HomeSort by relevance Sort by last modified time
    Searched full:service (Results 601 - 625 of 11175) sorted by null

<<21222324252627282930>>

  /system/security/keystore/
keystore_get.cpp 27 sp<IKeystoreService> service = interface_cast<IKeystoreService>(binder); local
29 if (service == NULL) {
34 int32_t ret = service->get(String16(key, keyLength), value, &valueLength);
  /external/chromium_org/chrome/browser/sync/test/integration/
typed_urls_helper.cc 144 HistoryService* service = HistoryServiceFactory::GetForProfileWithoutCreating( local
147 service->ScheduleDBTask(new FlushHistoryDBQueueTask(&wait_event),
154 void AddToHistory(HistoryService* service,
159 service->AddPage(url,
168 service->SetPageTitle(url, ASCIIToUTF16(url.spec() + " - title"));
171 history::URLRows GetTypedUrlsFromHistoryService(HistoryService* service) {
175 service->ScheduleDBTask(new GetTypedUrlsTask(&rows, &wait_event),
181 bool GetUrlFromHistoryService(HistoryService* service,
186 service->ScheduleDBTask(new GetUrlTask(url, row, &found, &wait_event),
192 history::VisitVector GetVisitsFromHistoryService(HistoryService* service,
219 HistoryService* service = HistoryServiceFactory::GetForProfileWithoutCreating( local
225 HistoryService* service = HistoryServiceFactory::GetForProfileWithoutCreating( local
231 HistoryService* service = HistoryServiceFactory::GetForProfileWithoutCreating( local
237 HistoryService* service = HistoryServiceFactory::GetForProfileWithoutCreating( local
    [all...]
  /frameworks/base/wifi/java/android/net/wifi/p2p/nsd/
WifiP2pServiceResponse.java 31 * The class for a response of service discovery.
40 * Service type. It's defined in table63 in Wi-Fi Direct specification.
45 * Status code of service discovery response.
52 * Service transaction ID.
53 * This is a nonzero value used to match the service request/response TLVs.
63 * Service discovery response data based on the requested on
64 * the service protocol type. The protocol format depends on the service type.
70 * The status code of service discovery response.
80 /** the service protocol type is not available *
    [all...]
  /external/chromium_org/chrome/browser/ui/webui/
sync_setup_handler.cc 297 ProfileSyncService* service = GetSyncService(); local
298 DCHECK(service);
299 if (!service->sync_initialized()) {
300 service->UnsuppressAndStart();
321 DCHECK(service->sync_initialized()) <<
339 service->GetRegisteredDataTypes();
341 service->GetPreferredDataTypes();
356 args.SetBoolean("encryptAllData", service->EncryptEverythingEnabled());
361 args.SetBoolean("showPassphrase", service->IsPassphraseRequired());
366 service->GetPassphraseType() == syncer::CUSTOM_PASSPHRASE)
427 ProfileSyncService* service = GetSyncService(); local
444 LoginUIService* service = GetLoginUIService(); local
530 ProfileSyncService* service = GetSyncService(); local
582 ProfileSyncService* service = GetSyncService(); local
623 ProfileSyncService* service = GetSyncService(); local
720 ProfileSyncService* service = GetSyncService(); local
894 LoginUIService* service = GetLoginUIService(); local
    [all...]
  /frameworks/base/core/java/android/accessibilityservice/
AccessibilityService.java 19 import android.app.Service;
35 * An accessibility service runs in the background and receives callbacks by the system
38 * etc. Such a service can optionally request the capability for querying the content
39 * of the active window. Development of an accessibility service requires extending this
51 * The lifecycle of an accessibility service is managed exclusively by the system and
52 * follows the established service life cycle. Additionally, starting or stopping an
53 * accessibility service is triggered exclusively by an explicit user action through
54 * enabling or disabling it in the device settings. After the system binds to a service it
60 * An accessibility is declared as any other service in an AndroidManifest.xml but it
63 * ignore the accessibility service. Additionally an accessibility service must request th
    [all...]
  /device/asus/flo/
init.flo.rc 287 service irsc_util /system/bin/logwrapper /system/bin/irsc_util "/etc/sec_config"
292 service rmt_storage /system/bin/rmt_storage
296 service hciattach /system/bin/sh /system/etc/init.flo.bt.sh
309 service bridgemgrd /system/bin/bridgemgrd
314 service qcom-c_main-sh /system/bin/sh /init.qcom.class_main.sh
320 service qmuxd /system/bin/qmuxd
326 service ks_checker /system/bin/sh /system/etc/kickstart_checker.sh
330 service kickstart /system/bin/qcks -i /firmware/image/ -r /data/tombstones/mdm/
337 service asus-dbug-d /data/data/com.asus.debugger/files/asus-debugger-d
350 service netmgrd /system/bin/netmgr
    [all...]
  /device/lge/hammerhead/
init.hammerhead.rc 290 service rmt_storage /system/bin/rmt_storage
294 service bridgemgrd /system/bin/bridgemgrd
300 service qmuxd /system/bin/qmuxd
305 service netmgrd /system/bin/netmgrd
309 service sensors /system/bin/sensors.qcom
314 service irsc_util /system/bin/irsc_util "/etc/sec_config"
319 service p2p_supplicant /system/bin/wpa_supplicant \
336 service wpa_supplicant /system/bin/wpa_supplicant \
350 service dhcpcd_wlan0 /system/bin/dhcpcd -aABDKL
355 service dhcpcd_p2p /system/bin/dhcpcd -aABK
    [all...]
  /external/iproute2/man/man7/
tc-hfsc.7 3 tc-hfcs \- Hierarchical Fair Service Curve
7 HFSC \- \fBHierarchical Fair Service Curve\fR was first presented at
26 minimize any discrepancy between the service curve and the actual amount of
27 service provided during linksharing
32 using nonlinear service curves (more about what it actually is later). This is
40 you might end with unusual situations, if you define service curves carelessly
44 situations where it's either not possible to guarantee service of all curves at
48 create a leaf class w/o realtime service, and in such case \- the caveats will
59 SC \- service curve
64 To understand how HFSC works, we must first introduce a service curve
    [all...]
  /external/bluetooth/bluedroid/stack/include/
gatt_api.h 331 /* Transports for the primary service */
376 typedef UINT8 tGATT_SERV_IF; /* GATT Service Interface */
396 GATT_DISC_SRVC_BY_UUID, /* discover service of a special type */
397 GATT_DISC_INC_SRVC, /* discover the included service within a service */
398 GATT_DISC_CHAR, /* discover characteristics of a service with/without type requirement */
408 tBT_UUID service; member in struct:__anon3789
465 tGATT_READ_BY_TYPE service; member in union:__anon3795
511 /* primary service group data
520 /* included service attribute valu
    [all...]
  /external/chromium_org/chrome/
chrome.gyp 53 'service',
    [all...]
  /frameworks/base/docs/html/guide/components/
aidl.jd 31 the client and service agree upon in order to communicate with each other using
38 different applications to access your service for IPC and want to handle multithreading in your
39 service. If you do not need to perform concurrent IPC across
57 another thread, that is the one that executes your code in the service. Thus, if only local
58 threads are accessing the service, you can completely control which threads are executing in it (but
80 the application hosting the service and any other application that binds to the service.</p>
84 the project's {@code gen/} directory. The service must implement the {@link android.os.IBinder}
85 interface as appropriate. The client applications can then bind to the service and call methods from
88 <p>To create a bounded service using AIDL, follow these steps:</p
    [all...]
  /cts/tests/tests/os/src/android/os/cts/
BinderTest.java 150 public void onServiceConnected(ComponentName name, IBinder service) {
157 service.transact(LocalService.SET_REPORTER_CODE, data, null, 0);
213 waitForResultOrThrow(DELAY_MSEC, "existing connection to receive service");
217 waitForResultOrThrow(DELAY_MSEC, "new connection to receive service");
236 waitForResultOrThrow(DELAY_MSEC, "the existing connection to lose service");
249 waitForResultOrThrow(DELAY_MSEC, "the existing connection to receive service");
263 // Expect to see the service unbind and then destroyed.
267 waitForResultOrThrow(DELAY_MSEC, "the existing connection to lose service");
280 waitForResultOrThrow(DELAY_MSEC, "existing connection to receive service");
294 // Expect to see the service unbind but not destroyed
    [all...]
  /external/chromium/net/proxy/
proxy_service_unittest.cc 119 scoped_refptr<ProxyService> service(
128 int rv = service->ResolveProxy(url, &info, &callback, NULL, log.bound());
154 scoped_refptr<ProxyService> service(
163 int rv = service->ResolveProxy(url, &info, &callback, NULL, log.bound());
204 scoped_refptr<ProxyService> service(
211 int rv = service->ResolveProxy(url, &info, &callback, NULL, BoundNetLog());
232 scoped_refptr<ProxyService> service(
239 int rv = service->ResolveProxy(url, &info, &callback1, NULL, BoundNetLog());
261 rv = service->ReconsiderProxyAfterError(url, &info, &callback2, NULL,
290 scoped_refptr<ProxyService> service(
    [all...]
  /device/asus/deb/
init.deb.rc 285 service irsc_util /system/bin/logwrapper /system/bin/irsc_util "/etc/sec_config"
290 service rmt_storage /system/bin/rmt_storage
294 service hciattach /system/bin/sh /system/etc/init.flo.bt.sh
307 service bridgemgrd /system/bin/bridgemgrd
313 service qmuxd /system/bin/qmuxd
318 service ks_checker /system/bin/sh /system/etc/kickstart_checker.sh
322 service kickstart /system/bin/qcks -i /firmware/image/ -r /data/tombstones/mdm/
329 service asus-dbug-d /data/data/com.asus.debugger/files/asus-debugger-d
343 service netmgrd /system/bin/netmgrd
346 service sensors /system/bin/sensors.qco
    [all...]
  /external/chromium/chrome/browser/extensions/
extension_browsertest.cc 64 ExtensionService* service = browser()->profile()->GetExtensionService(); local
69 service->LoadExtension(path);
78 service->extensions()->rbegin();
79 iter != service->extensions()->rend(); ++iter) {
90 service->extension_prefs()->OnExtensionInstalled(
92 service->SetIsIncognitoEnabled(extension->id(), incognito_enabled);
93 service->SetAllowFileAccess(extension, fileaccess_enabled);
121 ExtensionService* service = browser()->profile()->GetExtensionService(); local
128 service->LoadComponentExtension(
208 ExtensionService* service = profile->GetExtensionService() local
269 ExtensionService* service = browser()->profile()->GetExtensionService(); local
277 ExtensionService* service = browser()->profile()->GetExtensionService(); local
282 ExtensionService* service = browser()->profile()->GetExtensionService(); local
287 ExtensionService* service = browser()->profile()->GetExtensionService(); local
292 ExtensionService* service = browser()->profile()->GetExtensionService(); local
367 ExtensionService* service = browser()->profile()->GetExtensionService(); local
    [all...]
  /external/chromium/chrome/browser/sync/
sync_setup_flow.cc 35 void DisablePasswordSync(ProfileSyncService* service) {
37 service->GetPreferredDataTypes(&types);
39 service->OnUserChoseDatatypes(false, types);
56 SyncSetupFlow* SyncSetupFlow::Run(ProfileSyncService* service,
62 SyncSetupFlow::GetArgsForGaiaLogin(service, &args);
64 SyncSetupFlow::GetArgsForConfigure(service, &args);
74 container, service);
82 void SyncSetupFlow::GetArgsForGaiaLogin(const ProfileSyncService* service,
85 const GoogleServiceAuthError& error = service->GetAuthError();
86 if (!service->last_attempted_user_email().empty())
    [all...]
  /external/chromium_org/chrome/browser/extensions/
external_install_ui.cc 67 ExtensionService* service,
96 ExternalInstallMenuAlert(ExtensionService* service,
131 ExternalInstallGlobalError(ExtensionService* service,
157 base::WeakPtr<ExtensionService> service,
162 if (!service.get())
164 const Extension* extension = service->GetInstalledExtension(extension_id);
168 GlobalErrorServiceFactory::GetForProfile(service->profile());
175 service.get(), extension, delegate, prompt);
183 ExtensionService* service,
187 new ExternalInstallDialogDelegate(browser, service, extension, false)
    [all...]
  /cts/apps/CtsVerifier/src/com/android/cts/verifier/p2p/testcase/
ServRespTestCase.java 26 * The service response test case.
51 * Add renderer service
61 * Add IPP service
71 * Add AFP service
124 return "Service discovery responder test";
  /cts/tests/tests/app/src/android/app/cts/
IntentServiceTest.java 85 // start service
95 // bind service
105 // unbind service
107 // stop service
114 public void onServiceConnected(ComponentName name, IBinder service) {
  /development/samples/ApiDemos/tests/src/com/example/android/apis/app/
LocalServiceTest.java 31 * This is a simple framework for a test of a Service. See {@link android.test.ServiceTestCase
32 * ServiceTestCase} for more information on how to write and extend service tests.
61 * Test basic startup/shutdown of Service
71 * Test binding to service
77 IBinder service = bindService(startIntent); local
  /development/samples/WiFiDirectServiceDiscovery/src/com/example/android/wifidirect/discovery/
WiFiDirectServicesList.java 72 WiFiP2pService service = items.get(position); local
73 if (service != null) {
78 nameText.setText(service.device.deviceName + " - " + service.instanceName);
82 statusText.setText(getDeviceStatus(service.device.status));
  /external/chromium/chrome/browser/net/
resolve_proxy_msg_helper.h 19 // request on the IO thread using the specified proxy service. Completion is
24 // outstanding proxy resolve requests with the proxy service. It also deletes
30 // If |proxy_service| is NULL, then the main profile's proxy service will
51 // Get the proxy service instance to use. On success returns true and
80 // Specified by unit-tests, to use this proxy service in place of the
  /external/chromium/chrome/browser/policy/
device_management_backend.h 36 // Service error: Management not supported.
38 // Service error: Device not found.
40 // Service error: Device token invalid.
42 // Service error: Activation pending.
44 // Service error: Policy not found. Error code defined by the DM folks.
  /external/chromium/chrome/browser/safe_browsing/
client_side_detection_host.h 25 // class relays this information to the client-side detection service
58 // Used for testing. This function does not take ownership of the service
60 void set_client_side_detection_service(ClientSideDetectionService* service);
62 // Used for testing. This function does not take ownership of the service
64 void set_safe_browsing_service(SafeBrowsingService* service);
  /external/chromium_org/chrome/browser/chromeos/policy/
device_local_account_external_data_manager.h 28 // not outlive it because the |resource_cache| is owned by the service. However,
29 // the service is not the manager's sole owner: The manager lives as long as
30 // either the service or a DeviceLocalAccountPolicyProvider references it. This
32 // removing it from the service) while a session is in progress and a provider
33 // exists for the account. The manager is only destroyed when neither service

Completed in 1057 milliseconds

<<21222324252627282930>>