/frameworks/ex/camera2/public/src/com/android/ex/camera2/blocking/ |
BlockingStateListener.java | 186 * <p>Note: Only one waiter allowed at a time!</p> 203 * <p>Note: Only one waiter allowed at a time!</p> 214 if (mWaiting) throw new IllegalStateException("Only one waiter allowed at a time");
|
/packages/apps/Browser/src/com/android/browser/ |
SystemAllowGeolocationOrigins.java | 153 * Gets the current system setting for default allowed geolocation origins. 155 * @return The default allowed origins. Returns {@code ""} if not set. 173 * Removes geolocation permissions for the given origins, if they are allowed.
|
/packages/apps/Calendar/src/com/android/calendar/ |
MultiStateButton.java | 44 //The maximum number of states allowed for this button. 86 * This sets the maximum states allowed to the length of the resources array. It will also 87 * set the current state to the maximum allowed if it's greater than the new max.
|
/packages/apps/ContactsCommon/res/values/ |
donottranslate_config.xml | 18 <!-- Flag indicating whether Contacts app is allowed to import contacts from SDCard --> 81 <!-- Flag indicating whether Contacts app is allowed to export contacts to SDCard --> 84 <!-- Flag indicating whether Contacts app is allowed to share contacts with devices outside -->
|
/packages/apps/DeskClock/src/com/android/deskclock/widget/sgv/ |
GridAdapter.java | 57 * The direction for drag to reorder that is allowed. By default, the allowed direction 59 * @return int The allowed direction for drag to reorder. Possible return values are a
|
/packages/experimental/LoaderApp/res/values/ |
config.xml | 21 <!-- Flag indicating whether Contacts app is allowed to import contacts from SDCard --> 34 <!-- Flag indicating whether Contacts app is allowed to export contacts to SDCard --> 37 <!-- Flag indicating whether Contacts app is allowed to share contacts with devices outside -->
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/i686-linux/include/c++/4.4.3/parallel/ |
quicksort.h | 46 * @param num_threads Number of threads that are allowed to work on 96 * @param num_threads Number of threads that are allowed to work on 152 * @param num_threads Number of threads that are allowed to work on
|
/prebuilts/ndk/9/sources/cxx-stl/gnu-libstdc++/4.8/include/parallel/ |
quicksort.h | 46 * @param __num_threads Number of threads that are allowed to work on 96 * @param __num_threads Number of threads that are allowed to work on 149 * @param __num_threads Number of threads that are allowed to work on
|
/external/chromium_org/chrome/common/mac/ |
cfbundle_blocker.mm | 258 // The list of bundles that are allowed to load. Before adding an entry to 300 // Permit bundle identifiers that are exactly equal to the allowed 301 // identifier, as well as "children" of the allowed identifier. 309 // allowed to load. 315 // allowed to load.
|
/external/chromium_org/remoting/host/setup/ |
daemon_controller_delegate_win.cc | 289 consent.allowed = false; 306 BOOL allowed; local 308 hr = control2_->GetUsageStatsConsent(&allowed, &set_by_policy); 315 consent.allowed = !!allowed;
|
/external/chromium_org/third_party/libjingle/source/talk/base/ |
stringencode.h | 55 // Note: in-place unescaping (buffer == source) is allowed. 67 // Note: in-place decoding (buffer == source) is allowed. 80 // Note: in-place decoding (buffer == source) is allowed. 87 // Note: in-place decoding (buffer == source) is allowed. 94 // Note: in-place decoding (buffer == source) is allowed.
|
/external/clang/test/CXX/dcl.dcl/dcl.spec/dcl.constexpr/ |
p4.cpp | 38 constexpr T() {} // expected-error {{constexpr constructor not allowed in struct with virtual base class}} 45 constexpr C() {} // expected-error {{constexpr constructor not allowed in class with virtual base class}} 52 try // expected-error {{function try block not allowed in constexpr constructor}} 89 // expected-error@-3 {{statement not allowed in constexpr constructor}} 270 // corresponding member type shall be one of those allowed in a constant
|
/external/clang/test/SemaCXX/ |
functional-cast.cpp | 148 //(void)(A*)((H*)0); // {{static_cast from 'struct H *' to 'struct A *' is not allowed}} 203 (void)Enum((int*)0); // expected-error {{functional-style cast from 'int *' to 'Enum' is not allowed}} 224 (void)Amp((int F::*)0); // expected-error {{conversion from pointer to member of class 'F' to pointer to member of class 'A' via virtual base 'B' is not allowed}} 308 (void)structurevmfp(psi); // expected-error {{functional-style cast from 'const int structure::*' to 'structurevmfp' (aka 'void (structure::*)()') is not allowed}} 309 (void)structureimp(psf); // expected-error {{functional-style cast from 'void (structure::*)()' to 'structureimp' (aka 'int structure::*') is not allowed}}
|
/external/iptables/extensions/ |
libxt_tcp.c | 150 "Only one `--source-port' allowed"); 161 "Only one `--destination-port' allowed"); 173 " allowed"); 182 " allowed"); 199 "Only one `--tcp-option' allowed");
|
/external/llvm/include/llvm/Target/ |
TargetOptions.h | 73 /// (the default), the code generator is not allowed to generate mad 81 /// this flag is off (the default), the code generator is not allowed to 89 /// this flag is off (the default), the code generator is not allowed to 95 /// this flag is off (the default), the code generator is not allowed to 101 /// false (the default), the code generator is allowed to assume that the
|
/external/chromium_org/chrome/common/ |
render_messages.h | 369 bool /* allowed */) 373 bool /* allowed */) 470 bool /* allowed */) 479 bool /* allowed */) 487 bool /* allowed */) 496 bool /* allowed */) 511 // (e.g. whether it is allowed or has all its dependencies). 562 // message because renderer processes aren't allowed to directly navigate to 643 bool /* allowed */) 646 bool /* allowed */) [all...] |
/external/chromium_org/chrome/renderer/resources/extensions/ |
web_view.js | 758 self.instanceId_, requestId, 'default', '', function(allowed) { 759 if (allowed) { 769 self.instanceId_, requestId, 'default', '', function(allowed) { 770 if (allowed) { 796 // The permission type is not allowed. Trigger the default response. 798 self.instanceId_, requestId, 'default', '', function(allowed) { 799 if (allowed) { 845 self.instanceId_, requestId, 'default', '', function(allowed) { 846 if (allowed) { 855 self.instanceId_, requestId, 'default', '', function(allowed) { [all...] |
/external/chromium_org/native_client_sdk/src/doc/reference/ |
pnacl-bitcode-abi.rst | 189 The LLVM types allowed in PNaCl bitcode are restricted, as follows: 194 * The only scalar types allowed are integer, float (32-bit floating point), 197 * The only integer sizes allowed are i1, i8, i16, i32 and i64. 198 * The only integer sizes allowed for function arguments and function return 204 Array and struct types are only allowed in 212 Only the following pointer types are allowed: 234 ``undef`` is only allowed within functions, not in global variable initializers. 242 Constant expressions are only allowed in 271 List of allowed instructions 358 The only allowed type for ``alloca`` instructions in PNaCl bitcode is i8. Th [all...] |
/external/wpa_supplicant_8/src/ap/ |
hw_features.c | 92 wpa_printf(MSG_MSGDUMP, "Allowed channel: mode=%d " 188 int allowed[] = { 36, 44, 52, 60, 100, 108, 116, 124, 132, 149, 157, local 200 /* Verify that HT40 secondary channel is an allowed 20 MHz 213 wpa_printf(MSG_ERROR, "HT40 secondary channel %d not allowed", 219 * Verify that HT40 primary,secondary channel pair is allowed per 222 * the list of allowed channels (already checked above). 233 for (k = 0; k < sizeof(allowed) / sizeof(allowed[0]); k++) { 234 if (first == allowed[k]) { 240 wpa_printf(MSG_ERROR, "HT40 channel pair (%d, %d) not allowed", [all...] |
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/ |
ssl.py | 194 "non-zero flags not allowed in calls to send() on %s" % 213 raise ValueError("sendto not allowed on instances of %s" % 224 "non-zero flags not allowed in calls to sendall() on %s" % 239 "non-zero flags not allowed in calls to recv() on %s" % 253 "non-zero flags not allowed in calls to recv_into() on %s" % 264 raise ValueError("recvfrom not allowed on instances of %s" % 271 raise ValueError("recvfrom_into not allowed on instances of %s" %
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/ |
ssl.py | 194 "non-zero flags not allowed in calls to send() on %s" % 213 raise ValueError("sendto not allowed on instances of %s" % 224 "non-zero flags not allowed in calls to sendall() on %s" % 239 "non-zero flags not allowed in calls to recv() on %s" % 253 "non-zero flags not allowed in calls to recv_into() on %s" % 264 raise ValueError("recvfrom not allowed on instances of %s" % 271 raise ValueError("recvfrom_into not allowed on instances of %s" %
|
/frameworks/base/core/java/android/view/ |
LayoutInflater.java | 95 * Hook to allow clients of the LayoutInflater to restrict the set of Views that are allowed 102 * that are allowed to be inflated. 106 * @return True if this class is allowed to be inflated, or false otherwise 319 * that are allowed to be inflated. 327 * which is not allowed by the {@link Filter}, the {@link #inflate(int, ViewGroup)} call will 331 * @param filter The Filter which restricts the set of Views that are allowed to be inflated. 563 boolean allowed = mFilter.onLoadClass(clazz); 564 if (!allowed) { 576 // New class -- remember whether it is allowed 580 boolean allowed = clazz != null && mFilter.onLoadClass(clazz) [all...] |
/external/openssh/ |
monitor.c | 322 /* Specifies if a certain message is allowed at the moment */ 613 /* allowed key state */ 617 /* make sure key is allowed */ 732 int allowed = 0; local 756 allowed = 1; 789 debug3("%s: sending MONITOR_ANS_PWNAM: %d", __func__, allowed); 1125 int allowed = 0; local 1145 allowed = options.pubkey_authentication && 1148 if (options.pubkey_authentication && allowed != 1) 1152 allowed = options.hostbased_authentication & 1549 int allowed = 0; local [all...] |
auth.c | 86 * Check if the user is allowed to log in via ssh. If user is listed 149 logit("User %.100s not allowed because account is locked", 165 logit("User %.100s not allowed because shell %.100s " 172 logit("User %.100s not allowed because shell %.100s " 191 logit("User %.100s from %.100s not allowed " 205 logit("User %.100s from %.100s not allowed because " 213 logit("User %.100s from %.100s not allowed because " 223 logit("User %.100s from %.100s not allowed " 236 logit("User %.100s from %.100s not allowed " 571 * when trying to match the username, the user is only allowed t [all...] |
/dalvik/vm/analysis/ |
Optimize.cpp | 497 /* access allowed? */ 499 bool allowed = dvmCheckClassAccess(referrer, resClass); local 501 if (!allowed) { 567 /* access allowed? */ 569 bool allowed = dvmCheckFieldAccess(referrer, (Field*)resField); local 571 if (!allowed) { 645 /* access allowed? */ 647 bool allowed = dvmCheckFieldAccess(referrer, (Field*)resField); local 649 if (!allowed) { 861 /* access allowed? * 863 bool allowed = dvmCheckMethodAccess(referrer, resMethod); local [all...] |