| /external/chromium_org/v8/test/mjsunit/regress/ |
| regress-convert-enum2.js | 40 var keys = ["a", "b", "c"]; variable 44 assertEquals(keys[i], y);
|
| /external/icu4c/samples/legacy/ |
| newcol.cpp | 68 extern "C" void test_current(UChar data[][5], uint32_t size, uint32_t maxlen, uint8_t keys[][32]) { 77 keySize = getSortKey_current("ja", data[i], -1, keys[i], 32);
|
| /external/linux-tools-perf/scripts/perl/ |
| rw-by-pid.pl | 83 ($reads{$a}{bytes_read} || 0) } keys %reads) { 101 foreach my $pid (keys %reads) { 102 foreach my $error (keys %{$reads{$pid}{errors}}) { 124 ($writes{$a}{bytes_written} || 0)} keys %writes) { 141 foreach my $pid (keys %writes) { 142 foreach my $error (keys %{$writes{$pid}{errors}}) { 163 if ((scalar keys %unhandled) == 0) { 173 foreach my $event_name (keys %unhandled) {
|
| /external/openssh/contrib/redhat/ |
| sshd.init | 33 failure $"Configuration file or keys are invalid" 40 # Create keys if necessary
|
| /external/openssh/contrib/ |
| ssh-copy-id | 6 # or one of the other keys in your ssh-agent, for this to work. 51 to make sure we haven't added extra keys that you weren't expecting.
|
| /external/srec/srec/Recognizer/include/ |
| SR_RecognizerResult.h | 67 * @param count The number keys 74 * to the keys used internally by the recognition result. These keys should not be modified! 78 * @param list [out] List of keys associated with n-best list entry. 138 * @param count The number keys 146 * to the keys used internally by the recognition result. These keys should not be modified! 150 * @param list [out] List of keys associated with n-best list entry.
|
| /frameworks/av/media/libstagefright/timedtext/ |
| TextDescriptions.h | 43 // These keys must be in sync with the keys in TimedText.java
|
| /frameworks/base/libs/hwui/utils/ |
| TinyHashMap.h | 26 * A very simple hash map that doesn't allow duplicate keys, overwriting the older entry. 28 * Currently, expects simple keys that are handled by hash_t()
|
| /frameworks/support/v4/java/android/support/v4/util/ |
| ArrayMap.java | 124 * Determine if the array map contains all of the keys in the given collection. 146 * Remove all keys in the array map that exist in the given collection. 147 * @param collection The collection whose contents are to be used to remove keys. 148 * @return Returns true if any keys were removed from the array map, else false. 155 * Remove all keys in the array map that do <b>not</b> exist in the given collection. 157 * keys to keep. 158 * @return Returns true if any keys were removed from the array map, else false. 183 * Return a {@link java.util.Set} for iterating over and interacting with all keys
|
| /libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/func/ |
| CipherPBEThread.java | 30 CipherPBEThread(String name, int[] keys, String[] modes, String[] paddings) { 31 super(name, keys, modes, paddings);
|
| CipherRSAThread.java | 26 CipherRSAThread(String name, int[] keys, String[] modes, String[] paddings) { 27 super(name, keys, modes, paddings);
|
| /libcore/support/src/test/java/tests/support/ |
| Support_MapTest2.java | 44 assertTrue("Should not have keys", !map.keySet().iterator() 58 assertTrue("Should not have keys", !map.keySet().iterator()
|
| /packages/inputmethods/LatinIME/java/res/xml/ |
| key_nepali_traditional_period.xml | 23 of Hindi. The files named res/xml/{key,keys}_nepali*.xml have this U+25CC hack, although the 24 counterpart files named res/xml-v16/{key,keys}_nepali*.xml don't have this hack. -->
|
| /packages/inputmethods/LatinIME/java/src/com/android/inputmethod/keyboard/internal/ |
| KeyPreviewDrawParams.java | 34 // paddings. To align the more keys keyboard panel's visible part with the visible part of 40 // padding. To align the more keys keyboard and the key preview we also need to record the
|
| /external/chromium_org/sync/internal_api/ |
| sync_encryption_handler_impl.cc | 40 // because the encryption keys don't match (per chrome instantiation). 219 // Restore the cryptographer's previous keys. Note that we don't add the 220 // keystore keys into the cryptographer here, in case a migration was pending. 273 // undecryptable with the available keystore keys or does not match the 281 // with GAIA password and any pending keys resolved). 313 // If the cryptographer is not ready (either it has pending keys or we 357 // keys. 373 // 1. The user has no pending keys and is setting their current GAIA password 377 // 2. The user has no pending keys, and is overwriting an (already provided) 379 // 3. The user has pending keys for an explicit passphrase that is somehow se [all...] |
| sync_encryption_handler_impl_unittest.cc | 66 google::protobuf::RepeatedPtrField<google::protobuf::string> keys; local 67 keys.Add()->assign(encryption_key); 68 return keys; 520 // Receive an old nigori with old encryption keys and encrypted types. We should 539 // Set up the current encryption state (containing both keys and encrypt 564 // Has an old set of keys, and no encrypted types. 584 // The cryptographer should be able to decrypt both sets of keys and still 610 // Passing no keys should do nothing. 622 // Build a set of keystore keys. 626 google::protobuf::RepeatedPtrField<google::protobuf::string> keys; local 1993 google::protobuf::RepeatedPtrField<google::protobuf::string> keys; local 2047 google::protobuf::RepeatedPtrField<google::protobuf::string> keys; local 2080 google::protobuf::RepeatedPtrField<google::protobuf::string> keys; local 2126 google::protobuf::RepeatedPtrField<google::protobuf::string> keys; local 2166 google::protobuf::RepeatedPtrField<google::protobuf::string> keys; local 2221 google::protobuf::RepeatedPtrField<google::protobuf::string> keys; local 2265 google::protobuf::RepeatedPtrField<google::protobuf::string> keys; local [all...] |
| /external/blktrace/btt/ |
| bno_plot.py | 24 [ -K | --keys-below ] 33 The -K option forces bno_plot.py to put the keys below the graph, 34 typically all keys for input files are put in the upper right corner 36 automatically push the keys under the graph. 59 l_opts = [ 'help', 'keys-below', 'verbose' ] 74 elif o in ('-K', '--keys-below'):
|
| /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/params/ |
| DESParameters.java | 23 * Table of weak and semi-weak keys taken from Schneier pp281 29 /* weak keys */ 35 /* semi-weak keys */ 51 * DES has 16 weak keys. This method will check 86 * DES Keys use the LSB as the odd parity bit. This can 87 * be used to check for corrupt keys.
|
| /external/chromium/chrome/browser/sync/util/ |
| cryptographer.h | 59 // Returns whether we can decrypt |encrypted| using the keys we currently know 82 // Encrypts the set of currently known keys into |encrypted|. Returns true if 101 // Attempts to decrypt the set of keys that was copied in the previous call to 102 // SetPendingKeys using |params|. Returns true if the pending keys were 109 // Returns whether there is a pending set of keys that needs to be decrypted. 114 // can't be created (i.e. if this Cryptograhper doesn't have valid keys).
|
| /external/chromium/chrome/common/extensions/docs/examples/extensions/app_launcher/ |
| popup.js | 157 var keys = { 173 case keys.DOWN: 176 case keys.UP: 179 case keys.HOME: 182 case keys.END: 185 case keys.ENTER:
|
| /external/chromium-trace/trace-viewer/src/tcmalloc/ |
| heap_instance_track.js | 56 var traceNames = Object.keys(snapshot.heap_.children); 137 var keys = Object.keys(snapshot.heap_.children); 138 for (var k = keys.length - 1; k >= 0; k--) { 139 var trace = snapshot.heap_.children[keys[k]]; 142 this.objectInstance_.selectedTraces[0] == keys[k]) {
|
| tcmalloc_snapshot_view.js | 67 var keys = Object.keys(heapEntry.children); 68 keys.sort(function(a, b) { 73 for (var i = 0; i < keys.length; i++) { 74 var traceName = keys[i]; 79 var childCount = Object.keys(trace.children).length;
|
| /external/chromium_org/chrome/browser/extensions/api/storage/ |
| policy_value_store.cc | 55 // determining which keys are currently stored, or of determining which keys 117 size_t PolicyValueStore::GetBytesInUse(const std::vector<std::string>& keys) { 132 const std::vector<std::string>& keys) { 133 return delegate_->Get(keys); 155 const std::vector<std::string>& keys) {
|
| /external/chromium_org/chrome/browser/extensions/ |
| external_registry_loader_win.cc | 57 std::set<string16> keys; local 61 keys.insert(iterator_machine_key.Name()); 65 keys.insert(iterator_user_key.Name()); 67 // Iterate over the keys found, first trying HKLM, then HKCU, as per Windows 70 for (std::set<string16>::const_iterator it = keys.begin(); 71 it != keys.end(); ++it) {
|
| /external/chromium_org/chrome/common/extensions/docs/examples/extensions/app_launcher/ |
| popup.js | 139 var keys = { 155 case keys.DOWN: 158 case keys.UP: 161 case keys.HOME: 164 case keys.END: 167 case keys.ENTER:
|