/system/security/keystore/ |
keystore_get.cpp | 27 sp<IKeystoreService> service = interface_cast<IKeystoreService>(binder); local 29 if (service == NULL) { 34 int32_t ret = service->get(String16(key, keyLength), value, &valueLength);
|
/external/chromium_org/chrome/browser/sync/test/integration/ |
typed_urls_helper.cc | 144 HistoryService* service = HistoryServiceFactory::GetForProfileWithoutCreating( local 147 service->ScheduleDBTask(new FlushHistoryDBQueueTask(&wait_event), 154 void AddToHistory(HistoryService* service, 159 service->AddPage(url, 168 service->SetPageTitle(url, ASCIIToUTF16(url.spec() + " - title")); 171 history::URLRows GetTypedUrlsFromHistoryService(HistoryService* service) { 175 service->ScheduleDBTask(new GetTypedUrlsTask(&rows, &wait_event), 181 bool GetUrlFromHistoryService(HistoryService* service, 186 service->ScheduleDBTask(new GetUrlTask(url, row, &found, &wait_event), 192 history::VisitVector GetVisitsFromHistoryService(HistoryService* service, 219 HistoryService* service = HistoryServiceFactory::GetForProfileWithoutCreating( local 225 HistoryService* service = HistoryServiceFactory::GetForProfileWithoutCreating( local 231 HistoryService* service = HistoryServiceFactory::GetForProfileWithoutCreating( local 237 HistoryService* service = HistoryServiceFactory::GetForProfileWithoutCreating( local [all...] |
/frameworks/base/wifi/java/android/net/wifi/p2p/nsd/ |
WifiP2pServiceResponse.java | 31 * The class for a response of service discovery. 40 * Service type. It's defined in table63 in Wi-Fi Direct specification. 45 * Status code of service discovery response. 52 * Service transaction ID. 53 * This is a nonzero value used to match the service request/response TLVs. 63 * Service discovery response data based on the requested on 64 * the service protocol type. The protocol format depends on the service type. 70 * The status code of service discovery response. 80 /** the service protocol type is not available * [all...] |
/external/chromium_org/chrome/browser/ui/webui/ |
sync_setup_handler.cc | 297 ProfileSyncService* service = GetSyncService(); local 298 DCHECK(service); 299 if (!service->sync_initialized()) { 300 service->UnsuppressAndStart(); 321 DCHECK(service->sync_initialized()) << 339 service->GetRegisteredDataTypes(); 341 service->GetPreferredDataTypes(); 356 args.SetBoolean("encryptAllData", service->EncryptEverythingEnabled()); 361 args.SetBoolean("showPassphrase", service->IsPassphraseRequired()); 366 service->GetPassphraseType() == syncer::CUSTOM_PASSPHRASE) 427 ProfileSyncService* service = GetSyncService(); local 444 LoginUIService* service = GetLoginUIService(); local 530 ProfileSyncService* service = GetSyncService(); local 582 ProfileSyncService* service = GetSyncService(); local 623 ProfileSyncService* service = GetSyncService(); local 720 ProfileSyncService* service = GetSyncService(); local 894 LoginUIService* service = GetLoginUIService(); local [all...] |
/frameworks/base/core/java/android/accessibilityservice/ |
AccessibilityService.java | 19 import android.app.Service; 35 * An accessibility service runs in the background and receives callbacks by the system 38 * etc. Such a service can optionally request the capability for querying the content 39 * of the active window. Development of an accessibility service requires extending this 51 * The lifecycle of an accessibility service is managed exclusively by the system and 52 * follows the established service life cycle. Additionally, starting or stopping an 53 * accessibility service is triggered exclusively by an explicit user action through 54 * enabling or disabling it in the device settings. After the system binds to a service it 60 * An accessibility is declared as any other service in an AndroidManifest.xml but it 63 * ignore the accessibility service. Additionally an accessibility service must request th [all...] |
/device/asus/flo/ |
init.flo.rc | 287 service irsc_util /system/bin/logwrapper /system/bin/irsc_util "/etc/sec_config" 292 service rmt_storage /system/bin/rmt_storage 296 service hciattach /system/bin/sh /system/etc/init.flo.bt.sh 309 service bridgemgrd /system/bin/bridgemgrd 314 service qcom-c_main-sh /system/bin/sh /init.qcom.class_main.sh 320 service qmuxd /system/bin/qmuxd 326 service ks_checker /system/bin/sh /system/etc/kickstart_checker.sh 330 service kickstart /system/bin/qcks -i /firmware/image/ -r /data/tombstones/mdm/ 337 service asus-dbug-d /data/data/com.asus.debugger/files/asus-debugger-d 350 service netmgrd /system/bin/netmgr [all...] |
/device/lge/hammerhead/ |
init.hammerhead.rc | 290 service rmt_storage /system/bin/rmt_storage 294 service bridgemgrd /system/bin/bridgemgrd 300 service qmuxd /system/bin/qmuxd 305 service netmgrd /system/bin/netmgrd 309 service sensors /system/bin/sensors.qcom 314 service irsc_util /system/bin/irsc_util "/etc/sec_config" 319 service p2p_supplicant /system/bin/wpa_supplicant \ 336 service wpa_supplicant /system/bin/wpa_supplicant \ 350 service dhcpcd_wlan0 /system/bin/dhcpcd -aABDKL 355 service dhcpcd_p2p /system/bin/dhcpcd -aABK [all...] |
/external/iproute2/man/man7/ |
tc-hfsc.7 | 3 tc-hfcs \- Hierarchical Fair Service Curve 7 HFSC \- \fBHierarchical Fair Service Curve\fR was first presented at 26 minimize any discrepancy between the service curve and the actual amount of 27 service provided during linksharing 32 using nonlinear service curves (more about what it actually is later). This is 40 you might end with unusual situations, if you define service curves carelessly 44 situations where it's either not possible to guarantee service of all curves at 48 create a leaf class w/o realtime service, and in such case \- the caveats will 59 SC \- service curve 64 To understand how HFSC works, we must first introduce a service curve [all...] |
/external/bluetooth/bluedroid/stack/include/ |
gatt_api.h | 331 /* Transports for the primary service */ 376 typedef UINT8 tGATT_SERV_IF; /* GATT Service Interface */ 396 GATT_DISC_SRVC_BY_UUID, /* discover service of a special type */ 397 GATT_DISC_INC_SRVC, /* discover the included service within a service */ 398 GATT_DISC_CHAR, /* discover characteristics of a service with/without type requirement */ 408 tBT_UUID service; member in struct:__anon3789 465 tGATT_READ_BY_TYPE service; member in union:__anon3795 511 /* primary service group data 520 /* included service attribute valu [all...] |
/external/chromium_org/chrome/ |
chrome.gyp | 53 'service', [all...] |
/frameworks/base/docs/html/guide/components/ |
aidl.jd | 31 the client and service agree upon in order to communicate with each other using 38 different applications to access your service for IPC and want to handle multithreading in your 39 service. If you do not need to perform concurrent IPC across 57 another thread, that is the one that executes your code in the service. Thus, if only local 58 threads are accessing the service, you can completely control which threads are executing in it (but 80 the application hosting the service and any other application that binds to the service.</p> 84 the project's {@code gen/} directory. The service must implement the {@link android.os.IBinder} 85 interface as appropriate. The client applications can then bind to the service and call methods from 88 <p>To create a bounded service using AIDL, follow these steps:</p [all...] |
/cts/tests/tests/os/src/android/os/cts/ |
BinderTest.java | 150 public void onServiceConnected(ComponentName name, IBinder service) { 157 service.transact(LocalService.SET_REPORTER_CODE, data, null, 0); 213 waitForResultOrThrow(DELAY_MSEC, "existing connection to receive service"); 217 waitForResultOrThrow(DELAY_MSEC, "new connection to receive service"); 236 waitForResultOrThrow(DELAY_MSEC, "the existing connection to lose service"); 249 waitForResultOrThrow(DELAY_MSEC, "the existing connection to receive service"); 263 // Expect to see the service unbind and then destroyed. 267 waitForResultOrThrow(DELAY_MSEC, "the existing connection to lose service"); 280 waitForResultOrThrow(DELAY_MSEC, "existing connection to receive service"); 294 // Expect to see the service unbind but not destroyed [all...] |
/external/chromium/net/proxy/ |
proxy_service_unittest.cc | 119 scoped_refptr<ProxyService> service( 128 int rv = service->ResolveProxy(url, &info, &callback, NULL, log.bound()); 154 scoped_refptr<ProxyService> service( 163 int rv = service->ResolveProxy(url, &info, &callback, NULL, log.bound()); 204 scoped_refptr<ProxyService> service( 211 int rv = service->ResolveProxy(url, &info, &callback, NULL, BoundNetLog()); 232 scoped_refptr<ProxyService> service( 239 int rv = service->ResolveProxy(url, &info, &callback1, NULL, BoundNetLog()); 261 rv = service->ReconsiderProxyAfterError(url, &info, &callback2, NULL, 290 scoped_refptr<ProxyService> service( [all...] |
/device/asus/deb/ |
init.deb.rc | 285 service irsc_util /system/bin/logwrapper /system/bin/irsc_util "/etc/sec_config" 290 service rmt_storage /system/bin/rmt_storage 294 service hciattach /system/bin/sh /system/etc/init.flo.bt.sh 307 service bridgemgrd /system/bin/bridgemgrd 313 service qmuxd /system/bin/qmuxd 318 service ks_checker /system/bin/sh /system/etc/kickstart_checker.sh 322 service kickstart /system/bin/qcks -i /firmware/image/ -r /data/tombstones/mdm/ 329 service asus-dbug-d /data/data/com.asus.debugger/files/asus-debugger-d 343 service netmgrd /system/bin/netmgrd 346 service sensors /system/bin/sensors.qco [all...] |
/external/chromium/chrome/browser/extensions/ |
extension_browsertest.cc | 64 ExtensionService* service = browser()->profile()->GetExtensionService(); local 69 service->LoadExtension(path); 78 service->extensions()->rbegin(); 79 iter != service->extensions()->rend(); ++iter) { 90 service->extension_prefs()->OnExtensionInstalled( 92 service->SetIsIncognitoEnabled(extension->id(), incognito_enabled); 93 service->SetAllowFileAccess(extension, fileaccess_enabled); 121 ExtensionService* service = browser()->profile()->GetExtensionService(); local 128 service->LoadComponentExtension( 208 ExtensionService* service = profile->GetExtensionService() local 269 ExtensionService* service = browser()->profile()->GetExtensionService(); local 277 ExtensionService* service = browser()->profile()->GetExtensionService(); local 282 ExtensionService* service = browser()->profile()->GetExtensionService(); local 287 ExtensionService* service = browser()->profile()->GetExtensionService(); local 292 ExtensionService* service = browser()->profile()->GetExtensionService(); local 367 ExtensionService* service = browser()->profile()->GetExtensionService(); local [all...] |
/external/chromium/chrome/browser/sync/ |
sync_setup_flow.cc | 35 void DisablePasswordSync(ProfileSyncService* service) { 37 service->GetPreferredDataTypes(&types); 39 service->OnUserChoseDatatypes(false, types); 56 SyncSetupFlow* SyncSetupFlow::Run(ProfileSyncService* service, 62 SyncSetupFlow::GetArgsForGaiaLogin(service, &args); 64 SyncSetupFlow::GetArgsForConfigure(service, &args); 74 container, service); 82 void SyncSetupFlow::GetArgsForGaiaLogin(const ProfileSyncService* service, 85 const GoogleServiceAuthError& error = service->GetAuthError(); 86 if (!service->last_attempted_user_email().empty()) [all...] |
/external/chromium_org/chrome/browser/extensions/ |
external_install_ui.cc | 67 ExtensionService* service, 96 ExternalInstallMenuAlert(ExtensionService* service, 131 ExternalInstallGlobalError(ExtensionService* service, 157 base::WeakPtr<ExtensionService> service, 162 if (!service.get()) 164 const Extension* extension = service->GetInstalledExtension(extension_id); 168 GlobalErrorServiceFactory::GetForProfile(service->profile()); 175 service.get(), extension, delegate, prompt); 183 ExtensionService* service, 187 new ExternalInstallDialogDelegate(browser, service, extension, false) [all...] |
/cts/apps/CtsVerifier/src/com/android/cts/verifier/p2p/testcase/ |
ServRespTestCase.java | 26 * The service response test case. 51 * Add renderer service 61 * Add IPP service 71 * Add AFP service 124 return "Service discovery responder test";
|
/cts/tests/tests/app/src/android/app/cts/ |
IntentServiceTest.java | 85 // start service 95 // bind service 105 // unbind service 107 // stop service 114 public void onServiceConnected(ComponentName name, IBinder service) {
|
/development/samples/ApiDemos/tests/src/com/example/android/apis/app/ |
LocalServiceTest.java | 31 * This is a simple framework for a test of a Service. See {@link android.test.ServiceTestCase 32 * ServiceTestCase} for more information on how to write and extend service tests. 61 * Test basic startup/shutdown of Service 71 * Test binding to service 77 IBinder service = bindService(startIntent); local
|
/development/samples/WiFiDirectServiceDiscovery/src/com/example/android/wifidirect/discovery/ |
WiFiDirectServicesList.java | 72 WiFiP2pService service = items.get(position); local 73 if (service != null) { 78 nameText.setText(service.device.deviceName + " - " + service.instanceName); 82 statusText.setText(getDeviceStatus(service.device.status));
|
/external/chromium/chrome/browser/net/ |
resolve_proxy_msg_helper.h | 19 // request on the IO thread using the specified proxy service. Completion is 24 // outstanding proxy resolve requests with the proxy service. It also deletes 30 // If |proxy_service| is NULL, then the main profile's proxy service will 51 // Get the proxy service instance to use. On success returns true and 80 // Specified by unit-tests, to use this proxy service in place of the
|
/external/chromium/chrome/browser/policy/ |
device_management_backend.h | 36 // Service error: Management not supported. 38 // Service error: Device not found. 40 // Service error: Device token invalid. 42 // Service error: Activation pending. 44 // Service error: Policy not found. Error code defined by the DM folks.
|
/external/chromium/chrome/browser/safe_browsing/ |
client_side_detection_host.h | 25 // class relays this information to the client-side detection service 58 // Used for testing. This function does not take ownership of the service 60 void set_client_side_detection_service(ClientSideDetectionService* service); 62 // Used for testing. This function does not take ownership of the service 64 void set_safe_browsing_service(SafeBrowsingService* service);
|
/external/chromium_org/chrome/browser/chromeos/policy/ |
device_local_account_external_data_manager.h | 28 // not outlive it because the |resource_cache| is owned by the service. However, 29 // the service is not the manager's sole owner: The manager lives as long as 30 // either the service or a DeviceLocalAccountPolicyProvider references it. This 32 // removing it from the service) while a session is in progress and a provider 33 // exists for the account. The manager is only destroyed when neither service
|