/frameworks/native/libs/input/ |
H A D | KeyCharacterMap.cpp | 98 mKeys.add(other.mKeys.keyAt(i), new Key(*other.mKeys.valueAt(i))); 104 Key* key = mKeys.editValueAt(i); 177 Key* key = overlay->mKeys.valueAt(i); 181 map->mKeys.editValueAt(oldIndex) = new Key(*key); 183 map->mKeys.add(keyCode, new Key(*key)); 209 const Key* key; 221 const Key* key; 233 const Key* key; 250 const Key* key; 271 const Key* ke 685 KeyCharacterMap::Key::Key() : function in class:android::KeyCharacterMap::Key 689 KeyCharacterMap::Key::Key(const Key& other) : function in class:android::KeyCharacterMap::Key [all...] |
/frameworks/base/core/java/android/security/keystore/recovery/ |
H A D | RecoverySession.java | 28 import java.security.Key; 182 * @param applicationKeys Application keys. Key material can be decrypted using recoveryKeyBlob 190 @NonNull public Map<String, Key> recoverKeyChainSnapshot( 212 /** Given a map from alias to grant alias, returns a map from alias to a {@link Key} handle. */ 213 private @NonNull Map<String, Key> getKeysFromGrants(@NonNull Map<String, String> grantAliases) 215 ArrayMap<String, Key> keysByAlias = new ArrayMap<>(grantAliases.size()); 218 Key key;
|
H A D | RecoveryController.java | 35 import java.security.Key; 96 * Cloud Key Vault Service whitepaper</a>. The trusted hardware module itself must protect the key 114 * Recovery Key. 115 * <li>Wraps the key material of all keys in the recoverable key chain with the Recovery Key. 116 * <li>Encrypts the Recovery Key with both the public key of the trusted hardware module and a 136 * X509 certificate identifying the trusted hardware module in which the encrypted Recovery Key is 137 * stored. It also returns some vault parameters identifying that particular Recovery Key to the 149 * <li>The vault parameters used to identify the Recovery Key to the trusted hardware module. 160 * its responses. This is the Session Key. 163 * layers of lock-screen encryption from the Recovery Key [all...] |
/frameworks/base/keystore/java/android/security/keystore/ |
H A D | AndroidKeyStoreHmacSpi.java | 28 import java.security.Key; 94 protected void engineInit(Key key, AlgorithmParameterSpec params) throws InvalidKeyException, 110 private void init(Key key, AlgorithmParameterSpec params) throws InvalidKeyException, 116 "Only Android KeyStore secret keys supported. Key: " + key);
|
H A D | AndroidKeyStoreCipherSpiBase.java | 38 import java.security.Key; 100 protected final void engineInit(int opmode, Key key, SecureRandom random) 122 protected final void engineInit(int opmode, Key key, AlgorithmParameters params, 140 protected final void engineInit(int opmode, Key key, AlgorithmParameterSpec params, 157 private void init(int opmode, Key key, SecureRandom random) throws InvalidKeyException { 582 protected final byte[] engineWrap(Key key) 663 protected final Key engineUnwrap(byte[] wrappedKey, String wrappedKeyAlgorithm, 734 protected final int engineGetKeySize(Key key) throws InvalidKeyException { 823 protected abstract void initKey(int opmode, @Nullable Key key) throws InvalidKeyException;
|
H A D | AndroidKeyStore3DESCipherSpi.java | 25 import java.security.Key; 100 protected void initKey(int i, Key key) throws InvalidKeyException {
|
/frameworks/compile/mclinker/lib/LD/ |
H A D | BranchIsland.cpp | 87 Key key(pPrototype, pReloc.symInfo()->outSymbol(), pReloc.addend()); 101 Key key(pPrototype, pReloc.symInfo()->outSymbol(), pReloc.addend()); 128 Key key(&pStub, pStub.symInfo()->outSymbol(), 0);
|
/frameworks/base/services/backup/java/com/android/server/backup/utils/ |
H A D | PasswordUtils.java | 23 import java.security.Key; 118 Key checksum = buildCharArrayKey(algorithm, mkAsChar, salt, rounds);
|
/frameworks/base/services/core/jni/ |
H A D | com_android_server_tv_TvKeys.h | 11 struct Key { struct in namespace:android 17 static Key KEYS[] = {
|
/frameworks/layoutlib/remote/common/src/com/android/layout/remote/api/ |
H A D | RemoteLayoutlibCallback.java | 24 import com.android.ide.common.rendering.api.SessionParams.Key; 62 <T> T getFlag(Key<T> key) throws RemoteException;
|
/frameworks/base/media/tests/MediaFrameworkTest/src/com/android/mediaframeworktest/unit/ |
H A D | CameraMetadataTest.java | 336 Key<T> key = new Key<T>(keyStr, typeToken); 373 private <T> Key<T> checkKeyMarshal(String keyName, TypeReference<T> typeReference, 375 Key<T> key = new Key<T>(keyName, typeReference); 417 private <T> Key<T> checkKeyMarshal(String keyName, T expected, byte[] expectedNative) { 613 Key<AvailableFormat[]> availableFormatsKey = 614 new Key<AvailableFormat[]>("android.scaler.availableFormats", 904 Key<ReprocessFormatsMap> key = new Key<ReprocessFormatsMa [all...] |
/frameworks/base/media/tests/MediaFrameworkTest/src/com/android/mediaframeworktest/helpers/ |
H A D | CameraErrorCollector.java | 641 CameraCharacteristics.Key<T> key) { 645 addMessage("Key " + key.getName() + " shouldn't be null"); 660 CaptureRequest.Key<T> key) { 664 addMessage("Key " + key.getName() + " shouldn't be null"); 677 public <T> T expectKeyValueNotNull(Builder request, CaptureRequest.Key<T> key) { 681 addMessage("Key " + key.getName() + " shouldn't be null"); 694 public <T> T expectKeyValueNotNull(CaptureResult result, CaptureResult.Key<T> key) { 706 public <T> T expectKeyValueNotNull(String msg, CaptureResult result, CaptureResult.Key<T> key) { 710 addMessage(msg + " Key " + key.getName() + " shouldn't be null"); 724 Builder request, CaptureRequest.Key< [all...] |
/frameworks/base/core/java/android/inputmethodservice/ |
H A D | KeyboardView.java | 29 import android.inputmethodservice.Keyboard.Key; 158 private Map<Key,View> mMiniKeyboardCache; 159 private Key[] mKeys; 208 private Key mInvalidatedKey; 349 mMiniKeyboardCache = new HashMap<Key,View>(); 476 List<Key> keys = mKeyboard.getKeys(); 477 mKeys = keys.toArray(new Key[keys.size()]); 617 final Key[] keys = mKeys; 622 Key key = keys[i]; 675 final Key[] key [all...] |
/frameworks/base/core/java/android/hardware/camera2/legacy/ |
H A D | LegacyMetadataMapper.java | 751 Key<?> availableKeys[] = new Key<?>[] { 790 List<Key<?>> characteristicsKeys = new ArrayList<>(Arrays.asList(availableKeys)); 800 getTagsForKeys(characteristicsKeys.toArray(new Key<?>[0]))); 807 CaptureRequest.Key<?> defaultAvailableKeys[] = new CaptureRequest.Key<?>[] { 836 ArrayList<CaptureRequest.Key<?>> availableKeys = 837 new ArrayList<CaptureRequest.Key<?>>(Arrays.asList(defaultAvailableKeys)); 846 CaptureRequest.Key<?> availableRequestKeys[] = 847 new CaptureRequest.Key< [all...] |
/frameworks/base/packages/SystemUI/src/com/android/systemui/qs/tiles/ |
H A D | DataSaverTile.java | 63 || Prefs.getBoolean(mContext, Prefs.Key.QS_DATA_SAVER_DIALOG_SHOWN, false)) { 77 Prefs.putBoolean(mContext, Prefs.Key.QS_DATA_SAVER_DIALOG_SHOWN, true);
|
H A D | DndTile.java | 102 Prefs.putBoolean(context, Prefs.Key.DND_TILE_VISIBLE, visible); 106 return Prefs.getBoolean(context, Prefs.Key.DND_TILE_VISIBLE, false /* defaultValue */); 110 Prefs.putBoolean(context, Prefs.Key.DND_TILE_COMBINED_ICON, combined); 114 return Prefs.getBoolean(context, Prefs.Key.DND_TILE_COMBINED_ICON, 298 @Prefs.Key String key) { 299 if (Prefs.Key.DND_TILE_COMBINED_ICON.equals(key) || 300 Prefs.Key.DND_TILE_VISIBLE.equals(key)) {
|
/frameworks/base/packages/SystemUI/src/com/android/systemui/statusbar/phone/ |
H A D | MultiUserSwitch.java | 34 import com.android.systemui.Prefs.Key; 80 && Prefs.getBoolean(getContext(), Key.SEEN_MULTI_USER, false);
|
/frameworks/layoutlib/remote/client/src/com/android/layoutlib/bridge/remote/client/adapters/ |
H A D | RemoteLayoutlibCallbackAdapter.java | 24 import com.android.ide.common.rendering.api.SessionParams.Key; 121 public <T> T getFlag(Key<T> key) {
|
H A D | RemoteRenderParamsAdapter.java | 22 import com.android.ide.common.rendering.api.SessionParams.Key; 158 public <T> T getFlag(Key<T> key) {
|
H A D | RemoteSessionParamsAdapter.java | 23 import com.android.ide.common.rendering.api.SessionParams.Key;
|
/frameworks/base/packages/SystemUI/src/com/android/systemui/qs/ |
H A D | QSTileRevealController.java | 3 import static com.android.systemui.Prefs.Key.QS_TILE_SPECS_REVEALED;
|
/frameworks/ex/camera2/public/src/com/android/ex/camera2/pos/ |
H A D | AutoFocusStateMachine.java | 19 import android.hardware.camera2.CaptureResult.Key; 113 Key<Integer> keyAfState = CaptureResult.CONTROL_AF_STATE; 120 Key<Integer> keyAfMode = CaptureResult.CONTROL_AF_MODE;
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/ |
H A D | WifiKeyStore.java | 30 import java.security.Key; 67 private static boolean isHardwareBackedKey(Key key) { 202 public boolean putKeyInKeyStore(String name, Key key) {
|
/frameworks/native/libs/vr/libpdx/private/pdx/rpc/ |
H A D | serialization.h | 265 template <typename Key, typename T, typename Compare, typename Allocator> 267 const std::map<Key, T, Compare, Allocator>& m); 268 template <typename Key, typename T, typename Hash, typename KeyEqual, 271 const std::unordered_map<Key, T, Hash, KeyEqual, Allocator>&); 354 template <typename Key, typename T, typename Compare, typename Allocator> 356 const std::map<Key, T, Compare, Allocator>& v) { 359 [](const std::size_t& sum, const std::pair<Key, T>& object) { 366 template <typename Key, typename T, typename Hash, typename KeyEqual, 369 const std::unordered_map<Key, T, Hash, KeyEqual, Allocator>& v) { 372 [](const std::size_t& sum, const std::pair<Key, [all...] |
/frameworks/av/drm/mediadrm/plugins/clearkey/default/tests/ |
H A D | AesCtrDecryptorUnittest.cpp | 31 typedef uint8_t Key[kBlockSize]; typedef in class:clearkeydrm::AesCtrDecryptorTest 33 status_t attemptDecrypt(const Key& key, const Iv& iv, const uint8_t* source, 45 void attemptDecryptExpectingSuccess(const Key& key, const Iv& iv, 126 Key key = { 171 Key key = { 217 Key key = { 263 Key key = { 312 Key key = { 366 Key key = { 421 Key ke [all...] |