/frameworks/base/tools/layoutlib/create/src/com/android/tools/layoutlib/create/ |
D | TransformClassAdapter.java | 67 public void visit(int version, int access, String name, in visit() argument 75 access = access & ~(Opcodes.ACC_PRIVATE | Opcodes.ACC_PROTECTED); in visit() 76 access |= Opcodes.ACC_PUBLIC; in visit() 79 access = access & ~Opcodes.ACC_FINAL; in visit() 83 mIsInterface = ((access & Opcodes.ACC_INTERFACE) != 0); in visit() 84 super.visit(version, access, name, signature, superName, interfaces); in visit() 89 public void visitInnerClass(String name, String outerName, String innerName, int access) { in visitInnerClass() argument 92 access = access & ~(Opcodes.ACC_PRIVATE | Opcodes.ACC_PROTECTED); in visitInnerClass() 93 access |= Opcodes.ACC_PUBLIC; in visitInnerClass() 96 access = access & ~Opcodes.ACC_FINAL; in visitInnerClass() [all …]
|
D | DelegateClassAdapter.java | 71 public MethodVisitor visitMethod(int access, String name, String desc, in visitMethod() argument 74 boolean isStatic = (access & Opcodes.ACC_STATIC) != 0; in visitMethod() 75 boolean isNative = (access & Opcodes.ACC_NATIVE) != 0; in visitMethod() 83 return super.visitMethod(access, name, desc, signature, exceptions); in visitMethod() 98 access = access & ~Opcodes.ACC_NATIVE; in visitMethod() 99 MethodVisitor mwDelegate = super.visitMethod(access, name, desc, signature, exceptions); in visitMethod() 117 int accessDelegate = access; in visitMethod() 120 access &= ~(Opcodes.ACC_PROTECTED | Opcodes.ACC_PRIVATE); in visitMethod() 121 access |= Opcodes.ACC_PUBLIC; in visitMethod() 124 MethodVisitor mwOriginal = super.visitMethod(access, name + ORIGINAL_SUFFIX, in visitMethod()
|
D | ClassHasNativeVisitor.java | 49 public void visit(int version, int access, String name, String signature, in visit() argument 71 public FieldVisitor visitField(int access, String name, String desc, in visitField() argument 79 String innerName, int access) { in visitInnerClass() argument 84 public MethodVisitor visitMethod(int access, String name, String desc, in visitMethod() argument 86 if ((access & Opcodes.ACC_NATIVE) != 0) { in visitMethod()
|
D | RenameClassAdapter.java | 231 public void visit(int version, int access, String name, String signature, in visit() argument 237 super.visit(version, access, name, signature, superName, interfaces); in visit() 241 public void visitInnerClass(String name, String outerName, String innerName, int access) { in visitInnerClass() argument 245 super.visitInnerClass(name, outerName, innerName, access); in visitInnerClass() 249 public MethodVisitor visitMethod(int access, String name, String desc, in visitMethod() argument 253 MethodVisitor mw = super.visitMethod(access, name, desc, signature, exceptions); in visitMethod() 264 public FieldVisitor visitField(int access, String name, String desc, in visitField() argument 268 return super.visitField(access, name, desc, signature, value); in visitField()
|
/frameworks/base/core/java/android/view/ |
D | ViewTreeObserver.java | 804 CopyOnWriteArray.Access<OnGlobalLayoutListener> access = listeners.start(); in dispatchOnGlobalLayout() local 806 int count = access.size(); in dispatchOnGlobalLayout() 808 access.get(i).onGlobalLayout(); in dispatchOnGlobalLayout() 829 CopyOnWriteArray.Access<OnPreDrawListener> access = listeners.start(); in dispatchOnPreDraw() local 831 int count = access.size(); in dispatchOnPreDraw() 833 cancelDraw |= !(access.get(i).onPreDraw()); in dispatchOnPreDraw() 880 CopyOnWriteArray.Access<OnScrollChangedListener> access = listeners.start(); in dispatchOnScrollChanged() local 882 int count = access.size(); in dispatchOnScrollChanged() 884 access.get(i).onScrollChanged(); in dispatchOnScrollChanged() 912 CopyOnWriteArray.Access<OnComputeInternalInsetsListener> access = listeners.start(); in dispatchOnComputeInternalInsets() local [all …]
|
/frameworks/base/services/jni/ |
D | com_android_server_BatteryService.cpp | 323 if (access(path.string(), R_OK) == 0) in register_android_server_BatteryService() 330 if (access(path, R_OK) == 0) in register_android_server_BatteryService() 334 if (access(path, R_OK) == 0) in register_android_server_BatteryService() 338 if (access(path, R_OK) == 0) in register_android_server_BatteryService() 342 if (access(path, R_OK) == 0) in register_android_server_BatteryService() 347 if (access(path, R_OK) == 0) { in register_android_server_BatteryService() 354 if (access(path, R_OK) == 0) in register_android_server_BatteryService() 360 if (access(path, R_OK) == 0) { in register_android_server_BatteryService() 365 if (access(path, R_OK) == 0) in register_android_server_BatteryService() 371 if (access(path, R_OK) == 0) in register_android_server_BatteryService()
|
/frameworks/native/opengl/tools/glgen/stubs/gles11/ |
D | glMapBufferRange.cpp | 4 (JNIEnv *_env, jobject _this, jint target, jint offset, jint length, jint access) { in android_glMapBufferRange__IIII() argument 6 (GLintptr)offset, (GLsizeiptr)length, (GLbitfield)access); in android_glMapBufferRange__IIII()
|
D | glMapBufferRange.java | 7 int access in glMapBufferRange() argument
|
/frameworks/base/docs/html/tools/debugging/ |
D | debugging-projects.jd | 19 along with DDMS, to debug your applications. To access the debugger and 27 <p>The Debug Perspective in Eclipse gives you access to the following tabs:</p> 40 <p>You can access the Debug Perspective by clicking <strong>Window > Open Perspective > 45 <p>The DDMS Perspective in Eclipse lets you access all of the features 63 <p>To access the DDMS perspective, go to <strong>Window > Open Perspective >
|
/frameworks/base/docs/html/guide/topics/providers/ |
D | content-providers.jd | 52 Content providers manage access to a structured set of data. They encapsulate the 57 When you want to access data in a content provider, you use the 87 How to access data in a content provider when the data is organized in tables. 101 How to access the Calendar Provider that is part of the Android platform. 108 How to access the Contacts Provider that is part of the Android platform.
|
D | content-provider-basics.jd | 23 <a href="#RequestPermissions">Requesting read access permission</a> 60 <a href="#Batch">Batch access</a> 63 <a href="#Intents">Data access via intents</a> 124 A content provider manages access to a central repository of data. A provider 127 applications, which access the provider using a provider client object. Together, providers 129 inter-process communication and secure data access. 233 <strong>Note:</strong> To access a provider, your application usually has to request specific 307 a client method to access a table in a provider, the content URI for the table is one of 321 table to access. A provider usually has a <strong>path</strong> for each table it exposes. 336 Many providers allow you to access a single row in a table by appending an ID value [all …]
|
/frameworks/base/docs/html/guide/topics/admin/ |
D | index.jd | 3 …ou can take advantage of APIs and system capabilities to manage Android devices and control access. 13 href="http://android-developers.blogspot.com/2012/03/unifying-key-store-access-in-ics.html">
|
/frameworks/base/docs/html/training/id-auth/ |
D | authenticate.jd | 26 <p>In order to securely access an online service, users need to authenticate to 29 more complicated. Not only does the user need to be authenticated to access the 43 <li>Getting permission from the user to access an online service using his or 53 to access:</p> 56 <li>The url of the service you want to access.</li> 58 type of access your app is asking for. For instance, the auth scope for 59 read-only access to Google Tasks is <code>View your tasks</code>, while the auth 60 scope for read-write access to Google Tasks is <code>Manage Your 152 <li>The user decided not to grant your app access to the account.</li> 153 <li>The stored account credentials aren't sufficient to gain access to the account.</li> [all …]
|
D | index.jd | 33 devices know who your user is, what services they have access to, and where they 43 <li>Gain permission to access the user's online data via services like 57 <dd> Use OAuth2 to help users get permission to access web services without needing to type in a
|
/frameworks/native/cmds/installd/ |
D | installd.c | 348 if (access(user_data_dir, R_OK) < 0) { in initialize_directories() 360 if (access(primary_data_dir, R_OK) < 0) { in initialize_directories() 380 if (access(media_tmp_dir, F_OK) == -1) { in initialize_directories() 397 if (access(media_tmp_dir, F_OK) == 0) { in initialize_directories() 448 if (access(media_obb_dir, F_OK) != 0 && access(owner_obb_path, F_OK) == 0) { in initialize_directories()
|
/frameworks/base/docs/html/google/play/licensing/ |
D | overview.jd | 90 signed response data, and enforces access controls.</p> 127 custom code for defining licensing policy and managing access as needed by your application. The key 132 <dd>Your implementation determines whether to allow access to the 141 <dd>Your implementation manages access to the 143 response. Your implementation can manage access in any way needed, including 157 and access to the application while the device is offline (such as when the 163 does not cache any response data and allows the application access <em>only</em> 176 applications before publishing them, even if you don't have access to a 186 designed to let you control access to applications that are not published 198 the network. You can implement license caching behaviors to manage access to your application when [all …]
|
D | licensing-reference.jd | 54 access to the application, based on the license response. </td> 88 backend server and may cause the user to lose access to licensed applications, 93 <td>Default DeviceLimiter implementation that is a no-op (allows access to all 157 <td><em>Allow access according to {@code Policy} constraints.</em></td> 165 <td><em>Optionally allow access according to {@code Policy} constraints.</em> 167 application version is invalid or compromised. The application can allow access 177 <td><em>Do not allow access.</em></td> 250 <p>To assist your application in managing access to the application across the application refund 284 Policy may allow access to the application, even though the response status is 292 the {@code Policy} should allow, before denying the user access to the application. [all …]
|
/frameworks/base/docs/html/google/play-services/ |
D | auth.jd | 21 in the Google Play services platform by using the access token to manually make API 31 to gain authorization to the services that you want to use. To obtain an access token, 43 in an array. When obtaining an access token, only the email address of the account is 61 With an email address and the service scope you can now obtain an access token. 81 …The following code snippet obtains an access token with an email address, the scope that you want … 106 <p>If you are obtaining access tokens in a background service or sync adapter, there 119 app to access the account, the intent is broadcasted. When using this method: 134 app to access the account, the sync adapter retries syncing with the information 145 When requesting an access token with 154 …wn when an error occurs that users can resolve, such as not yet granting access to their accounts … [all …]
|
D | index.jd | 33 <p>Google Play services provides you with easy access to Google services and is tightly 43 users have a consistent and safe way to grant and receive OAuth2 access tokens 69 services and allows you to obtain authorization from users to gain access 77 If you want to access added features or products, you can upgrade to a new version of the 94 provided to gain access to the each Google service, which provides consistency for both
|
/frameworks/base/docs/html/training/improving-layouts/ |
D | smooth-scrolling.jd | 33 thread (the UI thread) free from heavy processing. Ensure you do any disk access, network access, or 34 SQL access in a separate thread. To test the status of your app, you can enable {@link 94 Layout, so you can immediately access them without the need to look them up repeatedly. First, you 118 <p>Now you can easily access each view without the need for the look-up, saving valuable processor
|
/frameworks/base/docs/html/training/articles/ |
D | perf-tips.jd | 97 other code to access. In those cases, it's usually better to make a small 111 <p>If you don't need to access an object's fields, make your method static. 164 usually inline the access, and if you need to restrict or debug field access 170 in the public interface, but within a class you should always access 174 direct field access is about 3x faster than invoking a 175 trivial getter. With the JIT (where direct field access is as cheap as 176 accessing a local), direct field access is about 7x faster than invoking a 281 <p>The problem is that the VM considers direct access to <code>Foo</code>'s 284 the Java language allows an inner class to access an outer class' private 289 /*package*/ static int Foo.access$100(Foo foo) { [all …]
|
/frameworks/base/docs/html/tools/testing/ |
D | what_to_test.jd | 70 If your application depends on network access, SMS, Bluetooth, or GPS, then you should 74 For example, if your application uses the network,it can notify the user if access is 76 IP-based location awareness. It can also wait for WiFi access before doing large data transfers, 80 You can use the emulator to test network access and bandwidth. To learn more, please see
|
/frameworks/base/docs/html/google/play/billing/ |
D | billing_subscriptions.jd | 67 In-app Billing to provide subscription purchasers with extended access to 78 already purchased a subscription elsewhere, then allow access to your content if 82 subscription that gives a subscriber access to an entire collection of apps, 85 has already purchased a given subscription and if so, allow access to your 204 paid for the trial period and so is not entitled to continued access after 221 can add multiple subscriptions that give access to different content or 222 services, or you can add multiple subscriptions that give access to the same 247 the current billing cycle. Instead, it allows the user to have access to the 260 subscriptions, for as long any users are able to access it. That is, you must 263 current billing cycle. Removing content that a subscriber is entitled to access [all …]
|
/frameworks/base/libs/androidfw/ |
D | InputDevice.cpp | 96 if (!access(path.string(), R_OK)) { in getInputDeviceConfigurationFilePathByName() 111 if (!access(path.string(), R_OK)) { in getInputDeviceConfigurationFilePathByName()
|
/frameworks/base/docs/html/guide/topics/connectivity/nfc/ |
D | advanced-nfc.jd | 55 <td>Provides access to NFC-A (ISO 14443-3A) properties and I/O operations.</td> 61 <td>Provides access to NFC-B (ISO 14443-3B) properties and I/O operations.</td> 67 <td>Provides access to NFC-F (JIS 6319-4) properties and I/O operations.</td> 73 <td>Provides access to NFC-V (ISO 15693) properties and I/O operations.</td> 79 <td>Provides access to ISO-DEP (ISO 14443-4) properties and I/O operations.</td> 85 <td>Provides access to NDEF data and operations on NFC tags that have been formatted as 107 <td>Provides access to MIFARE Classic properties and I/O operations, if this Android device 114 <td>Provides access to MIFARE Ultralight properties and I/O operations, if this Android
|