| /external/chromium_org/third_party/WebKit/Source/modules/encryptedmedia/ |
| MediaKeySession.cpp | 40 PassRefPtr<MediaKeySession> MediaKeySession::create(ScriptExecutionContext* context, ContentDecryptionModule* cdm, MediaKeys* keys) 42 return adoptRef(new MediaKeySession(context, cdm, keys)); 45 MediaKeySession::MediaKeySession(ScriptExecutionContext* context, ContentDecryptionModule* cdm, MediaKeys* keys) 48 , m_keySystem(keys->keySystem()) 50 , m_keys(keys)
|
| /external/chromium_org/third_party/leveldatabase/src/include/leveldb/ |
| db.h | 32 // A range of keys 41 // A DB is a persistent ordered map from keys to values. 121 // file system space used by keys in "[range[i].start .. range[i].limit)". 137 // begin==NULL is treated as a key before all keys in the database. 138 // end==NULL is treated as a key after all keys in the database.
|
| /external/chromium_org/third_party/mesa/src/src/mesa/program/ |
| hash_table.h | 60 * \param hash Function used to compute hash value of input keys. 61 * \param compare Function used to compare keys. 71 * This function cannot release memory occupied either by keys or data. 152 * Compare two strings used as keys 177 * Compare two pointers used as keys
|
| /external/chromium_org/win8/metro_driver/ |
| chrome_app_view.cc | 90 INPUT keys[4] = {0}; // Keyboard events local 94 keys[key_count].type = INPUT_KEYBOARD; 95 keys[key_count].ki.wVk = VK_SHIFT; 96 keys[key_count].ki.wScan = MapVirtualKey(VK_SHIFT, 0); 101 keys[key_count].type = INPUT_KEYBOARD; 102 keys[key_count].ki.wVk = VK_CONTROL; 103 keys[key_count].ki.wScan = MapVirtualKey(VK_CONTROL, 0); 108 keys[key_count].type = INPUT_KEYBOARD; 109 keys[key_count].ki.wVk = VK_MENU; 110 keys[key_count].ki.wScan = MapVirtualKey(VK_MENU, 0) [all...] |
| /external/linux-tools-perf/util/ui/ |
| browser.c | 150 void ui_browser__add_exit_keys(struct ui_browser *self, int keys[]) 154 while (keys[i] && i < 64) { 155 ui_browser__add_exit_key(self, keys[i]); 178 int keys[] = { NEWT_KEY_UP, NEWT_KEY_DOWN, NEWT_KEY_PGUP, local 199 ui_browser__add_exit_keys(self, keys);
|
| /external/mesa3d/src/mesa/program/ |
| hash_table.h | 60 * \param hash Function used to compute hash value of input keys. 61 * \param compare Function used to compare keys. 71 * This function cannot release memory occupied either by keys or data. 152 * Compare two strings used as keys 177 * Compare two pointers used as keys
|
| /external/openssh/ |
| ssh-pkcs11-helper.c | 117 Key **keys; local 126 if ((nkeys = pkcs11_add_provider(name, pin, &keys)) > 0) { 130 key_to_blob(keys[i], &blob, &blen); 134 add_key(keys[i], name); 136 xfree(keys);
|
| /external/qemu/distrib/sdl-1.2.15/include/ |
| SDL_keysym.h | 29 * @brief The names of the keys 249 /** @name Function keys */ 268 /** @name Key state modifier keys */ 287 /** @name Miscellaneous function keys */ 299 /* Add any other keys here */
|
| /frameworks/base/core/jni/ |
| android_media_AudioSystem.cpp | 108 android_media_AudioSystem_getParameters(JNIEnv *env, jobject thiz, jstring keys) 110 const jchar* c_keys = env->GetStringCritical(keys, 0); 112 if (keys) { 113 c_keys8 = String8(c_keys, env->GetStringLength(keys)); 114 env->ReleaseStringCritical(keys, c_keys);
|
| /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/ |
| mailcap.py | 242 ckeys = caps.keys() 248 keys = e.keys() 249 keys.sort() 250 for k in keys:
|
| /prebuilts/python/linux-x86/2.7.5/lib/python2.7/ |
| mailcap.py | 242 ckeys = caps.keys() 248 keys = e.keys() 249 keys.sort() 250 for k in keys:
|
| /prebuilts/tools/darwin-x86/sdl/include/SDL/ |
| SDL_keysym.h | 29 * @brief The names of the keys 249 /** @name Function keys */ 268 /** @name Key state modifier keys */ 287 /** @name Miscellaneous function keys */ 299 /* Add any other keys here */
|
| /prebuilts/tools/linux-x86/sdl/include/SDL/ |
| SDL_keysym.h | 29 * @brief The names of the keys 249 /** @name Function keys */ 268 /** @name Key state modifier keys */ 287 /** @name Miscellaneous function keys */ 299 /* Add any other keys here */
|
| /prebuilts/tools/windows/sdl/include/SDL/ |
| SDL_keysym.h | 29 * @brief The names of the keys 249 /** @name Function keys */ 268 /** @name Key state modifier keys */ 287 /** @name Miscellaneous function keys */ 299 /* Add any other keys here */
|
| /external/chromium/net/tools/testserver/ |
| device_management.py | 17 claimed to be managed. Other keys in the root dictionary identify request 401 policies: The source: a dictionary containing policies under keys 461 # Figure out the key we want to use. If multiple keys are configured, the 466 nkeys = len(self._server.keys) 470 req_key = self._server.keys[msg.public_key_version - 1]['private_key'] 472 signing_key = self._server.keys[key_version - 1] 552 private_key_paths: List of paths to read private keys from. 571 self.keys = [] 573 # Load specified keys from the filesystem. 582 self.keys.append({ 'private_key' : key } [all...] |
| /docs/source.android.com/src/devices/ |
| drm.jd | 45 The content protection provided by the Widevine DRM plugin depends on the security and content protection capabilities of the underlying hardware platform. The hardware capabilities of the device include hardware secure boot to establish a chain of trust of security and protection of cryptographic keys. Content protection capabilities of the device include protection of decrypted frames in the device and content output protection via a trusted output protection mechanism. Not all hardware platforms support all the above security and content protection features. Security is never implemented in a single place in the stack, but instead relies on the integration of hardware, software, and services. The combination of hardware security functions, a trusted boot mechanism, and an isolated secure OS for handling security functions is critical to provide a secure device.</p> 106 <td>Factory provisioned Widevine Keys</td> 108 <td>Keys never exposed in clear to host CPU</td> 115 <td>Factory provisioned Widevine Keys</td> 117 <td>Keys never exposed in clear to host CPU</td> 124 <td>Field provisioned Widevine Keys</td> 126 <td>Clear keys exposed to host CPU</td> 140 <p>In this implementation Widevine DRM keys and decrypted content are never exposed to the host CPU. Only security hardware or a protected security co-processor uses clear key values and the media content is decrypted by the secure hardware. This level of security requires factory provisioning of the Widevine key-box or requires the Widevine key-box to be protected by a device key installed at the time of manufacturing. The following describes some key points to this security level: 152 In this security level, the Widevine keys are never exposed to the host CPU. Only security hardware or a protected security co-processor uses clear key values. An AES crypto block performs the high throughput AES decryption of the media stream. The resulting clear media buffers are returned to the CPU for delivery to the video decoder. This level of security requires factory provisioning of the Widevine key-box or requires the Widevine key box to be protected by a key-box installed at the time of manufacturing.
|
| /external/apache-http/src/org/apache/commons/logging/impl/ |
| WeakHashtable.java | 26 * to hold its keys thus allowing them to be reclaimed by the garbage collector. 30 * possible. It therefore does not accept null values or keys.</p> 80 * are used for its keys, it is necessary to use strong references for its values. 124 /* ReferenceQueue we check for gc'd keys */ 185 public Enumeration keys() { method in class:WeakHashtable 187 final Enumeration enumer = super.keys(); 223 throw new NullPointerException("Null keys are not allowed"); 317 * Purges all entries whose wrapped keys 446 // existing keys, normal hashtable operations should never
|
| /external/chromium_org/tools/code_coverage/ |
| process_coverage.py | 231 instrumented = len(instrumented_set.keys()) 232 executed = len(executed_set.keys()) 254 keys = results.keys() 255 keys.sort() 260 # first directory name in results (position 1 in keys). 261 offset = len(keys[1][:keys[1][:-1].rfind('/')]) 263 for key in keys:
|
| /external/emma/core/java12/com/vladium/util/ |
| Property.java | 350 * Overrides Properties.keys () [this is used for debug logging only] 352 public Enumeration keys () method in class:Property.FilePropertyLookup 356 return m_contents.keys (); 437 * Overrides Properties.keys () [this is used for debug logging only] 439 public synchronized Enumeration keys () method in class:Property.SystemPropertyLookup 470 return _propertyNames.keys (); 522 * Overrides Properties.keys () [this is used for debug logging only] 524 public synchronized Enumeration keys () method in class:Property.SystemRedirectsLookup 538 return _propertyNames.keys ();
|
| /hardware/libhardware_legacy/audio/ |
| AudioDumpInterface.cpp | 212 String8 AudioDumpInterface::getParameters(const String8& keys) 214 AudioParameter param = AudioParameter(keys); 218 // ALOGV("getParameters %s", keys.string()); 389 String8 AudioStreamOutDump::getParameters(const String8& keys) 391 if (mFinalStream != 0 ) return mFinalStream->getParameters(keys); 393 AudioParameter param = AudioParameter(keys); 546 String8 AudioStreamInDump::getParameters(const String8& keys) 548 if (mFinalStream != 0 ) return mFinalStream->getParameters(keys); 550 AudioParameter param = AudioParameter(keys);
|
| /libcore/luni/src/test/java/tests/api/javax/net/ssl/ |
| SSLSocketTest.java | 485 String keys = useBKS ? SERVER_KEYS_BKS : SERVER_KEYS_JKS; local 486 TestServer server = new TestServer(true, keys); 521 String keys; field in class:SSLSocketTest.TestServer 527 public TestServer(boolean provideKeys, String keys) { 528 this.keys = keys; 536 KeyManager[] keyManagers = provideKeys ? getKeyManagers(keys) : null; 589 private KeyManager[] getKeyManagers(String keys) throws Exception { 590 byte[] bytes = Base64.decode(keys.getBytes());
|
| /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/bsddb/test/ |
| test_dbshelve.py | 96 k = d.keys() 102 print "keys:", k 116 for key in d.keys(): 124 self.assertEqual(len(dbvalues), len(d.keys())) 210 keys = d.keys() 211 keyset = set(keys) 212 self.assertEqual(len(keyset), len(keys)) 350 self.key_map = {} # map string keys to the number we gave them
|
| /prebuilts/python/linux-x86/2.7.5/lib/python2.7/bsddb/test/ |
| test_dbshelve.py | 96 k = d.keys() 102 print "keys:", k 116 for key in d.keys(): 124 self.assertEqual(len(dbvalues), len(d.keys())) 210 keys = d.keys() 211 keyset = set(keys) 212 self.assertEqual(len(keyset), len(keys)) 350 self.key_map = {} # map string keys to the number we gave them
|
| /external/chromium_org/chrome/browser/extensions/api/management/ |
| management_api.cc | 59 namespace keys = extension_management_api_constants; 249 error_ = ErrorUtils::FormatErrorMessage(keys::kNoExtensionError, 268 error_ = ErrorUtils::FormatErrorMessage(keys::kNoExtensionError, 326 error_ = keys::kManifestParseError; 392 OnParseFailure(keys::kExtensionCreateError); 420 error_ = ErrorUtils::FormatErrorMessage(keys::kNoExtensionError, 425 error_ = ErrorUtils::FormatErrorMessage(keys::kNotAnAppError, 464 keys::kNoExtensionError, extension_id_); 472 keys::kUserCantModifyError, extension_id_); 482 error_ = keys::kGestureNeededForEscalationError [all...] |
| /external/chromium_org/ppapi/native_client/src/trusted/plugin/ |
| json_manifest.cc | 28 // Top-level section name keys 33 // ISA Dictionary keys 39 // Url Resolution keys 43 // PNaCl keys 107 // Return true if this is a valid dictionary. Having only keys present in 108 // |valid_keys| and having at least the keys in |required_keys|. 135 // For forward compatibility, we do not prohibit other keys being in 187 // URL specifications must not contain "pnacl-translate" keys. 254 // is validated to have keys from within the set of recognized ISAs. Unknown 274 // Build the set of reserved ISA dictionary keys [all...] |