| /external/wpa_supplicant_8/src/eap_peer/ |
| eap_tls_common.c | 283 * @label: Label string for deriving the keys, e.g., "client EAP encryption" 297 struct tls_keys keys; local 316 if (tls_connection_get_keys(data->ssl_ctx, data->conn, &keys)) 319 if (keys.client_random == NULL || keys.server_random == NULL || 320 keys.master_key == NULL) 323 rnd = os_malloc(keys.client_random_len + keys.server_random_len); 326 os_memcpy(rnd, keys.client_random, keys.client_random_len) 363 struct tls_keys keys; local [all...] |
| /external/guava/guava-tests/test/com/google/common/collect/ |
| MultimapCollectionTest.java | 605 return multimap.keys(); 608 .named("HashMultimap.keys") 618 return multimap.keys(); 621 .named("LinkedHashMultimap.keys") 632 return multimap.keys(); 640 .named("TreeMultimap.keys") 650 return multimap.keys(); 653 .named("ArrayListMultimap.keys") 664 return multimap.keys(); 667 .named("synchronized ArrayListMultimap.keys") [all...] |
| /build/tools/releasetools/ |
| sign_target_files_apks | 26 Keys specified in -e override any value for that app contained 64 Default value is "-test-keys,-dev-keys,+release-keys". 89 OPTIONS.tag_changes = ("-test-keys", "-dev-keys", "+release-keys") 108 """Check that all the APKs we want to sign have keys specified, and 200 # change, eg, "JWR66N dev-keys" to "JWR66N" 202 if len(value) == 2 and value[1].endswith("-keys") [all...] |
| /external/chromium/chrome/browser/chromeos/login/ |
| wizard_accessibility_handler.cc | 24 namespace keys = extension_accessibility_api_constants; 161 if (control_info->type() == keys::kTypeTextBox) { 175 if (control_info->type() == keys::kTypeButton) { 179 } else if (control_info->type() == keys::kTypeCheckbox) { 192 } else if (control_info->type() == keys::kTypeComboBox) { 202 } else if (control_info->type() == keys::kTypeLink) { 206 } else if (control_info->type() == keys::kTypeListBox) { 216 } else if (control_info->type() == keys::kTypeMenu) { 220 } else if (control_info->type() == keys::kTypeMenuItem) { 229 } else if (control_info->type() == keys::kTypeRadioButton) [all...] |
| /libcore/luni/src/main/java/java/util/prefs/ |
| XMLParser.java | 212 String[] keys = prefs.keys(); local 213 String[] values = new String[keys.length]; 214 for (int i = 0; i < keys.length; i++) { 215 values[i] = prefs.get(keys[i], null); 217 exportEntries(keys, values, out); 220 private static void exportEntries(String[] keys, String[] values, 222 if (keys.length == 0) { 227 for (int i = 0; i < keys.length; i++) { 230 new String[] { keys[i], values[i] }, out) 488 String[] keys = properties.keySet().toArray(new String[properties.size()]); local [all...] |
| /external/chromium/chrome/browser/extensions/ |
| extension_page_actions_module.cc | 24 namespace keys = extension_page_actions_module_constants; 44 EXTENSION_FUNCTION_VALIDATE(action->GetInteger(keys::kTabIdKey, &tab_id)); 46 EXTENSION_FUNCTION_VALIDATE(action->GetString(keys::kUrlKey, &url)); 52 if (action->HasKey(keys::kTitleKey)) 53 EXTENSION_FUNCTION_VALIDATE(action->GetString(keys::kTitleKey, &title)); 54 if (action->HasKey(keys::kIconIdKey)) { 55 EXTENSION_FUNCTION_VALIDATE(action->GetInteger(keys::kIconIdKey,
|
| /external/mp4parser/isoparser/src/main/java/com/coremedia/iso/boxes/mdat/ |
| SampleList.java | 102 List<Long> keys = new ArrayList<Long>(offsets2Sizes.keySet()); local 103 Collections.sort(keys); 105 long[] nuSizes = new long[sizes.length + keys.size()]; 107 long[] nuOffsets = new long[offsets.length + keys.size()]; 109 for (int i = 0; i < keys.size(); i++) { 110 nuOffsets[i + offsets.length] = keys.get(i); 111 nuSizes[i + sizes.length] = offsets2Sizes.get(keys.get(i));
|
| /external/openssh/ |
| ssh-keysign.c | 154 Key *keys[NUM_KEYTYPES], *key = NULL; local 210 keys[i] = NULL; 213 keys[i] = key_load_private_pem(key_fd[i], KEY_UNSPEC, 216 if (keys[i] != NULL) 240 if (keys[i] != NULL && 241 key_equal_public(key, keys[i])) { 249 if (key_sign(keys[i], &signature, &slen, data, dlen) != 0)
|
| PROTOCOL.certkeys | 9 of X.509 certificates and uses raw keys. This approach has some benefits 12 managed, passwordless authentication and centrally certified host keys. 22 keys, by extending the existing ~/.ssh/authorized_keys mechanism to 23 allow specification of certification authority keys in addition to 24 raw user keys. The ssh client will support automatic verification of 25 acceptance of certified host keys, by adding a similar ability to 26 specify CA keys in ~/.ssh/known_hosts. 28 Certified keys are represented using new key types: 169 The valid key types for CA keys are ssh-rsa, ssh-dss and the ECDSA types
|
| /external/wpa_supplicant_8/wpa_supplicant/ |
| eapol_test.c | 702 struct radius_ms_mppe_keys *keys; local 704 keys = radius_msg_get_ms_keys(msg, req, shared_secret, 706 if (keys && keys->send == NULL && keys->recv == NULL) { 707 os_free(keys); 708 keys = radius_msg_get_cisco_keys(msg, req, shared_secret, 712 if (keys) { 713 if (keys->send) { 715 keys->send, keys->send_len) [all...] |
| /frameworks/support/v4/java/android/support/v4/media/ |
| TransportPerformer.java | 107 * will only deliver media keys. The default implementation handles these keys: 118 * implementation always returns true. This only matters for keys 122 * continues on to its default key handling (which for media keys means 151 * will only deliver media keys. The default implementation does nothing. 155 * implementation always returns true. This only matters for keys 159 * continues on to its default key handling (which for media keys means
|
| /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/ |
| shelve.py | 4 with dbm databases is that the values (not the keys!) in a shelf can 7 types, and objects containing lots of shared sub-objects. The keys 24 list = d.keys() # a list of all existing keys (slow!) 80 __getitem__ = __setitem__ = __delitem__ = keys = closed 100 def keys(self): member in class:Shelf 101 return self.dict.keys()
|
| /prebuilts/python/linux-x86/2.7.5/lib/python2.7/ |
| shelve.py | 4 with dbm databases is that the values (not the keys!) in a shelf can 7 types, and objects containing lots of shared sub-objects. The keys 24 list = d.keys() # a list of all existing keys (slow!) 80 __getitem__ = __setitem__ = __delitem__ = keys = closed 100 def keys(self): member in class:Shelf 101 return self.dict.keys()
|
| /docs/source.android.com/src/devices/tech/input/ |
| key-layout-files.jd | 23 input devices that have keys, including special keys such as volume, power 24 and headset media keys.</p> 155 # volume and power keys which are typically implemented as GPIO pins that 184 # These are the buttons that the joystick supports, represented as keys. 214 <h2 id="wake-keys">Wake Keys</h2> 215 <p>Wake keys are special keys that wake the device from sleep, such as the power key.</p> 217 keyboard device, all keys are wake keys.</p [all...] |
| /external/chromium_org/chrome/browser/extensions/api/preference/ |
| preference_api.cc | 34 namespace keys = extensions::preference_api_constants; 224 // Mapping from extension pref keys to browser pref keys and permissions. 227 // Mapping from browser pref keys to extension event names and permissions. 230 // Mapping from browser pref keys to transformers. 284 dict->Set(keys::kValue, transformed_value); 287 dict->SetBoolean(keys::kIncognitoSpecific, 545 keys::kPermissionErrorMessage, extension_pref_key); 560 if (details->HasKey(keys::kIncognitoKey)) 561 EXTENSION_FUNCTION_VALIDATE(details->GetBoolean(keys::kIncognitoKey [all...] |
| /external/chromium_org/third_party/WebKit/Source/core/page/ |
| make_settings.pl | 79 for my $settingName (sort keys %parsedItems) { 119 for my $conditional (sort keys %settingsByConditional) { 124 for my $settingName (sort keys %{ $settingsByConditional{$conditional} }) { 130 for my $settingName (sort keys %{ $settingsByConditional{$conditional} }) { 138 for my $settingName (sort keys %{ $settingsByConditional{$conditional} }) { 145 for my $settingName (sort keys %{ $settingsByConditional{$conditional} }) { 152 for my $settingName (sort keys %{ $settingsByConditional{$conditional} }) { 159 for my $settingName (sort keys %{ $settingsByConditional{$conditional} }) { 184 for my $settingName (sort keys %unconditionalSettings) { 187 for my $conditional (sort keys %settingsByConditional) [all...] |
| /external/marisa-trie/ |
| android_diff.txt | 88 @@ -63,15 +63,9 @@ void Trie::build_trie(Vector<Key<String> > &keys, 89 build_trie(keys, static_cast<UInt32 *>(NULL), flags); 93 - std::vector<UInt32> temp_key_ids(keys.size()); 94 - build_trie(keys, temp_key_ids.empty() ? NULL : &temp_key_ids[0], flags); 101 + std::vector<UInt32> temp_key_ids(keys.size()); 102 + build_trie(keys, temp_key_ids.empty() ? NULL : &temp_key_ids[0], flags); 106 void Trie::build_trie(Vector<Key<String> > &keys, 107 @@ -168,7 +162,7 @@ void Trie::build_trie(Vector<Key<T> > &keys, 110 void Trie::build_cur(Vector<Key<T> > &keys, 113 num_keys_ = sort_keys(keys); [all...] |
| /external/linux-tools-perf/scripts/python/ |
| netdev-times.py | 132 if 'comm' in event.keys(): 137 elif 'handle' in event.keys(): 303 if cpu not in irq_dic.keys(): 310 if cpu not in irq_dic.keys(): 317 if 'event_list' in irq_record.keys(): 322 if cpu not in irq_dic.keys() \ 326 if 'event_list' in irq_record.keys(): 342 if cpu in irq_dic.keys(): 345 if cpu in net_rx_dic.keys(): 358 if cpu in net_rx_dic.keys() [all...] |
| /frameworks/native/include/media/drm/ |
| DrmAPI.h | 86 // Drm keys can be for offline content or for online streaming. 87 // Offline keys are persisted on the device and may be used when the device 89 // that offline keys be no longer restricted to offline use. 107 // Server to obtain the keys required to decrypt the content. getKeyRequest() 113 // kKeyType_Streaming, scope should be set to the sessionId the keys will be 115 // the keySetId of the keys being released. Releasing keys from a device 127 // keyType specifies if the keys are to be used for streaming or offline content 151 // keys to a new session with the method restoreKeys. When the response is 158 // Remove the current keys from a sessio [all...] |
| /external/chromium_org/third_party/openssl/openssl/crypto/rc4/ |
| rc4test.c | 75 static unsigned char keys[7][30]={ variable 131 RC4_set_key(&key,keys[i][0],&(keys[i][1])); 154 RC4_set_key(&key,keys[3][0],&(keys[3][1])); 181 RC4_set_key(&key,keys[3][0],&(keys[3][1])); 213 RC4_set_key(&key,keys[0][0],&(keys[3][1]));
|
| /external/chromium_org/ui/keyboard/resources/layouts/ |
| dvorak.html | 15 <kb-key-sequence keys="",.PYFGCRL" superscripts="1234567890"></kb-key-sequence> 20 <kb-key-sequence keys="AOEUIDHTNS"></kb-key-sequence> 25 <kb-key-sequence keys=";QJKXBMWVZ"></kb-key-sequence> 41 <kb-key-sequence keys="",.pyfgcrl" superscripts="1234567890"></kb-key-sequence> 46 <kb-key-sequence keys="aoeuidhtns"></kb-key-sequence> 51 <kb-key-sequence keys=";qjkxbmwvz"></kb-key-sequence> 67 <kb-key-sequence keys="1234567890"></kb-key-sequence> 72 <kb-key-sequence keys="@#$%&*-=()"></kb-key-sequence> 77 <kb-key-sequence keys="!"':;/?"></kb-key-sequence>
|
| /external/openssl/crypto/rc4/ |
| rc4test.c | 75 static unsigned char keys[7][30]={ variable 131 RC4_set_key(&key,keys[i][0],&(keys[i][1])); 154 RC4_set_key(&key,keys[3][0],&(keys[3][1])); 181 RC4_set_key(&key,keys[3][0],&(keys[3][1])); 213 RC4_set_key(&key,keys[0][0],&(keys[3][1]));
|
| /external/qemu/android/skin/ |
| keyset.c | 21 # define D_ACTIVE VERBOSE_CHECK(keys) 27 # define D(...) VERBOSE_PRINT(keys,__VA_ARGS__) 410 char keys[24]; local 411 if (len+1 >= (int)sizeof(keys)) { 415 memcpy( keys, p, len ); 416 keys[len] = 0; 417 if ( skin_key_symmod_from_str( keys, &sym, &mod ) < 0 ) { 418 D( "ignoring unknown keys '%s' for command '%s'", 419 keys, node->name );
|
| /external/srec/portable/include/ |
| phashtable.h | 41 * Default hash function used for hashing keys. The default function assumes 47 * Default compare function used for hashing keys. The default function 54 * Abstract hash table operations. The keys of the Map are strings and values 55 * are plain void pointers. The keys and values are only stored as pointers 57 * for the keys and values. 81 * are related in the sense that if the comparison function for two keys 83 * keys as arguments must be equal. 114 * Function used to compare two keys. 145 * Destructor. The keys and values need to be deleted (if necessary) before
|
| /frameworks/support/v4/java/android/support/v4/util/ |
| LongSparseArray.java | 25 * auto-boxing keys and its data structure doesn't rely on an extra entry object 29 * using a binary search to find keys. The implementation is not intended to be appropriate for 37 * keys: instead of compacting its array immediately, it leaves the removed entry marked 150 long[] keys = mKeys; local 158 keys[o] = keys[i]; 292 * specified key, or a negative number if no keys map to the 295 * and that multiple keys can map to the same value and this will 327 * the key is greater than all existing keys in the array.
|