/prebuilts/ndk/r11/platforms/android-24/arch-x86/usr/include/SLES/ |
OpenSLES_AndroidMetadata.h | 25 /* Android metadata keys */ 29 * Additional metadata keys to be used in SLMetadataExtractionItf: 30 * the ANDROID_KEY_PCMFORMAT_* keys follow the fields of the SLDataFormat_PCM struct, and as such 31 * all values corresponding to these keys are of SLuint32 type, and are defined as the fields
|
/prebuilts/ndk/r11/platforms/android-24/arch-x86_64/usr/include/SLES/ |
OpenSLES_AndroidMetadata.h | 25 /* Android metadata keys */ 29 * Additional metadata keys to be used in SLMetadataExtractionItf: 30 * the ANDROID_KEY_PCMFORMAT_* keys follow the fields of the SLDataFormat_PCM struct, and as such 31 * all values corresponding to these keys are of SLuint32 type, and are defined as the fields
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/ |
test_dumbdbm.py | 35 self.assertEqual(f.keys(), []) 88 keys = self.keys_helper(f) 120 keys = self.keys_helper(f) 131 keys = f.keys() 132 keys.sort() 133 dkeys = self._dict.keys() 135 self.assertEqual(keys, dkeys) 136 return keys
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/ |
test_dumbdbm.py | 35 self.assertEqual(f.keys(), []) 88 keys = self.keys_helper(f) 120 keys = self.keys_helper(f) 131 keys = f.keys() 132 keys.sort() 133 dkeys = self._dict.keys() 135 self.assertEqual(keys, dkeys) 136 return keys
|
/test/vts/runners/host/ |
config_parser.py | 24 from vts.runners.host import keys 42 result[keys.ConfigKeys.KEY_TESTBED][ 43 keys.ConfigKeys.KEY_TESTBED_NAME] = test_name 69 if keys.ConfigKeys.KEY_TESTBED not in configs and baseline_config: 74 for tb in configs[keys.ConfigKeys.KEY_TESTBED]: 75 if tb[keys.ConfigKeys.KEY_TESTBED_NAME] in tb_filters: 82 configs[keys.ConfigKeys.KEY_TESTBED] = tbs 84 _validate_testbed_configs(configs[keys.ConfigKeys.KEY_TESTBED]) 85 k_log_path = keys.ConfigKeys.KEY_LOG_PATH 87 tps = configs[keys.ConfigKeys.KEY_TEST_PATHS [all...] |
/packages/inputmethods/LatinIME/java/src/com/android/inputmethod/keyboard/ |
MoreKeysKeyboard.java | 61 * Set keyboard parameters of more keys keyboard. 63 * @param numKeys number of keys in this more keys keyboard. 64 * @param numColumn number of columns of this more keys keyboard. 65 * @param keyWidth more keys keyboard key width in pixel, including horizontal gap. 66 * @param rowHeight more keys keyboard row height in pixel, including vertical gap. 69 * @param isMoreKeysFixedColumn true if more keys keyboard should have 70 * <code>numColumn</code> columns. Otherwise more keys keyboard should have 72 * @param isMoreKeysFixedOrder true if the order of more keys is determined by the order in 73 * the more keys' specification. Otherwise the order of more keys is automaticall [all...] |
/frameworks/base/legacy-test/src/android/test/ |
InstrumentationTestCase.java | 246 * of keys is a string containing the key names as specified in KeyEvent, without the 251 * @param keysSequence The sequence of keys. 254 final String[] keys = keysSequence.split(" "); local 255 final int count = keys.length; 260 String key = keys[i]; 303 * @param keys The series of key codes to send through instrumentation. 305 public void sendKeys(int... keys) { 306 final int count = keys.length; 311 instrumentation.sendKeyDownUpSync(keys[i]); 327 * @param keys The series of key repeats and codes to send through instrumentation [all...] |
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Tools/i18n/ |
msgfmt.py | 62 keys = MESSAGES.keys()
63 # the keys are sorted in the .mo file
64 keys.sort()
67 for id in keys:
75 # the keys start right after the index tables.
77 keystart = 7*4+16*len(keys)
78 # and the values start after the keys
82 # The string table first has the list of keys, then the list of values.
91 len(keys), # # of entries [all...] |
/external/clang/test/Analysis/ |
CFContainers.mm | 77 CFDictionaryRef CFDictionaryCreate(CFAllocatorRef allocator, const void **keys, const void **values, CFIndex numValues, const CFDictionaryKeyCallBacks *keyCallBacks, const CFDictionaryValueCallBacks *valueCallBacks); 89 CFDictionaryRef CFDictionaryCreate(CFAllocatorRef allocator, const void **keys, const void **values, CFIndex numValues, const 117 CFStringRef keys[6]; 119 keys[0] = CFSTR("January"); values[0] = CFNumberCreate(kCFAllocatorDefault, kCFNumberShortType, &days31); 120 keys[1] = CFSTR("February"); values[1] = CFNumberCreate(kCFAllocatorDefault, kCFNumberShortType, &days28); 121 keys[2] = CFSTR("March"); values[2] = CFNumberCreate(kCFAllocatorDefault, kCFNumberShortType, &days31); 122 keys[3] = CFSTR("April"); values[3] = CFNumberCreate(kCFAllocatorDefault, kCFNumberShortType, &days30); 123 keys[4] = CFSTR("May"); values[4] = CFNumberCreate(kCFAllocatorDefault, kCFNumberShortType, &days31); 124 keys[5] = CFSTR("June"); values[5] = CFNumberCreate(kCFAllocatorDefault, kCFNumberShortType, &days30); 128 CFDictionaryRef dict1 = CFDictionaryCreate(kCFAllocatorDefault, (const void**)keys, (const void**)values, numValues, &keyCB, &valCB); // no warnin [all...] |
/external/jacoco/org.jacoco.core.test/src/org/jacoco/core/internal/flow/ |
MethodProbesAdapterTest.java | 82 public void visitLookupSwitchInsnWithProbes(Label dflt, int[] keys, 84 rec("visitLookupSwitchInsnWithProbes", dflt, keys, labels); 225 final int[] keys = new int[] { 0, 1 }; local 228 adapter.visitLookupSwitchInsn(label, keys, labels); 231 expectedVisitor.visitLookupSwitchInsnWithProbes(label, keys, labels, 244 final int[] keys = new int[] { 0, 1 }; local 247 adapter.visitLookupSwitchInsn(label, keys, labels); 250 expectedVisitor.visitLookupSwitchInsnWithProbes(label, keys, labels, 260 final int[] keys = new int[] { 0, 1 }; local 263 adapter.visitLookupSwitchInsn(label, keys, labels) [all...] |
/external/python/cpython2/Tools/i18n/ |
msgfmt.py | 63 keys = MESSAGES.keys() 64 # the keys are sorted in the .mo file 65 keys.sort() 68 for id in keys: 76 # the keys start right after the index tables. 78 keystart = 7*4+16*len(keys) 79 # and the values start after the keys 83 # The string table first has the list of keys, then the list of values. 92 len(keys), # # of entrie [all...] |
/external/syslinux/gpxe/src/util/ |
symcheck.pl | 42 foreach my $object ( keys %$symtab ) { 109 my @provides = keys %{$info->{provides}}; 110 my @requires = keys %{$info->{requires}}; 111 my @shares = keys %{$info->{shares}}; 167 foreach my $object ( sort keys %$problems ) { 168 my @nonexistent = sort keys %{$problems->{$object}->{nonexistent}}; 169 my @multiples = sort keys %{$problems->{$object}->{multiples}}; 170 my @unused = sort keys %{$problems->{$object}->{unused}}; 171 my @shared = sort keys %{$problems->{$object}->{shared}}; 172 my @large = sort keys %{$problems->{$object}->{large}} [all...] |
/external/v8/tools/ |
eval_gc_nvp.py | 60 keys = self.histogram.keys() 61 keys.sort() 62 last = keys[len(keys) - 1] 65 if i == keys[0]: 66 keys.pop(0) 148 parser.add_argument('keys', metavar='KEY', type=str, nargs='+', 149 help='the keys of NVPs to process') 173 help="rank keys by metric (default: no)" [all...] |
/frameworks/base/core/java/android/util/ |
SparseIntArray.java | 30 * auto-boxing keys and values and its data structure doesn't rely on an extra entry object 34 * using a binary search to find keys. The implementation is not intended to be appropriate for 42 * {@link #keyAt(int)} and {@link #valueAt(int)}. Iterating over the keys using 44 * keys in ascending order, or the values corresponding to the keys in ascending 164 * <p>The keys corresponding to indices in ascending order are guaranteed to 179 * to be associated with keys in ascending order, e.g., 207 * specified key, or a negative number if no keys map to the 210 * and that multiple keys can map to the same value and this will 230 * the key is greater than all existing keys in the array [all...] |
/hardware/interfaces/drm/1.0/ |
types.hal | 28 * attempted and no license keys have been provided. 34 * to use a license and the keys in that license have expired. 118 * This event type indicates that the app needs to request keys from a 124 * This event type indicates that the licensed usage duration for keys in a 125 * session has expired. The keys are no longer valid. 144 * Drm keys can be for offline content or for online streaming. 145 * Offline keys are persisted on the device and may be used when the device 151 * Keys for streaming are not persisted and require the device to be 157 * The Release type is used to request that offline keys be no longer 175 * to extend the validity period for streaming keys [all...] |
/development/ndk/platforms/android-21/include/media/ |
NdkMediaDrm.h | 62 * This event type indicates that the app needs to request keys from a license 68 * This event type indicates that the licensed usage duration for keys in a session 69 * has expired. The keys are no longer valid. 128 * This key request type species that the keys will be for online use, they will 135 * This key request type specifies that the keys will be for offline use, they 141 * This key request type specifies that previously saved offline keys should be released. 156 * to obtain or release keys used to decrypt encrypted content. 168 * to the sessionId the keys will be provided to. When the keyType is 169 * KEY_TYPE_RELEASE, scope should be set to the keySetId of the keys being released. 170 * Releasing keys from a device invalidates them for all sessions [all...] |
/external/apache-commons-math/src/main/java/org/apache/commons/math/util/ |
OpenIntToDoubleHashMap.java | 70 /** Keys table. */ 71 private int[] keys; field in class:OpenIntToDoubleHashMap 122 keys = new int[capacity]; 134 final int length = source.keys.length; 135 keys = new int[length]; 136 System.arraycopy(source.keys, 0, keys, 0, length); 259 return findInsertionIndex(keys, states, key, mask); 264 * @param keys keys tabl [all...] |
OpenIntToFieldHashMap.java | 76 /** Keys table. */ 77 private int[] keys; field in class:OpenIntToFieldHashMap 133 keys = new int[capacity]; 146 final int length = source.keys.length; 147 keys = new int[length]; 148 System.arraycopy(source.keys, 0, keys, 0, length); 271 return findInsertionIndex(keys, states, key, mask); 276 * @param keys keys tabl [all...] |
/external/python/cpython2/Lib/bsddb/test/ |
test_thread.py | 81 keys=range(self.records) 83 random.shuffle(keys) 104 a=keys[records_per_writer*x:records_per_writer*(x+1)] 125 def writerThread(self, d, keys, readers): 134 count=len(keys)//len(readers) 136 for x in keys : 209 keys=range(self.records) 211 random.shuffle(keys) 232 a=keys[records_per_writer*x:records_per_writer*(x+1)] 253 def writerThread(self, d, keys, readers) [all...] |
/frameworks/av/media/ndk/include/media/ |
NdkMediaDrm.h | 65 * This event type indicates that the app needs to request keys from a license 71 * This event type indicates that the licensed usage duration for keys in a session 72 * has expired. The keys are no longer valid. 131 * This key request type species that the keys will be for online use, they will 138 * This key request type specifies that the keys will be for offline use, they 144 * This key request type specifies that previously saved offline keys should be released. 159 * to obtain or release keys used to decrypt encrypted content. 170 * to the sessionId the keys will be provided to. When the keyType is 171 * KEY_TYPE_RELEASE, scope should be set to the keySetId of the keys being released. 172 * Releasing keys from a device invalidates them for all sessions [all...] |
/prebuilts/gdb/darwin-x86/lib/python2.7/bsddb/test/ |
test_thread.py | 81 keys=range(self.records) 83 random.shuffle(keys) 104 a=keys[records_per_writer*x:records_per_writer*(x+1)] 125 def writerThread(self, d, keys, readers): 134 count=len(keys)//len(readers) 136 for x in keys : 209 keys=range(self.records) 211 random.shuffle(keys) 232 a=keys[records_per_writer*x:records_per_writer*(x+1)] 253 def writerThread(self, d, keys, readers) [all...] |
/prebuilts/gdb/linux-x86/lib/python2.7/bsddb/test/ |
test_thread.py | 81 keys=range(self.records) 83 random.shuffle(keys) 104 a=keys[records_per_writer*x:records_per_writer*(x+1)] 125 def writerThread(self, d, keys, readers): 134 count=len(keys)//len(readers) 136 for x in keys : 209 keys=range(self.records) 211 random.shuffle(keys) 232 a=keys[records_per_writer*x:records_per_writer*(x+1)] 253 def writerThread(self, d, keys, readers) [all...] |
/prebuilts/ndk/r10/platforms/android-21/arch-arm/usr/include/media/ |
NdkMediaDrm.h | 62 * This event type indicates that the app needs to request keys from a license 68 * This event type indicates that the licensed usage duration for keys in a session 69 * has expired. The keys are no longer valid. 128 * This key request type species that the keys will be for online use, they will 135 * This key request type specifies that the keys will be for offline use, they 141 * This key request type specifies that previously saved offline keys should be released. 156 * to obtain or release keys used to decrypt encrypted content. 168 * to the sessionId the keys will be provided to. When the keyType is 169 * KEY_TYPE_RELEASE, scope should be set to the keySetId of the keys being released. 170 * Releasing keys from a device invalidates them for all sessions [all...] |
/prebuilts/ndk/r10/platforms/android-21/arch-arm64/usr/include/media/ |
NdkMediaDrm.h | 62 * This event type indicates that the app needs to request keys from a license 68 * This event type indicates that the licensed usage duration for keys in a session 69 * has expired. The keys are no longer valid. 128 * This key request type species that the keys will be for online use, they will 135 * This key request type specifies that the keys will be for offline use, they 141 * This key request type specifies that previously saved offline keys should be released. 156 * to obtain or release keys used to decrypt encrypted content. 168 * to the sessionId the keys will be provided to. When the keyType is 169 * KEY_TYPE_RELEASE, scope should be set to the keySetId of the keys being released. 170 * Releasing keys from a device invalidates them for all sessions [all...] |
/prebuilts/ndk/r10/platforms/android-21/arch-mips/usr/include/media/ |
NdkMediaDrm.h | 62 * This event type indicates that the app needs to request keys from a license 68 * This event type indicates that the licensed usage duration for keys in a session 69 * has expired. The keys are no longer valid. 128 * This key request type species that the keys will be for online use, they will 135 * This key request type specifies that the keys will be for offline use, they 141 * This key request type specifies that previously saved offline keys should be released. 156 * to obtain or release keys used to decrypt encrypted content. 168 * to the sessionId the keys will be provided to. When the keyType is 169 * KEY_TYPE_RELEASE, scope should be set to the keySetId of the keys being released. 170 * Releasing keys from a device invalidates them for all sessions [all...] |