/cts/tools/selinux/ |
D | seamendc-test.sh | 44 ./searchpolicy --allow --libpath libsepolwrap.so sepolicy+test-secilc.binary \ 46 ./searchpolicy --allow --libpath libsepolwrap.so sepolicy+test-seamendc.binary \ 50 ./searchpolicy --allow --libpath libsepolwrap.so sepolicy+test-secilc.binary \ 52 ./searchpolicy --allow --libpath libsepolwrap.so sepolicy+test-seamendc.binary \
|
/cts/hostsidetests/packagemanager/domainverification/device/multiuser/src/com/android/cts/packagemanager/verify/domain/device/multiuser/ |
D | DomainVerificationWorkUtils.kt | 32 internal fun RemoteDevicePolicyManager.setAppLinkPolicy(admin: ComponentName, allow: Boolean) { in getAppLinkPolicy() 33 if (allow) { in getAppLinkPolicy()
|
/cts/tests/tests/appenumeration/src/android/appenumeration/cts/ |
D | MediaSessionEnumerationTests.java | 81 private static void setAllowGetActiveSession(String packageName, boolean allow) { in setAllowGetActiveSession() argument 83 if (allow) { in setAllowGetActiveSession()
|
/cts/hostsidetests/media/src/android/media/session/cts/ |
D | MediaSessionManagerHostTest.java | 370 private void setAllowGetActiveSessionForTest(boolean allow, int userId) throws Exception { in setAllowGetActiveSessionForTest() argument 373 + ((allow) ? "allow_listener " : "disallow_listener ") in setAllowGetActiveSessionForTest() 376 if (allow) { in setAllowGetActiveSessionForTest()
|
/cts/tests/tests/companion/multidevice/client/ |
D | proguard.flags | 14 # Necessary to allow debugging.
|
/cts/hostsidetests/incrementalinstall/app/ |
D | Android.bp | 42 // This flag allow the native lib to be compressed in the apk or associated split apk, and 70 // This flag allow the native lib to be uncompressed in the apk or associated split apk, and
|
/cts/tests/tests/telecom/src/android/telecom/cts/ |
D | ThirdPartyInCallServiceAppOpsPermissionTest.java | 249 private void setInCallServiceAppOpsPermission(boolean allow) in setInCallServiceAppOpsPermission() argument 254 uid, allow ? AppOpsManager.MODE_ALLOWED : AppOpsManager.opToDefaultMode( in setInCallServiceAppOpsPermission()
|
/cts/tests/framework/base/windowmanager/src/android/server/wm/window/ |
D | AlertWindowsTests.java | 222 private void setAlertWindowPermission(final ComponentName activityName, final boolean allow) in setAlertWindowPermission() argument 224 int mode = allow ? MODE_ALLOWED : MODE_ERRORED; in setAlertWindowPermission()
|
D | AlertWindowsImportanceTests.java | 173 private void setAlertWindowPermission(boolean allow) throws Exception { in setAlertWindowPermission() argument 174 final int mode = allow ? MODE_ALLOWED : MODE_ERRORED; in setAlertWindowPermission()
|
/cts/hostsidetests/incrementalinstall/app/nativelibcompressed/ |
D | Android.bp | 44 // This flag along with android:extractNativeLibs="true" in the manifest will allow the native
|
/cts/hostsidetests/devicepolicy/app/CorpOwnedManagedProfile/ |
D | Android.bp | 16 // This allow us to have different device owner and profile owner, some APIs may behave differently
|
/cts/tools/release-parser/tests/resources/ |
D | platform.xml.pb.txt | 6 key: "allow-in-power-save" 8 name: "allow-in-power-save"
|
/cts/tests/tests/webkit/src/android/webkit/cts/ |
D | GeolocationTest.java | 510 GeolocationPermissions.getInstance().allow(URL_2); in testGeolocationPermissions() 520 GeolocationPermissions.getInstance().allow(URL_1); in testGeolocationPermissions() 544 GeolocationPermissions.getInstance().allow(URL_1); in testGeolocationPermissions()
|
/cts/hostsidetests/appsecurity/src/android/appsecurity/cts/ |
D | ExternalStorageHostTest.java | 1121 private void updateAppOp(String packageName, int userId, String appOp, boolean allow) in updateAppOp() argument 1123 updateAppOp(packageName, false, userId, appOp, allow); in updateAppOp() 1127 String appOp, boolean allow) in updateAppOp() argument 1129 final String verb = allow ? "allow" : "default"; in updateAppOp()
|
/cts/tests/tests/content/emptytestapp/ |
D | Android.bp | 112 // using 29 (< 30) to allow install an app without application tag
|
/cts/tests/tests/renderscript/src/android/renderscript/cts/ |
D | AtomicTest.rscript | 55 // to allow the calling code to read it back.
|
D | reduce.rscript | 437 // out of range. The globals and reduction kernels below allow a test
|
/cts/tests/tests/nativemedia/aaudio/jni/ |
D | test_aaudio_callback.cpp | 78 static const char* allowMMapToString(int allow) { in allowMMapToString() argument 79 switch (allow) { in allowMMapToString()
|
/cts/tests/framework/base/windowmanager/backgroundactivity/src/android/server/wm/ |
D | BackgroundActivityLaunchTest.java | 1376 private static void grantSystemAlertWindow(Components app, boolean allow) throws Exception { in grantSystemAlertWindow() argument 1377 grantSystemAlertWindow(app.APP_PACKAGE_NAME, allow); in grantSystemAlertWindow() 1380 private static void grantSystemAlertWindow(String packageName, boolean allow) throws Exception { in grantSystemAlertWindow() argument 1381 final int mode = allow ? MODE_ALLOWED : MODE_ERRORED; in grantSystemAlertWindow()
|
/cts/tests/tests/telephony/current/mockmodem/src/android/telephony/mockmodem/ |
D | IRadioDataImpl.java | 176 public void setDataAllowed(int serial, boolean allow) { in setDataAllowed() argument
|
/cts/tests/app/ |
D | Android.bp | 68 // Even with coverage disabled, we're close to the single dex limit, so allow use of multi-dex.
|
/cts/tests/app/src/android/app/cts/ |
D | ActivityManagerFgsDelegateTest.java | 902 private void allowBgFgsStart(String packageName, boolean allow) throws Exception { in allowBgFgsStart() argument 903 if (allow) { in allowBgFgsStart()
|
D | ActivityManagerFgsBgStartTest.java | 2538 private void allowBgActivityStart(String packageName, boolean allow) throws Exception { in allowBgActivityStart() argument 2539 if (allow) { in allowBgActivityStart() 2557 private void setAppOp(String packageName, String opStr, boolean allow) throws Exception { in setAppOp() argument 2560 + (allow ? "allow" : "deny")); in setAppOp()
|
/cts/hostsidetests/appsecurity/test-apps/tinyapp/ |
D | Android.bp | 442 // rsa-2048 signing key to allow updates from the package above. This app can
|
/cts/common/device-side/bedstead/remoteframeworkclasses/java/apis/ |
D | current.txt | 454 … @FlaggedApi("android.content.pm.relative_reference_intent_filters") public static final int allow; 23627 field public static final String KEY_ALLOW_FRAME_DROP = "allow-frame-drop"; 57692 method public void allow(String);
|