/frameworks/base/core/java/android/view/textservice/ |
SpellCheckerSession.java | 56 * <p>For the rare people amongst us writing client applications that use the spell checker service 59 * service by yourself.</p> 75 * {@link android.service.textservice.SpellCheckerService} interface, via the 77 * enforced in the system by not binding to a spell checker service that does 90 * Name under which a SpellChecker service component publishes information about itself. 142 * @return true if the connection to a text service of this session is disconnected and not 150 * Get the spell checker service info this spell checker session has.
|
/frameworks/base/docs/html/sdk/api_diff/15/changes/ |
changes-summary.html | 182 <A NAME="android.service.textservice"></A> 183 <nobr><A HREF="pkg_android.service.textservice.html">android.service.textservice</A></nobr> 189 <A NAME="android.service.wallpaper"></A> 190 <nobr><A HREF="pkg_android.service.wallpaper.html">android.service.wallpaper</A></nobr> 256 <a href="http://www.android.com/terms.html">Site Terms of Service</a> -
|
/frameworks/base/keystore/java/android/security/ |
KeyChain.java | 407 private final IKeyChainService service; field in class:KeyChain.KeyChainConnection 410 IKeyChainService service) { 413 this.service = service; 419 return service; 436 @Override public void onServiceConnected(ComponentName name, IBinder service) { 440 q.put(IKeyChainService.Stub.asInterface(service));
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
org.eclipse.core.runtime_3.6.0.v20100505.jar | |
org.eclipse.ecf.filetransfer_4.0.0.v20100529-0735.jar | |
/prebuilts/tools/common/eclipse/ |
org.eclipse.core.runtime_3.6.0.v20100505.jar | |
/packages/apps/Bluetooth/src/com/android/bluetooth/opp/ |
BluetoothOppService.java | 38 import android.app.Service; 69 public class BluetoothOppService extends Service { 143 throw new UnsupportedOperationException("Cannot bind to Bluetooth OPP Service"); 400 super("Bluetooth Share Service"); 572 Log.v(TAG, "Service adding new entry"); 624 if (V) Log.v(TAG, "Service create new Batch " + newBatch.mId 628 if (V) Log.v(TAG, "Service create new Batch " + newBatch.mId 635 if (V) Log.v(TAG, "Service start transfer new Batch " + newBatch.mId 640 if (V) Log.v(TAG, "Service start server transfer new Batch " + newBatch.mId 648 if (V) Log.v(TAG, "Service add info " + info.mId + " to existing batch [all...] |
/device/generic/goldfish/qemud/ |
qemud.c | 38 * * the client sends the service name through the socket, as 39 * <service-name> 47 * where <name> is the service name, and <id> is a 2-hexchar 58 * * if the emulator refuses the service connection, it will 1213 * the client first sends the name of the system service 1221 * to the service. 1224 * the name of another service. 1307 /* the client hasn't registered a service yet, 1308 * so this must be the name of a service, call [all...] |
/external/chromium/chrome/browser/search_engines/ |
template_url_model_unittest.cc | 145 // Simulate firing by the prefs service specifying that the managed 196 TestingPrefService* service = profile()->GetTestingPrefService(); local 197 service->SetManagedPref( 200 service->SetManagedPref( 203 service->SetManagedPref( 206 service->SetManagedPref( 209 service->SetManagedPref( 212 service->SetManagedPref( 215 service->SetManagedPref( 223 TestingPrefService* service = profile()->GetTestingPrefService() local [all...] |
/external/openssh/ |
sshconnect2.c | 258 const char *service; member in struct:Authctxt 387 debug2("buggy server: service_accept w/o service"); 401 authctxt.service = "ssh-connection"; /* service name */ 655 packet_put_cstring(authctxt->service); 710 authctxt->service, "gssapi-with-mic"); 857 packet_put_cstring(authctxt->service); 883 packet_put_cstring(authctxt->service); 925 packet_put_cstring(authctxt->service); 1658 const char *service; local [all...] |
/packages/apps/Nfc/nci/jni/ |
PeerToPeer.cpp | 154 ** serviceName: service name. 179 ** Description: Find a PeerToPeer object by service name 181 ** serviceName: service name. 205 ** serviceName: Server's service name. 213 ALOGD ("%s: enter; service name: %s JNI handle: %u", fn, serviceName, jniHandle); 220 ALOGD ("%s: service name=%s already registered, handle: 0x%04x", fn, serviceName, pSrv->mNfaP2pServerHandle); 242 ALOGE ("%s: service name=%s no free entry", fn, serviceName); 350 ALOGD ("%s: notify nfc service", fn); 387 ALOGD ("%s: notify nfc service", fn); 414 ALOGD ("%s: notify nfc service", fn) [all...] |
/external/bluetooth/bluedroid/bta/dm/ |
bta_dm_act.c | 158 * i.e., If you add new Service ID for BTA, the correct security ID of the new service 159 * from Security service definitions (btm_api.h) should be added to this lookup table. 744 /* covert BTA service mask to BTM mask */ 1634 UINT16 service = 0xFFFF; local [all...] |
/external/chromium_org/chrome/browser/policy/ |
policy_browsertest.cc | 385 content::PluginService* service = content::PluginService::GetInstance(); local 386 service->GetPlugins(base::Bind(CopyPluginListAndQuit, plugins)); 853 TemplateURLService* service = TemplateURLServiceFactory::GetForProfile( local 855 ui_test_utils::WaitForTemplateURLServiceToLoad(service); 856 TemplateURL* default_search = service->GetDefaultSearchProvider(); 979 TemplateURLService* service = TemplateURLServiceFactory::GetForProfile( local 1042 TemplateURLService* service = TemplateURLServiceFactory::GetForProfile( local 1440 ExtensionService* service = extension_service(); local 1471 ExtensionService* service = extension_service(); local 1493 ExtensionService* service = extension_service(); local 1521 ExtensionService* service = extension_service(); local 1637 ExtensionService* service = extension_service(); local [all...] |
/frameworks/base/docs/html/guide/topics/data/ |
backup.jd | 21 <li><a href="#BackupKey">Registering for Android Backup Service</a></li> 56 <p>Android's {@link android.app.backup backup} service allows you to copy your persistent 75 <p class="note"><strong>Note:</strong> The backup service is <em>not</em> designed for 82 the device manufacturer and service provider. The backup transport may differ from device to device 100 <p class="caution"><strong>Caution:</strong> Because the cloud storage and transport service can 120 <li>Register your application with a backup service. Google offers <a 121 href="http://code.google.com/android/backup/index.html">Android Backup Service</a> as a backup 122 service for most Android-powered devices, which requires that you register your application in 186 <p class="note"><strong>Note:</strong> The backup service and the APIs you must use are 195 <h2 id="BackupKey">Registering for Android Backup Service</h2 [all...] |
/frameworks/opt/telephony/src/java/com/android/internal/telephony/gsm/ |
GsmServiceStateTracker.java | 112 * Mark when service state is in emergency call only mode 157 static final int PS_ENABLED = 1001; // Access Control blocks data service 158 static final int PS_DISABLED = 1002; // Access Control enables data service 159 static final int CS_ENABLED = 1003; // Access Control blocks all voice/sms service 160 static final int CS_DISABLED = 1004; // Access Control enables all voice/sms service 161 static final int CS_NORMAL_ENABLED = 1005; // Access Control blocks normal voice/sms service 162 static final int CS_EMERGENCY_ENABLED = 1006; // Access Control blocks emergency call service 445 // Can't register data service while voice service is ok 501 // 1) No service but emergency call allowed -> expecte [all...] |
/frameworks/base/services/java/com/android/server/ |
WallpaperManagerService.java | 59 import android.service.wallpaper.IWallpaperConnection; 60 import android.service.wallpaper.IWallpaperEngine; 61 import android.service.wallpaper.IWallpaperService; 62 import android.service.wallpaper.WallpaperService; 95 * Minimum time between crashes of a wallpaper service for us to consider 231 public void onServiceConnected(ComponentName name, IBinder service) { 235 mService = IWallpaperService.Stub.asInterface(service); 252 Slog.w(TAG, "Wallpaper service gone: " + mWallpaper.wallpaperComponent); 679 // We've attached to the service but the engine hasn't attached back to us 706 // This returns the current user's wallpaper, if called by a system service. Else i [all...] |
/external/chromium/chrome/browser/ui/webui/ |
new_tab_ui.cc | 91 virtual void TabRestoreServiceChanged(TabRestoreService* service); 95 virtual void TabRestoreServiceDestroyed(TabRestoreService* service); 152 TabRestoreService* service) { 154 NewTabUI::AddRecentlyClosedEntries(service->entries(), &list_value); 160 TabRestoreService* service) { 277 NotificationService* service = NotificationService::current(); local 278 service->Notify(NotificationType::PROMO_RESOURCE_STATE_CHANGED, 324 ExtensionService* service = GetProfile()->GetExtensionService(); local 327 if (service) 328 AddMessageHandler((new AppLauncherHandler(service))->Attach(this)) [all...] |
/external/chromium/chrome/common/extensions/docs/examples/apps/hello-python/oauth2/ |
__init__.py | 107 The OAuth consumer is a "third-party" service that wants to access 108 protected resources from an OAuth service provider on behalf of an end 111 Usually a consumer must be registered with the service provider by the 112 developer of the consumer software. As part of that process, the service 114 software can identify itself to the service. The consumer will include its 120 the service provider for a request token, kicking off the OAuth 151 token* that the live user authorizes with the service provider. The 262 When a consumer wants to access a service's protected resources, it does 579 """A skeletal implementation of a service provider, providing protected 676 The OAuth protocol lets consumers and service providers pick a way to sig [all...] |
/external/chromium_org/chrome/browser/extensions/api/usb/ |
usb_api.cc | 62 const char kErrorInitService[] = "Failed to initialize USB service."; 425 UsbService* service = UsbService::GetInstance(); local 426 if (!service) { 432 device = service->GetDeviceById(input_device.device); 561 UsbService *service = UsbService::GetInstance(); local 562 if (!service) { 568 service->GetDevices(devices.get()); 649 UsbService* service = UsbService::GetInstance(); local 650 if (!service) { 656 service->GetDevices(&devices) [all...] |
/external/chromium_org/chrome/browser/extensions/api/web_navigation/ |
web_navigation_apitest.cc | 538 ExtensionService* service = extensions::ExtensionSystem::Get( local 541 service->GetExtensionById(last_loaded_extension_id(), false); 580 ExtensionService* service = extensions::ExtensionSystem::Get( local 583 service->GetExtensionById(last_loaded_extension_id(), false); 692 ExtensionService* service = extensions::ExtensionSystem::Get( local 695 service->GetExtensionById(last_loaded_extension_id(), false); 714 ExtensionService* service = extensions::ExtensionSystem::Get( local 717 service->GetExtensionById(last_loaded_extension_id(), false); 747 ExtensionService* service = extensions::ExtensionSystem::Get( local 750 service->GetExtensionById(last_loaded_extension_id(), false) [all...] |
/external/chromium_org/chrome/browser/safe_browsing/ |
safe_browsing_blocking_page_test.cc | 5 // This test creates a fake safebrowsing service, where we can inject 80 explicit FakeSafeBrowsingDatabaseManager(SafeBrowsingService* service) 81 : SafeBrowsingDatabaseManager(service) { } 127 explicit FakeSafeBrowsingUIManager(SafeBrowsingService* service) : 128 SafeBrowsingUIManager(service) { } 369 FakeSafeBrowsingService* service = local 373 ASSERT_TRUE(service); 374 service->fake_database_manager()->SetURLThreatType(url, threat_type); 378 // service, navigates to that page, and returns the url. 388 // Adds a safebrowsing malware result to the fake safebrowsing service, [all...] |
/external/chromium_org/chrome/common/extensions/docs/examples/apps/hello-python/oauth2/ |
__init__.py | 107 The OAuth consumer is a "third-party" service that wants to access 108 protected resources from an OAuth service provider on behalf of an end 111 Usually a consumer must be registered with the service provider by the 112 developer of the consumer software. As part of that process, the service 114 software can identify itself to the service. The consumer will include its 120 the service provider for a request token, kicking off the OAuth 151 token* that the live user authorizes with the service provider. The 262 When a consumer wants to access a service's protected resources, it does 579 """A skeletal implementation of a service provider, providing protected 676 The OAuth protocol lets consumers and service providers pick a way to sig [all...] |
/external/chromium_org/google_apis/gaia/ |
oauth2_token_service.cc | 85 // The Fetcher will call back the service by calling 88 // before it completes fetching, the service will never be called back. The 89 // Fetcher destructs itself after calling back the service when finishes 321 // Deregisters itself from the service to prevent more waiting requests to 576 // (1) All the live Fetchers are created by this service. 578 // service, as all the fetchers created by a service are destructed in the 579 // service's dtor. 581 // (2) All the uncompleted Fetchers created by this service are recorded in 594 // By (1), |fetcher| is created by this service [all...] |
/external/chromium_org/ppapi/native_client/src/trusted/plugin/ |
service_runtime.cc | 505 // Hook up the reverse service channel. We are the IMC client, but 506 // provide SRPC service. 518 // Get connection capability to service runtime where the IMC 530 NaClLog(4, "ServiceRuntime::InitCommunication: starting reverse service\n"); 621 // On a load failure the service runtime does not crash itself to 625 // we induce a service runtime crash here. We do not release 635 NaClLog(LOG_ERROR, "Reverse service thread will pick up crash log\n"); 674 // Abandon callbacks, tell service threads to quit if they were 687 // from the service runtime may not have noticed yet. The low-level 690 // for the service threads to get their EOF indications [all...] |
/external/qemu/android/ |
hw-sensors.c | 172 QemudService* service; member in struct:__anon27442 249 /* Qemud service management */ 482 QemudService* service, 488 QemudClient* client = qemud_client_new(service, channel, client_param, cl, 672 h->service = qemud_service_register("sensors", 0, h, _hwSensors_connect, 709 if (hw->service == NULL) { 711 D("%s: sensors qemud service initialized", __FUNCTION__); 747 if (hw->service != NULL) { 770 if (hw->service != NULL) { 792 if (hw->service != NULL) [all...] |