HomeSort by relevance Sort by last modified time
    Searched full:secure (Results 1 - 25 of 1329) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/openssh/contrib/suse/
rc.config.sshd 2 # Start the Secure Shell (SSH) Daemon?
  /device/lge/mako/sepolicy/
keystore.te 1 # Grant keystore daemon access to Qualcomm Secure Execution Environment Communicator (QSEECOM) device
drmserver.te 1 # Grant DRM Service access to Qualcomm Secure Execution Environment Communicator (QSEECOM) device
device.te 4 # Qualcomm Secure Execution Environment Communicator (QSEECOM) device
  /cts/tests/tests/provider/src/android/provider/cts/
Settings_SecureTest.java 23 import android.provider.Settings.Secure;
35 private static final String STRING_VALUE_SETTING = Secure.ANDROID_ID;
50 assertNull(Secure.getString(cr, NO_SUCH_SETTING));
52 String value = Secure.getString(cr, STRING_VALUE_SETTING);
62 assertEquals(10, Secure.getInt(cr, "int", 10));
63 assertEquals(20, Secure.getLong(cr, "long", 20));
64 assertEquals(30.0f, Secure.getFloat(cr, "float", 30), 0.001);
68 assertNull(Secure.getString(cr, NO_SUCH_SETTING));
71 Secure.putInt(cr, NO_SUCH_SETTING, -1);
77 Secure.getInt(cr, NO_SUCH_SETTING)
    [all...]
  /development/samples/ApiDemos/src/com/example/android/apis/app/
SecureWindowActivity.java 26 * <h3>Secure Window Activity</h3>
30 * a secure surface using {@link WindowManager.LayoutParams#FLAG_SECURE}.
31 * Because the surface is secure, its contents cannot be captured in screenshots
32 * and will not be visible on non-secure displays even when mirrored.
34 * Here are a few things you can do to experiment with secure surfaces and
39 * of the secure surface.
40 * <li>Try mirroring the secure surface onto a non-secure display such as an
42 * the "Developer options" section of the Settings application. The non-secure
43 * secondary display should not show the contents of the secure surface
    [all...]
SecureSurfaceViewActivity.java 29 * <h3>Secure Window Activity</h3>
33 * a secure surface using {@link SurfaceView#setSecure}.
34 * Because the surface is secure, its contents cannot be captured in screenshots
35 * and will not be visible on non-secure displays even when mirrored.
37 * Here are a few things you can do to experiment with secure surfaces and
42 * of the secure surface.
43 * <li>Try mirroring the secure surface onto a non-secure display such as an
45 * the "Developer options" section of the Settings application. The non-secure
46 * secondary display should not show the contents of the secure surface
    [all...]
SecureDialogActivity.java 29 * <h3>Secure Dialog Activity</h3>
33 * a secure surface using {@link WindowManager.LayoutParams#FLAG_SECURE}.
34 * Because the surface is secure, its contents cannot be captured in screenshots
35 * and will not be visible on non-secure displays even when mirrored.
37 * Here are a few things you can do to experiment with secure surfaces and
42 * of the secure surface.
43 * <li>Try mirroring the secure surface onto a non-secure display such as an
45 * the "Developer options" section of the Settings application. The non-secure
46 * secondary display should not show the contents of the secure surface
    [all...]
  /frameworks/base/core/tests/coretests/src/android/provider/
SettingsProviderTest.java 43 Settings.Secure.putString(r, "test_service", "Value");
44 assertEquals("Value", Settings.Secure.getString(r, "test_service"));
47 Settings.Secure.putString(r, "test_service", "New");
48 assertEquals("New", Settings.Secure.getString(r, "test_service"));
51 assertEquals(1, r.delete(Settings.Secure.getUriFor("test_service"), null, null));
52 assertEquals(null, Settings.Secure.getString(r, "test_service"));
71 assertEquals("content://settings/secure/test_service",
72 Settings.Secure.getUriFor("test_service").toString());
75 Uri tables[] = { Settings.System.CONTENT_URI, Settings.Secure.CONTENT_URI };
131 assertEquals(null, Settings.Secure.getString(r, "test_key"))
    [all...]
  /frameworks/base/docs/html/training/
best-security.jd 9 keep your app's data secure.</p
  /hardware/samsung_slsi/exynos5/mobicore/common/MobiCore/inc/
mcSo.h 4 * @addtogroup MC_SO mcSo - Secure objects definitions.
54 /** Secure object type. */
56 /** Regular secure object. */
63 /** Secure object context.
64 * A context defines which key to use to encrypt/decrypt a secure object.
77 /** Secure object lifetime.
78 * A lifetime defines how long a secure object is valid.
102 /** Secure object header v2.2.
103 * A secure object header introduces a secure object
    [all...]
  /external/chromium/webkit/glue/
webcookie.cc 12 secure(false),
23 secure(c.IsSecure()),
29 double expires, bool http_only, bool secure, bool session)
36 secure(secure),
  /hardware/samsung_slsi/exynos5/mobicore/daemon/Registry/Public/
MobiCoreRegistry.h 59 * @param so Authentication token secure object.
65 * @param[out] so Authentication token secure object.
70 /** Deletes the authentication token secure object from the registry.
75 /** Stores a root container secure object in the registry.
76 * @param so Root container secure object.
81 /** Reads a root container secure object from the registry.
82 * @param[out] so Root container secure object.
87 /** Stores a service provider container secure object in the registry.
89 * @param so Service provider container secure object.
94 /** Reads a service provider container secure object from the registry
    [all...]
  /packages/apps/Camera/src/com/android/camera/
SecureCameraActivity.java 19 // Use a different activity for secure camera only. So it can have a different
20 // task affinity from others. This makes sure non-secure camera activity is not
21 // started in secure lock screen.
  /packages/apps/Gallery2/src/com/android/camera/
SecureCameraActivity.java 19 // Use a different activity for secure camera only. So it can have a different
20 // task affinity from others. This makes sure non-secure camera activity is not
21 // started in secure lock screen.
  /libcore/luni/src/main/java/org/apache/harmony/security/provider/crypto/
SHA1_Data.java 28 * - a set of constant values, H0-H4, defined in "SECURE HASH STANDARD", FIPS PUB 180-2 ;<BR>
37 * constant defined in "SECURE HASH STANDARD"
43 * constant defined in "SECURE HASH STANDARD"
49 * constant defined in "SECURE HASH STANDARD"
55 * constant defined in "SECURE HASH STANDARD"
61 * constant defined in "SECURE HASH STANDARD"
  /development/tools/labpretest/sholes/
custom_flash.sh 33 secure=`$fastboot -s $device getvar secure 2>&1 | sed -n 's/secure: \([a-z]*\)\n*/\1/ p'`
34 if [ "$secure" = "no" ]; then
  /packages/apps/Gallery2/src/com/android/gallery3d/data/
SecureSource.java 28 mMatcher.add("/secure/all/*", SECURE_ALBUM);
29 mMatcher.add("/secure/unlock", SECURE_UNLOCK);
33 super("secure");
47 "/secure/unlock");
  /external/webkit/Source/WebCore/platform/
Cookie.h 39 const String& path, double expires, bool httpOnly, bool secure,
47 , secure(secure)
58 bool secure; member in struct:WebCore::Cookie
65 return StringHash::hash(key.name) + StringHash::hash(key.domain) + StringHash::hash(key.path) + key.secure;
70 return a.name == b.name && a.domain == b.domain && a.path == b.path && a.secure == b.secure;
  /system/extras/tests/storage/
wipe_blkdev.c 50 static int wipe_block_device(int fd, u64 len, int secure)
58 if (secure) {
67 secure ? "Secure" : "Nonsecure", errno);
81 int secure = 0; local
94 secure = 1;
126 ret = wipe_block_device(fd, len, secure);
  /external/webkit/Source/WebKit/chromium/public/
WebCookie.h 47 , secure(false)
53 const WebString& path, double expires, bool httpOnly, bool secure, bool session)
60 , secure(secure)
71 bool secure; member in struct:WebKit::WebCookie
  /frameworks/base/docs/html/sdk/api_diff/17/changes/
android.provider.Settings.Secure.html 10 android.provider.Settings.Secure
74 Class android.provider.<A HREF="../../../../reference/android/provider/Settings.Secure.html" target="_top"><font size="+2"><code>Settings.Secure</code></font></A>
87 <A NAME="android.provider.Settings.Secure.ADB_ENABLED"></A>
88 <nobr><code>String</code>&nbsp;<A HREF="../../../../reference/android/provider/Settings.Secure.html#ADB_ENABLED" target="_top"><code>ADB_ENABLED</code></font></A></nobr> </TD>
96 <A NAME="android.provider.Settings.Secure.BLUETOOTH_ON"></A>
97 <nobr><code>String</code>&nbsp;<A HREF="../../../../reference/android/provider/Settings.Secure.html#BLUETOOTH_ON" target="_top"><code>BLUETOOTH_ON</code></font></A></nobr> </TD>
105 <A NAME="android.provider.Settings.Secure.DATA_ROAMING"></A>
106 <nobr><code>String</code>&nbsp;<A HREF="../../../../reference/android/provider/Settings.Secure.html#DATA_ROAMING" target="_top"><code>DATA_ROAMING</code></font></A></nobr> </TD>
114 <A NAME="android.provider.Settings.Secure.DEVELOPMENT_SETTINGS_ENABLED"></A
    [all...]
  /packages/apps/Nfc/nci/jni/
SecureElement.h 18 * Communicate with secure elements that are attached to the NFC
95 ** Description: Turn on the secure element.
96 ** seID: ID of secure element.
108 ** Description: Turn off the secure element.
109 ** seID: ID of secure element.
134 ** seID: ID of secure element.
146 ** Description: Send data to the secure element; read it's response.
166 ** isActive: Whether the secure element is activated.
178 ** isActive: Whether any secure element is activated.
214 ** Description: Get the ID of the secure element
    [all...]
  /frameworks/base/docs/html/sdk/api_diff/14/changes/
android.provider.Settings.Secure.html 10 android.provider.Settings.Secure
74 Class android.provider.<A HREF="../../../../reference/android/provider/Settings.Secure.html" target="_top"><font size="+2"><code>Settings.Secure</code></font></A>
87 <A NAME="android.provider.Settings.Secure.TOUCH_EXPLORATION_ENABLED"></A>
88 <nobr><code>String</code>&nbsp;<A HREF="../../../../reference/android/provider/Settings.Secure.html#TOUCH_EXPLORATION_ENABLED" target="_top"><code>TOUCH_EXPLORATION_ENABLED</code></A></nobr>
102 <A NAME="android.provider.Settings.Secure.BACKGROUND_DATA"></A>
103 <nobr><code>String</code>&nbsp;<A HREF="../../../../reference/android/provider/Settings.Secure.html#BACKGROUND_DATA" target="_top"><code>BACKGROUND_DATA</code></font></A></nobr> </TD>
111 <A NAME="android.provider.Settings.Secure.TTS_DEFAULT_COUNTRY"></A>
112 <nobr><code>String</code>&nbsp;<A HREF="../../../../reference/android/provider/Settings.Secure.html#TTS_DEFAULT_COUNTRY" target="_top"><code>TTS_DEFAULT_COUNTRY</code></font></A></nobr> </TD>
120 <A NAME="android.provider.Settings.Secure.TTS_DEFAULT_LANG"></A
    [all...]
  /hardware/qcom/keymaster/
keymaster_qcom.h 77 * (by secure app) is in shared buffer at offset of "key_blob" and is opaque
79 * cmd_id : Command issue to secure app
92 * (by secure app) is in shared buffer at offset of "key_blob" and is opaque
94 * cmd_id : Command issue to secure app
111 * data returned (by secure app) is in shared buffer at offset of
114 * cmd_id : Command issue to secure app
127 * (by secure app) is in shared buffer at offset of "key_blob" and is opaque
129 * cmd_id : Command issue to secure app
145 * The signed data is returned (by secure app) at offset of data + dlen.
147 * cmd_id : Command issue to secure ap
    [all...]

Completed in 1221 milliseconds

1 2 3 4 5 6 7 8 91011>>