/frameworks/base/core/java/android/webkit/ |
D | CookieManager.java | 142 boolean secure; field in CookieManager.Cookie 406 if (!cookieEntry.secure || HTTPS.equals(uri.getScheme())) { in setCookie() 409 cookieEntry.secure = cookie.secure; in setCookie() 521 boolean secure = HTTPS.equals(uri.getScheme()); in getCookie() 532 && (!cookie.secure || secure) in getCookie() 1061 cookie.secure = true; in parseCookie()
|
D | WebViewDatabase.java | 522 cookie.secure = cursor.getShort(secureCol) != 0; in getCookiesForDomain() 579 cookieVal.put(COOKIES_SECURE_COL, cookie.secure); in addCookie()
|
/frameworks/base/docs/html/resources/faq/ |
D | security.jd | 7 <li><a href="#secure">Is Android Secure?</a></li> 21 <a name="secure" id="secure"></a><h2>Is Android secure?</h2> 25 of the most secure mobile platforms available while still fulfilling our goal 41 <p>We have made great efforts to secure the Android platform, but it is
|
/frameworks/base/policy/src/com/android/internal/policy/impl/ |
D | LockPatternKeyguardView.java | 815 boolean secure = false; in isSecure() 818 secure = mLockPatternUtils.isLockPatternEnabled(); in isSecure() 821 secure = mUpdateMonitor.getSimState() == IccCard.State.PIN_REQUIRED; in isSecure() 824 secure = mUpdateMonitor.getSimState() == IccCard.State.PUK_REQUIRED; in isSecure() 827 secure = true; in isSecure() 830 secure = mLockPatternUtils.isLockPasswordEnabled(); in isSecure() 835 return secure; in isSecure()
|
/frameworks/base/core/java/android/net/ |
D | SSLCertificateSocketFactory.java | 104 int handshakeTimeoutMillis, SSLSessionCache cache, boolean secure) { in SSLCertificateSocketFactory() argument 107 mSecure = secure; in SSLCertificateSocketFactory()
|
/frameworks/base/core/java/android/provider/ |
D | Browser.java | 263 boolean secure = false; in getVisitedLike() 269 secure = true; in getVisitedLike() 275 if (secure) { in getVisitedLike()
|
/frameworks/base/tests/CoreTests/android/core/ |
D | SSLSocketTest.java | 79 boolean secure, String path, int outerLoop, int innerLoop, in fetch() argument 85 Socket socket = secure ? socketFactory.createSocket() in fetch() 180 private void fetch(String host, int port, boolean secure, String path, in fetch() argument 183 fetch(clientFactory, host, port, secure, path, outerLoop, innerLoop, in fetch()
|
/frameworks/base/docs/html/guide/market/billing/ |
D | billing_best_practices.jd | 43 a remote server, be sure that the device-server handshake is secure.</p> 87 <h4>Use secure random nonces</h4> 88 <p>Nonces must not be predictable or reused. Always use a cryptographically secure random number
|
D | index.jd | 81 secure and well designed.</dd>
|
D | billing_integrate.jd | 732 <code>REQUEST_NONCE</code> key contains a cryptographically secure nonce (number used once) that you 819 <code>REQUEST_NONCE</code> key contains a cryptographically secure nonce (number used once) that you 990 once) is a cryptographically secure number that your application generates and sends with every
|
/frameworks/base/docs/html/intl/ja/guide/publishing/ |
D | app-signing.jd | 31 <li><a href="#secure-key">秘密鍵のセキュリティ設定</a></li> 211 <p class="warning"><strong>注:</strong> Keytool を実行する前に、<a href="#secure-key">秘密鍵のセキュリティ設定</a>を読んで、キ… 321 <h2 id="secure-key">秘密鍵のセキュリティ設定</h2>
|
/frameworks/base/docs/html/guide/publishing/ |
D | app-signing.jd | 32 <li><a href="#secure-key">Securing Your Private Key</a></li> 141 data in a secure manner. </li> 310 <p class="warning"><strong>Warning:</strong> Keep your private key secure. 312 <a href="#secure-key">Securing Your Private Key</a> for a discussion of how to keep 313 your key secure and why doing so is critically important to you and to users. In 464 in your command line unless you are working at a secure computer. 471 in your command line unless you are working at a secure computer. 574 <h2 id="secure-key">Securing Your Private Key</h2> 590 keeping your key secure: </p> 606 and storing your key, it will remain secure. </p>
|
D | licensing.jd | 64 <p>The licensing service is a secure means of controlling access to your 184 and helps ensure a more secure, robust implementation for your application. The 258 secure.</li> 268 <p>Android Market Licensing is a flexible, secure mechanism for controlling 276 provide a secure internal storage environment. For example, a copy-protected 954 data is secure and persists across device power cycles. ServerManagedPolicy 1056 stored data is secure and cannot be reused or manipulated by a root user on a 1064 secure, persistent manner. First, it provides an Obfuscator 1083 <p>AESObfuscator provides secure obfuscation of data by using AES to 1516 hidden from all users in a secure location. When an application requests a
|
D | publishing_overview.jd | 94 are secure and production ready.</p>
|
D | preparing.jd | 331 <p>If your application relies on a remote server, make sure the server is secure and that it is
|
/frameworks/base/core/java/com/android/internal/widget/ |
D | LockPatternUtils.java | 1030 final boolean secure = isPattern && isLockPatternEnabled() && savedPatternExists() in isSecure() 1032 return secure; in isSecure()
|
/frameworks/base/core/java/android/content/ |
D | Intent.java | 5616 public String toShortString(boolean secure, boolean comp, boolean extras) { in toShortString() argument 5618 toShortString(b, secure, comp, extras); in toShortString() 5623 public void toShortString(StringBuilder b, boolean secure, boolean comp, boolean extras) { in toShortString() argument 5650 if (secure) { in toShortString()
|
/frameworks/base/docs/html/sdk/ |
D | android-1.5-highlights.jd | 145 <li>APIs for creating secure home screen {@link android.appwidget
|
D | android-2.2-highlights.jd | 98 factory defaults to secure data in case device is lost or stolen.</p>
|
D | android-1.5.jd | 203 <li>APIs for creating secure home screen {@link android.appwidget
|
D | android-4.0-highlights.jd | 817 devices over a high-performance, secure Wi-Fi Direct connection. No internet 971 secure sessions. A new keychain API and underlying encrypted storage let 991 using a new VPN API and underlying secure credential storage. With user 993 outgoing and incoming packets, and establish secure tunnels to a remote server.
|
/frameworks/base/docs/html/resources/ |
D | community-groups.jd | 106 A place for open discussion on secure development, emerging security concerns, and best practices f…
|
/frameworks/base/core/java/android/app/ |
D | IActivityManager.java | 256 public boolean killPids(int[] pids, String reason, boolean secure) throws RemoteException; in killPids() argument
|
D | ActivityManagerNative.java | 1032 boolean secure = data.readInt() != 0; in onTransact() 1033 boolean res = killPids(pids, reason, secure); in onTransact() 2820 public boolean killPids(int[] pids, String reason, boolean secure) throws RemoteException { in killPids() argument 2826 data.writeInt(secure ? 1 : 0); in killPids()
|
/frameworks/base/docs/html/guide/developing/tools/ |
D | aidl.jd | 422 information about how to keep your application secure from malware.</p>
|