/frameworks/base/packages/SystemUI/src/com/android/systemui/keyboard/ |
KeyboardUI.java | 39 import android.provider.Settings.Secure; 293 return Secure.getIntForUser( 294 resolver, Secure.USER_SETUP_COMPLETE, 0, UserHandle.USER_CURRENT) != 0;
|
/packages/apps/Settings/src/com/android/settings/inputmethod/ |
PhysicalKeyboardFragment.java | 35 import android.provider.Settings.Secure; 250 Secure.getUriFor(Secure.SHOW_IME_WITH_HARD_KEYBOARD),
|
/frameworks/base/core/java/com/android/internal/widget/ |
LockPatternUtils.java | 147 private static final String LOCK_SCREEN_OWNER_INFO = Settings.Secure.LOCK_SCREEN_OWNER_INFO; 149 Settings.Secure.LOCK_SCREEN_OWNER_INFO_ENABLED; [all...] |
/packages/apps/Settings/src/com/android/settings/ |
SecuritySettings.java | [all...] |
/cts/apps/CtsVerifier/src/com/android/cts/verifier/notifications/ |
InteractiveVerifierActivity.java | 29 import android.provider.Settings.Secure; 460 String listeners = Secure.getString(getContentResolver(),
|
/external/libmojo/base/android/java/src/org/chromium/base/ |
ApiCompatibilityUtils.java | 364 * @see android.provider.Settings.Secure#SKIP_FIRST_USE_HINTS 368 return Settings.Secure.getInt( 369 contentResolver, Settings.Secure.SKIP_FIRST_USE_HINTS, 0) != 0;
|
/frameworks/base/core/java/android/inputmethodservice/ |
InputMethodService.java | 675 * A {@link ContentObserver} to monitor {@link Settings.Secure#SHOW_IME_WITH_HARD_KEYBOARD}. 677 * <p>Note that {@link Settings.Secure#SHOW_IME_WITH_HARD_KEYBOARD} is not a public API. 719 Settings.Secure.getUriFor(Settings.Secure.SHOW_IME_WITH_HARD_KEYBOARD), 731 mShowImeWithHardKeyboard = Settings.Secure.getInt(mService.getContentResolver(), 732 Settings.Secure.SHOW_IME_WITH_HARD_KEYBOARD, 0) != 0 ? 749 Settings.Secure.getUriFor(Settings.Secure.SHOW_IME_WITH_HARD_KEYBOARD); 751 mShowImeWithHardKeyboard = Settings.Secure.getInt(mService.getContentResolver(), 752 Settings.Secure.SHOW_IME_WITH_HARD_KEYBOARD, 0) != 0 [all...] |
/frameworks/base/packages/SettingsProvider/src/com/android/providers/settings/ |
SettingsService.java | 165 && !"secure".equalsIgnoreCase(arg) 309 : "secure".equals(table) ? Settings.Secure.CONTENT_URI 339 else if ("secure".equals(table)) callGetCommand = Settings.CALL_METHOD_GET_SECURE; 370 } else if ("secure".equals(table)) callPutCommand = Settings.CALL_METHOD_PUT_SECURE; 397 else if ("secure".equals(table)) targetUri = Settings.Secure.getUriFor(key); 416 if ("secure".equals(table)) callResetCommand = Settings.CALL_METHOD_RESET_SECURE; 475 pw.println(" {default} to set as the default, case-insensitive only for global/secure namespace"); 479 pw.println(" Reset the global/secure table for a package with mode.") [all...] |
/frameworks/base/packages/SystemUI/src/com/android/systemui/ |
HardwareUiLayout.java | 88 mEdgeBleed = Settings.Secure.getInt(getContext().getContentResolver(), 90 mRoundedDivider = Settings.Secure.getInt(getContext().getContentResolver(),
|
/frameworks/base/services/core/java/com/android/server/ |
BluetoothManagerService.java | 471 Settings.Secure.getInt(mContentResolver, SECURE_SETTINGS_BLUETOOTH_ADDR_VALID, 0) == 0) { 476 mName = Settings.Secure.getString(mContentResolver, SECURE_SETTINGS_BLUETOOTH_NAME); 477 mAddress = Settings.Secure.getString(mContentResolver, SECURE_SETTINGS_BLUETOOTH_ADDRESS); 489 Settings.Secure.putString(mContentResolver, SECURE_SETTINGS_BLUETOOTH_NAME, name); 492 Settings.Secure.getString(mContentResolver,SECURE_SETTINGS_BLUETOOTH_NAME)); 496 Settings.Secure.putString(mContentResolver, SECURE_SETTINGS_BLUETOOTH_ADDRESS, address); 499 Settings.Secure.getString(mContentResolver,SECURE_SETTINGS_BLUETOOTH_ADDRESS)); 503 Settings.Secure.putInt(mContentResolver, SECURE_SETTINGS_BLUETOOTH_ADDR_VALID, 1); [all...] |
RescueParty.java | 208 Settings.Secure.resetToDefaultsAsUser(resolver, null, mode, userId); 210 res = new RuntimeException("Failed to reset secure settings for " + userId, t);
|
/frameworks/base/services/core/java/com/android/server/connectivity/ |
Vpn.java | 460 * Save the always-on package and lockdown config into Settings.Secure 466 mSystemServices.settingsSecurePutStringForUser(Settings.Secure.ALWAYS_ON_VPN_APP, 468 mSystemServices.settingsSecurePutIntForUser(Settings.Secure.ALWAYS_ON_VPN_LOCKDOWN, 476 * Load the always-on package and lockdown config from Settings.Secure 483 Settings.Secure.ALWAYS_ON_VPN_APP, mUserHandle); 485 Settings.Secure.ALWAYS_ON_VPN_LOCKDOWN, 0 /*default*/, mUserHandle) != 0; [all...] |
/frameworks/base/services/core/java/com/android/server/notification/ |
ConditionProviders.java | 88 c.secureSettingName = Settings.Secure.ENABLED_NOTIFICATION_POLICY_ACCESS_PACKAGES; 90 c.secondarySettingName = Settings.Secure.ENABLED_NOTIFICATION_LISTENERS;
|
ScheduleConditionProvider.java | 291 Settings.Secure.putStringForUser(mContext.getContentResolver(), 301 final String setting = Settings.Secure.getStringForUser(
|
/frameworks/base/services/tests/notification/src/com/android/server/notification/ |
NotificationComparatorTest.java | 99 smsPkg = Settings.Secure.getString(mContext.getContentResolver(), 100 Settings.Secure.SMS_DEFAULT_APPLICATION);
|
RankingHelperTest.java | 44 import android.provider.Settings.Secure; 149 Secure.putIntForUser(contentResolver, 150 Secure.NOTIFICATION_BADGING, 1, UserHandle.getUserId(UID)); [all...] |
/packages/experimental/NotificationListenerSample/src/com/android/example/notificationlistener/ |
NotificationListenerActivity.java | 28 import android.provider.Settings.Secure; 144 String listeners = Secure.getString(getContentResolver(),
|
/prebuilts/go/darwin-x86/src/net/http/cookiejar/ |
jar.go | 29 // testing but it is not secure: it means that the HTTP server for foo.com can 54 // secure: it means that the HTTP server for foo.co.uk can set a cookie 96 Secure bool 119 return e.domainMatch(host) && e.pathMatch(path) && (https || !e.Secure) 415 e.Secure = c.Secure
|
/prebuilts/go/linux-x86/src/net/http/cookiejar/ |
jar.go | 29 // testing but it is not secure: it means that the HTTP server for foo.com can 54 // secure: it means that the HTTP server for foo.co.uk can set a cookie 96 Secure bool 119 return e.domainMatch(host) && e.pathMatch(path) && (https || !e.Secure) 415 e.Secure = c.Secure
|
/cts/hostsidetests/devicepolicy/app/DeviceOwner/src/com/android/cts/deviceowner/ |
CreateAndManageUserTest.java | 93 boolean setupComplete = (Settings.Secure.getInt(context.getContentResolver(),
|
/cts/tests/tests/net/src/android/net/wifi/cts/ |
WifiManagerTest.java | 348 return Settings.Secure.getInt(getContext().getContentResolver(), 349 Settings.Secure.LOCATION_MODE, Settings.Secure.LOCATION_MODE_OFF) != 350 Settings.Secure.LOCATION_MODE_OFF; [all...] |
/cts/tests/tests/print/src/android/print/cts/ |
BasePrintTest.java | 225 "settings get secure " + Settings.Secure.DISABLED_PRINT_SERVICES); 243 SystemUtil.runShellCommand(instrumentation, "settings put secure " 244 + Settings.Secure.DISABLED_PRINT_SERVICES + " " + builder); 252 "settings put secure " + Settings.Secure.DISABLED_PRINT_SERVICES + " " 313 SystemUtil.runShellCommand(instrumentation, "settings put secure " 314 + Settings.Secure.DISABLED_PRINT_SERVICES + " null"); [all...] |
/external/openssh/contrib/suse/ |
openssh.spec | 14 Summary: OpenSSH, a free Secure Shell (SSH) protocol implementation 51 Ssh (Secure Shell) is a program for logging into a remote machine and for 53 rlogin and rsh, and provide secure encrypted communications between 55 arbitrary TCP/IP ports can also be forwarded over the secure channel. 65 Ssh (Secure Shell) is a program for logging into a remote machine and for 67 rlogin and rsh, and provide secure encrypted communications between 69 arbitrary TCP/IP ports can also be forwarded over the secure channel.
|
/frameworks/base/media/java/android/media/ |
RingtoneManager.java | 793 Settings.Secure.putIntForUser(userContext.getContentResolver(), 794 Settings.Secure.SYNC_PARENT_SOUNDS, 1 /* true */, userContext.getUserId()); 841 if (Settings.Secure.getIntForUser(resolver, Settings.Secure.SYNC_PARENT_SOUNDS, 0, [all...] |
/frameworks/base/services/backup/java/com/android/server/backup/ |
RefactoredBackupManagerService.java | 557 final int enableState = Settings.Secure.getIntForUser(r, 558 Settings.Secure.BACKUP_ENABLED, -1, userId); 564 Settings.Secure.putStringForUser(r, 565 Settings.Secure.BACKUP_ENABLED, null, userId); 714 mAutoRestore = Settings.Secure.getInt(resolver, 715 Settings.Secure.BACKUP_AUTO_RESTORE, 1) != 0; 777 String transport = Settings.Secure.getString(context.getContentResolver(), 778 Settings.Secure.BACKUP_TRANSPORT); [all...] |