/cts/tests/tests/provider/src/android/provider/cts/ |
Settings_SecureTest.java | 28 import android.provider.Settings.Secure; 32 @TestTargetClass(android.provider.Settings.Secure.class) 87 @BrokenTest("Cannot access secure settings table") 90 * first query the exist settings in Secure table, and then insert four rows: 96 Cursor c = cr.query(Secure.CONTENT_URI, null, null, null, null); 103 assertTrue(Secure.putInt(cr, "IntField", 10)); 104 assertTrue(Secure.putLong(cr, "LongField", 20)); 105 assertTrue(Secure.putFloat(cr, "FloatField", 30)); 106 assertTrue(Secure.putString(cr, "StringField", "cts")); 108 c = cr.query(Secure.CONTENT_URI, null, null, null, null) [all...] |
SettingsTest.java | 170 @BrokenTest("Cannot access secure settings table") 173 Settings.Secure._ID, Settings.Secure.NAME, Settings.Secure.VALUE 181 IContentProvider provider = cr.acquireProvider(Settings.Secure.CONTENT_URI); 185 value.put(Settings.Secure.NAME, insertName); 186 value.put(Settings.Secure.VALUE, insertValue); 188 provider.insert(Settings.Secure.CONTENT_URI, value); 192 cursor = provider.query(Settings.Secure.CONTENT_URI, SECURE_PROJECTION, 193 Settings.Secure.NAME + "=\"" + insertName + "\"", null, null) [all...] |
/development/apps/SdkSetup/src/com/android/sdksetup/ |
DefaultActivity.java | 41 Settings.Secure.putInt(getContentResolver(), Settings.Secure.DEVICE_PROVISIONED, 1); 45 Settings.Secure.putString(getContentResolver(), Settings.Secure.LOCATION_PROVIDERS_ALLOWED, LocationManager.GPS_PROVIDER); 48 Settings.Secure.putInt(getContentResolver(), Settings.Secure.INSTALL_NON_MARKET_APPS, 1);
|
/frameworks/base/packages/SettingsProvider/src/com/android/providers/settings/ |
DatabaseHelper.java | 36 import android.provider.Settings.Secure; 76 db.execSQL("CREATE TABLE secure (" + 81 db.execSQL("CREATE INDEX secureIndex1 ON secure (name);"); 209 // This introduces the new secure settings table. 222 Settings.Secure.ADB_ENABLED, 223 Settings.Secure.ANDROID_ID, 224 Settings.Secure.BLUETOOTH_ON, 225 Settings.Secure.DATA_ROAMING, 226 Settings.Secure.DEVICE_PROVISIONED, 227 Settings.Secure.HTTP_PROXY [all...] |
/external/webkit/WebCore/platform/ |
Cookie.h | 39 const String& path, double expires, bool httpOnly, bool secure, 47 , secure(secure) 58 bool secure; member in struct:WebCore::Cookie 65 return StringHash::hash(key.name) + StringHash::hash(key.domain) + StringHash::hash(key.path) + key.secure; 70 return a.name == b.name && a.domain == b.domain && a.path == b.path && a.secure == b.secure;
|
/packages/apps/Settings/src/com/android/settings/ |
DevelopmentSettings.java | 66 mEnableAdb.setChecked(Settings.Secure.getInt(getContentResolver(), 67 Settings.Secure.ADB_ENABLED, 0) != 0); 70 mAllowMockLocation.setChecked(Settings.Secure.getInt(getContentResolver(), 71 Settings.Secure.ALLOW_MOCK_LOCATION, 0) != 0); 94 Settings.Secure.putInt(getContentResolver(), Settings.Secure.ADB_ENABLED, 0); 101 Settings.Secure.putInt(getContentResolver(), Settings.Secure.ALLOW_MOCK_LOCATION, 117 Settings.Secure.putInt(getContentResolver(), Settings.Secure.ADB_ENABLED, 1) [all...] |
AccessibilitySettings.java | 99 String settingValue = Settings.Secure.getString(getContentResolver(), 100 Settings.Secure.ENABLED_ACCESSIBILITY_SERVICES); 118 int serviceState = Settings.Secure.getInt(getContentResolver(), 119 Settings.Secure.ACCESSIBILITY_ENABLED, 0); 131 Settings.Secure.putInt(getContentResolver(), 132 Settings.Secure.ACCESSIBILITY_ENABLED, 0); 141 int incallPowerBehavior = Settings.Secure.getInt(getContentResolver(), 142 Settings.Secure.INCALL_POWER_BUTTON_BEHAVIOR, 143 Settings.Secure.INCALL_POWER_BUTTON_BEHAVIOR_DEFAULT); 148 (incallPowerBehavior == Settings.Secure.INCALL_POWER_BUTTON_BEHAVIOR_HANGUP) [all...] |
ApplicationSettings.java | 65 Settings.Secure.SET_INSTALL_LOCATION, 0) != 0); 89 Settings.Secure.DEFAULT_INSTALL_LOCATION, APP_INSTALL_DEVICE); 92 Settings.Secure.DEFAULT_INSTALL_LOCATION, APP_INSTALL_SDCARD); 95 Settings.Secure.DEFAULT_INSTALL_LOCATION, APP_INSTALL_AUTO); 99 Settings.Secure.DEFAULT_INSTALL_LOCATION, APP_INSTALL_AUTO); 135 Settings.Secure.putInt(getContentResolver(), Settings.Secure.INSTALL_NON_MARKET_APPS, 140 return Settings.Secure.getInt(getContentResolver(), 141 Settings.Secure.INSTALL_NON_MARKET_APPS, 0) > 0; 146 Settings.Secure.DEFAULT_INSTALL_LOCATION, APP_INSTALL_AUTO) [all...] |
TextToSpeechSettings.java | 19 import static android.provider.Settings.Secure.TTS_USE_DEFAULTS; 20 import static android.provider.Settings.Secure.TTS_DEFAULT_RATE; 21 import static android.provider.Settings.Secure.TTS_DEFAULT_LANG; 22 import static android.provider.Settings.Secure.TTS_DEFAULT_COUNTRY; 23 import static android.provider.Settings.Secure.TTS_DEFAULT_VARIANT; 24 import static android.provider.Settings.Secure.TTS_DEFAULT_SYNTH; 25 import static android.provider.Settings.Secure.TTS_ENABLED_PLUGINS; 241 useDefault = Settings.Secure.getInt(resolver, TTS_USE_DEFAULTS); 245 Settings.Secure.putInt(resolver, TTS_USE_DEFAULTS, useDefault); 254 String engine = Settings.Secure.getString(resolver, TTS_DEFAULT_SYNTH) [all...] |
/external/webkit/WebKit/chromium/public/ |
WebCookie.h | 47 , secure(false) 53 const WebString& path, double expires, bool httpOnly, bool secure, bool session) 60 , secure(secure) 71 bool secure; member in struct:WebKit::WebCookie
|
/packages/apps/Phone/src/com/android/phone/ |
CdmaRoamingListPreference.java | 26 import android.provider.Settings.Secure; 72 Secure.getInt(mPhone.getContext().getContentResolver(), 73 Secure.CDMA_ROAMING_MODE, Phone.CDMA_RM_HOME); 84 //Set the Settings.Secure network mode 85 Secure.putInt(mPhone.getContext().getContentResolver(), 86 Secure.CDMA_ROAMING_MODE, 121 int settingsRoamingMode = Secure.getInt( 123 Secure.CDMA_ROAMING_MODE, Phone.CDMA_RM_HOME); 130 //changes the Settings.Secure accordingly to statusCdmaRoamingMode 131 Secure.putInt [all...] |
/dalvik/libcore/security/src/main/java/org/apache/harmony/security/provider/crypto/ |
SHA1_Data.java | 28 * - a set of constant values, H0-H4, defined in "SECURE HASH STANDARD", FIPS PUB 180-2 ;<BR> 37 * constant defined in "SECURE HASH STANDARD" 43 * constant defined in "SECURE HASH STANDARD" 49 * constant defined in "SECURE HASH STANDARD" 55 * constant defined in "SECURE HASH STANDARD" 61 * constant defined in "SECURE HASH STANDARD"
|
/external/apache-http/src/org/apache/http/conn/routing/ |
RouteTracker.java | 76 /** Whether the route is secure. */ 77 private boolean secure; field in class:RouteTracker 114 * @param secure <code>true</code> if the route is secure, 117 public final void connectTarget(boolean secure) { 122 this.secure = secure; 130 * @param secure <code>true</code> if the route is secure, 133 public final void connectProxy(HttpHost proxy, boolean secure) { [all...] |
HttpRoute.java | 71 /** Whether the route is (supposed to be) secure. */ 72 private final boolean secure; field in class:HttpRoute 88 * @param secure <code>true</code> if the route is (to be) secure, 97 boolean secure, 117 this.secure = secure; 131 * @param secure <code>true</code> if the route is (to be) secure, 137 boolean secure, TunnelType tunnelled, LayerType layered) [all...] |
/cts/tests/tests/permission2/src/android/permission2/cts/ |
NoWriteSecureSettingsPermissionTest.java | 22 * Verify secure settings cannot be written to without required permissions. 27 * Verify that write to secure settings requires permissions. 33 assertWritingContentUriRequiresPermission(android.provider.Settings.Secure.CONTENT_URI,
|
/external/clearsilver/man/man3/ |
cgi_cookie_set.3 | 22 const char *time_str, int persistent, int secure); 56 secure - cookie will only be sent over secure connections
|
/frameworks/base/docs/html/sdk/api_diff/4/changes/ |
android.provider.Settings.Secure.html | 10 android.provider.Settings.Secure 74 Class android.provider.<A HREF="../../../../reference/android/provider/Settings.Secure.html" target="_top"><font size="+2"><code>Settings.Secure</code></font></A> 87 <A NAME="android.provider.Settings.Secure.ACCESSIBILITY_ENABLED"></A> 88 <nobr><code>String</code> <A HREF="../../../../reference/android/provider/Settings.Secure.html#ACCESSIBILITY_ENABLED" target="_top"><code>ACCESSIBILITY_ENABLED</code></A></nobr> 94 <A NAME="android.provider.Settings.Secure.ENABLED_ACCESSIBILITY_SERVICES"></A> 95 <nobr><code>String</code> <A HREF="../../../../reference/android/provider/Settings.Secure.html#ENABLED_ACCESSIBILITY_SERVICES" target="_top"><code>ENABLED_ACCESSIBILITY_SERVICES</code></A></nobr> 101 <A NAME="android.provider.Settings.Secure.TTS_DEFAULT_COUNTRY"></A> 102 <nobr><code>String</code> <A HREF="../../../../reference/android/provider/Settings.Secure.html#TTS_DEFAULT_COUNTRY" target="_top"><code>TTS_DEFAULT_COUNTRY</code></A></nobr> 108 <A NAME="android.provider.Settings.Secure.TTS_DEFAULT_LANG"></A [all...] |
/external/apache-http/src/org/apache/http/cookie/ |
CookieOrigin.java | 48 private final boolean secure; field in class:CookieOrigin 50 public CookieOrigin(final String host, int port, final String path, boolean secure) { 74 this.secure = secure; 90 return this.secure; 97 if (this.secure) { 98 buffer.append("(secure)");
|
SetCookie.java | 91 * Sets the secure attribute of the cookie. 94 * using a secure protocol (https). This should only be set when 95 * the cookie's originating server used a secure protocol to set the 98 * @param secure The value of the secure attribute 102 void setSecure (boolean secure);
|
/frameworks/base/core/java/android/os/storage/ |
IMountService.aidl | 92 * Creates a secure container with the specified parameters. 105 * Destroy a secure container, and free up all resources associated with it. 112 * Mount a secure container with the specified key and owner UID. 118 * Unount a secure container. 129 * Rename an unmounted secure container. 135 * Returns the filesystem path of a mounted secure container. 140 * Gets an Array of currently known secure container IDs
|
/frameworks/base/core/tests/coretests/src/android/provider/ |
SettingsProviderTest.java | 34 Settings.Secure.putString(r, "test_service", "Value"); 35 assertEquals("Value", Settings.Secure.getString(r, "test_service")); 38 Settings.Secure.putString(r, "test_service", "New"); 39 assertEquals("New", Settings.Secure.getString(r, "test_service")); 42 assertEquals(1, r.delete(Settings.Secure.getUriFor("test_service"), null, null)); 43 assertEquals(null, Settings.Secure.getString(r, "test_service")); 62 assertEquals("content://settings/secure/test_service", 63 Settings.Secure.getUriFor("test_service").toString()); 66 Uri tables[] = { Settings.System.CONTENT_URI, Settings.Secure.CONTENT_URI }; 122 assertEquals(null, Settings.Secure.getString(r, "test_key")) [all...] |
/frameworks/base/docs/html/sdk/api_diff/8/changes/ |
android.provider.Settings.Secure.html | 10 android.provider.Settings.Secure 74 Class android.provider.<A HREF="../../../../reference/android/provider/Settings.Secure.html" target="_top"><font size="+2"><code>Settings.Secure</code></font></A> 86 <A NAME="android.provider.Settings.Secure.isLocationProviderEnabled_added(android.content.ContentResolver, java.lang.String)"></A> 87 <nobr><code>boolean</code> <A HREF="../../../../reference/android/provider/Settings.Secure.html#isLocationProviderEnabled(android.content.ContentResolver, java.lang.String)" target="_top"><code>isLocationProviderEnabled</code></A>(<code>ContentResolver,</nobr> String<nobr><nobr></code>)</nobr> 93 <A NAME="android.provider.Settings.Secure.setLocationProviderEnabled_added(android.content.ContentResolver, java.lang.String, boolean)"></A> 94 <nobr><code>void</code> <A HREF="../../../../reference/android/provider/Settings.Secure.html#setLocationProviderEnabled(android.content.ContentResolver, java.lang.String, boolean)" target="_top"><code>setLocationProviderEnabled</code></A>(<code>ContentResolver,</nobr> String<nobr>,</nobr> boolean<nobr><nobr></code>)</nobr> 109 <A NAME="android.provider.Settings.Secure.ALLOWED_GEOLOCATION_ORIGINS"></A> 110 <nobr><code>String</code> <A HREF="../../../../reference/android/provider/Settings.Secure.html#ALLOWED_GEOLOCATION_ORIGINS" target="_top"><code>ALLOWED_GEOLOCATION_ORIGINS</code></A></nobr> 116 <A NAME="android.provider.Settings.Secure.LOCK_PATTERN_ENABLED"></A [all...] |
/cts/tests/tests/net/src/android/net/cts/ |
ProxyTest.java | 21 import android.provider.Settings.Secure; 73 @BrokenTest("Cannot write secure settings table") 87 Secure.putString(mContext.getContentResolver(), Secure.HTTP_PROXY, host + ":" + port);
|
/dalvik/libcore/auth/src/main/java/javax/security/auth/ |
package.html | 12 the java.security file that, as always, is the ultimate arbiter of all matters secure in Android.
|
/frameworks/base/core/java/android/net/http/ |
CertificateValidatorCache.java | 35 * to keep each secure domain name associated with a cryptographically secure 71 * secure hash from 72 * @return The secure hash computed from server certificates 131 * @param secureHash The secure hash to check against 133 * associated with the domain and the secure hash 163 * @param secureHash The secure hash to be added to the cache 207 * @param secureHash The secure hash to be associated with this cache 228 * @param secureHash The secure hash to check
|