/external/antlr/antlr-3.4/runtime/ObjC/Framework/ANTLR/ANTLR/en.lproj/ |
InfoPlist.strings | 1 /* Localized versions of Info.plist keys */
|
/external/antlr/antlr-3.4/runtime/ObjC/Framework/ANTLR/ANTLRTests/en.lproj/ |
InfoPlist.strings | 1 /* Localized versions of Info.plist keys */
|
/external/webkit/Source/WebKit2/English.lproj/ |
InfoPlist.strings | 1 ?/* Localized versions of Info.plist keys */
|
/external/webkit/LayoutTests/storage/domstorage/localstorage/resources/ |
clearLocalStorage.js | 3 var keys = new Array(); 5 keys.push(key); 7 for (key in keys) 8 localStorage.removeItem(keys[key]);
|
/external/webkit/LayoutTests/storage/domstorage/sessionstorage/resources/ |
clearSessionStorage.js | 3 var keys = new Array(); 5 keys.push(key); 7 for (key in keys) 8 sessionStorage.removeItem(keys[key]);
|
/external/openssh/regress/ |
brokenkeys.sh | 4 tid="broken keys" 6 KEYS="$OBJ/authorized_keys_${USER}" 10 mv ${KEYS} ${KEYS}.bak 13 echo "ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAIEABTM= bad key" > $KEYS 14 cat ${KEYS}.bak >> ${KEYS} 22 mv ${KEYS}.bak ${KEYS}
|
/development/ide/xcode/SampleCode/English.lproj/ |
InfoPlist.strings | 1 /* Localized versions of Info.plist keys */
|
/tools/motodev/src/help/studio_help/src/topics/ |
t_app-cert-props-changing.dita | 5 <title>Managing keys and keystores</title> 6 <shortdesc>The Signing and Keys view provides you a simple means to generate keys and keystores, delete keys and 7 keystores, import keys from one keystore to another, backup and restore keystores, and of course sign Android 8 Package (APK) files with your keys.</shortdesc>
|
/external/mp4parser/isoparser/src/main/java/com/coremedia/iso/boxes/mdat/ |
DummyMap.java | 14 HashSet<K> keys = new HashSet<K>(); field in class:DummyMap 25 public void addKeys(K[] keys) { 26 Collections.addAll(this.keys, keys); 31 return keys.size(); 35 return keys.isEmpty(); 39 return keys.contains(key); 47 return keys.contains(key) ? value : null; 52 keys.add(key); 58 keys.remove(key) [all...] |
/sdk/apps/DeviceConfig/res/values-nokeys/ |
strings.xml | 3 <string name="text_input">NO KEYS</string>
|
/external/v8/test/mjsunit/third_party/ |
object-keys.js | 32 // Based on LayoutTests/fast/js/Object-keys.html 34 assertThrows(function () { Object.keys(2) }, TypeError); 35 assertThrows(function () { Object.keys("foo") }, TypeError); 36 assertThrows(function () { Object.keys(null) }, TypeError); 37 assertThrows(function () { Object.keys(undefined) }, TypeError); 39 assertEquals(Object.keys({}), []); 40 assertEquals(Object.keys({a:null}), ['a']); 41 assertEquals(Object.keys({a:null, b:null}), ['a', 'b']); 42 assertEquals(Object.keys({b:null, a:null}), ['b', 'a']); 43 assertEquals(Object.keys([]), []); [all...] |
/libcore/luni/src/main/java/java/security/interfaces/ |
package.html | 9 (1) Keys for the RSA asymmetric encryption algorithm using the PKCS#1 standard; 10 (2) Keys for the Digital Signature Algorithm (DSA) specified by FIPS-186; 11 (3) Keys for a generic Elliptic Curve asymmetric encryption algorithm.
|
/external/dropbear/_MTN/ |
options | 3 keydir "/Users/matt/.monotone/keys"
|
/external/wpa_supplicant_6/wpa_supplicant/examples/ |
wep.conf | 1 # Static WEP keys
|
/external/wpa_supplicant_8/wpa_supplicant/examples/ |
wep.conf | 1 # Static WEP keys
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/ |
KeyStore_Impl2Test.java | 89 private void checkResult(KeyStore keyS) throws KeyStoreException, 94 keyS.load(null, pass); 95 assertNull("getKey must return null", keyS.getKey(alias, pass)); 96 assertNull("getCertificate must return null", keyS 98 assertNull("getCertificateChain must return null", keyS 100 assertEquals("Incorrect result of getCreationDate", keyS 102 assertEquals("Incorrect result of size", keyS.size(), 0); 103 assertFalse("Incorrect result of isCertificateEntry", keyS 105 assertFalse("Incorrect result of isKeyEntry", keyS.isKeyEntry(alias)); 106 assertFalse("Incorrect result of containsAlias", keyS [all...] |
/external/v8/test/cctest/ |
test-platform-tls.cc | 15 static Thread::LocalStorageKey keys[kValueCount]; variable 23 CHECK(!Thread::HasThreadLocal(keys[i])); 26 Thread::SetThreadLocal(keys[i], GetValue(i)); 29 CHECK(Thread::HasThreadLocal(keys[i])); 32 CHECK_EQ(GetValue(i), Thread::GetThreadLocal(keys[i])); 33 CHECK_EQ(GetValue(i), Thread::GetExistingThreadLocal(keys[i])); 36 Thread::SetThreadLocal(keys[i], GetValue(kValueCount - i - 1)); 39 CHECK(Thread::HasThreadLocal(keys[i])); 43 Thread::GetThreadLocal(keys[i])); 45 Thread::GetExistingThreadLocal(keys[i])) [all...] |
/external/chromium/chrome/browser/ |
accessibility_events.cc | 14 namespace keys = extension_accessibility_api_constants; 36 dict->SetString(keys::kNameKey, name_); 37 dict->SetString(keys::kTypeKey, type()); 46 return keys::kTypeWindow; 55 return keys::kTypeButton; 63 return keys::kTypeLink; 79 return keys::kTypeRadioButton; 85 dict->SetBoolean(keys::kCheckedKey, checked_); 86 dict->SetInteger(keys::kItemIndexKey, item_index_); 87 dict->SetInteger(keys::kItemCountKey, item_count_) [all...] |
/dalvik/dx/src/com/android/dx/io/instructions/ |
SparseSwitchPayloadDecodedInstruction.java | 26 private final int[] keys; field in class:SparseSwitchPayloadDecodedInstruction 38 int opcode, int[] keys, int[] targets) { 41 if (keys.length != targets.length) { 42 throw new IllegalArgumentException("keys/targets length mismatch"); 45 this.keys = keys; 55 return keys;
|
/external/dexmaker/src/dx/java/com/android/dx/io/instructions/ |
SparseSwitchPayloadDecodedInstruction.java | 26 private final int[] keys; field in class:SparseSwitchPayloadDecodedInstruction 38 int opcode, int[] keys, int[] targets) { 41 if (keys.length != targets.length) { 42 throw new IllegalArgumentException("keys/targets length mismatch"); 45 this.keys = keys; 55 return keys;
|
/external/skia/src/core/ |
SkScalar.cpp | 13 SkScalar SkScalarInterpFunc(SkScalar searchKey, const SkScalar keys[], 16 SkASSERT(keys != NULL); 20 SkASSERT(keys[i] >= keys[i-1]); 23 while (right < length && searchKey > keys[right]) 32 SkScalar rightKey = keys[right]; 33 SkScalar leftKey = keys[right-1];
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
ikev2_common.c | 41 { ENCR_AES_CBC, 16, 16 }, /* only 128-bit keys supported for now */ 438 struct ikev2_keys *keys, int initiator, 447 const u8 *SK_p = initiator ? keys->SK_pi : keys->SK_pr; 461 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len, 496 struct ikev2_keys *keys, int initiator, 507 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er; 508 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
ikev2_common.c | 36 { ENCR_AES_CBC, 16, 16 }, /* only 128-bit keys supported for now */ 433 struct ikev2_keys *keys, int initiator, 442 const u8 *SK_p = initiator ? keys->SK_pi : keys->SK_pr; 456 if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len, 491 struct ikev2_keys *keys, int initiator, 502 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er; 503 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar [all...] |
/external/chromium/chrome/browser/extensions/ |
extension_bookmark_helpers.cc | 12 namespace keys = extension_bookmarks_module_constants; 21 dict->SetString(keys::kIdKey, base::Int64ToString(node->id())); 25 dict->SetString(keys::kParentIdKey, base::Int64ToString(parent->id())); 26 dict->SetInteger(keys::kIndexKey, parent->GetIndexOf(node)); 30 dict->SetString(keys::kUrlKey, node->GetURL().spec()); 36 dict->SetDouble(keys::kDateFolderModifiedKey, 40 dict->SetString(keys::kTitleKey, node->GetTitle()); 44 dict->SetDouble(keys::kDateAddedKey, 58 dict->Set(keys::kChildrenKey, children); 90 *error = keys::kNoNodeError [all...] |
/external/dropbear/ |
TODO | 5 - default private dbclient keys 22 - Be able to use OpenSSH keys for the client? or at least have some form of 23 encrypted keys.
|