/development/samples/ApiDemos/tests/src/com/example/android/apis/view/ |
Focus2AndroidTest.java | 48 * the context will be injected for you.
|
/external/chromium/chrome/browser/extensions/ |
extension_tts_api.h | 160 // Get the platform TTS implementation (or injected mock).
|
extension_webstore_private_browsertest.cc | 122 // we get the webstore private APIs injected (this happens because of the
|
/external/chromium/chrome/common/extensions/docs/static/ |
samples.html | 59 // The search data should be injected as executable JavaScript, so assign
|
/external/libvpx/examples/includes/ |
vp8_doc_tools.php | 155 // Fix annoying GeSHI-injected attributes
|
/external/webkit/Source/WebKit2/UIProcess/API/C/ |
WKContext.h | 42 // Injected Bundle Client
|
/frameworks/av/media/libstagefright/rtsp/ |
ARTPSession.cpp | 89 rtpSocket, rtcpSocket, mDesc, i, notify, false /* injected */);
|
/frameworks/base/test-runner/src/android/test/ |
ApplicationTestCase.java | 52 * <p>If simply run your tests as-is, your Application will be injected with a fully-functional
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/net/ |
route.h | 85 #define RTF_STATIC 0x0400 /* Manually injected route. */
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/net/ |
route.h | 85 #define RTF_STATIC 0x0400 /* Manually injected route. */
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/net/ |
route.h | 85 #define RTF_STATIC 0x0400 /* Manually injected route. */
|
/external/clang/include/clang/AST/ |
DeclTemplate.h | 711 /// \brief The set of "injected" template arguments used within this 801 /// \brief Retrieve the "injected" template arguments that correspond to the 804 /// Although the C++ standard has no notion of the "injected" template [all...] |
/external/chromium/chrome/browser/net/gaia/ |
token_service.cc | 57 // Allow a token to be injected from the command line.
|
/external/chromium/chrome/browser/ |
utility_process_host.h | 93 // Called when an IDBKey was injected into a
|
/external/chromium/chrome/common/extensions/ |
user_script.h | 230 // True if the script should be injected into an incognito tab.
|
/external/clang/lib/Sema/ |
SemaCXXScopeSpec.cpp | 42 // an injected-class-name; 115 // injected class name of the named class template, we're entering 117 QualType Injected 119 if (Context.hasSameType(Injected, ContextType)) [all...] |
/external/webkit/Source/WebCore/bindings/v8/custom/ |
V8InjectedScriptManager.cpp | 96 // injected script id and explicit reference to the inspected global object. The function is expected
|
/external/webkit/Source/WebCore/inspector/front-end/ |
WatchExpressionsSidebarPane.js | 122 // TODO: pass exact injected script id.
|
/packages/apps/Email/src/com/android/email/ |
VendorPolicyLoader.java | 89 * non-injected instance.
|
/packages/apps/Settings/src/com/android/settings/ |
AppWidgetPickActivity.java | 37 * injected special widgets specified through
|
/external/chromium/chrome/common/ |
sandbox_policy.cc | 191 // also loaded in this process. All the injected dlls of interest do this. 222 // Eviction of injected DLLs is done by the sandbox so that the injected module
|
/external/clang/tools/libclang/ |
CIndexCodeCompletion.cpp | 567 // Get the class for a C++ injected-class-name 568 else if (const InjectedClassNameType *Injected = 570 D = Injected->getDecl(); [all...] |
/external/webkit/Source/WebKit/chromium/public/ |
WebView.h | 63 // Controls the time that user scripts injected into the document run. 69 // Controls which frames user content is injected into. 75 // Controls which documents user styles are injected into.
|
/development/build/tools/ |
mk_sources_zip.py | 71 The source.properties file must exist and will be injected in the Zip file.
|
/external/chromium/chrome/common/net/gaia/ |
gaia_authenticator.h | 100 // loop, which is injected here.
|