HomeSort by relevance Sort by last modified time
    Searched full:keys (Results 51 - 75 of 1850) sorted by null

1 23 4 5 6 7 8 91011>>

  /frameworks/base/core/java/android/app/backup/
FileBackupHelperBase.java 54 ParcelFileDescriptor newState, String[] files, String[] keys) {
64 // the length of files and keys must be the same
65 if (files.length != keys.length) {
67 + " keys.length=" + keys.length);
76 int err = performBackup_native(oldStateFd, data.mBackupWriter, newStateFd, files, keys);
121 int data, FileDescriptor newState, String[] files, String[] keys);
  /external/ipsec-tools/src/racoon/doc/
README.plainrsa 14 the keys. So, what all this means for the security administrator is
15 that the setup needs a pair of reasonably long keys for each host that
27 RSA keys for the host. There are only two parameters that you should
28 be concerned about: -b, which sets the number of bits for the keys,
31 seconds to generate keys that are 2048 bits long, and only slightly
32 longer to generate 4096-bit keys. Either key length should be
37 plainrsa-gen -b 2048 -f /var/tmp/boston.keys
40 includes both public and private keys. GUARD THIS FILE CAREFULLY,
50 Alternatively, you can also grab the first line of the boston.keys
66 your keys and place it in one directory and use the global directiv
    [all...]
  /frameworks/base/core/java/android/util/
LongSparseArray.java 53 * @return A copy of all keys contained in the sparse array.
63 * Sets all supplied keys to the given unique value.
64 * @param keys Keys to set
65 * @param uniqueValue Value to set all supplied keys to
67 public void setValues(long[] keys, E uniqueValue) {
68 int length = keys.length;
70 put(keys[i], uniqueValue);
122 long[] keys = mKeys; local
130 keys[o] = keys[i]
    [all...]
  /dalvik/libcore/luni/src/test/java/tests/api/java/util/
ListResourceBundleTest.java 62 Enumeration keys = bundle.getKeys(); local
64 while (keys.hasMoreElements()) {
65 result.addElement(keys.nextElement());
102 Enumeration keys = bundle.getKeys(); local
105 while (keys.hasMoreElements()) {
106 result.addElement(bundle.handleGetObject((String)keys.nextElement()));
  /dalvik/libcore/security/src/main/java/org/apache/harmony/security/
SystemScope.java 49 private Hashtable keys = new Hashtable(); field in class:SystemScope
97 return (Identity) keys.get(key);
115 if (key != null && keys.containsKey(key)) {
121 keys.put(key, identity);
147 contains = contains || keys.containsKey(key);
148 keys.remove(key);
  /external/webkit/WebKitTools/Scripts/
find-extra-includes 69 for my $include (keys %{ $includes{$file} }) {
72 for my $i (keys %{ $totalIncludes{$include} }) {
82 for my $include (keys %{ $includes{$file} }) {
85 for my $i1 (sort keys %{ $includes{$file} }) {
86 for my $i2 (keys %{ $includes{$file} }) {
100 for my $file (sort keys %includes) {
  /development/pdk/docs/porting/
release_keys.jd 1 page.title=Creating Release Keys and Signing Builds
12 <li><a href="#generatingKeys">Generating keys</a></li>
19 <p>Android requires that each application be signed with the developer's digital keys to enforce signature permissions and application request to use shared user ID or target process. For more information on the general Android security principles and signing requirements, see the Android Security and Permissions section in the Android Developer Guide). The core Android platform uses four keys to maintain security of core platform components:</p>
26 <p>These keys are used to sign applications separately for release images and are not used by the Android build system. The build system signs packages with the testkeys provided in <code>build/target/product/security/</code>. Because the testkeys are part of the standard Android open source distribution, they should never be used for production devices. Instead, device manufacturers should generate their own private keys for shipping release builds.</p>
28 <h3>Generating keys</h3>
29 <p>A device manufacturer's keys for each product should be stored under <code>vendor/&lt;vendor_name&gt;/security/&lt;product_name&gt;</code>, where <code>&lt;vendor_name&gt;</code> and <code>&lt;product_name&gt;</code> represent the manufacturer and product names. To simplify key creation, copy the script below to this directory in a file called <code>mkkey.sh</code>. To customize your keys, change the line that starts with AUTH to reflect the correct information for your company:</p>
49 <p><code>mkkey.sh</code> is a helper script to generate the platform's keys. NOTE: the password you type will be visible in your terminal window. Note the passwords you use (…)
    [all...]
  /external/guava/src/com/google/common/collect/
TreeMultimap.java 36 * Implementation of {@code Multimap} whose keys and values are ordered by
48 * through the keys according to the key comparator ordering or the natural
49 * ordering of the keys. Similarly, {@code get}, {@code removeAll}, and {@code
52 * collections generated by {@code entries}, {@code keys}, and {@code values}
53 * iterate across the keys according to the above key ordering, and for each
59 * <p>Depending on the comparators, null keys and values may or may not be
78 * its keys and values.
103 * keys and values, with the same mappings as the specified multimap.
152 * Returns the comparator that orders the multimap keys.
165 * <p>Because a {@code TreeMultimap} has unique sorted keys, this metho
    [all...]
ImmutableSortedMap.java 37 * An immutable {@link SortedMap}. Does not permit null keys or values.
100 * natural ordering of their keys.
102 * @throws IllegalArgumentException if the two keys are equal according to
113 * natural ordering of their keys.
115 * @throws IllegalArgumentException if any two keys are equal according to
126 * natural ordering of their keys.
128 * @throws IllegalArgumentException if any two keys are equal according to
139 * natural ordering of their keys.
141 * @throws IllegalArgumentException if any two keys are equal according to
152 * by the natural ordering of the keys
    [all...]
  /external/opencore/nodes/common/include/
pvmf_meta_data_extension.h 57 * Synchronous method to return the number of metadata keys for the specified query key string
59 * @param aQueryKeyString A NULL terminated character string specifying a subset of metadata keys to count.
60 * If the string is NULL, total number of all keys will be returned
62 * @returns The number of metadata keys
76 * Asynchronous method to retrieve a list of metadata keys. The subset of all available keys in the node can
77 * be specified by providing a combination of query key string, starting index, and maximum number of keys to retrieve
80 * @param aKeyList A reference to a metadata key list to add the metadata keys
83 * @param aQueryKeyString Optional NULL terminated character string to select a subset of keys
116 * Synchronous method to free up the specified range of metadata keys in the list. It is assumed that caller of this functio
    [all...]
  /build/target/product/security/
README 8 The following standard test keys are currently included:
15 These test keys are used strictly in development, and should never be assumed
17 honor these keys in any context.
29 extracting public keys for embedding
  /dalvik/libcore/nio/src/test/java/org/apache/harmony/nio/tests/java/nio/channels/spi/
MockAbstractSelector.java 70 private Set<SelectionKey> keys = new HashSet<SelectionKey>(); field in class:MockAbstractSelector
94 keys.add(key);
110 public Set<SelectionKey> keys() { method in class:MockAbstractSelector
111 return keys;
  /external/blktrace/doc/
bno_plot.1 14 [ \-K | \-\-keys-below ]
31 The \fI-K\fR option forces bno_plot to put the keys below the graph. If it is
32 not specified, all keys for input files are put in the upper right corner of the
34 push the keys under the graph.
  /external/bluetooth/bluez/tools/
bccmd.8 109 List all PS keys.
113 Read all PS keys.
117 Load all PS keys from PSR file.
123 .SH KEYS
  /external/ipsec-tools/src/racoon/
stats.pl 13 foreach (sort keys %t) {
  /external/webkit/LayoutTests/storage/domstorage/
complex-keys.html 10 <script src="script-tests/complex-keys.js"></script>
  /external/webkit/WebCore/css/
WebKitCSSKeyframeRule.cpp 68 void WebKitCSSKeyframeRule::parseKeyString(const String& s, Vector<float>& keys)
70 keys.clear();
90 keys.clear();
94 keys.append(key);
WebKitCSSKeyframeRule.h 60 void getKeys(Vector<float>& keys) const { parseKeyString(m_key, keys); }
75 static void parseKeyString(const String& s, Vector<float>& keys);
80 String m_key; // comma separated list of keys
  /external/webkit/WebCore/html/
HTMLKeygenElement.cpp 47 Vector<String> keys; local
48 getSupportedKeySizes(keys);
50 Vector<String>::const_iterator end = keys.end();
51 for (Vector<String>::const_iterator it = keys.begin(); it != end; ++it) {
  /external/webkit/WebKitTools/QtLauncher/
utils.cpp 41 QString formatKeys(QList<QString> keys)
44 for (int i = 0; i < keys.count() - 1; i++)
45 result.append(keys.at(i) + "|");
46 result.append(keys.last());
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_tls_common.c 69 struct tls_keys keys; local
80 if (tls_connection_get_keys(sm->ssl_ctx, data->conn, &keys))
83 if (keys.client_random == NULL || keys.server_random == NULL ||
84 keys.master_key == NULL)
87 rnd = os_malloc(keys.client_random_len + keys.server_random_len);
90 os_memcpy(rnd, keys.client_random, keys.client_random_len);
91 os_memcpy(rnd + keys.client_random_len, keys.server_random
    [all...]
  /packages/inputmethods/PinyinIME/res/xml/
skb_sym2.xml 26 <keys splitter="|" labels="~|±|×|÷|?|°|&lt;|&gt;|{|}"/>
30 <keys splitter="|" labels="©|£|?|^|®"/>
34 <keys splitter="|" labels="_|="/>
52 <keys splitter=" " labels="+ | \\ ?"/>
  /packages/providers/ContactsProvider/src/com/android/providers/contacts/
ContactLocaleUtils.java 49 * The classes to generate the Chinese style sort and search keys.
55 * The below additional name lookup keys will be generated.
58 * The name lookup keys are generated to make sure the name can be found by from any
92 HashSet<String> keys = new HashSet<String>(); local
99 // build the lookup keys for itself.
118 keys.add(keyOrignal.toString());
119 keys.add(keyPinyin.toString());
120 keys.add(keyInitial.toString());
122 return keys.iterator();
  /external/icu4c/common/
uhash.h 8 * 07/06/01 aliu Modified to support int32_t keys on
20 * based on keys. It provides a good tradeoff between access time and
25 * Keys and values are stored as void* pointers. These void* pointers
29 * functions. These functions hash keys, compare keys, delete keys,
34 * UHashtable ownership of keys and values is flexible, and controlled
39 * then keys passed to uhash_put() are owned by the hashtable and will
40 * be deleted by it at some point, either as keys are replaced, or
42 * and the value deleter function pointer. Keys passed to method
    [all...]
  /cts/tests/tests/util/src/android/util/cts/
SparseIntArrayTest.java 31 private static final int[] KEYS = {12, 23, 4, 6, 8, 1, 3, -12, 0, -3, 11, 14, -23};
121 sparseIntArray.put(KEYS[i], VALUES[i]);
125 assertEquals(VALUES[i], sparseIntArray.get(KEYS[i]));
129 sparseIntArray.indexOfKey(KEYS[i]));
133 int existKey = KEYS[0];
154 assertEquals(VALUES[1], sparseIntArray.get(KEYS[1]));
156 sparseIntArray.delete(KEYS[1]);
158 sparseIntArray.get(KEYS[1], VALUE_FOR_NON_EXISTED_KEY));
244 sparseIntArray.put(KEYS[i], VALUES[i]);
248 assertEquals(VALUES[i], sparseIntArray.get(KEYS[i]))
    [all...]

Completed in 340 milliseconds

1 23 4 5 6 7 8 91011>>