/external/protobuf/src/google/protobuf/compiler/java/ |
java_service.cc | 55 " implements com.google.protobuf.Service {\n", 112 "public static com.google.protobuf.Service newReflectiveService(\n" 176 " \"Service.callMethod() given method descriptor for wrong \" +\n" 177 " \"service type.\");\n" 221 " \"Service.callBlockingMethod() given method descriptor for \" +\n" 222 " \"wrong service type.\");\n" 256 * TODO(cpovirk): The exception message says "Service.foo" when it may be 265 " \"Service.get$request_or_response$Prototype() given method \" +\n" 266 " \"descriptor for wrong service type.\");\n"
|
/frameworks/base/core/java/android/speech/tts/ |
TtsEngines.java | 169 ServiceInfo service = resolveInfos.get(0).serviceInfo; local 170 if (service != null) { 171 final String settings = settingsActivityFromServiceInfo(service, pm); 240 ServiceInfo service = resolve.serviceInfo; local 241 if (service != null) { 245 engine.name = service.packageName; 246 CharSequence label = service.loadLabel(pm); 248 engine.icon = service.getIconResource(); 250 engine.system = isSystemEngine(service);
|
TextToSpeech.java | 145 * Listener that will be called when the TTS service has 272 * Intent for starting a TTS service. Services that handle this intent must 274 * directly, instead they should talk to the TTS service using the the methods in this 729 public Void run(ITextToSpeechService service) throws RemoteException { 730 service.setCallback(getCallerIdentity(), null); 731 service.stop(getCallerIdentity()); 735 // service ends up being destroyed (if there are no other open 737 // ServiceConnection continues to refer to the destroyed service. [all...] |
/hardware/qcom/keymaster/ |
QSEEComAPI.h | 82 * service. A QSAPP must be loaded at the request of the HLOS, 84 * A listener service on the otherhand is started during start-up by a 119 * app, but each listener service can open a unique device in the same HLOS app 142 * @brief Register an HLOS listener service. This allows messages from QSAPP 146 * @param[in] lstnr_id The listener service identifier. This ID must be uniquely 159 * @brief Unregister a listener service. 233 * @brief Receive a service defined buffer. 248 * This allows a listener service to receive a command (e.g. read file abc). 249 * The service can then handle the request from QSEECom_receive_req, and provide
|
/packages/apps/ContactsCommon/src/com/android/contacts/common/vcard/ |
VCardService.java | 18 import android.app.Service; 48 * This Service creates one ImportRequest/ExportRequest object (as Runnable) per request and push 52 // TODO: Using IntentService looks simpler than using Service + ServiceConnection though this 54 public class VCardService extends Service { 147 if (DEBUG) Log.d(LOG_TAG, "vCard Service is being created."); 265 Log.d(LOG_TAG, "Executor service status: shutdown: " + mExecutorService.isShutdown() 335 // process, we cannot stop the service yet. Also clean up already finished processors 370 Log.i(LOG_TAG, "No unfinished job. Stop this service."); 434 * means this Service becomes no longer ready for import/export requests.
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
org.eclipse.ui_3.6.1.M20100826-1330.jar | |
/external/qemu/android/ |
sdk-controller-socket.h | 35 * On the device there is an SdkController service running that enables 39 * SdkController service on the device, and SDKCtlSocket API implemented here 56 * Connecting to SdkController service on the attached device can be broken down 157 /* Service-side port has connected to the socket. */ 159 /* Service-side port has disconnected from the socket. */ 161 /* Service-side port has enabled emulation */ 163 /* Service-side port has disabled emulation */ 165 /* Handshake request has succeeded, and service-side port is connected. */ 167 /* Handshake request has succeeded, but service-side port is not connected. */ 180 * or not a service-side port that provides requested emulation functionality i [all...] |
/external/jmdns/src/javax/jmdns/impl/ |
DNSRecord.java | 495 // The service name is in the alias 637 * Service record. 639 public static class Service extends DNSRecord { 640 private static Logger logger1 = Logger.getLogger(Service.class.getName()); 646 public Service(String name, DNSRecordClass recordClass, boolean unique, int ttl, int priority, int weight, int port, String server) { 711 if (! (other instanceof Service) ) { 714 Service s = (Service) other; 728 DNSRecord.Service localService = new DNSRecord.Service(info.getQualifiedName(), DNSRecordClass.CLASS_IN, DNSRecordClass.UNIQUE, DNSConstants.DNS_TTL, inf (…) [all...] |
/external/openssh/contrib/cygwin/ |
ssh-host-config | 23 CSIH_SCRIPT=/usr/share/csih/cygwin-service-installation-helper.sh 369 csih_warning "Couldn't determine name of user running sshd service from /etc/passwd!" 371 csih_warning "by the sshd service belong to the user running the service." 409 csih_warning "This may cause the sshd service to fail! Please make sure that" 418 # Install sshd as a service 428 csih_inform "Sshd service is already installed." 431 echo -e "${_csih_QUERY_STR} Do you want to install sshd as a service?" 432 if csih_request "(Say \"no\" if it is already installed as a service)" 486 csih_inform "The sshd service has been installed under the LocalSystem [all...] |
/cts/tests/tests/net/src/android/net/wifi/cts/ |
NsdManagerTest.java | 310 // Expect a service record to be discovered (and filter the ones 345 // Resolve the service 362 // Unregister the service 369 // Expect a callback for service lost 377 // Register service again to see if we discover it 386 // Create a new registration listener and register same service again
|
/docs/source.android.com/src/devices/ |
camera.jd | 52 This class calls the IPC binder proxies to obtain access to the camera service.</dd> 57 camera service. ICameraService is the interface to the camera service, ICamera is the interface 60 <dt>Camera service</dt> 61 <dd>The camera service, located in <code>frameworks/av/services/camera/libcameraservice/CameraService.cpp</code>, is the actual code that interacts with the HAL.</p> 64 <dd>The hardware abstraction layer defines the standard interface that the camera service calls into and that
|
/external/bluetooth/bluedroid/bta/hh/ |
bta_hh_int.h | 195 UINT8 inst_id; /* share service instance ID and report instance ID, as 196 hi 4 for service instance ID, low 4 as charatceristic instance ID */ 219 UINT8 incl_srvc_inst; /* assuming only one included service : battery service */ 220 UINT8 cur_expl_char_idx; /* currently discovering service index */ 279 UINT8 cur_srvc_index; /* currently discovering service index */
|
/external/chromium/chrome/browser/extensions/ |
extension_context_menu_api.cc | 276 ExtensionService* service = profile()->GetExtensionService(); local 277 ExtensionMenuManager* manager = service->menu_manager(); 342 ExtensionService* service = profile()->GetExtensionService(); local 343 ExtensionMenuManager* manager = service->menu_manager(); 357 ExtensionService* service = profile()->GetExtensionService(); local 358 ExtensionMenuManager* manager = service->menu_manager();
|
/external/chromium/chrome/browser/policy/ |
cloud_policy_controller.cc | 64 DeviceManagementService* service, 70 Initialize(service, 175 DeviceManagementService* service, 185 Initialize(service, 197 DeviceManagementService* service, 208 service_ = service;
|
/external/chromium/chrome/browser/search_engines/ |
search_provider_install_data_unittest.cc | 193 TestingPrefService* service = util_.profile()->GetTestingPrefService(); local 194 service->SetManagedPref( 197 service->SetManagedPref( 200 service->SetManagedPref( 204 service->SetManagedPref( 206 service->SetManagedPref(
|
/external/chromium/chrome/common/ |
service_process_util_mac.mm | 99 // Gets the name of the service process IPC channel. 135 // to be a service process of some sort registered with launchd. 160 LOG(ERROR) << "Unable to get executable path for service process"; 272 // We want the service process to be able to exit if there are no services 274 // relaunch the service automatically in any other case than exiting 292 // creating that directory if needed. This will cause the service process to be
|
/external/chromium_org/chrome/browser/history/ |
history_service.h | 80 // The history service records page titles, and visit times, as well as 83 // This service is thread safe. Each request callback is invoked in the 101 // Initializes the history service, returning true on success. On false, do 117 // Unloads the backend without actually shutting down the history service. 127 // In practice, this will be called by the service manager (BrowserProcess) 129 // should be impossible for anybody else to call the service, even if it is 164 // returned service is intended to be accessed only via the history thread. 414 // history service has created a new entry for a download in the history db. 419 // history service request is complete. The callback is called on the thread 430 // history service has retrieved a list of all download state. The cal [all...] |
/external/chromium_org/chrome/browser/resources/print_preview/data/ |
destination.js | 109 * Whether the user has accepted the terms-of-service for the print 111 * {@code} null if terms-of-service does not apply to the print destination. 333 * @return {?boolean} Whether the user has accepted the terms-of-service of 334 * the print destination or {@code null} if a terms-of-service does not 342 * @param {?boolean} Whether the user has accepted the terms-of-service of 343 * the print destination or {@code null} if a terms-of-service does not
|
/external/chromium_org/chrome/browser/safe_browsing/ |
client_side_detection_service.h | 71 // Creates a client-side detection service. The service is initially 77 // Enables or disables the service, and refreshes the state of all renderers. 102 // occurs during the fetch. If the service is disabled or an error occurs 286 // Whether the service is running or not. When the service is not running,
|
ui_manager.cc | 52 const scoped_refptr<SafeBrowsingService>& service) 53 : sb_service_(service) { 228 // The service may delete the ping manager (i.e. when user disabling service, 248 // The service may delete the ping manager (i.e. when user disabling service,
|
/external/chromium_org/chrome/browser/search_engines/ |
search_provider_install_data_unittest.cc | 175 TestingPrefServiceSyncable* service = local 177 service->SetManagedPref(prefs::kDefaultSearchProviderEnabled, 179 service->SetManagedPref(prefs::kDefaultSearchProviderSearchURL, 181 service->SetManagedPref(prefs::kDefaultSearchProviderName, 184 service->SetManagedPref(prefs::kDefaultSearchProviderID, 186 service->SetManagedPref(prefs::kDefaultSearchProviderPrepopulateID,
|
/external/chromium_org/chrome/browser/sync/glue/ |
non_ui_data_type_controller.cc | 57 // If we are waiting for some external service to load before associating 138 // We continue on to deactivate the datatype and stop the local service. 144 // stopped the local service in StartDoneImpl(..). 150 // service. 161 // Stop the local service and release our references to it and the 228 // ensure we clean up the local service and shared change processor properly.
|
/external/chromium_org/chrome/browser/ui/gtk/ |
global_history_menu.cc | 290 void GlobalHistoryMenu::TabRestoreServiceChanged(TabRestoreService* service) { 291 const TabRestoreService::Entries& entries = service->entries(); 381 TabRestoreService* service) { 392 TabRestoreService* service = local 394 if (item->session_id && service) { 395 service->RestoreEntryById(browser_->tab_restore_service_delegate(),
|
/external/chromium_org/chrome/common/extensions/docs/templates/articles/ |
app_codelab7_useridentification.html | 4 Chrome Apps come with an <a href="experimental.identity.html">identity API</a> that makes it easy to integrate either with Google accounts or with any other service that supports OAuth.</p> 21 <h2 id="integrating_with_a_third_party_service">Integrating with a third-party service</h2> 23 <p>Chrome Apps have a dedicated API for lauching the authentication flow to any third-party OAuth2 service, called $ref:identity.launchWebAuthFlow. 30 <p>Here we are treating Google as a third-party service. Just follow Google's own registration procedure for apps requiring API access below:</p> 48 to make XHR requests to the Tasks service URL - for security reasons, 61 <p>Now we are ready to ask user's authorization, so we can connect to the Tasks service and import his tasks into our Todo list. First, we will need to request an access token - which, at the first run will automatically pops up an authentication and authorization window to the user.
|
/external/chromium_org/components/policy/core/common/cloud/ |
cloud_policy_client.h | 30 // Implements the core logic required to talk to the device management service. 31 // Also keeps track of the current state of the association with the service, 88 // |provider| and |service| are weak pointers and it's the caller's 95 DeviceManagementService* service, 105 // Attempts to register with the device management service. Results in a 172 // Whether the client is registered with the device management service.
|