/external/openssl/crypto/conf/ |
README | 6 Configuration modules. These are a set of modules which can perform 39 The function can then take whatever action is appropriate, for example 41 config module can be loaded. 54 DSO name can be given by including a separate section as in the module4 example 65 Static modules can also be added using, 71 A set of builtin modules (currently only an ASN1 non functional test module) can be 75 any application can call to perform various default configuration tasks. It uses the
|
/frameworks/base/docs/html/resources/articles/ |
can-i-use-this-intent.jd | 1 page.title=Can I Use this Intent? 6 You can use intents to turn applications into high-level libraries and 16 <p>This article describes a technique you can use to find out whether the system 19 to determine whether there's an app that can respond to a specified intent. Your 20 application can pass an intent to the method and then, for example, show or hide 24 * Indicates whether the specified action can be used as an intent. This 25 * method queries the package manager for installed packages that can 32 * @return True if an Intent with the specified action can be sent and 67 technique described here can also be used at startup time to ask the user 68 whether he'd like to install the missing package, you can then simply redirec [all...] |
using-webviews.jd | 6 /WebViewDemo">WebViewDemo</a> shows how you can add web content to your 7 application. You can find it in the <a title="apps-for-android" 9 This application demonstrates how you can embed a {@link android.webkit.WebView} 10 into an activity and also how you can have two way communication between your 15 but it runs under the control of your application. The WebView can be 16 full screen or you can mix it with other Views. The content for your 17 WebView can come from anywhere. The WebView can download content from 18 the web, or it can come from local files stored in your assets 19 directory. The content can even be dynamically generated by you [all...] |
future-proofing.jd | 7 You can think of these as "anti-patterns" (that is, techniques to avoid) for 34 <p>As a result, applications can no longer directly 36 previously had permission to do so. For instance, apps can no longer 40 screen, so that the user can change these settings manually. For 41 details, see the android.provider.Settings.Secure class, which you can 52 excessively complex layouts, but you can think of Android 1.5 as being 55 need to put it on a diet. You can simplify your layouts using the more 70 <p>Devices running Android 1.5 and later can automatically rotate the screen, 72 this by default, and on all others it can be turned on by the user. 73 This can sometimes result in unpredictable behavior from application [all...] |
/external/webkit/WebCore/manual-tests/ |
print-with-height-transition-in-screen-stylesheet.html | 16 <div>A1: This is a long paragraph which helps us see the mess you can get with long ones.<br> 17 A2: This is a long paragraph which helps us see the mess you can get with long ones.<br> 18 A3: This is a long paragraph which helps us see the mess you can get with long ones.<br> 21 <div class='outer_slide'><div>B1: This is a long paragraph which helps us see the mess you can get with long ones.</div></div> 23 <div class='outer_slide'><div>C1: This is a long paragraph which helps us see the mess you can get with long ones.</div></div>
|
simple-image-compositing.html | 44 Basic image - no style - can be directly composited 49 5px blue border - can NOT be directly composited 54 margin - can NOT be directly composited 59 solid background - can be directly composited 64 background image - can NOT be directly composited 69 rotated but otherwise no style - can be directly composited
|
/packages/apps/Email/src/com/android/email/mail/ |
Flag.java | 20 * Flags that can be applied to Messages. 55 * Indicates that a message is fully downloaded from the server and can be viewed normally. 61 * Indicates that a message is partially downloaded from the server and can be viewed but 68 * General purpose flag that can be used by any remote store. The flag will be 74 * General purpose flag that can be used by any remote store. The flag will be
|
/frameworks/base/telephony/java/com/android/internal/telephony/ |
WspTypeDecoder.java | 72 * return value can be retrieved by getValueString() method 73 * length of data in pdu can be retrieved by getValue32() method 95 * return value can be retrieved by getValue32() method 96 * length of data in pdu can be retrieved by getValue32() method 113 * return value can be retrieved by getValue32() method 114 * length of data in pdu can be retrieved by getValue32() method 136 * return value can be retrieved by getValue32() method 137 * length of data in pdu can be retrieved by getValue32() method 152 * return value can be retrieved by getValue32() method 153 * length of data in pdu can be retrieved by getValue32() metho [all...] |
/bootable/recovery/ |
bootloader.c | 48 LOGE("Can't find %s\n", MISC_NAME); 54 LOGE("Can't open %s\n(%s)\n", MISC_NAME, strerror(errno)); 61 if (r != size) LOGE("Can't read %s\n(%s)\n", MISC_NAME, strerror(errno)); 79 LOGE("Can't find %s\n", MISC_NAME); 85 LOGE("Can't open %s\n(%s)\n", MISC_NAME, strerror(errno)); 92 if (r != size) LOGE("Can't read %s\n(%s)\n", MISC_NAME, strerror(errno)); 106 LOGE("Can't open %s\n(%s)\n", MISC_NAME, strerror(errno)); 110 LOGE("Can't write %s\n(%s)\n", MISC_NAME, strerror(errno)); 115 LOGE("Can't finish %s\n(%s)\n", MISC_NAME, strerror(errno));
|
/external/iproute2/man/man8/ |
tc-tbf.8 | 39 Kernels with a higher 'HZ' can achieve higher rates with perfect burstiness. On Alpha, HZ is ten 50 On creation, the TBF is stocked with tokens which correspond to the amount of traffic that can be burst 54 calculates the token deficit, and throttles until the first packet in the queue can be sent. 56 If it is not acceptable to burst out packets at maximum speed, a peakrate can be configured 63 This limit is caused by the fact that the kernel can only throttle for at minimum 1 'jiffy', which depends 64 on HZ as 1/HZ. For perfect shaping, only a single packet can get sent per jiffy - for HZ=100, this means 100 73 Limit is the number of bytes that can be queued waiting for tokens to become 74 available. You can also specify this the other way around by setting the 75 latency parameter, which specifies the maximum amount of time a packet can 82 Size of the bucket, in bytes. This is the maximum amount of bytes that tokens can be available for instantaneously. [all...] |
/external/webkit/WebKit/qt/tests/qwebframe/resources/ |
testiframe.html | 45 <div id="content1">You can use the overflow property when you want to have better control of the layout. Try to change the overflow property to: visible, hidden, auto, or inherit and see what happens. The default value is visible.
46 You can use the overflow property when you want to have better control of the layout. Try to change the overflow property to: visible, hidden, auto, or inherit and see what happens. The default value is visible.
47 You can use the overflow property when you want to have better control of the layout. Try to change the overflow property to: visible, hidden, auto, or inherit and see what happens. The default value is visible.
48 You can use the overflow property when you want to have better control of the layout. Try to change the overflow property to: visible, hidden, auto, or inherit and see what happens. The default value is visible.
49 You can use the overflow property when you want to have better control of the layout. Try to change the overflow property to: visible, hidden, auto, or inherit and see what happens. The default value is visible.
50 You can use the overflow property when you want to have better control of the layout. Try to change the overflow property to: visible, hidden, auto, or inherit and see what happens. The default value is visible.</div>
|
/frameworks/base/media/libdrm/mobile2/include/util/domcore/ |
NodeIterator.h | 24 * means we have a <code>restriction</code>: the Iterator can only be used in the case that the tree structure will
52 * and we also can specify the <code>scope</code> if want restrict the range of iterator.
62 * @return NULL On there is not node can be get.
63 * The pointer of node On can get next node.
69 * @return NULL On there is not node can be get.
70 * The pointer of node On can get previous node.
|
/packages/experimental/RpcPerformance/ |
rpcperftest.cpp | 48 fprintf(stderr, "error: can't get default service manager\n"); 56 fprintf(stderr, "error: can't register service: %s\n", argv[1] + 1); 62 fprintf(stderr, "error: can't run service\n"); 68 fprintf(stderr, "error: can't find service: %s\n", argv[1]); 75 fprintf(stderr, "error: can't ping: %s [%d]\n", argv[1], status); 85 fprintf(stderr, "error: can't ping: %s [%d]\n", argv[1], status);
|
/frameworks/base/core/java/android/provider/ |
Downloads.java | 96 * <P>Owner can Init/Read</P> 104 * <P>Owner can Init/Read/Write</P> 114 * it can't guarantee that the download has completed (e.g. when doing 115 * a byte-range request without an ETag, or when it can't determine 118 * <P>Owner can Init</P> 128 * <P>Owner can Init</P> 137 * <P>Owner can Read</P> 145 * <P>Owner can Init/Read</P> 154 * <P>Owner can Init</P> 164 * <P>Owner can Init/Read/Write</P [all...] |
/external/bluetooth/glib/docs/reference/glib/tmpl/ |
types.sgml | 9 GLib defines a number of commonly used types, which can be divided into 83 Values of this type can range from #G_MININT to #G_MAXINT. 90 Values of this type can range from 0 to #G_MAXUINT. 97 Values of this type can range from #G_MINSHORT to #G_MAXSHORT. 104 Values of this type can range from 0 to #G_MAXUSHORT. 111 Values of this type can range from #G_MINLONG to #G_MAXLONG. 118 Values of this type can range from 0 to #G_MAXULONG. 125 Values of this type can range from -128 to 127. 132 Values of this type can range from 0 to 255. 139 Values of this type can range from -32,768 to 32,767 [all...] |
/external/elfutils/ |
INSTALL | 11 you can run in the future to recreate the current configuration, a file 18 diffs or instructions to the address given in the `README' so they can 45 5. You can remove the program binaries and object files from the 47 files that `configure' created (so you can compile the package for 58 the `configure' script does not know about. You can give `configure' 60 a Bourne-compatible shell, you can do that on the command line like 64 Or on systems that have the `env' program, you can do it like this: 70 You can compile the package for more than one kind of computer at the 88 `/usr/local/bin', `/usr/local/man', etc. You can specify an 92 You can specify separate installation prefixes fo [all...] |
/external/strace/ |
INSTALL | 11 you can run in the future to recreate the current configuration, a file 18 diffs or instructions to the address given in the `README' so they can 45 5. You can remove the program binaries and object files from the 47 files that `configure' created (so you can compile the package for 58 the `configure' script does not know about. You can give `configure' 60 a Bourne-compatible shell, you can do that on the command line like 64 Or on systems that have the `env' program, you can do it like this: 70 You can compile the package for more than one kind of computer at the 88 `/usr/local/bin', `/usr/local/man', etc. You can specify an 92 You can specify separate installation prefixes fo [all...] |
/dalvik/tests/ |
README.txt | 5 in particular, the tests can be run on the desktop, on a USB-attached 11 directory; this can be used to exercise "API mismatch" situations by
|
/development/scripts/app_engine_server/gae_shell/ |
README | 6 Can be used for system administration tasks, as an interactive way to try out 12 definitions, and other values in the global and local namespaces can be used
|
/device/htc/dream/ |
vendorsetup.sh | 17 # This file is executed by build/envsetup.sh, and can use anything 20 # In particular, you can add lunch options with the add_lunch_combo
|
/device/htc/passion/ |
vendorsetup.sh | 17 # This file is executed by build/envsetup.sh, and can use anything 20 # In particular, you can add lunch options with the add_lunch_combo
|
/device/htc/sapphire/ |
vendorsetup.sh | 17 # This file is executed by build/envsetup.sh, and can use anything 20 # In particular, you can add lunch options with the add_lunch_combo
|
/external/bison/m4/ |
mbrtowc.m4 | 9 dnl This file can be removed, and gl_FUNC_MBRTOWC replaced with 10 dnl AC_FUNC_MBRTOWC, when autoconf 2.60 can be assumed everywhere.
|
/external/dbus/bus/ |
policy.h | 8 * This program is free software; you can redistribute it and/or modify 58 /* message type can be DBUS_MESSAGE_TYPE_INVALID meaning "any" */ 60 /* any of these can be NULL meaning "any" */ 71 /* message type can be DBUS_MESSAGE_TYPE_INVALID meaning "any" */ 73 /* any of these can be NULL meaning "any" */ 85 /* can be NULL meaning "any" */ 91 /* can be DBUS_UID_UNSET meaning "any" */ 97 /* can be DBUS_GID_UNSET meaning "any" */
|
/external/e2fsprogs/debian/ |
libblkid.copyright | 4 It is part of the main e2fsprogs distribution, which can be found at: 19 General Public License can be found in /usr/share/common-licenses/LGPL.
|