/frameworks/base/packages/DefaultContainerService/src/com/android/defcontainer/ |
H A D | DefaultContainerService.java | 95 * @param key Refers to key used for encrypting the secure container 102 final String key, final String resFileName, final String publicResFileName, 108 return copyResourceInner(packageURI, cid, key, resFileName, publicResFileName, 320 private String copyResourceInner(Uri packageURI, String newCid, String key, String resFileName, argument 346 final String newCachePath = PackageHelper.createSdDir(sizeMb, newCid, key, Process.myUid(),
|
/frameworks/base/packages/InputDevices/ |
H A D | Android.mk | 29 # Validate all key maps.
|
/frameworks/base/packages/SettingsProvider/src/com/android/providers/settings/ |
H A D | DatabaseHelper.java | 772 * 2. Define the key bindings for traversing web content in WebViews. 1262 // Patch up the slightly-wrong key migration from 82 -> 83 for those 2210 private void loadSetting(SQLiteStatement stmt, String key, Object value) { argument 2211 stmt.bindString(1, key); 2216 private void loadStringSetting(SQLiteStatement stmt, String key, int resid) { argument 2217 loadSetting(stmt, key, mContext.getResources().getString(resid)); 2220 private void loadBooleanSetting(SQLiteStatement stmt, String key, int resid) { argument 2221 loadSetting(stmt, key, 2225 private void loadIntegerSetting(SQLiteStatement stmt, String key, int resid) { argument 2226 loadSetting(stmt, key, 2230 loadFractionSetting(SQLiteStatement stmt, String key, int resid, int base) argument [all...] |
H A D | SettingsBackupAgent.java | 116 // the key to store the WIFI data under, should be sorted as last, so restore happens last. 370 final String key = data.getKey(); 372 if (KEY_SYSTEM.equals(key)) { 375 } else if (KEY_SECURE.equals(key)) { 377 } else if (KEY_GLOBAL.equals(key)) { 379 } else if (KEY_WIFI_SUPPLICANT.equals(key)) { 382 } else if (KEY_LOCALE.equals(key)) { 386 } else if (KEY_WIFI_CONFIG.equals(key)) { 560 private long writeIfChanged(long oldChecksum, String key, byte[] data, argument 569 output.writeEntityHeader(key, dat [all...] |
H A D | SettingsProvider.java | 98 // want to cache the existence of a key, but not store its value. 586 // Put methods - new value is in the args bundle under the key named by 610 // Looks up value 'key' in 'table' and returns either a single-pair Bundle, 613 final SettingsCache cache, String key) { 615 Slog.e(TAG, "cache is null for user " + UserHandle.getCallingUserId() + " : key=" + key); 619 Bundle value = cache.get(key); 639 cursor = db.query(table, COLUMN_VALUE, "name=?", new String[]{key}, 643 return cache.putIfAbsent(key, cursor.getString(0)); 651 cache.putIfAbsent(key, nul 612 lookupValue(DatabaseHelper dbHelper, String table, final SettingsCache cache, String key) argument 1089 entryRemoved(boolean evicted, String key, Bundle oldValue, Bundle newValue) argument 1102 putIfAbsent(String key, String value) argument [all...] |
/frameworks/base/packages/SystemUI/src/com/android/systemui/statusbar/ |
H A D | BaseStatusBar.java | 879 void handleNotificationError(IBinder key, StatusBarNotification n, String message) { argument 880 removeNotification(key); 888 protected StatusBarNotification removeNotificationViews(IBinder key) { argument 889 NotificationData.Entry entry = mNotificationData.remove(key); 891 Slog.w(TAG, "removeNotification for unknown key: " + key); 903 protected StatusBarIconView addNotificationViews(IBinder key, argument 906 Slog.d(TAG, "addNotificationViews(key=" + key + ", notification=" + notification); 921 handleNotificationError(key, notificatio 983 tick(IBinder key, StatusBarNotification n, boolean firstTime) argument 992 updateNotification(IBinder key, StatusBarNotification notification) argument [all...] |
H A D | CommandQueue.java | 72 IBinder key; field in class:CommandQueue.NotificationQueueEntry 84 public void addNotification(IBinder key, StatusBarNotification notification); argument 85 public void updateNotification(IBinder key, StatusBarNotification notification); argument 86 public void removeNotification(IBinder key); argument 124 public void addNotification(IBinder key, StatusBarNotification notification) { argument 127 ne.key = key; 133 public void updateNotification(IBinder key, StatusBarNotification notification) { argument 136 ne.key = key; 142 removeNotification(IBinder key) argument [all...] |
H A D | DoNotDisturb.java | 44 public void onSharedPreferenceChanged(SharedPreferences prefs, String key) { argument
|
H A D | NotificationData.java | 35 public IBinder key; field in class:NotificationData.Entry 44 public Entry(IBinder key, StatusBarNotification n, StatusBarIconView ic) { argument 45 this.key = key; 108 public Entry findByKey(IBinder key) { argument 110 if (e.key == key) { 129 public int add(IBinder key, StatusBarNotification notification, View row, View content, argument 132 entry.key = key; 142 remove(IBinder key) argument [all...] |
/frameworks/base/packages/SystemUI/src/com/android/systemui/statusbar/phone/ |
H A D | PhoneStatusBar.java | 856 public void addNotification(IBinder key, StatusBarNotification notification) { argument 858 StatusBarIconView iconView = addNotificationViews(key, notification); 931 public void removeNotification(IBinder key) { argument 932 StatusBarNotification old = removeNotificationViews(key); 933 if (SPEW) Slog.d(TAG, "removeNotification key=" + key + " old=" + old); 1901 protected void tick(IBinder key, StatusBarNotification n, boolean firstTime) { argument 2014 pw.println(" [" + i + "] key=" + e.key + " icon=" + e.icon);
|
/frameworks/base/packages/SystemUI/src/com/android/systemui/statusbar/policy/ |
H A D | DoNotDisturbController.java | 64 public void onSharedPreferenceChanged(SharedPreferences prefs, String key) { argument
|
/frameworks/base/packages/SystemUI/src/com/android/systemui/statusbar/tablet/ |
H A D | TabletStatusBar.java | 730 entry.key, 761 mNotificationPeekKey = entry.key; 849 public void addNotification(IBinder key, StatusBarNotification notification) { argument 850 if (DEBUG) Slog.d(TAG, "addNotification(" + key + " -> " + notification + ")"); 851 addNotificationViews(key, notification); 865 tick(key, notification, true); 871 public void removeNotification(IBinder key) { argument 872 if (DEBUG) Slog.d(TAG, "removeNotification(" + key + ")"); 873 removeNotificationViews(key); 874 mTicker.remove(key); 961 tick(IBinder key, StatusBarNotification n, boolean firstTime) argument [all...] |
H A D | TabletTicker.java | 92 public void add(IBinder key, StatusBarNotification notification) { argument 99 remove(key, false); 101 mKeys[mQueuePos] = key; 114 public void remove(IBinder key) { argument 115 remove(key, true); 118 public void remove(IBinder key, boolean advance) { argument 119 if (mCurrentKey == key) { 128 if (mKeys[i] == key) {
|
/frameworks/base/packages/SystemUI/src/com/android/systemui/statusbar/tv/ |
H A D | TvStatusBar.java | 48 public void addNotification(IBinder key, StatusBarNotification notification) { argument 52 public void updateNotification(IBinder key, StatusBarNotification notification) { argument 56 public void removeNotification(IBinder key) { argument 124 protected void tick(IBinder key, StatusBarNotification n, boolean firstTime) { argument
|
/frameworks/base/packages/SystemUI/tests/ |
H A D | Android.mk | 26 # sign this with platform cert, so this test is allowed to inject key events into
|
/frameworks/base/samples/training/network-usage/src/com/example/android/networkusage/ |
H A D | SettingsActivity.java | 61 public void onSharedPreferenceChanged(SharedPreferences sharedPreferences, String key) { argument
|
/frameworks/base/services/input/tests/ |
H A D | InputReader_test.cpp | 357 void addConfigurationProperty(int32_t deviceId, const String8& key, const String8& value) { argument 359 device->configuration.addProperty(key, value); 512 const KeyInfo* key = getKey(device, scanCode, usageCode); local 513 if (key) { 515 *outKeycode = key->keyCode; 518 *outFlags = key->flags; 1252 << "Ignored device should return unknown key code state."; 1261 << "Ignored device should never mark any key codes."; 1262 ASSERT_EQ(0, flags[0]) << "Flag for unsupported key should be unchanged."; 1263 ASSERT_EQ(1, flags[1]) << "Flag for unsupported key shoul 1397 addConfigurationProperty(const char* key, const char* value) argument [all...] |
/frameworks/base/services/java/com/android/server/ |
H A D | AppWidgetServiceImpl.java | 134 ServiceConnectionProxy(Pair<Integer, Intent.FilterComparison> key, IBinder connectionCb) { argument 684 // the same key) 687 Pair<Integer, FilterComparison> key = Pair.create(appWidgetId, fc); 688 if (mBoundRemoteViewsServices.containsKey(key)) { 689 conn = (ServiceConnectionProxy) mBoundRemoteViewsServices.get(key); 692 mBoundRemoteViewsServices.remove(key); 700 conn = new ServiceConnectionProxy(key, connection); 702 mBoundRemoteViewsServices.put(key, conn); 720 Pair<Integer, FilterComparison> key = Pair.create(appWidgetId, new FilterComparison( 722 if (mBoundRemoteViewsServices.containsKey(key)) { [all...] |
H A D | BackupManagerService.java | 418 // same PBKDF2 cycle with the persisted salt; if the resulting derived key string matches 1049 Slog.e(TAG, "Invalid key spec for PBKDF2!"); 1057 SecretKey key = buildPasswordKey(pw, salt, rounds); 1058 if (key != null) { 1059 return byteArrayToHex(key.getEncoded()); 2502 // line 6: master key checksum salt [hex] 2504 // line 8: IV of the user key [hex] 2505 // line 9: master key blob [hex] 2506 // IV of the master key, master key itsel [all...] |
H A D | BatteryService.java | 615 String key = args[1]; 619 if ("ac".equals(key)) { 621 } else if ("usb".equals(key)) { 623 } else if ("wireless".equals(key)) { 625 } else if ("status".equals(key)) { 627 } else if ("level".equals(key)) { 629 } else if ("invalid".equals(key)) { 632 pw.println("Unknown set option: " + key);
|
H A D | CertBlacklister.java | 57 public BlacklistObserver(String key, String name, String path, ContentResolver cr) { argument 59 mKey = key; 128 // set up the public key blacklist observer
|
H A D | ConnectivityService.java | 2353 String key = nt.getTcpBufferSizesPropName(); 2354 String bufferSizes = key == null ? null : SystemProperties.get(key); 2357 if (VDBG) log(key + " not found in system properties. Using defaults"); 2360 key = "net.tcp.buffersize.default"; 2361 bufferSizes = SystemProperties.get(key); 2368 + "] which comes from [" + key + "]"); 2508 String key = "net.dns" + last; 2510 if (!changed && value.equals(SystemProperties.get(key))) { 2517 SystemProperties.set(key, valu [all...] |
H A D | CountryDetectorService.java | 146 private void removeListener(IBinder key) { argument 148 mReceivers.remove(key);
|
H A D | MountService.java | 212 * The size of the crypto algorithm key in bits for OBB files. Currently 1606 public int createSecureContainer(String id, int sizeMb, String fstype, String key, argument 1614 mConnector.execute("asec", "create", id, sizeMb, fstype, key, ownerUid, 1702 public int mountSecureContainer(String id, String key, int ownerUid) { argument 1715 mConnector.execute("asec", "mount", id, key, ownerUid); 1914 String rawPath, String canonicalPath, String key, IObbActionListener token, int nonce) { 1921 final ObbAction action = new MountObbAction(obbState, key, callingUid); 2399 MountObbAction(ObbState obbState, String key, int callingUid) { argument 2401 mKey = key; 2438 SecretKey key 1913 mountObb( String rawPath, String canonicalPath, String key, IObbActionListener token, int nonce) argument [all...] |
H A D | PackageManagerBackupAgent.java | 57 // key under which we store global metadata (individual app metadata 58 // is stored using the package name as a key) 150 if (DEBUG) Slog.v(TAG, "Storing global metadata key"); 155 if (DEBUG) Slog.v(TAG, "Global metadata key already stored"); 165 // We've already handled the metadata key; skip it here 244 private static void writeEntity(BackupDataOutput data, String key, byte[] bytes) argument 246 data.writeEntityHeader(key, bytes.length); 261 String key = data.getKey(); 264 if (DEBUG) Slog.v(TAG, " got key=" + key [all...] |