/frameworks/base/samples/training/network-usage/src/com/example/android/networkusage/ |
H A D | SettingsActivity.java | 61 public void onSharedPreferenceChanged(SharedPreferences sharedPreferences, String key) { argument
|
/frameworks/base/services/input/tests/ |
H A D | InputReader_test.cpp | 357 void addConfigurationProperty(int32_t deviceId, const String8& key, const String8& value) { argument 359 device->configuration.addProperty(key, value); 512 const KeyInfo* key = getKey(device, scanCode, usageCode); local 513 if (key) { 515 *outKeycode = key->keyCode; 518 *outFlags = key->flags; 1252 << "Ignored device should return unknown key code state."; 1261 << "Ignored device should never mark any key codes."; 1262 ASSERT_EQ(0, flags[0]) << "Flag for unsupported key should be unchanged."; 1263 ASSERT_EQ(1, flags[1]) << "Flag for unsupported key shoul 1397 addConfigurationProperty(const char* key, const char* value) argument [all...] |
/frameworks/base/services/java/com/android/server/ |
H A D | AppWidgetServiceImpl.java | 134 ServiceConnectionProxy(Pair<Integer, Intent.FilterComparison> key, IBinder connectionCb) { argument 684 // the same key) 687 Pair<Integer, FilterComparison> key = Pair.create(appWidgetId, fc); 688 if (mBoundRemoteViewsServices.containsKey(key)) { 689 conn = (ServiceConnectionProxy) mBoundRemoteViewsServices.get(key); 692 mBoundRemoteViewsServices.remove(key); 700 conn = new ServiceConnectionProxy(key, connection); 702 mBoundRemoteViewsServices.put(key, conn); 720 Pair<Integer, FilterComparison> key = Pair.create(appWidgetId, new FilterComparison( 722 if (mBoundRemoteViewsServices.containsKey(key)) { [all...] |
H A D | BackupManagerService.java | 418 // same PBKDF2 cycle with the persisted salt; if the resulting derived key string matches 1049 Slog.e(TAG, "Invalid key spec for PBKDF2!"); 1057 SecretKey key = buildPasswordKey(pw, salt, rounds); 1058 if (key != null) { 1059 return byteArrayToHex(key.getEncoded()); 2502 // line 6: master key checksum salt [hex] 2504 // line 8: IV of the user key [hex] 2505 // line 9: master key blob [hex] 2506 // IV of the master key, master key itsel [all...] |
H A D | BatteryService.java | 615 String key = args[1]; 619 if ("ac".equals(key)) { 621 } else if ("usb".equals(key)) { 623 } else if ("wireless".equals(key)) { 625 } else if ("status".equals(key)) { 627 } else if ("level".equals(key)) { 629 } else if ("invalid".equals(key)) { 632 pw.println("Unknown set option: " + key);
|
H A D | CertBlacklister.java | 57 public BlacklistObserver(String key, String name, String path, ContentResolver cr) { argument 59 mKey = key; 128 // set up the public key blacklist observer
|
H A D | ConnectivityService.java | 2353 String key = nt.getTcpBufferSizesPropName(); 2354 String bufferSizes = key == null ? null : SystemProperties.get(key); 2357 if (VDBG) log(key + " not found in system properties. Using defaults"); 2360 key = "net.tcp.buffersize.default"; 2361 bufferSizes = SystemProperties.get(key); 2368 + "] which comes from [" + key + "]"); 2508 String key = "net.dns" + last; 2510 if (!changed && value.equals(SystemProperties.get(key))) { 2517 SystemProperties.set(key, valu [all...] |
H A D | CountryDetectorService.java | 146 private void removeListener(IBinder key) { argument 148 mReceivers.remove(key);
|
H A D | MountService.java | 212 * The size of the crypto algorithm key in bits for OBB files. Currently 1606 public int createSecureContainer(String id, int sizeMb, String fstype, String key, argument 1614 mConnector.execute("asec", "create", id, sizeMb, fstype, key, ownerUid, 1702 public int mountSecureContainer(String id, String key, int ownerUid) { argument 1715 mConnector.execute("asec", "mount", id, key, ownerUid); 1914 String rawPath, String canonicalPath, String key, IObbActionListener token, int nonce) { 1921 final ObbAction action = new MountObbAction(obbState, key, callingUid); 2399 MountObbAction(ObbState obbState, String key, int callingUid) { argument 2401 mKey = key; 2438 SecretKey key 1913 mountObb( String rawPath, String canonicalPath, String key, IObbActionListener token, int nonce) argument [all...] |
H A D | PackageManagerBackupAgent.java | 57 // key under which we store global metadata (individual app metadata 58 // is stored using the package name as a key) 150 if (DEBUG) Slog.v(TAG, "Storing global metadata key"); 155 if (DEBUG) Slog.v(TAG, "Global metadata key already stored"); 165 // We've already handled the metadata key; skip it here 244 private static void writeEntity(BackupDataOutput data, String key, byte[] bytes) argument 246 data.writeEntityHeader(key, bytes.length); 261 String key = data.getKey(); 264 if (DEBUG) Slog.v(TAG, " got key=" + key [all...] |
H A D | StatusBarManagerService.java | 263 * Hide or show the on-screen Menu key. Only call this from the window manager, typically in 269 if (SPEW) Slog.d(TAG, (menuVisible?"showing":"hiding") + " MENU key"); 488 IBinder key = new Binder(); 489 mNotifications.put(key, notification); 492 mBar.addNotification(key, notification); 496 return key; 500 public void updateNotification(IBinder key, StatusBarNotification notification) { argument 502 if (!mNotifications.containsKey(key)) { 503 throw new IllegalArgumentException("updateNotification key not found: " + key); 515 removeNotification(IBinder key) argument [all...] |
/frameworks/base/services/java/com/android/server/am/ |
H A D | ActivityManagerService.java | 250 // How long we wait until we timeout on key dispatching. 253 // How long we wait until we timeout on key dispatching during instrumentation. 317 * Activity we have told the window manager to have key focus. 379 * All of the processes that have been forced to be foreground. The key 3954 if (pir.key.userId != userId) { 3963 if (userId != UserHandle.USER_ALL && pir.key.userId != userId) { 3967 if (!pir.key.packageName.equals(name)) { 3978 if (pir.key.activity != null) { 3979 pir.key.activity.pendingResults.remove(pir.ref); 4633 PendingIntentRecord.Key key [all...] |
H A D | PendingIntentRecord.java | 36 final Key key; field in class:PendingIntentRecord 185 key = _k; 203 if ((key.flags&PendingIntent.FLAG_ONE_SHOT) != 0) { 207 Intent finalIntent = key.requestIntent != null 208 ? new Intent(key.requestIntent) : new Intent(); 210 int changes = finalIntent.fillIn(intent, key.flags); 212 resolvedType = key.requestResolvedType; 215 resolvedType = key.requestResolvedType; 224 int userId = key.userId; 228 switch (key [all...] |
H A D | UsageStatsService.java | 583 for (String key : keys) { 584 PkgUsageStatsExtended pus = mStats.get(key); 585 out.writeString(key);
|
/frameworks/base/services/java/com/android/server/connectivity/ |
H A D | Tethering.java | 674 for (Object key : keys) { 675 TetherInterfaceSM sm = mIfaces.get(key); 677 list.add((String)key); 705 for (Object key : keys) { 706 TetherInterfaceSM sm = mIfaces.get(key); 708 list.add((String)key); 723 for (Object key : keys) { 724 TetherInterfaceSM sm = mIfaces.get(key); 726 list.add((String)key);
|
H A D | Vpn.java | 554 config.user = profile.key; 601 info.key = mLegacyVpnRunner.mConfig.user;
|
/frameworks/base/services/java/com/android/server/location/ |
H A D | LocationBlacklist.java | 126 private String[] getStringArrayLocked(String key) { argument 129 flatString = Settings.Secure.getStringForUser(mContext.getContentResolver(), key,
|
/frameworks/base/services/java/com/android/server/net/ |
H A D | NetworkStatsCollection.java | 57 * Collection of {@link NetworkStatsHistory}, stored based on combined key of 149 final Key key = entry.getKey(); 150 final boolean setMatches = set == SET_ALL || key.set == set; 151 if (key.uid == uid && setMatches && key.tag == tag 152 && templateMatches(template, key.ident)) { 174 final Key key = mapEntry.getKey(); 175 if (templateMatches(template, key.ident)) { 180 entry.uid = key.uid; 181 entry.set = key 211 recordHistory(Key key, NetworkStatsHistory history) argument [all...] |
/frameworks/base/services/java/com/android/server/pm/ |
H A D | PackageManagerService.java | 2876 private static final int getContinuationPoint(final String[] keys, final String key) { argument 2878 if (key == null) { 2881 final int insertPoint = Arrays.binarySearch(keys, key); 5809 * If the public key of the package's signature does not match 5810 * our expected public key, then this is a different package and 5827 + " does not have the expected public key; ignoring"); 8046 * The key steps in deleting a package are
|
H A D | PackageSignatures.java | 71 serializer.attribute(null, "key", sig.toCharsString()); 108 String key = parser.getAttributeValue(null, "key"); 109 if (key == null) { 131 Signature sig = new Signature(key);
|
H A D | Settings.java | 1544 final String key = its.next(); 1545 final PackageSetting ps = mPackages.get(key);
|
/frameworks/base/services/java/com/android/server/usb/ |
H A D | UsbDebuggingManager.java | 92 String key = new String(Arrays.copyOfRange(buffer, 2, count)); 93 Slog.d(TAG, "Received public key: " + key); 95 msg.obj = key; 190 String key = (String)msg.obj; 191 String fingerprints = getFingerprints(key); 200 writeKey(key); 212 String key = (String)msg.obj; 213 mFingerprints = getFingerprints(key); 214 showConfirmationDialog(key, mFingerprint 221 getFingerprints(String key) argument 245 showConfirmationDialog(String key, String fingerprints) argument 260 writeKey(String key) argument [all...] |
H A D | UsbSettingsManager.java | 1033 // make a copy of the key set to avoid ConcurrentModificationException 1036 Object key = keys[i]; 1037 if (packageName.equals(mDevicePreferenceMap.get(key))) { 1038 mDevicePreferenceMap.remove(key); 1044 // make a copy of the key set to avoid ConcurrentModificationException 1047 Object key = keys[i]; 1048 if (packageName.equals(mAccessoryPreferenceMap.get(key))) { 1049 mAccessoryPreferenceMap.remove(key);
|
/frameworks/base/services/tests/servicestests/src/com/android/server/ |
H A D | CertBlacklisterTest.java | 45 private void overrideSettings(String key, String value) throws Exception { argument 46 Settings.Secure.putString(mContext.getContentResolver(), key, value);
|
/frameworks/base/services/tests/servicestests/src/com/android/server/updates/ |
H A D | CertPinInstallReceiverTest.java | 102 private void overrideSettings(String key, String value) throws Exception { argument 103 assertTrue(Settings.Secure.putString(mContext.getContentResolver(), key, value));
|