/cts/tools/signature-tools/src/signature/io/ |
IApiLoader.java | 17 package signature.io; 22 import signature.converter.Visibility; 23 import signature.model.IApi;
|
/cts/tools/signature-tools/test/signature/converter/ |
ConvertWildcardTest.java | 17 package signature.converter; 24 import signature.converter.util.AbstractConvertTest; 25 import signature.converter.util.CompilationUnit; 26 import signature.model.IApi; 27 import signature.model.IClassDefinition; 28 import signature.model.IClassReference; 29 import signature.model.IField; 30 import signature.model.IPackage; 31 import signature.model.IParameterizedType; 32 import signature.model.ITypeReference [all...] |
/dalvik/dx/tests/026-field-attrib-Signature/ |
expected.txt | 13 0005: utf8{"Signature"} 31 name: Signature 33 signature: string{"LYo;"}
|
/dalvik/dx/tests/027-method-attrib-Signature/ |
expected.txt | 15 0007: utf8{"Signature"} 32 name: Signature 34 signature: string{"LYo;"}
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/ |
Signer.java | 27 * generate a signature for the message we've been loaded with using 34 * return true if the internal state represents the signature described 37 public boolean verifySignature(byte[] signature);
|
/external/chromium_org/chromeos/network/onc/ |
onc_mapper.h | 25 // iterates over both the ONC signature and the object hierarchy. DCHECKs if a 26 // field signature without value signature or an array signature without entry 27 // signature is reached. 31 // address of a signature object to the list of signatures in "onc_signature.h", 32 // accurate signature-specific translations or validations can be applied in the 46 virtual scoped_ptr<base::Value> MapValue(const OncValueSignature& signature, 55 const OncValueSignature& signature, 63 const OncValueSignature& signature, [all...] |
/external/chromium_org/net/cert/ |
sct_status_flags.h | 18 // The SCT is from an unknown log, so we cannot verify its signature. 21 // The SCT is from a known log, but the signature is invalid. 24 // The SCT is from a known log, and the signature is valid.
|
/cts/tools/signature-tools/src/signature/compare/model/subst/ |
ParameterizedTypeProjection.java | 17 package signature.compare.model.subst; 19 import signature.model.IClassReference; 20 import signature.model.IParameterizedType; 21 import signature.model.ITypeReference; 22 import signature.model.ITypeVariableDefinition; 23 import signature.model.impl.SigParameterizedType;
|
ViewpointAdapter.java | 17 package signature.compare.model.subst; 19 import signature.model.IArrayType; 20 import signature.model.IClassDefinition; 21 import signature.model.IClassReference; 22 import signature.model.IParameterizedType; 23 import signature.model.IPrimitiveType; 24 import signature.model.ITypeReference; 25 import signature.model.ITypeVariableDefinition; 26 import signature.model.ITypeVariableReference; 27 import signature.model.IWildcardType [all...] |
/external/chromium_org/net/quic/crypto/ |
proof_source.h | 22 // point to it (in leaf-first order), calculates a signature of 25 // The signature uses SHA-256 as the hash function and PSS padding when the 28 // The signature uses SHA-256 as the hash function when the key is ECDSA. 30 // If |ecdsa_ok| is true, the signature may use an ECDSA key. Otherwise, the 31 // signature must use an RSA key. 39 // The signature values should be cached because |server_config| will be
|
/external/elfutils/libasm/ |
asm_scngrp_newsignature.c | 1 /* Update signature of section group. 35 asm_scngrp_newsignature (grp, signature) 37 AsmSym_t *signature; 39 if (grp == NULL || signature == NULL) 42 grp->signature = signature;
|
/external/jmonkeyengine/engine/src/bullet-native/ |
com_jme3_bullet_joints_SixDofSpringJoint.cpp | 15 * Signature: (JIZ)V 27 * Signature: (JIF)V 38 * Signature: (JIF)V 49 * Signature: (JIF)V 60 * Signature: (JI)V 74 * Signature: (JJLcom/jme3/math/Vector3f;Lcom/jme3/math/Matrix3f;Lcom/jme3/math/Vector3f;Lcom/jme3/math/Matrix3f;Z)J
|
/packages/apps/Nfc/src/com/android/nfc/ |
NfceeAccessControl.java | 36 import android.content.pm.Signature; 50 * with this signature is allowed. 52 final HashMap<Signature, String[]> mNfceeAccess; // contents final after onCreate() 67 mNfceeAccess = new HashMap<Signature, String[]>(); 138 for (Signature s : info.signatures){ 161 Log.w(TAG, "denied NFCEE access for " + pkg + " with signature:"); 162 for (Signature s : info.signatures) { 193 Signature signature = null; local 199 signature = null [all...] |
/cts/tools/signature-tools/src/signature/converter/dex/ |
GenericSignatureParser.java | 17 package signature.converter.dex; 19 import static signature.converter.dex.DexUtil.getClassName; 20 import static signature.converter.dex.DexUtil.getPackageName; 21 import signature.model.IClassDefinition; 22 import signature.model.IClassReference; 23 import signature.model.IConstructor; 24 import signature.model.IGenericDeclaration; 25 import signature.model.IMethod; 26 import signature.model.ITypeReference; 27 import signature.model.ITypeVariableDefinition [all...] |
/external/chromium_org/components/nacl/loader/ |
nacl_validation_db.h | 19 virtual bool QueryKnownToValidate(const std::string& signature) = 0; 20 virtual void SetKnownToValidate(const std::string& signature) = 0;
|
/external/chromium_org/crypto/ |
signature_creator_unittest.cc | 44 std::vector<uint8> signature; local 45 ASSERT_TRUE(signer->Final(&signature)); 53 &signature.front(), signature.size(), 76 std::vector<uint8> signature; local 81 &signature)); 90 &signature.front(), signature.size(),
|
signature_verifier_nss.cc | 36 const unsigned char* signature, 49 const_cast<unsigned char*>(signature), 78 const uint8* signature, 85 signature_.assign(signature, signature + signature_len); 115 sig.data = const_cast<uint8*>(signature); 124 // A corrupted RSA signature could be detected without the data, so 141 const uint8* signature, 148 signature_.assign(signature, signature + signature_len) [all...] |
/external/clang/test/SemaObjC/ |
objc-literal-sig.m | 43 (void)@__objc_yes; // expected-error{{literal construction method 'numberWithBool:' has incompatible signature}} 44 (void)@__objc_yes; // expected-error{{literal construction method 'numberWithBool:' has incompatible signature}} 45 id array = @[ @17 ]; // expected-error{{literal construction method 'arrayWithObjects:count:' has incompatible signature}} 46 id array2 = @[ @17 ]; // expected-error{{literal construction method 'arrayWithObjects:count:' has incompatible signature}} 47 id dict = @{ @"hello" : @17 }; // expected-error{{literal construction method 'dictionaryWithObjects:forKeys:count:' has incompatible signature}} 48 id dict2 = @{ @"hello" : @17 }; // expected-error{{literal construction method 'dictionaryWithObjects:forKeys:count:' has incompatible signature}} 49 id str = @("hello"); // expected-error{{literal construction method 'stringWithUTF8String:' has incompatible signature}} 50 id str2 = @("hello"); // expected-error{{literal construction method 'stringWithUTF8String:' has incompatible signature}}
|
/external/smack/src/org/xbill/DNS/ |
SIGBase.java | 25 protected byte [] signature; field in class:SIGBase 33 byte [] signature) 48 this.signature = signature; 61 signature = in.readByteArray(); 80 signature = st.getBase64(); 106 sb.append(base64.formatString(signature, 64, "\t", 110 sb.append(base64.toString(signature)); 115 /** Returns the RRset type covered by this signature */ 122 * Returns the cryptographic algorithm of the key that generated the signature [all...] |
/frameworks/base/tests/Camera2Tests/SmartCamera/SimpleCamera/src/androidx/media/filterfw/ |
Signature.java | 26 * A Signature holds the specification for a filter's input and output ports. 28 * A Signature instance must be returned by the filter's {@link Filter#getSignature()} method. It 30 * are required, how data for those ports are accessed, and more. A Signature does not change over 38 * If ports other than the ones in the Signature are allowed, they default to the most generic 40 * a frame's data, it must be specified in the Signature. 42 public class Signature { 80 * Creates a new empty Signature. 82 public Signature() { 86 * Adds an input port to the Signature. 91 * @return this Signature instance [all...] |
/external/apache-harmony/support/src/test/java/tests/support/ |
Support_TestProvider.java | 91 // Signature algorithm 92 put("Signature.SHA1withDSA", 96 put("Alg.Alias.Signature.DSA", "SHA1withDSA"); 97 put("Alg.Alias.Signature.DSS", "SHA1withDSA"); 98 put("Alg.Alias.Signature.SHA/DSA", "SHA1withDSA"); 99 put("Alg.Alias.Signature.SHA1/DSA", "SHA1withDSA"); 100 put("Alg.Alias.Signature.SHA-1/DSA", "SHA1withDSA"); 101 put("Alg.Alias.Signature.SHAwithDSA", "SHA1withDSA"); 102 put("Alg.Alias.Signature.DSAwithSHA1", "SHA1withDSA"); 103 put("Alg.Alias.Signature.DSAWithSHA1", "SHA1withDSA") [all...] |
/libcore/support/src/test/java/tests/support/ |
Support_TestProvider.java | 91 // Signature algorithm 92 put("Signature.SHA1withDSA", 96 put("Alg.Alias.Signature.DSA", "SHA1withDSA"); 97 put("Alg.Alias.Signature.DSS", "SHA1withDSA"); 98 put("Alg.Alias.Signature.SHA/DSA", "SHA1withDSA"); 99 put("Alg.Alias.Signature.SHA1/DSA", "SHA1withDSA"); 100 put("Alg.Alias.Signature.SHA-1/DSA", "SHA1withDSA"); 101 put("Alg.Alias.Signature.SHAwithDSA", "SHA1withDSA"); 102 put("Alg.Alias.Signature.DSAwithSHA1", "SHA1withDSA"); 103 put("Alg.Alias.Signature.DSAWithSHA1", "SHA1withDSA") [all...] |
/cts/tools/signature-tools/src/signature/compare/model/impl/ |
SigAnnotationDelta.java | 17 package signature.compare.model.impl; 21 import signature.compare.model.IAnnotationDelta; 22 import signature.compare.model.IAnnotationElementDelta; 23 import signature.model.IAnnotation;
|
SigAnnotationElementDelta.java | 17 package signature.compare.model.impl; 19 import signature.compare.model.IAnnotationElementDelta; 20 import signature.compare.model.IValueDelta; 21 import signature.model.IAnnotationElement;
|
SigAnnotationFieldDelta.java | 17 package signature.compare.model.impl; 19 import signature.compare.model.IAnnotationFieldDelta; 20 import signature.compare.model.IValueDelta; 21 import signature.model.IAnnotationField;
|