/frameworks/base/core/java/android/app/backup/ |
FileBackupHelperBase.java | 54 ParcelFileDescriptor newState, String[] files, String[] keys) { 64 // the length of files and keys must be the same 65 if (files.length != keys.length) { 67 + " keys.length=" + keys.length); 76 int err = performBackup_native(oldStateFd, data.mBackupWriter, newStateFd, files, keys); 121 int data, FileDescriptor newState, String[] files, String[] keys);
|
/external/ipsec-tools/src/racoon/doc/ |
README.plainrsa | 14 the keys. So, what all this means for the security administrator is 15 that the setup needs a pair of reasonably long keys for each host that 27 RSA keys for the host. There are only two parameters that you should 28 be concerned about: -b, which sets the number of bits for the keys, 31 seconds to generate keys that are 2048 bits long, and only slightly 32 longer to generate 4096-bit keys. Either key length should be 37 plainrsa-gen -b 2048 -f /var/tmp/boston.keys 40 includes both public and private keys. GUARD THIS FILE CAREFULLY, 50 Alternatively, you can also grab the first line of the boston.keys 66 your keys and place it in one directory and use the global directiv [all...] |
/frameworks/base/core/java/android/util/ |
LongSparseArray.java | 53 * @return A copy of all keys contained in the sparse array. 63 * Sets all supplied keys to the given unique value. 64 * @param keys Keys to set 65 * @param uniqueValue Value to set all supplied keys to 67 public void setValues(long[] keys, E uniqueValue) { 68 int length = keys.length; 70 put(keys[i], uniqueValue); 122 long[] keys = mKeys; local 130 keys[o] = keys[i] [all...] |
/dalvik/libcore/luni/src/test/java/tests/api/java/util/ |
ListResourceBundleTest.java | 62 Enumeration keys = bundle.getKeys(); local 64 while (keys.hasMoreElements()) { 65 result.addElement(keys.nextElement()); 102 Enumeration keys = bundle.getKeys(); local 105 while (keys.hasMoreElements()) { 106 result.addElement(bundle.handleGetObject((String)keys.nextElement()));
|
/dalvik/libcore/security/src/main/java/org/apache/harmony/security/ |
SystemScope.java | 49 private Hashtable keys = new Hashtable(); field in class:SystemScope 97 return (Identity) keys.get(key); 115 if (key != null && keys.containsKey(key)) { 121 keys.put(key, identity); 147 contains = contains || keys.containsKey(key); 148 keys.remove(key);
|
/external/webkit/WebKitTools/Scripts/ |
find-extra-includes | 69 for my $include (keys %{ $includes{$file} }) { 72 for my $i (keys %{ $totalIncludes{$include} }) { 82 for my $include (keys %{ $includes{$file} }) { 85 for my $i1 (sort keys %{ $includes{$file} }) { 86 for my $i2 (keys %{ $includes{$file} }) { 100 for my $file (sort keys %includes) {
|
/development/pdk/docs/porting/ |
release_keys.jd | 1 page.title=Creating Release Keys and Signing Builds 12 <li><a href="#generatingKeys">Generating keys</a></li> 19 <p>Android requires that each application be signed with the developer's digital keys to enforce signature permissions and application request to use shared user ID or target process. For more information on the general Android security principles and signing requirements, see the Android Security and Permissions section in the Android Developer Guide). The core Android platform uses four keys to maintain security of core platform components:</p> 26 <p>These keys are used to sign applications separately for release images and are not used by the Android build system. The build system signs packages with the testkeys provided in <code>build/target/product/security/</code>. Because the testkeys are part of the standard Android open source distribution, they should never be used for production devices. Instead, device manufacturers should generate their own private keys for shipping release builds.</p> 28 <h3>Generating keys</h3> 29 <p>A device manufacturer's keys for each product should be stored under <code>vendor/<vendor_name>/security/<product_name></code>, where <code><vendor_name></code> and <code><product_name></code> represent the manufacturer and product names. To simplify key creation, copy the script below to this directory in a file called <code>mkkey.sh</code>. To customize your keys, change the line that starts with AUTH to reflect the correct information for your company:</p> 49 <p><code>mkkey.sh</code> is a helper script to generate the platform's keys. NOTE: the password you type will be visible in your terminal window. Note the passwords you use (…) [all...] |
/external/guava/src/com/google/common/collect/ |
TreeMultimap.java | 36 * Implementation of {@code Multimap} whose keys and values are ordered by 48 * through the keys according to the key comparator ordering or the natural 49 * ordering of the keys. Similarly, {@code get}, {@code removeAll}, and {@code 52 * collections generated by {@code entries}, {@code keys}, and {@code values} 53 * iterate across the keys according to the above key ordering, and for each 59 * <p>Depending on the comparators, null keys and values may or may not be 78 * its keys and values. 103 * keys and values, with the same mappings as the specified multimap. 152 * Returns the comparator that orders the multimap keys. 165 * <p>Because a {@code TreeMultimap} has unique sorted keys, this metho [all...] |
ImmutableSortedMap.java | 37 * An immutable {@link SortedMap}. Does not permit null keys or values. 100 * natural ordering of their keys. 102 * @throws IllegalArgumentException if the two keys are equal according to 113 * natural ordering of their keys. 115 * @throws IllegalArgumentException if any two keys are equal according to 126 * natural ordering of their keys. 128 * @throws IllegalArgumentException if any two keys are equal according to 139 * natural ordering of their keys. 141 * @throws IllegalArgumentException if any two keys are equal according to 152 * by the natural ordering of the keys [all...] |
/external/opencore/nodes/common/include/ |
pvmf_meta_data_extension.h | 57 * Synchronous method to return the number of metadata keys for the specified query key string 59 * @param aQueryKeyString A NULL terminated character string specifying a subset of metadata keys to count. 60 * If the string is NULL, total number of all keys will be returned 62 * @returns The number of metadata keys 76 * Asynchronous method to retrieve a list of metadata keys. The subset of all available keys in the node can 77 * be specified by providing a combination of query key string, starting index, and maximum number of keys to retrieve 80 * @param aKeyList A reference to a metadata key list to add the metadata keys 83 * @param aQueryKeyString Optional NULL terminated character string to select a subset of keys 116 * Synchronous method to free up the specified range of metadata keys in the list. It is assumed that caller of this functio [all...] |
/build/target/product/security/ |
README | 8 The following standard test keys are currently included: 15 These test keys are used strictly in development, and should never be assumed 17 honor these keys in any context. 29 extracting public keys for embedding
|
/dalvik/libcore/nio/src/test/java/org/apache/harmony/nio/tests/java/nio/channels/spi/ |
MockAbstractSelector.java | 70 private Set<SelectionKey> keys = new HashSet<SelectionKey>(); field in class:MockAbstractSelector 94 keys.add(key); 110 public Set<SelectionKey> keys() { method in class:MockAbstractSelector 111 return keys;
|
/external/blktrace/doc/ |
bno_plot.1 | 14 [ \-K | \-\-keys-below ] 31 The \fI-K\fR option forces bno_plot to put the keys below the graph. If it is 32 not specified, all keys for input files are put in the upper right corner of the 34 push the keys under the graph.
|
/external/bluetooth/bluez/tools/ |
bccmd.8 | 109 List all PS keys. 113 Read all PS keys. 117 Load all PS keys from PSR file. 123 .SH KEYS
|
/external/ipsec-tools/src/racoon/ |
stats.pl | 13 foreach (sort keys %t) {
|
/external/webkit/LayoutTests/storage/domstorage/ |
complex-keys.html | 10 <script src="script-tests/complex-keys.js"></script>
|
/external/webkit/WebCore/css/ |
WebKitCSSKeyframeRule.cpp | 68 void WebKitCSSKeyframeRule::parseKeyString(const String& s, Vector<float>& keys) 70 keys.clear(); 90 keys.clear(); 94 keys.append(key);
|
WebKitCSSKeyframeRule.h | 60 void getKeys(Vector<float>& keys) const { parseKeyString(m_key, keys); } 75 static void parseKeyString(const String& s, Vector<float>& keys); 80 String m_key; // comma separated list of keys
|
/external/webkit/WebCore/html/ |
HTMLKeygenElement.cpp | 47 Vector<String> keys; local 48 getSupportedKeySizes(keys); 50 Vector<String>::const_iterator end = keys.end(); 51 for (Vector<String>::const_iterator it = keys.begin(); it != end; ++it) {
|
/external/webkit/WebKitTools/QtLauncher/ |
utils.cpp | 41 QString formatKeys(QList<QString> keys) 44 for (int i = 0; i < keys.count() - 1; i++) 45 result.append(keys.at(i) + "|"); 46 result.append(keys.last());
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_tls_common.c | 69 struct tls_keys keys; local 80 if (tls_connection_get_keys(sm->ssl_ctx, data->conn, &keys)) 83 if (keys.client_random == NULL || keys.server_random == NULL || 84 keys.master_key == NULL) 87 rnd = os_malloc(keys.client_random_len + keys.server_random_len); 90 os_memcpy(rnd, keys.client_random, keys.client_random_len); 91 os_memcpy(rnd + keys.client_random_len, keys.server_random [all...] |
/packages/inputmethods/PinyinIME/res/xml/ |
skb_sym2.xml | 26 <keys splitter="|" labels="~|±|×|÷|?|°|<|>|{|}"/> 30 <keys splitter="|" labels="©|£|?|^|®"/> 34 <keys splitter="|" labels="_|="/> 52 <keys splitter=" " labels="+ | \\ ?"/>
|
/packages/providers/ContactsProvider/src/com/android/providers/contacts/ |
ContactLocaleUtils.java | 49 * The classes to generate the Chinese style sort and search keys. 55 * The below additional name lookup keys will be generated. 58 * The name lookup keys are generated to make sure the name can be found by from any 92 HashSet<String> keys = new HashSet<String>(); local 99 // build the lookup keys for itself. 118 keys.add(keyOrignal.toString()); 119 keys.add(keyPinyin.toString()); 120 keys.add(keyInitial.toString()); 122 return keys.iterator();
|
/external/icu4c/common/ |
uhash.h | 8 * 07/06/01 aliu Modified to support int32_t keys on 20 * based on keys. It provides a good tradeoff between access time and 25 * Keys and values are stored as void* pointers. These void* pointers 29 * functions. These functions hash keys, compare keys, delete keys, 34 * UHashtable ownership of keys and values is flexible, and controlled 39 * then keys passed to uhash_put() are owned by the hashtable and will 40 * be deleted by it at some point, either as keys are replaced, or 42 * and the value deleter function pointer. Keys passed to method [all...] |
/cts/tests/tests/util/src/android/util/cts/ |
SparseIntArrayTest.java | 31 private static final int[] KEYS = {12, 23, 4, 6, 8, 1, 3, -12, 0, -3, 11, 14, -23}; 121 sparseIntArray.put(KEYS[i], VALUES[i]); 125 assertEquals(VALUES[i], sparseIntArray.get(KEYS[i])); 129 sparseIntArray.indexOfKey(KEYS[i])); 133 int existKey = KEYS[0]; 154 assertEquals(VALUES[1], sparseIntArray.get(KEYS[1])); 156 sparseIntArray.delete(KEYS[1]); 158 sparseIntArray.get(KEYS[1], VALUE_FOR_NON_EXISTED_KEY)); 244 sparseIntArray.put(KEYS[i], VALUES[i]); 248 assertEquals(VALUES[i], sparseIntArray.get(KEYS[i])) [all...] |