/libcore/support/src/test/java/org/apache/harmony/security/tests/support/ |
MyKeyStore.java | 47 private Hashtable<String, Object> Keys = new Hashtable<String, Object>(); 65 if (Keys.containsKey(alias)) { 66 return (Key) Keys.get(alias); 97 Keys.put(alias, key); 117 Keys.put(alias, keyK); 132 if (Keys.containsKey(alias)) { 133 Keys.remove(alias); 147 if (Keys.containsKey(alias)) { 157 return (Keys.size() + Cert.size()); 161 if (Keys.containsKey(alias)) [all...] |
/external/dbus/dbus/ |
dbus-keyring.c | 42 * The secret keys are not kept in locked memory, and are written to a 45 * discarded). Also, the keys are not sent over the wire. 65 * use keys for a short time. 80 * Maximum number of keys in the keyring before 117 DBusKey *keys; /**< Keys loaded from the file */ member in struct:DBusKeyring 118 int n_keys; /**< Number of keys */ 141 keyring->keys = NULL; 159 free_keys (DBusKey *keys, 169 _dbus_string_free (&keys[i].secret) 291 DBusKey *keys; local 404 DBusKey *keys; local [all...] |
/external/chromium/chrome/browser/extensions/ |
extension_cookies_unittest.cc | 16 namespace keys = extension_cookies_api_constants; 115 EXPECT_TRUE(cookie_value1->GetString(keys::kNameKey, &string_value)); 117 EXPECT_TRUE(cookie_value1->GetString(keys::kValueKey, &string_value)); 119 EXPECT_TRUE(cookie_value1->GetString(keys::kDomainKey, &string_value)); 121 EXPECT_TRUE(cookie_value1->GetBoolean(keys::kHostOnlyKey, &boolean_value)); 123 EXPECT_TRUE(cookie_value1->GetString(keys::kPathKey, &string_value)); 125 EXPECT_TRUE(cookie_value1->GetBoolean(keys::kSecureKey, &boolean_value)); 127 EXPECT_TRUE(cookie_value1->GetBoolean(keys::kHttpOnlyKey, &boolean_value)); 129 EXPECT_TRUE(cookie_value1->GetBoolean(keys::kSessionKey, &boolean_value)); 132 cookie_value1->GetDouble(keys::kExpirationDateKey, &double_value)) [all...] |
extension_history_api.cc | 21 namespace keys = extension_history_api_constants; 31 value->SetString(keys::kIdKey, base::Int64ToString(row.id())); 32 value->SetString(keys::kUrlKey, row.url().spec()); 33 value->SetString(keys::kTitleKey, row.title()); 34 value->SetDouble(keys::kLastVisitdKey, 36 value->SetInteger(keys::kTypedCountKey, row.typed_count()); 37 value->SetInteger(keys::kVisitCountKey, row.visit_count()); 48 value->SetString(keys::kIdKey, base::Int64ToString(row.url_id)); 49 value->SetString(keys::kVisitId, base::Int64ToString(row.visit_id)); 50 value->SetDouble(keys::kVisitTime, MilliSecondsFromTime(row.visit_time)) [all...] |
extension_tabs_module.cc | 47 namespace keys = extension_tabs_module_constants; 92 return is_loading ? keys::kStatusValueLoading : keys::kStatusValueComplete; 125 result->SetInteger(keys::kIdKey, ExtensionTabUtil::GetTabId(contents)); 126 result->SetInteger(keys::kIndexKey, tab_index); 127 result->SetInteger(keys::kWindowIdKey, 129 result->SetString(keys::kUrlKey, contents->GetURL().spec()); 130 result->SetString(keys::kStatusKey, GetTabStatusText(contents->is_loading())); 131 result->SetBoolean(keys::kSelectedKey, 133 result->SetBoolean(keys::kPinnedKey [all...] |
execute_code_in_tab_function.cc | 26 namespace keys = extension_tabs_module_constants; 42 error_ = keys::kNoCodeOrFileToExecuteError; 45 bool has_code = script_info->HasKey(keys::kCodeKey); 46 bool has_file = script_info->HasKey(keys::kFileKey); 48 error_ = keys::kMoreThanOneValuesError; 51 error_ = keys::kNoCodeOrFileToExecuteError; 67 error_ = keys::kNoCurrentWindowError; 90 if (script_info->HasKey(keys::kAllFramesKey)) { 91 if (!script_info->GetBoolean(keys::kAllFramesKey, &all_frames_)) 96 if (script_info->HasKey(keys::kCodeKey)) [all...] |
extension_bookmarks_unittest.cc | 12 namespace keys = extension_bookmarks_module_constants; 39 tree->GetList(keys::kChildrenKey, &children); 49 tree->GetList(keys::kChildrenKey, &children); 59 tree->GetList(keys::kChildrenKey, &children); 64 digg->GetString(keys::kTitleKey, &title); 74 tree->GetList(keys::kChildrenKey, &children); 79 inner_folder->GetString(keys::kTitleKey, &title);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/interfaces/ |
ECPrivateKey.java | 7 * interface for Elliptic Curve Private keys.
|
ECPublicKey.java | 8 * interface for elliptic curve public keys.
|
/external/iproute2/include/linux/tc_act/ |
tc_pedit.h | 30 struct tc_pedit_key keys[0]; member in struct:tc_pedit_sel
|
/external/openssh/regress/ |
agent-timeout.sh | 14 trace "add keys with timeout" 22 trace "agent has $n keys" 24 fail "ssh-add -l did not return 2 keys: $n" 31 fail "ssh-add -l still returns keys after timeout"
|
/external/openssl/crypto/lhash/ |
num.pl | 13 @a=sort {$a <=> $b } keys %num;
|
/external/qemu/pc-bios/keymaps/ |
modifiers | 12 # Translate Super to Windows keys.
|
/external/webkit/LayoutTests/storage/domstorage/localstorage/ |
enumerate-storage-expected.txt | 1 This test checks to see that you can enumerate a Storage object and get only the keys as a result. The built-in properties of the Storage object should be ignored. The test operates on the localStorage object.
|
enumerate-with-length-and-key-expected.txt | 1 This test attempts to enumerate all the keys in localStorage with .length + .key(). The built-in properties of the Storage object should be ignored. The test operates on the localStorage object.
|
/external/webkit/LayoutTests/storage/domstorage/sessionstorage/ |
enumerate-storage-expected.txt | 1 This test checks to see that you can enumber a Storage object and get only the keys as a result. The built-in properties of the Storage object should be ignored. The test operates on the SessionStorage object.
|
enumerate-with-length-and-key-expected.txt | 1 This test attempts to enumerate all the keys in sessionStorage with .length + .key(). The built-in properties of the Storage object should be ignored. The test operates on the sessionStorage object.
|
/external/webkit/Source/WebKit2/Shared/mac/ |
WebMemorySampler.mac.mm | 143 webKitMemoryStats.keys.append(String("Timestamp")); 145 webKitMemoryStats.keys.append(String("Total Bytes of Memory In Use")); 147 webKitMemoryStats.keys.append(String("Fast Malloc Zone Bytes")); 149 webKitMemoryStats.keys.append(String("Default Malloc Zone Bytes")); 151 webKitMemoryStats.keys.append(String("Dispatch Continuation Malloc Zone Bytes")); 153 webKitMemoryStats.keys.append(String("Purgeable Malloc Zone Bytes")); 155 webKitMemoryStats.keys.append(String("JavaScript Heap Bytes")); 157 webKitMemoryStats.keys.append(String("Total Bytes of Committed Memory")); 159 webKitMemoryStats.keys.append(String("Fast Malloc Zone Bytes")); 161 webKitMemoryStats.keys.append(String("Default Malloc Zone Bytes")) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/examples/ |
ieee8021x.conf | 1 # IEEE 802.1X with dynamic WEP keys using EAP-PEAP/MSCHAPv2
|
/external/wpa_supplicant_8/wpa_supplicant/examples/ |
ieee8021x.conf | 1 # IEEE 802.1X with dynamic WEP keys using EAP-PEAP/MSCHAPv2
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/tc_act/ |
tc_pedit.h | 32 struct tc_pedit_key keys[0]; member in struct:tc_pedit_sel
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/linux/tc_act/ |
tc_pedit.h | 32 struct tc_pedit_key keys[0]; member in struct:tc_pedit_sel
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/linux/tc_act/ |
tc_pedit.h | 32 struct tc_pedit_key keys[0]; member in struct:tc_pedit_sel
|
/tools/motodev/src/help/studio_help/src/topics/ |
t_app-cert-removing.dita | 15 <p>To delete a key or certificate listed in the Signing and Keys view:</p> 19 <cmd>If necessary, open the Signing and Keys view by <ph product="webui android-studio">selecting <menucascade> 25 <uicontrol>Signing and Keys</uicontrol> 30 <cmd>Within the Signing and Keys view, if the key to be deleted is not already showing, expose the contents of
|
t_keystore-backup-restore.dita | 6 with, it is extremely important that you keep a copy of all of your signing keys. The Signing and Keys view provides 18 <cmd>If necessary, open the Signing and Keys view by <ph product="webui android-studio">selecting <menucascade> 24 <uicontrol>Signing and Keys</uicontrol> 29 <cmd>In the Signing and Keys view toolbar, click <image href="../images/KeystoresRestore.png"/> (Restore From 50 directory. They are also added to the Signing and Keys view so that you can use their entries (keys) to sign your
|