HomeSort by relevance Sort by last modified time
    Searched full:service (Results 2901 - 2925 of 11175) sorted by null

<<111112113114115116117118119120>>

  /frameworks/base/core/java/android/view/textservice/
SpellCheckerSession.java 56 * <p>For the rare people amongst us writing client applications that use the spell checker service
59 * service by yourself.</p>
75 * {@link android.service.textservice.SpellCheckerService} interface, via the
77 * enforced in the system by not binding to a spell checker service that does
90 * Name under which a SpellChecker service component publishes information about itself.
142 * @return true if the connection to a text service of this session is disconnected and not
150 * Get the spell checker service info this spell checker session has.
  /frameworks/base/docs/html/sdk/api_diff/15/changes/
changes-summary.html 182 <A NAME="android.service.textservice"></A>
183 <nobr><A HREF="pkg_android.service.textservice.html">android.service.textservice</A></nobr>
189 <A NAME="android.service.wallpaper"></A>
190 <nobr><A HREF="pkg_android.service.wallpaper.html">android.service.wallpaper</A></nobr>
256 <a href="http://www.android.com/terms.html">Site Terms of Service</a> -
  /frameworks/base/keystore/java/android/security/
KeyChain.java 407 private final IKeyChainService service; field in class:KeyChain.KeyChainConnection
410 IKeyChainService service) {
413 this.service = service;
419 return service;
436 @Override public void onServiceConnected(ComponentName name, IBinder service) {
440 q.put(IKeyChainService.Stub.asInterface(service));
  /external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/
org.eclipse.core.runtime_3.6.0.v20100505.jar 
org.eclipse.ecf.filetransfer_4.0.0.v20100529-0735.jar 
  /prebuilts/tools/common/eclipse/
org.eclipse.core.runtime_3.6.0.v20100505.jar 
  /packages/apps/Bluetooth/src/com/android/bluetooth/opp/
BluetoothOppService.java 38 import android.app.Service;
69 public class BluetoothOppService extends Service {
143 throw new UnsupportedOperationException("Cannot bind to Bluetooth OPP Service");
400 super("Bluetooth Share Service");
572 Log.v(TAG, "Service adding new entry");
624 if (V) Log.v(TAG, "Service create new Batch " + newBatch.mId
628 if (V) Log.v(TAG, "Service create new Batch " + newBatch.mId
635 if (V) Log.v(TAG, "Service start transfer new Batch " + newBatch.mId
640 if (V) Log.v(TAG, "Service start server transfer new Batch " + newBatch.mId
648 if (V) Log.v(TAG, "Service add info " + info.mId + " to existing batch
    [all...]
  /device/generic/goldfish/qemud/
qemud.c 38 * * the client sends the service name through the socket, as
39 * <service-name>
47 * where <name> is the service name, and <id> is a 2-hexchar
58 * * if the emulator refuses the service connection, it will
1213 * the client first sends the name of the system service
1221 * to the service.
1224 * the name of another service.
1307 /* the client hasn't registered a service yet,
1308 * so this must be the name of a service, call
    [all...]
  /external/chromium/chrome/browser/search_engines/
template_url_model_unittest.cc 145 // Simulate firing by the prefs service specifying that the managed
196 TestingPrefService* service = profile()->GetTestingPrefService(); local
197 service->SetManagedPref(
200 service->SetManagedPref(
203 service->SetManagedPref(
206 service->SetManagedPref(
209 service->SetManagedPref(
212 service->SetManagedPref(
215 service->SetManagedPref(
223 TestingPrefService* service = profile()->GetTestingPrefService() local
    [all...]
  /external/openssh/
sshconnect2.c 258 const char *service; member in struct:Authctxt
387 debug2("buggy server: service_accept w/o service");
401 authctxt.service = "ssh-connection"; /* service name */
655 packet_put_cstring(authctxt->service);
710 authctxt->service, "gssapi-with-mic");
857 packet_put_cstring(authctxt->service);
883 packet_put_cstring(authctxt->service);
925 packet_put_cstring(authctxt->service);
1658 const char *service; local
    [all...]
  /packages/apps/Nfc/nci/jni/
PeerToPeer.cpp 154 ** serviceName: service name.
179 ** Description: Find a PeerToPeer object by service name
181 ** serviceName: service name.
205 ** serviceName: Server's service name.
213 ALOGD ("%s: enter; service name: %s JNI handle: %u", fn, serviceName, jniHandle);
220 ALOGD ("%s: service name=%s already registered, handle: 0x%04x", fn, serviceName, pSrv->mNfaP2pServerHandle);
242 ALOGE ("%s: service name=%s no free entry", fn, serviceName);
350 ALOGD ("%s: notify nfc service", fn);
387 ALOGD ("%s: notify nfc service", fn);
414 ALOGD ("%s: notify nfc service", fn)
    [all...]
  /external/bluetooth/bluedroid/bta/dm/
bta_dm_act.c 158 * i.e., If you add new Service ID for BTA, the correct security ID of the new service
159 * from Security service definitions (btm_api.h) should be added to this lookup table.
744 /* covert BTA service mask to BTM mask */
1634 UINT16 service = 0xFFFF; local
    [all...]
  /external/chromium_org/chrome/browser/policy/
policy_browsertest.cc 385 content::PluginService* service = content::PluginService::GetInstance(); local
386 service->GetPlugins(base::Bind(CopyPluginListAndQuit, plugins));
853 TemplateURLService* service = TemplateURLServiceFactory::GetForProfile( local
855 ui_test_utils::WaitForTemplateURLServiceToLoad(service);
856 TemplateURL* default_search = service->GetDefaultSearchProvider();
979 TemplateURLService* service = TemplateURLServiceFactory::GetForProfile( local
1042 TemplateURLService* service = TemplateURLServiceFactory::GetForProfile( local
1440 ExtensionService* service = extension_service(); local
1471 ExtensionService* service = extension_service(); local
1493 ExtensionService* service = extension_service(); local
1521 ExtensionService* service = extension_service(); local
1637 ExtensionService* service = extension_service(); local
    [all...]
  /frameworks/base/docs/html/guide/topics/data/
backup.jd 21 <li><a href="#BackupKey">Registering for Android Backup Service</a></li>
56 <p>Android's {@link android.app.backup backup} service allows you to copy your persistent
75 <p class="note"><strong>Note:</strong> The backup service is <em>not</em> designed for
82 the device manufacturer and service provider. The backup transport may differ from device to device
100 <p class="caution"><strong>Caution:</strong> Because the cloud storage and transport service can
120 <li>Register your application with a backup service. Google offers <a
121 href="http://code.google.com/android/backup/index.html">Android Backup Service</a> as a backup
122 service for most Android-powered devices, which requires that you register your application in
186 <p class="note"><strong>Note:</strong> The backup service and the APIs you must use are
195 <h2 id="BackupKey">Registering for Android Backup Service</h2
    [all...]
  /frameworks/opt/telephony/src/java/com/android/internal/telephony/gsm/
GsmServiceStateTracker.java 112 * Mark when service state is in emergency call only mode
157 static final int PS_ENABLED = 1001; // Access Control blocks data service
158 static final int PS_DISABLED = 1002; // Access Control enables data service
159 static final int CS_ENABLED = 1003; // Access Control blocks all voice/sms service
160 static final int CS_DISABLED = 1004; // Access Control enables all voice/sms service
161 static final int CS_NORMAL_ENABLED = 1005; // Access Control blocks normal voice/sms service
162 static final int CS_EMERGENCY_ENABLED = 1006; // Access Control blocks emergency call service
445 // Can't register data service while voice service is ok
501 // 1) No service but emergency call allowed -> expecte
    [all...]
  /frameworks/base/services/java/com/android/server/
WallpaperManagerService.java 59 import android.service.wallpaper.IWallpaperConnection;
60 import android.service.wallpaper.IWallpaperEngine;
61 import android.service.wallpaper.IWallpaperService;
62 import android.service.wallpaper.WallpaperService;
95 * Minimum time between crashes of a wallpaper service for us to consider
231 public void onServiceConnected(ComponentName name, IBinder service) {
235 mService = IWallpaperService.Stub.asInterface(service);
252 Slog.w(TAG, "Wallpaper service gone: " + mWallpaper.wallpaperComponent);
679 // We've attached to the service but the engine hasn't attached back to us
706 // This returns the current user's wallpaper, if called by a system service. Else i
    [all...]
  /external/chromium/chrome/browser/ui/webui/
new_tab_ui.cc 91 virtual void TabRestoreServiceChanged(TabRestoreService* service);
95 virtual void TabRestoreServiceDestroyed(TabRestoreService* service);
152 TabRestoreService* service) {
154 NewTabUI::AddRecentlyClosedEntries(service->entries(), &list_value);
160 TabRestoreService* service) {
277 NotificationService* service = NotificationService::current(); local
278 service->Notify(NotificationType::PROMO_RESOURCE_STATE_CHANGED,
324 ExtensionService* service = GetProfile()->GetExtensionService(); local
327 if (service)
328 AddMessageHandler((new AppLauncherHandler(service))->Attach(this))
    [all...]
  /external/chromium/chrome/common/extensions/docs/examples/apps/hello-python/oauth2/
__init__.py 107 The OAuth consumer is a "third-party" service that wants to access
108 protected resources from an OAuth service provider on behalf of an end
111 Usually a consumer must be registered with the service provider by the
112 developer of the consumer software. As part of that process, the service
114 software can identify itself to the service. The consumer will include its
120 the service provider for a request token, kicking off the OAuth
151 token* that the live user authorizes with the service provider. The
262 When a consumer wants to access a service's protected resources, it does
579 """A skeletal implementation of a service provider, providing protected
676 The OAuth protocol lets consumers and service providers pick a way to sig
    [all...]
  /external/chromium_org/chrome/browser/extensions/api/usb/
usb_api.cc 62 const char kErrorInitService[] = "Failed to initialize USB service.";
425 UsbService* service = UsbService::GetInstance(); local
426 if (!service) {
432 device = service->GetDeviceById(input_device.device);
561 UsbService *service = UsbService::GetInstance(); local
562 if (!service) {
568 service->GetDevices(devices.get());
649 UsbService* service = UsbService::GetInstance(); local
650 if (!service) {
656 service->GetDevices(&devices)
    [all...]
  /external/chromium_org/chrome/browser/extensions/api/web_navigation/
web_navigation_apitest.cc 538 ExtensionService* service = extensions::ExtensionSystem::Get( local
541 service->GetExtensionById(last_loaded_extension_id(), false);
580 ExtensionService* service = extensions::ExtensionSystem::Get( local
583 service->GetExtensionById(last_loaded_extension_id(), false);
692 ExtensionService* service = extensions::ExtensionSystem::Get( local
695 service->GetExtensionById(last_loaded_extension_id(), false);
714 ExtensionService* service = extensions::ExtensionSystem::Get( local
717 service->GetExtensionById(last_loaded_extension_id(), false);
747 ExtensionService* service = extensions::ExtensionSystem::Get( local
750 service->GetExtensionById(last_loaded_extension_id(), false)
    [all...]
  /external/chromium_org/chrome/browser/safe_browsing/
safe_browsing_blocking_page_test.cc 5 // This test creates a fake safebrowsing service, where we can inject
80 explicit FakeSafeBrowsingDatabaseManager(SafeBrowsingService* service)
81 : SafeBrowsingDatabaseManager(service) { }
127 explicit FakeSafeBrowsingUIManager(SafeBrowsingService* service) :
128 SafeBrowsingUIManager(service) { }
369 FakeSafeBrowsingService* service = local
373 ASSERT_TRUE(service);
374 service->fake_database_manager()->SetURLThreatType(url, threat_type);
378 // service, navigates to that page, and returns the url.
388 // Adds a safebrowsing malware result to the fake safebrowsing service,
    [all...]
  /external/chromium_org/chrome/common/extensions/docs/examples/apps/hello-python/oauth2/
__init__.py 107 The OAuth consumer is a "third-party" service that wants to access
108 protected resources from an OAuth service provider on behalf of an end
111 Usually a consumer must be registered with the service provider by the
112 developer of the consumer software. As part of that process, the service
114 software can identify itself to the service. The consumer will include its
120 the service provider for a request token, kicking off the OAuth
151 token* that the live user authorizes with the service provider. The
262 When a consumer wants to access a service's protected resources, it does
579 """A skeletal implementation of a service provider, providing protected
676 The OAuth protocol lets consumers and service providers pick a way to sig
    [all...]
  /external/chromium_org/google_apis/gaia/
oauth2_token_service.cc 85 // The Fetcher will call back the service by calling
88 // before it completes fetching, the service will never be called back. The
89 // Fetcher destructs itself after calling back the service when finishes
321 // Deregisters itself from the service to prevent more waiting requests to
576 // (1) All the live Fetchers are created by this service.
578 // service, as all the fetchers created by a service are destructed in the
579 // service's dtor.
581 // (2) All the uncompleted Fetchers created by this service are recorded in
594 // By (1), |fetcher| is created by this service
    [all...]
  /external/chromium_org/ppapi/native_client/src/trusted/plugin/
service_runtime.cc 505 // Hook up the reverse service channel. We are the IMC client, but
506 // provide SRPC service.
518 // Get connection capability to service runtime where the IMC
530 NaClLog(4, "ServiceRuntime::InitCommunication: starting reverse service\n");
621 // On a load failure the service runtime does not crash itself to
625 // we induce a service runtime crash here. We do not release
635 NaClLog(LOG_ERROR, "Reverse service thread will pick up crash log\n");
674 // Abandon callbacks, tell service threads to quit if they were
687 // from the service runtime may not have noticed yet. The low-level
690 // for the service threads to get their EOF indications
    [all...]
  /external/qemu/android/
hw-sensors.c 172 QemudService* service; member in struct:__anon27442
249 /* Qemud service management */
482 QemudService* service,
488 QemudClient* client = qemud_client_new(service, channel, client_param, cl,
672 h->service = qemud_service_register("sensors", 0, h, _hwSensors_connect,
709 if (hw->service == NULL) {
711 D("%s: sensors qemud service initialized", __FUNCTION__);
747 if (hw->service != NULL) {
770 if (hw->service != NULL) {
792 if (hw->service != NULL)
    [all...]

Completed in 1339 milliseconds

<<111112113114115116117118119120>>