/art/runtime/ |
parsed_options.h | 46 using RuntimeParser = CmdlineParser<RuntimeArgumentMap, RuntimeArgumentMap::Key>;
|
safe_map.h | 104 // Check that we're using the correct position and the key is not in the map. 110 // Check that we're using the correct position and the key is not in the map. 122 // Already there - update the value for the existing key 160 template<class Key, class T, AllocatorTag kTag, class Compare = std::less<Key>> 162 Key, T, Compare, TrackingAllocator<std::pair<const Key, T>, kTag>> {
|
/cts/apps/CtsVerifier/src/com/android/cts/verifier/camera/its/ |
ItsSerializer.java | 64 key = k; 67 public String key; field in class:ItsSerializer.MetadataEntry 277 if (keyObj.getClass() == CaptureResult.Key.class 279 return ((CaptureResult.Key)keyObj).getName(); 280 } else if (keyObj.getClass() == CaptureRequest.Key.class) { 281 return ((CaptureRequest.Key)keyObj).getName(); 282 } else if (keyObj.getClass() == CameraCharacteristics.Key.class) { 283 return ((CameraCharacteristics.Key)keyObj).getName(); 285 throw new ItsException("Invalid key object"); 290 return ((CaptureResult)md).get((CaptureResult.Key)keyObj) 542 CaptureRequest.Key key = (CaptureRequest.Key)field.get(md); local [all...] |
/external/apache-harmony/crypto/src/test/api/java.injected/javax/crypto/ |
CipherSpiTest.java | 27 import java.security.Key; 81 * Test for <code>engineGetKeySize(Key)</code> method 94 * Test for <code>engineWrap(Key)</code> method 253 protected void engineInit(int opmode, Key key, SecureRandom random) 257 protected void engineInit(int opmode, Key key, 262 protected void engineInit(int opmode, Key key, AlgorithmParameters params,
|
/external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/ |
MyKeyStore.java | 28 import java.security.Key; 61 public Key engineGetKey(String alias, char[] password) 64 return (Key) Keys.get(alias); 90 public void engineSetKeyEntry(String alias, Key key, char[] password, 95 Keys.put(alias, key); 102 public void engineSetKeyEntry(String alias, byte[] key, Certificate[] chain) 104 if (key == null) { 105 throw new KeyStoreException("Not Supported for null key"); 114 alias, alias, key); [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/ec/ |
KeyFactorySpi.java | 5 import java.security.Key; 41 protected Key engineTranslateKey( 42 Key key) 45 if (key instanceof ECPublicKey) 47 return new BCECPublicKey((ECPublicKey)key, configuration); 49 else if (key instanceof ECPrivateKey) 51 return new BCECPrivateKey((ECPrivateKey)key, configuration); 54 throw new InvalidKeyException("key type unknown"); 58 Key key [all...] |
/external/chromium-trace/catapult/dashboard/dashboard/models/ |
bug_label_patterns.py | 31 entity = ndb.Key(BugLabelPatterns, _ID).get()
|
/external/chromium-trace/catapult/dashboard/dashboard/ |
stored_object.py | 43 def Get(key): 47 key: String key value. 50 A value for key. 52 results = MultipartCache.Get(key) 54 results = _GetValueFromDatastore(key) 55 MultipartCache.Set(key, results) 59 def Set(key, value): 63 key: String key value [all...] |
units_to_direction.py | 21 entity = ndb.Key(UnitsToDirection, units).get() 39 unit = units_to_direction_entity.key.id() 42 units_to_direction_entity.key.delete()
|
xsrf.py | 16 """Stores a secret XSRF key for the site.""" 32 """Returns a random XSRF secret key.""" 37 """Gets or creates the secret key to use for validating XSRF tokens.""" 38 key_entity = ndb.Key('XsrfSecretKey', 'site').get()
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/s3/ |
resumable_download_handler.py | 33 from boto.gs.key import Key as GSKey 60 boto.s3.Key.get_file(), taking into account that we're resuming 150 def _save_tracker_info(self, key): 151 self.etag_value_for_current_download = key.etag.strip('"\'') 175 def _attempt_resumable_download(self, key, fp, headers, cb, num_cb, 186 self.etag_value_for_current_download == key.etag.strip('"\'')): 188 if cur_file_size > key.size: 192 (fp.name, cur_file_size, str(storage_uri_for_key(key)), 193 key.size), ResumableTransferDisposition.ABORT [all...] |
/external/conscrypt/src/main/java/org/conscrypt/ |
OpenSSLECKeyFactory.java | 21 import java.security.Key; 70 protected <T extends KeySpec> T engineGetKeySpec(Key key, Class<T> keySpec) 72 if (key == null) { 73 throw new InvalidKeySpecException("key == null"); 80 if (!"EC".equals(key.getAlgorithm())) { 81 throw new InvalidKeySpecException("Key must be an EC key"); 84 if (key instanceof ECPublicKey && ECPublicKeySpec.class.isAssignableFrom(keySpec)) { 85 ECPublicKey ecKey = (ECPublicKey) key; [all...] |
OpenSSLRSAKeyFactory.java | 21 import java.security.Key; 72 protected <T extends KeySpec> T engineGetKeySpec(Key key, Class<T> keySpec) 74 if (key == null) { 75 throw new InvalidKeySpecException("key == null"); 82 if (!"RSA".equals(key.getAlgorithm())) { 83 throw new InvalidKeySpecException("Key must be a RSA key"); 86 if (key instanceof RSAPublicKey && RSAPublicKeySpec.class.isAssignableFrom(keySpec)) { 87 RSAPublicKey rsaKey = (RSAPublicKey) key; [all...] |
/external/dagger2/compiler/src/main/java/dagger/internal/codegen/ |
ProductionBinding.java | 41 * A value object representing the mechanism by which a {@link Key} can be produced. New instances 70 /** Returns provision type that was used to bind the key. */ 96 private final Key.Factory keyFactory; 100 Types types, Key.Factory keyFactory, DependencyRequest.Factory dependencyRequestFactory) { 116 Key key = keyFactory.forProducesMethod(resolvedMethod, producesMethod); local 128 key, 131 findBindingPackage(key), 144 Optional<Key> implicitMapOfProducerKey = 145 keyFactory.implicitMapProducerKeyFrom(mapOfValueRequest.key()); [all...] |
/external/guice/core/test/com/google/inject/ |
LoggerInjectionTest.java | 57 assertNull(injector.getInstance(Key.get(Logger.class, Names.named("anonymous"))).getName());
|
/external/llvm/include/llvm/Linker/ |
IRMover.h | 36 static unsigned getHashValue(const KeyTy &Key);
|
/external/llvm/include/llvm/Support/ |
Options.h | 71 /// \param Key unique key for option 72 /// \param O option to map to \p Key 76 void addOption(void *Key, cl::Option *O); 88 /// \tparam Base class used to key the option 106 /// \tparam Base class used to key the option 109 /// Reads option values based on the key generated by the template parameters.
|
/external/llvm/lib/Transforms/Utils/ |
BypassSlowDivision.cpp | 176 DivOpInfo Key(UseSignedOp, Dividend, Divisor); 178 PerBBDivCache.insert(std::pair<DivOpInfo, DivPhiNodes>(Key, Value)); 194 DivOpInfo Key(UseSignedOp, Instr->getOperand(0), Instr->getOperand(1)); 195 DivCacheTy::iterator CacheI = PerBBDivCache.find(Key);
|
/external/lzma/CPP/7zip/Crypto/ |
7zAes.h | 25 Byte Key[kKeySize];
46 bool Find(CKeyInfo &key);
47 // HRESULT Calculate(CKeyInfo &key);
48 void Add(CKeyInfo &key);
|
/external/skia/src/core/ |
SkMaskCache.cpp | 21 struct RRectBlurKey : public SkResourceCache::Key { 40 RRectBlurRec(RRectBlurKey key, const SkMask& mask, SkCachedData* data) 41 : fKey(key) 54 const Key& getKey() const override { return fKey; } 80 RRectBlurKey key(sigma, rrect, style, quality); 81 if (!CHECK_LOCAL(localCache, find, Find, key, RRectBlurRec::Visitor, &result)) { 93 RRectBlurKey key(sigma, rrect, style, quality); 94 return CHECK_LOCAL(localCache, add, Add, new RRectBlurRec(key, mask, data)); 102 struct RectsBlurKey : public SkResourceCache::Key { 135 RectsBlurRec(RectsBlurKey key, const SkMask& mask, SkCachedData* data [all...] |
/external/snakeyaml/src/main/java/org/yaml/snakeyaml/tokens/ |
Token.java | 23 Alias, Anchor, BlockEnd, BlockEntry, BlockMappingStart, BlockSequenceStart, Directive, DocumentEnd, DocumentStart, FlowEntry, FlowMappingEnd, FlowMappingStart, FlowSequenceEnd, FlowSequenceStart, Key, Scalar, StreamEnd, StreamStart, Tag, Value, Whitespace, Comment, Error
|
/external/v8/src/ |
hashmap.h | 34 // HashMap entries are (key, value, hash) triplets. 36 // (e.g. implementers of sets, where the key is the value). 38 void* key; member in struct:v8::internal::TemplateHashMapImpl::Entry 40 uint32_t hash; // The full hash value for key 44 // If an entry with matching key is found, returns that entry. 46 Entry* Lookup(void* key, uint32_t hash) const; 48 // If an entry with matching key is found, returns that entry. 50 // corresponding key, key hash, and NULL value. 51 Entry* LookupOrInsert(void* key, uint32_t hash [all...] |
/libcore/ojluni/src/main/java/javax/crypto/ |
EncryptedPrivateKeyInfo.java | 234 * Cipher.UNWRAP_MODE, with the same key and parameters used 274 private PKCS8EncodedKeySpec getKeySpecImpl(Key decryptKey, 309 * @param decryptKey key used for decrypting the encrypted data. 321 public PKCS8EncodedKeySpec getKeySpec(Key decryptKey) 332 * @param decryptKey key used for decrypting the encrypted data. 348 public PKCS8EncodedKeySpec getKeySpec(Key decryptKey, 368 * @param decryptKey key used for decrypting the encrypted data. 382 public PKCS8EncodedKeySpec getKeySpec(Key decryptKey, 422 throw new IOException("invalid key encoding - wrong tag for " + 445 throw new IOException("invalid key encoding") [all...] |
MacSpi.java | 57 * Initializes the MAC with the given (secret) key and algorithm 60 * @param key the (secret) key. 63 * @exception InvalidKeyException if the given key is inappropriate for 68 protected abstract void engineInit(Key key, 126 * maintaining the secret key that the MAC was initialized with. 133 * Resets the MAC for further use, maintaining the secret key that the
|
SealedObject.java | 30 import java.security.Key; 45 * the corresponding algorithm using the correct decryption key) and 49 * correct algorithm, key, padding scheme, etc., before being applied 62 * exact same algorithm, key, padding scheme, etc., that were used to seal the 66 * sealed object does not require knowledge of the decryption key. For example, 68 * decryption key, it could hand over the cipher object to 74 * {@link #getObject(java.security.Key) getObject} methods 75 * that take a <code>Key</code> object. 79 * given decryption key and the algorithm parameters (if any) that were stored 225 * <code>key</code> and the parameters (if any) that had been used in th [all...] |