/external/opencv3/modules/highgui/src/ |
window_carbon.cpp | 62 int signature; member in struct:CvTrackbar 83 int signature; member in struct:CvWindow 544 trackbar->signature = CV_TRACKBAR_MAGIC_VAL; 915 window->signature = CV_WINDOW_MAGIC_VAL;
|
/external/owasp/sanitizer/tools/findbugs/lib/ |
asm-util-3.3.jar | |
/external/smali/smalidea/src/main/java/org/jf/smalidea/debugging/ |
SmaliPositionManager.java | 90 location.method().signature(), (int)location.codeIndex());
|
/external/tcpdump/win32/prj/ |
GNUmakefile | 163 ../../signature.o
|
/external/vboot_reference/firmware/2lib/ |
2misc.c | 44 rv = vb2_validate_gbb_signature(gbb->signature);
|
/external/vboot_reference/tests/ |
vboot_region_tests.c | 74 memcpy(bhdr->signature, BMPBLOCK_SIGNATURE, BMPBLOCK_SIGNATURE_SIZE);
|
/external/vboot_reference/utility/ |
load_kernel_test.c | 6 /* Routines for verifying a file's signature. Useful in testing the core 164 Memcpy(gbb->signature, GBB_SIGNATURE, GBB_SIGNATURE_SIZE);
|
/frameworks/av/media/ndk/ |
NdkMediaDrm.cpp | 649 uint8_t *signature, size_t *signatureSize) { 680 memcpy(signature, signatureVec.array(), signatureVec.size()); 688 const uint8_t *signature, size_t signatureSize) { 714 signatureVec.appendArray(signature, signatureSize);
|
/frameworks/base/core/java/android/util/apk/ |
ApkSignatureSchemeV2Verifier.java | 42 import java.security.Signature; 66 * APK Signature Scheme v2 verifier. 74 * JAR signature scheme but also with APK Signature Scheme v2 or newer. This attribute 75 * facilitates v2 signature stripping detection. 77 * <p>The attribute contains a comma-separated set of signature scheme IDs. 83 * Returns {@code true} if the provided APK contains an APK Signature Scheme V2 signature. 85 * <p><b>NOTE: This method does not verify the signature.</b> 97 * Verifies APK Signature Scheme v2 signatures of the provided APK and returns the certificate 267 ByteBuffer signature = getLengthPrefixedSlice(signatures); local [all...] |
/frameworks/base/keystore/java/android/security/keystore/ |
AndroidKeyStoreKeyPairGeneratorSpi.java | 251 // Authorized to be used with any encryption and signature padding 638 // Failed to generate the self-signed certificate with valid signature. Fall back 639 // to generating a self-signed certificate with a fake signature. This is done for 641 // producing a self-signed certificate with an invalid signature to key pair 668 byte[] signature; 676 signature = new DERSequence().getEncoded(); 681 signature = new byte[1]; [all...] |
/frameworks/base/media/mca/filterfw/jni/ |
jni_util.cpp | 127 jobject CreateJObject(JNIEnv* env, const std::string& class_name, const std::string& signature, T value) {
|
/frameworks/base/services/tests/servicestests/src/com/android/server/ |
NetworkPolicyManagerServiceTest.java | 56 import android.content.pm.Signature; 163 final Signature signature; 165 signature = new Signature("F00D"); 167 signature = new Signature("DEAD"); 169 info.signatures = new Signature[] { signature }; [all...] |
/hardware/intel/bootstub/ |
bootparam.h | 68 __u32 signature; member in struct:ist_info
|
/hardware/qcom/keymaster/ |
keymaster_qcom.cpp | 487 ALOGE("Output signature buffer == NULL"); 574 const uint8_t* signature, const size_t signatureLength) 581 if (signedData == NULL || signature == NULL) { 582 ALOGE("data or signature buffers == NULL"); 594 ALOGE("signed data length must be signature length"); 633 send_cmd->signature = signedDataLength; 636 signature, signatureLength);
|
/prebuilts/gdb/darwin-x86/lib/python2.7/test/ |
test_functools.py | 24 def signature(part): function 25 """ return the signature of a partial object """ 149 f = self.thetype(signature, 'asdf', bar=True) 152 self.assertEqual(signature(f), signature(f_copy))
|
/prebuilts/gdb/linux-x86/lib/python2.7/test/ |
test_functools.py | 24 def signature(part): function 25 """ return the signature of a partial object """ 149 f = self.thetype(signature, 'asdf', bar=True) 152 self.assertEqual(signature(f), signature(f_copy))
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/ |
test_functools.py | 24 def signature(part): function 25 """ return the signature of a partial object """ 149 f = self.thetype(signature, 'asdf', bar=True) 152 self.assertEqual(signature(f), signature(f_copy))
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/ |
test_functools.py | 24 def signature(part): function 25 """ return the signature of a partial object """ 149 f = self.thetype(signature, 'asdf', bar=True) 152 self.assertEqual(signature(f), signature(f_copy))
|
/prebuilts/tools/common/asm-tools/ |
asm-util-4.0.jar | |
/prebuilts/tools/common/m2/repository/asm/asm-util/3.3.1/ |
asm-util-3.3.1.jar | |
/prebuilts/tools/common/m2/repository/org/ow2/asm/asm-util/5.0.1/ |
asm-util-5.0.1.jar | |
/prebuilts/tools/common/m2/repository/org/ow2/asm/asm-util/5.0.3/ |
asm-util-5.0.3.jar | |
/system/core/fs_mgr/ |
fs_mgr_verity.cpp | 119 static int verify_table(const uint8_t *signature, const char *table, 138 signature, 155 if (verify_table(verity.signature, verity.table, 644 SHA256_hash(verity.signature, RSANUMBYTES, curr); 674 /* update current signature hash */ 933 // verify the signature on the table
|
/toolchain/binutils/binutils-2.25/gold/ |
layout.h | 198 // .gnu.linkonce section that will be kept for a given signature. 231 // We need to support copies for the signature map in the Layout 612 const char* signature, 780 // *KEPT_SECTION is set to point to the signature and the function 1016 // The signature. 1017 const char* signature; member in struct:gold::Layout::Group_signature 1020 : section(NULL), signature(NULL) 1024 : section(sectiona), signature(signaturea) [all...] |
/external/boringssl/src/ssl/ |
s3_clnt.c | 1238 uint8_t hash, signature; local 1256 CBS signature; local [all...] |