() 113 ASSERT_EQ(allowed, originallyAllowed); in TEST_P() 120 bool allowed; in TEST_P() local 127 allowed = a; in TEST_P() 145 bool allowed; in TEST_P() local [all …]
|
/aosp12/hardware/interfaces/oemlock/1.0/ |
H A D | IOemLock.hal | 22 * allowed and both must agree that is allowed in order for unlock to be 39 * Updates whether OEM unlock is allowed by the carrier. 44 * @param allowed is the new value of the flag. 51 setOemUnlockAllowedByCarrier(bool allowed, vec<uint8_t> signature) 55 * Returns whether OEM unlock is allowed by the carrier. 58 * @return allowed is the current state of the flag. 63 * Updates whether OEM unlock is allowed by the device. 65 * @param allowed is the new value of the flag. 68 setOemUnlockAllowedByDevice(bool allowed) generates (OemLockStatus status); 71 * Returns whether OEM unlock ia allowed by the device. [all …]
|
/aosp12/frameworks/base/services/core/java/com/android/server/location/provider/ |
H A D | AbstractLocationProvider.java | 78 public final boolean allowed; field in AbstractLocationProvider.State 98 this.allowed = allowed; in State() 107 public State withAllowed(boolean allowed) { in withAllowed() argument 108 if (allowed == this.allowed) { in withAllowed() 111 return new State(allowed, properties, identity, extraAttributionTags); in withAllowed() 122 return new State(allowed, properties, identity, extraAttributionTags); in withProperties() 133 return new State(allowed, properties, identity, extraAttributionTags); in withIdentity() 158 return allowed == state.allowed && properties == state.properties in equals() 165 return Objects.hash(allowed, properties, identity, extraAttributionTags); in hashCode() 275 protected void setAllowed(boolean allowed) { in setAllowed() argument [all …]
|
/aosp12/packages/apps/Settings/src/com/android/settings/accessibility/ |
H A D | DividerSwitchPreference.java | 59 public void setDividerAllowedAbove(boolean allowed) { in setDividerAllowedAbove() argument 60 if (mDividerAllowedAbove != allowed) { in setDividerAllowedAbove() 61 mDividerAllowedAbove = allowed; in setDividerAllowedAbove() 71 public void setDividerAllowedBelow(boolean allowed) { in setDividerAllowedBelow() argument 72 if (mDividerAllowedAbove != allowed) { in setDividerAllowedBelow() 73 mDividerAllowBelow = allowed; in setDividerAllowedBelow()
|
/aosp12/frameworks/base/services/core/java/com/android/server/oemlock/ |
H A D | OemLockService.java | 129 public void setOemUnlockAllowedByCarrier(boolean allowed, @Nullable byte[] signature) { 135 mOemLock.setOemUnlockAllowedByCarrier(allowed, signature); 205 boolean allowed = mOemLock.isOemUnlockAllowedByCarrier() 207 setPersistentDataBlockOemUnlockAllowedBit(allowed); 208 return allowed; 232 private void setPersistentDataBlockOemUnlockAllowedBit(boolean allowed) { in setPersistentDataBlockOemUnlockAllowedBit() argument 237 Slog.i(TAG, "Update OEM Unlock bit in pst partition to " + allowed); in setPersistentDataBlockOemUnlockAllowedBit() 238 pdbmi.forceOemUnlockEnabled(allowed); in setPersistentDataBlockOemUnlockAllowedBit()
|
H A D | VendorLock.java | 87 void setOemUnlockAllowedByCarrier(boolean allowed, @Nullable byte[] signature) { in setOemUnlockAllowedByCarrier() argument 90 switch (mOemLock.setOemUnlockAllowedByCarrier(allowed, signatureBytes)) { in setOemUnlockAllowedByCarrier() 92 Slog.i(TAG, "Updated carrier allows OEM lock state to: " + allowed); in setOemUnlockAllowedByCarrier() 120 mOemLock.isOemUnlockAllowedByCarrier((status, allowed) -> { in isOemUnlockAllowedByCarrier() 122 allowedByCarrier[0] = allowed; in isOemUnlockAllowedByCarrier() 168 mOemLock.isOemUnlockAllowedByDevice((status, allowed) -> { in isOemUnlockAllowedByDevice() 170 allowedByDevice[0] = allowed; in isOemUnlockAllowedByDevice()
|
H A D | PersistentDataBlockLock.java | 49 void setOemUnlockAllowedByCarrier(boolean allowed, @Nullable byte[] signature) { in setOemUnlockAllowedByCarrier() argument 57 UserManager.DISALLOW_OEM_UNLOCK, !allowed, UserHandle.SYSTEM); in setOemUnlockAllowedByCarrier() 59 if (!allowed) { in setOemUnlockAllowedByCarrier()
|
/aosp12/build/make/core/ |
H A D | artifact_path_requirements.mk | 29 $(eval allowed := $(PRODUCTS.$(makefile).ARTIFACT_PATH_ALLOWED_LIST)) \ 31 $(eval allowed_patterns := $(call resolve-product-relative-paths,$(allowed))) \ 39 …$(call maybe-print-list-and-error,$(unused_allowed),$(makefile) includes redundant allowed entries… 45 $(eval allowed := $(PRODUCT_ARTIFACT_PATH_REQUIREMENT_ALLOWED_LIST)) \ 46 $(eval allowed_patterns := $(call resolve-product-relative-paths,$(allowed))) \ 55 …_allowed),$(INTERNAL_PRODUCT) includes redundant artifact path requirement allowed list entries.) \
|
/aosp12/system/hwservicemanager/ |
H A D | AccessControl.cpp | 100 bool allowed = false; in checkPermission() local 107 allowed = (selinux_check_access(source.sid.c_str(), targetContext, "hwservice_manager", in checkPermission() 110 return allowed; in checkPermission() 115 bool allowed = false; in checkPermission() local 123 allowed = checkPermission(source, targetContext, perm, interface); in checkPermission() 127 return allowed; in checkPermission()
|
/aosp12/system/libziparchive/incfs_support/ |
H A D | signal_handling.cpp | 26 sigset_t allowed; in enableSignal() local 27 sigemptyset(&allowed); in enableSignal() 28 sigaddset(&allowed, code); in enableSignal() 29 pthread_sigmask(SIG_UNBLOCK, &allowed, nullptr); in enableSignal()
|
/aosp12/frameworks/base/test-runner/api/ |
H A D | lint-baseline.txt | 149 Protected methods not allowed; must be public: method android.test.ActivityUnitTestCase.setUp()} 151 …Protected methods not allowed; must be public: method android.test.ActivityUnitTestCase.tearDown()} 153 Protected methods not allowed; must be public: method android.test.ApplicationTestCase.setUp()} 155 … Protected methods not allowed; must be public: method android.test.ApplicationTestCase.tearDown()} 157 Protected methods not allowed; must be public: method android.test.ProviderTestCase.setUp()} 159 Protected methods not allowed; must be public: method android.test.ProviderTestCase.tearDown()} 161 Protected methods not allowed; must be public: method android.test.ProviderTestCase2.setUp()} 163 Protected methods not allowed; must be public: method android.test.ProviderTestCase2.tearDown()} 165 Protected methods not allowed; must be public: method android.test.ServiceTestCase.setUp()} 167 Protected methods not allowed; must be public: method android.test.ServiceTestCase.tearDown()} [all …]
|
/aosp12/frameworks/base/services/tests/servicestests/src/com/android/server/om/ |
H A D | OverlayActorEnforcerTests.kt | 71 testCase.allowed.map { param(it, Params.Type.ALLOWED) } 88 } + testCase.allowed.map { 130 allowed("debuggable") { 141 allowed("targetUid") { callingUid = TARGET_UID } 142 allowed("rootUid") { callingUid = Process.ROOT_UID } 143 allowed("systemUid") { callingUid = Process.SYSTEM_UID } 160 allowed("hasPermission") { hasPermission = true } 193 allowed("hasPermissionNullActor") { 345 var allowed: MutableList<Pair<String, TestState.() -> Unit>> = mutableListOf(), 352 fun allowed(caseName: String, block: TestState.() -> Unit) { regex [all …]
|
/aosp12/frameworks/base/services/core/java/com/android/server/locksettings/ |
H A D | LockSettingsStrongAuth.java | 349 protected void setIsNonStrongBiometricAllowed(boolean allowed, int userId) { in setIsNonStrongBiometricAllowed() argument 351 Slog.d(TAG, "setIsNonStrongBiometricAllowed for allowed=" + allowed in setIsNonStrongBiometricAllowed() 357 setIsNonStrongBiometricAllowedOneUser(allowed, key); in setIsNonStrongBiometricAllowed() 360 setIsNonStrongBiometricAllowedOneUser(allowed, userId); in setIsNonStrongBiometricAllowed() 364 private void setIsNonStrongBiometricAllowedOneUser(boolean allowed, int userId) { in setIsNonStrongBiometricAllowedOneUser() argument 371 if (allowed != oldValue) { in setIsNonStrongBiometricAllowedOneUser() 374 + " oldValue=" + oldValue + ", allowed=" + allowed); in setIsNonStrongBiometricAllowedOneUser() 376 mIsNonStrongBiometricAllowedForUser.put(userId, allowed); in setIsNonStrongBiometricAllowedOneUser() 377 notifyStrongAuthTrackersForIsNonStrongBiometricAllowed(allowed, userId); in setIsNonStrongBiometricAllowedOneUser() 422 + " for allowed=" + allowed + ", userId=" + userId); in notifyStrongAuthTrackersForIsNonStrongBiometricAllowed() [all …]
|
/aosp12/frameworks/base/core/java/android/service/oemlock/ |
H A D | OemLockManager.java | 80 public void setOemUnlockAllowedByCarrier(boolean allowed, @Nullable byte[] signature) { in setOemUnlockAllowedByCarrier() argument 82 mService.setOemUnlockAllowedByCarrier(allowed, signature); in setOemUnlockAllowedByCarrier() 114 public void setOemUnlockAllowedByUser(boolean allowed) { in setOemUnlockAllowedByUser() argument 116 mService.setOemUnlockAllowedByUser(allowed); in setOemUnlockAllowedByUser()
|
H A D | IOemLockService.aidl | 27 void setOemUnlockAllowedByCarrier(boolean allowed, in byte[] signature); in setOemUnlockAllowedByCarrier() argument 30 void setOemUnlockAllowedByUser(boolean allowed); in setOemUnlockAllowedByUser() argument
|
/aosp12/system/apex/apexd/ |
H A D | apex_shim.cpp | 170 auto allowed = GetAllowedHashes(system_apex_path); in ValidateUpdate() local 171 if (!allowed.ok()) { in ValidateUpdate() 172 return allowed.error(); in ValidateUpdate() 178 auto it = std::find(allowed->begin(), allowed->end(), *actual); in ValidateUpdate() 179 if (it == allowed->end()) { in ValidateUpdate()
|
/aosp12/packages/apps/ManagedProvisioning/src/com/android/managedprovisioning/common/ |
H A D | SettingsFacade.java | 60 public void setProfileContactRemoteSearch(Context context, boolean allowed, int userId) { in setProfileContactRemoteSearch() argument 62 MANAGED_PROFILE_CONTACT_REMOTE_SEARCH, allowed ? 1 : 0, userId); in setProfileContactRemoteSearch() 68 public void setCrossProfileCalendarEnabled(Context context, boolean allowed, int userId) { in setCrossProfileCalendarEnabled() argument 70 CROSS_PROFILE_CALENDAR_ENABLED, allowed ? 1 : 0, userId); in setCrossProfileCalendarEnabled()
|
/aosp12/frameworks/base/packages/SystemUI/src/com/android/systemui/demomode/ |
H A D | DemoModeAvailabilityTracker.kt | 70 val allowed = checkIsDemoModeAllowed() regex 72 android.util.Log.d(TAG, "onChange: DEMO_MODE_ALLOWED changed: $allowed") 75 if (isDemoModeAvailable == allowed) { 79 isDemoModeAvailable = allowed
|
/aosp12/frameworks/base/services/autofill/java/com/android/server/autofill/ui/ |
H A D | OverlayControl.java | 49 private void setOverlayAllowed(boolean allowed) { in setOverlayAllowed() argument 51 mAppOpsManager.setUserRestrictionForUser(AppOpsManager.OP_SYSTEM_ALERT_WINDOW, !allowed, in setOverlayAllowed() 53 mAppOpsManager.setUserRestrictionForUser(AppOpsManager.OP_TOAST_WINDOW, !allowed, in setOverlayAllowed()
|
/aosp12/frameworks/base/core/java/android/os/ |
H A D | Trace.java | 121 private static native void nativeSetAppTracingAllowed(boolean allowed); in nativeSetAppTracingAllowed() argument 122 private static native void nativeSetTracingEnabled(boolean allowed); in nativeSetTracingEnabled() argument 177 public static void setAppTracingAllowed(boolean allowed) { in setAppTracingAllowed() argument 178 nativeSetAppTracingAllowed(allowed); in setAppTracingAllowed()
|
/aosp12/frameworks/base/services/print/java/com/android/server/print/ |
H A D | PrintShellCommand.java | 73 final String allowed = getNextArgRequired(); in runSetBindInstantServiceAllowed() local 74 if (allowed == null) { in runSetBindInstantServiceAllowed() 79 mService.setBindInstantServiceAllowed(userId, Boolean.parseBoolean(allowed)); in runSetBindInstantServiceAllowed()
|
/aosp12/frameworks/base/services/core/java/com/android/server/accounts/ |
H A D | AccountManagerServiceShellCommand.java | 67 final String allowed = getNextArgRequired(); in runSetBindInstantServiceAllowed() local 68 if (allowed == null) { in runSetBindInstantServiceAllowed() 73 Boolean.parseBoolean(allowed)); in runSetBindInstantServiceAllowed()
|
/aosp12/frameworks/base/services/tests/mockingservicestests/src/com/android/server/location/provider/ |
H A D | MockableLocationProviderTest.java | 161 assertThat(mProvider.getState().allowed).isFalse(); in testSetState() 168 assertThat(newState.allowed).isTrue(); in testSetState() 173 assertThat(newState.allowed).isFalse(); in testSetState() 178 assertThat(newState.allowed).isTrue(); in testSetState() 186 assertThat(newState.allowed).isFalse(); in testSetState()
|
/aosp12/hardware/interfaces/oemlock/aidl/aidl_api/android.hardware.oemlock/1/android/hardware/oemlock/ |
H A D | IOemLock.aidl | 40 …android.hardware.oemlock.OemLockSecureStatus setOemUnlockAllowedByCarrier(in boolean allowed, in b… in setOemUnlockAllowedByCarrier() argument 41 void setOemUnlockAllowedByDevice(in boolean allowed); in setOemUnlockAllowedByDevice() argument
|