/art/runtime/mirror/ |
class.h | 68 class Signature; 744 ArtMethod* FindInterfaceMethod(const StringPiece& name, const StringPiece& signature) 747 ArtMethod* FindInterfaceMethod(const StringPiece& name, const Signature& signature) 753 ArtMethod* FindDeclaredDirectMethod(const StringPiece& name, const StringPiece& signature) 756 ArtMethod* FindDeclaredDirectMethod(const StringPiece& name, const Signature& signature) 762 ArtMethod* FindDirectMethod(const StringPiece& name, const StringPiece& signature) 765 ArtMethod* FindDirectMethod(const StringPiece& name, const Signature& signature) [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/x509/ |
x509.h | 245 ASN1_BIT_STRING *signature; member in struct:X509_req_st 253 X509_ALGOR *signature; member in struct:x509_cinf_st 283 ASN1_BIT_STRING *signature; member in struct:x509_st 463 /* actual signature */ 466 ASN1_BIT_STRING *signature; member in struct:X509_crl_st 541 ASN1_BIT_STRING *signature; member in struct:Netscape_spki_st 886 ASN1_BIT_STRING *signature,char *data,EVP_PKEY *pkey); 892 X509_ALGOR *algor2, ASN1_BIT_STRING *signature, 899 ASN1_BIT_STRING *signature,void *data,EVP_PKEY *pkey); 902 ASN1_BIT_STRING *signature, [all...] |
/external/chromium_org/third_party/openssl/openssl/include/openssl/ |
x509.h | 245 ASN1_BIT_STRING *signature; member in struct:X509_req_st 253 X509_ALGOR *signature; member in struct:x509_cinf_st 283 ASN1_BIT_STRING *signature; member in struct:x509_st 463 /* actual signature */ 466 ASN1_BIT_STRING *signature; member in struct:X509_crl_st 541 ASN1_BIT_STRING *signature; member in struct:Netscape_spki_st 886 ASN1_BIT_STRING *signature,char *data,EVP_PKEY *pkey); 892 X509_ALGOR *algor2, ASN1_BIT_STRING *signature, 899 ASN1_BIT_STRING *signature,void *data,EVP_PKEY *pkey); 902 ASN1_BIT_STRING *signature, [all...] |
/external/openssl/crypto/x509/ |
x509.h | 245 ASN1_BIT_STRING *signature; member in struct:X509_req_st 253 X509_ALGOR *signature; member in struct:x509_cinf_st 283 ASN1_BIT_STRING *signature; member in struct:x509_st 463 /* actual signature */ 466 ASN1_BIT_STRING *signature; member in struct:X509_crl_st 541 ASN1_BIT_STRING *signature; member in struct:Netscape_spki_st 886 ASN1_BIT_STRING *signature,char *data,EVP_PKEY *pkey); 892 X509_ALGOR *algor2, ASN1_BIT_STRING *signature, 899 ASN1_BIT_STRING *signature,void *data,EVP_PKEY *pkey); 902 ASN1_BIT_STRING *signature, [all...] |
/external/openssl/include/openssl/ |
x509.h | 245 ASN1_BIT_STRING *signature; member in struct:X509_req_st 253 X509_ALGOR *signature; member in struct:x509_cinf_st 283 ASN1_BIT_STRING *signature; member in struct:x509_st 463 /* actual signature */ 466 ASN1_BIT_STRING *signature; member in struct:X509_crl_st 541 ASN1_BIT_STRING *signature; member in struct:Netscape_spki_st 886 ASN1_BIT_STRING *signature,char *data,EVP_PKEY *pkey); 892 X509_ALGOR *algor2, ASN1_BIT_STRING *signature, 899 ASN1_BIT_STRING *signature,void *data,EVP_PKEY *pkey); 902 ASN1_BIT_STRING *signature, [all...] |
/external/qemu/android/ |
sdk-controller-socket.c | 104 /* Packet signature value ('SDKC'). */ 113 /* Signature. */ 114 int signature; member in struct:SDKCtlPacketHeader 629 packet->header.signature = _sdkctl_packet_sig; 737 assert(packet->header.signature == _sdkctl_packet_sig); 872 assert(packet->packet->signature == _sdkctl_packet_sig); 940 msg_header->packet.signature = _sdkctl_packet_sig; [all...] |
/frameworks/testing/espresso/libs/ |
jarjar-1.4.jar | |
/dalvik/dx/src/com/android/dx/cf/direct/ |
StdAttributeFactory.java | 104 return signature(cf, offset, length, observer); 127 return signature(cf, offset, length, observer); 166 return signature(cf, offset, length, observer); 578 CstString signature = null; local 581 signature = type; 587 descriptor, signature, index); 673 * Parses a {@code Signature} attribute. 675 private Attribute signature(DirectClassFile cf, int offset, int length, method in class:StdAttributeFactory 688 observer.parsed(bytes, offset, 2, "signature: " + cst);
|
/external/chromium_org/components/autofill/core/browser/ |
form_structure.cc | 47 const char kAttributeSignature[] = "signature"; 359 // signature. This is a requirement for Autofill servers. 516 std::string signature((*it)->FormSignature()); 517 if (processed_forms.find(signature) != processed_forms.end()) 519 processed_forms.insert(signature); 523 signature); local 530 encoded_signatures->push_back(signature); 636 form.signature = form_structure->FormSignature(); 644 annotated_field.signature = (*field)->FieldSignature(); 750 // The form signature should match between query and upload requests to th [all...] |
/external/chromium_org/net/disk_cache/blockfile/ |
sparse_control.cc | 40 // Returns the name of a child entry given the base_name and signature of the 43 // like Range_entry_name:XXX:YYY where XXX is the entry signature and YYY is the 45 std::string GenerateChildName(const std::string& base_name, int64 signature, 48 signature, child_id); 95 signature_ = data->header.signature; 379 sparse_header_.signature = Time::Now().ToInternalValue(); 475 // Read signature. 481 if (child_data_.header.signature != sparse_header_.signature || 509 return GenerateChildName(entry_->GetKey(), sparse_header_.signature, [all...] |
sparse_control_v3.cc | 40 // Returns the name of a child entry given the base_name and signature of the 43 // like Range_entry_name:XXX:YYY where XXX is the entry signature and YYY is the 45 std::string GenerateChildName(const std::string& base_name, int64 signature, 48 signature, child_id); 95 signature_ = data->header.signature; 381 sparse_header_.signature = Time::Now().ToInternalValue(); 477 // Read signature. 483 if (child_data_.header.signature != sparse_header_.signature || 527 // Write signature [all...] |
/dalvik/dexgen/src/com/android/dexgen/dex/code/ |
OutputFinisher.java | 192 CstUtf8 signature = local.getSignature(); local 203 if (signature != null) { 204 result.add(signature);
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/ |
SignerInformation.java | 48 private byte[] signature; field in class:SignerInformation 86 this.signature = info.getEncryptedDigest().getOctets(); 133 * return the object identifier for the signature. 141 * return the signature parameters, or null if there aren't any. 169 * return the object identifier for the signature. 177 * return the signature/encryption algorithm parameters, or null if 221 * return the encoded signature 225 return Arrays.clone(signature); 368 throw new CMSException("data not encapsulated in signature - use detached constructor."); 392 throw new CMSException("can't process mime object to create signature.", e) [all...] |
/external/dexmaker/src/dx/java/com/android/dx/dex/code/ |
OutputFinisher.java | 201 CstString signature = local.getSignature(); local 212 if (signature != null) { 213 result.add(signature);
|
/external/mockito/cglib-and-asm/src/org/mockito/asm/ |
ClassReader.java | 456 String signature;
local 500 signature = null;
524 } else if (SIGNATURES && "Signature".equals(attrName)) {
525 signature = readUTF8(v + 6, c);
556 signature,
623 signature = null;
636 } else if (SIGNATURES && "Signature".equals(attrName)) {
637 signature = readUTF8(u + 6, c);
665 signature,
702 signature = null; [all...] |
/frameworks/opt/net/wifi/service/jni/ |
jni_helper.cpp | 383 void reportEvent(JNIEnv *env, jclass cls, const char *method, const char *signature, ...) 386 va_start(params, signature); 388 jmethodID methodID = env->GetStaticMethodID(cls, method, signature);
|
/hardware/samsung_slsi/exynos5/libkeymaster/ |
keymaster_mobicore.cpp | 342 ALOGE("output signature buffer == NULL"); 383 const uint8_t* signature, const size_t signatureLength) { 387 if (signedData == NULL || signature == NULL) { 388 ALOGE("data or signature buffers == NULL"); 400 ALOGE("signed data length must be signature length"); 407 memcpy(tmpSig, signature, signatureLength);
|
/system/keymaster/ |
google_keymaster_messages.cpp | 203 return sizeof(op_handle) + signature.SerializedSize(); 208 return signature.Serialize(buf, end); 212 return copy_uint64_from_buf(buf_ptr, end, &op_handle) && signature.Deserialize(buf_ptr, end);
|
google_keymaster_messages_test.cpp | 227 msg.signature.Reinitialize("bar", 3); 231 EXPECT_EQ(3U, deserialized->signature.available_read()); 232 EXPECT_EQ(0, memcmp(deserialized->signature.peek_read(), "bar", 3));
|
/development/ndk/platforms/android-3/include/linux/ |
msdos_fs.h | 140 __u8 signature; member in struct:fat_boot_bsx
|
/development/ndk/platforms/android-L/include/linux/ |
msdos_fs.h | 160 __u8 signature; member in struct:fat_boot_bsx
|
/external/chromium_org/chrome/browser/chromeos/attestation/ |
platform_verification_flow.h | 120 // nonce) and |signature| holds the RSA-PKCS1-v1.5 signature. The 122 // signature. This key may be generated on demand and is not guaranteed to 124 // the validity of |signature| or |platform_key_certificate|. 127 const std::string& signature,
|
/external/chromium_org/chrome/browser/chromeos/platform_keys/ |
platform_keys_nss.cc | 162 CallBack(from, std::string() /* no signature */, error_message); 166 const std::string& signature, 169 from, base::Bind(callback_, signature, error_message)); 369 std::string signature(reinterpret_cast<const char*>(sign_result.data), 371 state->CallBack(FROM_HERE, signature, std::string() /* no error */);
|
/external/chromium_org/chrome/browser/extensions/api/cast_channel/ |
cast_message_util.cc | 113 out += "response: {signature: ("; 114 out += base::UintToString(message.response().signature().length());
|
/external/chromium_org/chrome/browser/extensions/ |
install_verifier.cc | 216 DVLOG(1) << "Init - ignoring invalid signature"; 380 // If we don't have a signature yet, we'll temporarily consider every 607 scoped_ptr<InstallSignature> signature) { 613 if (!signature.get()) { 615 } else if (!InstallSigner::VerifySignature(*signature)) { 628 signature_ = signature.Pass();
|