HomeSort by relevance Sort by last modified time
    Searched full:allowed (Results 876 - 900 of 7690) sorted by null

<<31323334353637383940>>

  /frameworks/ex/camera2/public/src/com/android/ex/camera2/blocking/
BlockingStateListener.java 186 * <p>Note: Only one waiter allowed at a time!</p>
203 * <p>Note: Only one waiter allowed at a time!</p>
214 if (mWaiting) throw new IllegalStateException("Only one waiter allowed at a time");
  /packages/apps/Browser/src/com/android/browser/
SystemAllowGeolocationOrigins.java 153 * Gets the current system setting for default allowed geolocation origins.
155 * @return The default allowed origins. Returns {@code ""} if not set.
173 * Removes geolocation permissions for the given origins, if they are allowed.
  /packages/apps/Calendar/src/com/android/calendar/
MultiStateButton.java 44 //The maximum number of states allowed for this button.
86 * This sets the maximum states allowed to the length of the resources array. It will also
87 * set the current state to the maximum allowed if it's greater than the new max.
  /packages/apps/ContactsCommon/res/values/
donottranslate_config.xml 18 <!-- Flag indicating whether Contacts app is allowed to import contacts from SDCard -->
81 <!-- Flag indicating whether Contacts app is allowed to export contacts to SDCard -->
84 <!-- Flag indicating whether Contacts app is allowed to share contacts with devices outside -->
  /packages/apps/DeskClock/src/com/android/deskclock/widget/sgv/
GridAdapter.java 57 * The direction for drag to reorder that is allowed. By default, the allowed direction
59 * @return int The allowed direction for drag to reorder. Possible return values are a
  /packages/experimental/LoaderApp/res/values/
config.xml 21 <!-- Flag indicating whether Contacts app is allowed to import contacts from SDCard -->
34 <!-- Flag indicating whether Contacts app is allowed to export contacts to SDCard -->
37 <!-- Flag indicating whether Contacts app is allowed to share contacts with devices outside -->
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/i686-linux/include/c++/4.4.3/parallel/
quicksort.h 46 * @param num_threads Number of threads that are allowed to work on
96 * @param num_threads Number of threads that are allowed to work on
152 * @param num_threads Number of threads that are allowed to work on
  /prebuilts/ndk/9/sources/cxx-stl/gnu-libstdc++/4.8/include/parallel/
quicksort.h 46 * @param __num_threads Number of threads that are allowed to work on
96 * @param __num_threads Number of threads that are allowed to work on
149 * @param __num_threads Number of threads that are allowed to work on
  /external/chromium_org/chrome/common/mac/
cfbundle_blocker.mm 258 // The list of bundles that are allowed to load. Before adding an entry to
300 // Permit bundle identifiers that are exactly equal to the allowed
301 // identifier, as well as "children" of the allowed identifier.
309 // allowed to load.
315 // allowed to load.
  /external/chromium_org/remoting/host/setup/
daemon_controller_delegate_win.cc 289 consent.allowed = false;
306 BOOL allowed; local
308 hr = control2_->GetUsageStatsConsent(&allowed, &set_by_policy);
315 consent.allowed = !!allowed;
  /external/chromium_org/third_party/libjingle/source/talk/base/
stringencode.h 55 // Note: in-place unescaping (buffer == source) is allowed.
67 // Note: in-place decoding (buffer == source) is allowed.
80 // Note: in-place decoding (buffer == source) is allowed.
87 // Note: in-place decoding (buffer == source) is allowed.
94 // Note: in-place decoding (buffer == source) is allowed.
  /external/clang/test/CXX/dcl.dcl/dcl.spec/dcl.constexpr/
p4.cpp 38 constexpr T() {} // expected-error {{constexpr constructor not allowed in struct with virtual base class}}
45 constexpr C() {} // expected-error {{constexpr constructor not allowed in class with virtual base class}}
52 try // expected-error {{function try block not allowed in constexpr constructor}}
89 // expected-error@-3 {{statement not allowed in constexpr constructor}}
270 // corresponding member type shall be one of those allowed in a constant
  /external/clang/test/SemaCXX/
functional-cast.cpp 148 //(void)(A*)((H*)0); // {{static_cast from 'struct H *' to 'struct A *' is not allowed}}
203 (void)Enum((int*)0); // expected-error {{functional-style cast from 'int *' to 'Enum' is not allowed}}
224 (void)Amp((int F::*)0); // expected-error {{conversion from pointer to member of class 'F' to pointer to member of class 'A' via virtual base 'B' is not allowed}}
308 (void)structurevmfp(psi); // expected-error {{functional-style cast from 'const int structure::*' to 'structurevmfp' (aka 'void (structure::*)()') is not allowed}}
309 (void)structureimp(psf); // expected-error {{functional-style cast from 'void (structure::*)()' to 'structureimp' (aka 'int structure::*') is not allowed}}
  /external/iptables/extensions/
libxt_tcp.c 150 "Only one `--source-port' allowed");
161 "Only one `--destination-port' allowed");
173 " allowed");
182 " allowed");
199 "Only one `--tcp-option' allowed");
  /external/llvm/include/llvm/Target/
TargetOptions.h 73 /// (the default), the code generator is not allowed to generate mad
81 /// this flag is off (the default), the code generator is not allowed to
89 /// this flag is off (the default), the code generator is not allowed to
95 /// this flag is off (the default), the code generator is not allowed to
101 /// false (the default), the code generator is allowed to assume that the
  /external/chromium_org/chrome/common/
render_messages.h 369 bool /* allowed */)
373 bool /* allowed */)
470 bool /* allowed */)
479 bool /* allowed */)
487 bool /* allowed */)
496 bool /* allowed */)
511 // (e.g. whether it is allowed or has all its dependencies).
562 // message because renderer processes aren't allowed to directly navigate to
643 bool /* allowed */)
646 bool /* allowed */)
    [all...]
  /external/chromium_org/chrome/renderer/resources/extensions/
web_view.js 758 self.instanceId_, requestId, 'default', '', function(allowed) {
759 if (allowed) {
769 self.instanceId_, requestId, 'default', '', function(allowed) {
770 if (allowed) {
796 // The permission type is not allowed. Trigger the default response.
798 self.instanceId_, requestId, 'default', '', function(allowed) {
799 if (allowed) {
845 self.instanceId_, requestId, 'default', '', function(allowed) {
846 if (allowed) {
855 self.instanceId_, requestId, 'default', '', function(allowed) {
    [all...]
  /external/chromium_org/native_client_sdk/src/doc/reference/
pnacl-bitcode-abi.rst 189 The LLVM types allowed in PNaCl bitcode are restricted, as follows:
194 * The only scalar types allowed are integer, float (32-bit floating point),
197 * The only integer sizes allowed are i1, i8, i16, i32 and i64.
198 * The only integer sizes allowed for function arguments and function return
204 Array and struct types are only allowed in
212 Only the following pointer types are allowed:
234 ``undef`` is only allowed within functions, not in global variable initializers.
242 Constant expressions are only allowed in
271 List of allowed instructions
358 The only allowed type for ``alloca`` instructions in PNaCl bitcode is i8. Th
    [all...]
  /external/wpa_supplicant_8/src/ap/
hw_features.c 92 wpa_printf(MSG_MSGDUMP, "Allowed channel: mode=%d "
188 int allowed[] = { 36, 44, 52, 60, 100, 108, 116, 124, 132, 149, 157, local
200 /* Verify that HT40 secondary channel is an allowed 20 MHz
213 wpa_printf(MSG_ERROR, "HT40 secondary channel %d not allowed",
219 * Verify that HT40 primary,secondary channel pair is allowed per
222 * the list of allowed channels (already checked above).
233 for (k = 0; k < sizeof(allowed) / sizeof(allowed[0]); k++) {
234 if (first == allowed[k]) {
240 wpa_printf(MSG_ERROR, "HT40 channel pair (%d, %d) not allowed",
    [all...]
  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/
ssl.py 194 "non-zero flags not allowed in calls to send() on %s" %
213 raise ValueError("sendto not allowed on instances of %s" %
224 "non-zero flags not allowed in calls to sendall() on %s" %
239 "non-zero flags not allowed in calls to recv() on %s" %
253 "non-zero flags not allowed in calls to recv_into() on %s" %
264 raise ValueError("recvfrom not allowed on instances of %s" %
271 raise ValueError("recvfrom_into not allowed on instances of %s" %
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/
ssl.py 194 "non-zero flags not allowed in calls to send() on %s" %
213 raise ValueError("sendto not allowed on instances of %s" %
224 "non-zero flags not allowed in calls to sendall() on %s" %
239 "non-zero flags not allowed in calls to recv() on %s" %
253 "non-zero flags not allowed in calls to recv_into() on %s" %
264 raise ValueError("recvfrom not allowed on instances of %s" %
271 raise ValueError("recvfrom_into not allowed on instances of %s" %
  /frameworks/base/core/java/android/view/
LayoutInflater.java 95 * Hook to allow clients of the LayoutInflater to restrict the set of Views that are allowed
102 * that are allowed to be inflated.
106 * @return True if this class is allowed to be inflated, or false otherwise
319 * that are allowed to be inflated.
327 * which is not allowed by the {@link Filter}, the {@link #inflate(int, ViewGroup)} call will
331 * @param filter The Filter which restricts the set of Views that are allowed to be inflated.
563 boolean allowed = mFilter.onLoadClass(clazz);
564 if (!allowed) {
576 // New class -- remember whether it is allowed
580 boolean allowed = clazz != null && mFilter.onLoadClass(clazz)
    [all...]
  /external/openssh/
monitor.c 322 /* Specifies if a certain message is allowed at the moment */
613 /* allowed key state */
617 /* make sure key is allowed */
732 int allowed = 0; local
756 allowed = 1;
789 debug3("%s: sending MONITOR_ANS_PWNAM: %d", __func__, allowed);
1125 int allowed = 0; local
1145 allowed = options.pubkey_authentication &&
1148 if (options.pubkey_authentication && allowed != 1)
1152 allowed = options.hostbased_authentication &
1549 int allowed = 0; local
    [all...]
auth.c 86 * Check if the user is allowed to log in via ssh. If user is listed
149 logit("User %.100s not allowed because account is locked",
165 logit("User %.100s not allowed because shell %.100s "
172 logit("User %.100s not allowed because shell %.100s "
191 logit("User %.100s from %.100s not allowed "
205 logit("User %.100s from %.100s not allowed because "
213 logit("User %.100s from %.100s not allowed because "
223 logit("User %.100s from %.100s not allowed "
236 logit("User %.100s from %.100s not allowed "
571 * when trying to match the username, the user is only allowed t
    [all...]
  /dalvik/vm/analysis/
Optimize.cpp 497 /* access allowed? */
499 bool allowed = dvmCheckClassAccess(referrer, resClass); local
501 if (!allowed) {
567 /* access allowed? */
569 bool allowed = dvmCheckFieldAccess(referrer, (Field*)resField); local
571 if (!allowed) {
645 /* access allowed? */
647 bool allowed = dvmCheckFieldAccess(referrer, (Field*)resField); local
649 if (!allowed) {
861 /* access allowed? *
863 bool allowed = dvmCheckMethodAccess(referrer, resMethod); local
    [all...]

Completed in 1795 milliseconds

<<31323334353637383940>>