/external/webkit/LayoutTests/storage/domstorage/localstorage/resources/ |
clearLocalStorage.js | 3 var keys = new Array(); 5 keys.push(key); 7 for (key in keys) 8 localStorage.removeItem(keys[key]);
|
/external/webkit/LayoutTests/storage/domstorage/sessionstorage/resources/ |
clearSessionStorage.js | 3 var keys = new Array(); 5 keys.push(key); 7 for (key in keys) 8 sessionStorage.removeItem(keys[key]);
|
/development/ide/xcode/SampleCode/English.lproj/ |
InfoPlist.strings | 1 /* Localized versions of Info.plist keys */
|
/external/skia/xcode/SampleCode/English.lproj/ |
InfoPlist.strings | 1 /* Localized versions of Info.plist keys */
|
/external/v8/test/mjsunit/third_party/ |
object-keys.js | 32 // Based on LayoutTests/fast/js/Object-keys.html 34 assertThrows(function () { Object.keys(2) }, TypeError); 35 assertThrows(function () { Object.keys("foo") }, TypeError); 36 assertThrows(function () { Object.keys(null) }, TypeError); 37 assertThrows(function () { Object.keys(undefined) }, TypeError); 39 assertEquals(Object.keys({}), []); 40 assertEquals(Object.keys({a:null}), ['a']); 41 assertEquals(Object.keys({a:null, b:null}), ['a', 'b']); 42 assertEquals(Object.keys({b:null, a:null}), ['b', 'a']); 43 assertEquals(Object.keys([]), []); [all...] |
/dalvik/libcore/security/src/main/java/java/security/interfaces/ |
package.html | 9 (1) Keys for the RSA asymmetric encryption algorithm using the PKCS#1 standard; 10 (2) Keys for the Digital Signature Algorithm (DSA) specified by FIPS-186; 11 (3) Keys for a generic Elliptic Curve asymmetric encryption algorithm.
|
/external/dropbear/_MTN/ |
options | 3 keydir "/Users/matt/.monotone/keys"
|
/external/wpa_supplicant/examples/ |
wep.conf | 1 # Static WEP keys
|
/external/wpa_supplicant_6/wpa_supplicant/examples/ |
wep.conf | 1 # Static WEP keys
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
ikev2_common.c | 41 { ENCR_AES_CBC, 16, 16 }, /* only 128-bit keys supported for now */ 438 struct ikev2_keys *keys, int initiator, 447 const u8 *SK_p = initiator ? keys->SK_pi : keys->SK_pr; 461 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len, 496 struct ikev2_keys *keys, int initiator, 507 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er; 508 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar [all...] |
/dalvik/libcore/crypto/src/main/java/javax/crypto/spec/ |
package.html | 4 This package provides the classes and interfaces needed to specify keys 9 Keys may be specified via algorithm or in a more abstract and general way 12 Keys and algorithm parameters are specified for the following procedures:
|
/external/dropbear/ |
TODO | 5 - default private dbclient keys 22 - Be able to use OpenSSH keys for the client? or at least have some form of 23 encrypted keys.
|
/external/icu4c/samples/legacy/ |
legacy.cpp | 25 extern "C" void test_current(UChar data[][5], uint32_t size, uint32_t maxLen, uint8_t keys[][32]); 26 extern "C" void test_legacy(UChar data[][5], uint32_t size, uint32_t maxlen, uint8_t keys[][32]); 49 void printKeys(const char *comment, uint8_t keys[][32], int32_t keySize) { 54 currentKey = keys[i]; 88 static uint8_t keys[4][32]; local 96 test_current(uTest, 4, 5, keys); 98 printKeys("Current keys", keys, 4); 104 test_legacy(uTest, 4, 5, keys); 106 printKeys("Legacy keys", keys, 4) [all...] |
/dalvik/libcore/security/src/main/java/org/bouncycastle/crypto/ |
AsymmetricCipherKeyPairGenerator.java | 16 * return an AsymmetricCipherKeyPair containing the generated keys. 18 * @return an AsymmetricCipherKeyPair containing the generated keys.
|
KeyGenerationParameters.java | 18 * @param strength the size, in bits, of the keys we want to produce. 40 * return the bit strength for keys produced by this generator, 42 * @return the strength of the keys this generator produces (in bits).
|
/dalvik/libcore/security/src/main/java/org/bouncycastle/crypto/generators/ |
KDF1BytesGenerator.java | 6 * KDF1 generator for derived keys and ivs as defined by IEEE P1363a/ISO 18033 16 * @param digest the digest to be used as the source of derived keys.
|
KDF2BytesGenerator.java | 6 * KFD2 generator for derived keys and ivs as defined by IEEE P1363a/ISO 18033 17 * @param digest the digest to be used as the source of derived keys.
|
/frameworks/base/tests/CoreTests/android/core/ |
HashtableTest.java | 72 String[] keys = sKeys; local 75 value = hTable.get(keys[i]); 76 value = hTable.get(keys[i]); 77 value = hTable.get(keys[i]); 78 value = hTable.get(keys[i]); 79 value = hTable.get(keys[i]); 80 value = hTable.get(keys[i]); 81 value = hTable.get(keys[i]); 82 value = hTable.get(keys[i]); 83 value = hTable.get(keys[i]) 163 String[] keys = sKeys; local 233 Enumeration<String> keys; local [all...] |
TreeMapPerformanceTest.java | 74 String[] keys = sKeys; local 76 value = map.get(keys[i]); 77 value = map.get(keys[i]); 78 value = map.get(keys[i]); 79 value = map.get(keys[i]); 80 value = map.get(keys[i]); 81 value = map.get(keys[i]); 82 value = map.get(keys[i]); 83 value = map.get(keys[i]); 84 value = map.get(keys[i]) 267 String[] keys = sKeys; local [all...] |
/packages/providers/ContactsProvider/tests/src/com/android/providers/contacts/ |
ContactLocaleUtilsTest.java | 76 Iterator<String> keys = mContactLocaleUtils.getNameLookupKeys(CHINESE_NAME, local 78 verifyKeys(keys, CHINESE_NAME_KEY); 80 keys = mContactLocaleUtils.getNameLookupKeys(CHINESE_LATIN_MIX_NAME_1, 82 verifyKeys(keys, CHINESE_LATIN_MIX_NAME_1_KEY); 84 keys = mContactLocaleUtils.getNameLookupKeys(CHINESE_LATIN_MIX_NAME_2, 86 verifyKeys(keys, CHINESE_LATIN_MIX_NAME_2_KEY); 113 Iterator<String> keys = mContactLocaleUtils.getNameLookupKeys(CHINESE_NAME, local 115 verifyKeys(keys, CHINESE_NAME_KEY); 116 keys = mContactLocaleUtils.getNameLookupKeys(CHINESE_NAME, FullNameStyle.CJK); 117 verifyKeys(keys, CHINESE_NAME_KEY) [all...] |
/dalvik/libcore/support/src/test/java/org/apache/harmony/security/tests/support/ |
MyKeyStore.java | 47 private Hashtable<String, Object> Keys = new Hashtable<String, Object>(); 65 if (Keys.containsKey(alias)) { 66 return (Key) Keys.get(alias); 97 Keys.put(alias, key); 117 Keys.put(alias, keyK); 132 if (Keys.containsKey(alias)) { 133 Keys.remove(alias); 147 if (Keys.containsKey(alias)) { 157 return (Keys.size() + Cert.size()); 161 if (Keys.containsKey(alias)) [all...] |
/external/dbus/dbus/ |
dbus-keyring.c | 42 * The secret keys are not kept in locked memory, and are written to a 45 * discarded). Also, the keys are not sent over the wire. 65 * use keys for a short time. 80 * Maximum number of keys in the keyring before 118 DBusKey *keys; /**< Keys loaded from the file */ member in struct:DBusKeyring 119 int n_keys; /**< Number of keys */ 144 keyring->keys = NULL; 162 free_keys (DBusKey *keys, 172 _dbus_string_free (&keys[i].secret) 297 DBusKey *keys; local 410 DBusKey *keys; local [all...] |
/bootable/bootloader/legacy/libboot/ |
gpio_keypad.c | 50 unsigned long long keys; local 54 keys = 0; 68 keys = (keys << 1) | (gpio_get(keypad->input_gpios[in]) ^ npolarity); 69 if(((unsigned)(keypad->state >> shift) ^ (unsigned)keys) & 1) { 75 // shift, mapped_key, keys & 1); 77 key_changed(mapped_key, keys & 1); 85 if(keys != keypad->state) { 86 keypad->state = keys; 87 //dprintf("gpio_keypad_scan_keys: %x %x\n", (unsigned long)(keys >> 32), (unsigned long)keys) [all...] |
/dalvik/libcore/security/src/main/java/org/apache/harmony/security/x509/ |
ExtendedKeyUsage.java | 46 private List keys; field in class:ExtendedKeyUsage 52 public ExtendedKeyUsage(List keys) { 53 this.keys = keys; 68 if (keys == null) { 69 keys = (List) ASN1.decode(getEncoded()); 71 return keys; 79 encoding = ASN1.encode(keys); 90 if (keys == null) { 92 keys = getExtendedKeyUsage() [all...] |
/cts/tests/tests/util/src/android/util/cts/ |
SparseArrayTest.java | 28 private static final int[] KEYS = {12, 23, 4, 6, 8, 1, 3, -12, 0, -3, 11, 14, -23}; 113 sparseArray.put(KEYS[i], VALUES[i]); 118 assertEquals(new Integer(i), sparseArray.get(KEYS[i])); 122 assertEquals(sparseArray.indexOfValue(VALUES[i]), sparseArray.indexOfKey(KEYS[i])); 126 int existKey = KEYS[0]; 152 assertEquals(VALUES[1], sparseArray.get(KEYS[1])); 154 sparseArray.delete(KEYS[1]); 156 sparseArray.get(KEYS[1], VALUE_FOR_NON_EXISTED_KEY)); 160 assertEquals(VALUES[2], sparseArray.get(KEYS[2])); 162 sparseArray.remove(KEYS[2]) [all...] |