HomeSort by relevance Sort by last modified time
    Searched refs:signature (Results 426 - 450 of 2070) sorted by null

<<11121314151617181920>>

  /external/glide/library/src/main/java/com/bumptech/glide/
RequestManager.java 21 import com.bumptech.glide.signature.ApplicationVersionSignature;
22 import com.bumptech.glide.signature.MediaStoreSignature;
23 import com.bumptech.glide.signature.StringSignature;
225 * signature.
237 * Returns a request builder that loads data from {@link String}s using an empty signature.
243 * {@link com.bumptech.glide.GenericRequestBuilder#signature(com.bumptech.glide.load.Key)} to mixin a signature
270 * Returns a request builder to load data from {@link android.net.Uri}s using no signature.
276 * {@link com.bumptech.glide.GenericRequestBuilder#signature(com.bumptech.glide.load.Key)} to mixin a signature
317 Key signature = new MediaStoreSignature(mimeType, dateModified, orientation); local
    [all...]
  /external/libweave/src/privet/
security_manager_unittest.cc 89 void PairAndAuthenticate(std::string* fingerprint, std::string* signature) {
105 fingerprint, signature, nullptr));
107 EXPECT_TRUE(IsBase64(*signature));
180 std::string signature; local
183 security_.ConfirmPairing("123", "345", &fingerprint, &signature, &error));
225 std::string fingerprint, signature; local
229 &fingerprint, &signature, nullptr);
285 std::string signature; local
286 PairAndAuthenticate(&fingerprint, &signature);
  /external/proguard/src/proguard/optimize/evaluation/
SimpleEnumDescriptorSimplifier.java 199 // Simplify the signature.
213 // Simplify the code, the signature, and the parameter annotations,
290 // Update the signature if it has any simple enum classes.
291 String signature = signatureAttribute.getSignature(clazz); local
292 String newSignature = simplifyDescriptor(signature,
295 if (!signature.equals(newSignature))
297 // Update the signature.
310 // Compute the new signature.
311 String signature = signatureAttribute.getSignature(clazz); local
312 String newSignature = simplifyDescriptor(signature,
353 String signature = localVariableTypeInfo.getSignature(clazz); local
    [all...]
  /developers/build/prebuilts/gradle/BasicAndroidKeyStore/Application/src/main/java/com/example/android/basicandroidkeystore/
BasicAndroidKeyStoreFragment.java 38 import java.security.Signature;
55 // Some sample data to sign, and later verify using the generated signature.
58 // Just a handy place to store the signature in between signing and verifying.
108 Log.w(TAG, "Invalid Signature", e);
114 Log.d(TAG, "Signature: " + mSignatureStr);
136 Log.w(TAG, "Invalid Signature", e);
139 Log.d(TAG, "Data Signature Verified");
195 * Signs the data using the key pair stored in the Android Key Store. This signature can be
197 * @return A string encoding of the data signature generated
240 // This class doesn't actually represent the signature,
    [all...]
  /developers/samples/android/security/keystore/BasicAndroidKeyStore/Application/src/main/java/com/example/android/basicandroidkeystore/
BasicAndroidKeyStoreFragment.java 38 import java.security.Signature;
55 // Some sample data to sign, and later verify using the generated signature.
58 // Just a handy place to store the signature in between signing and verifying.
108 Log.w(TAG, "Invalid Signature", e);
114 Log.d(TAG, "Signature: " + mSignatureStr);
136 Log.w(TAG, "Invalid Signature", e);
139 Log.d(TAG, "Data Signature Verified");
195 * Signs the data using the key pair stored in the Android Key Store. This signature can be
197 * @return A string encoding of the data signature generated
240 // This class doesn't actually represent the signature,
    [all...]
  /development/samples/browseable/BasicAndroidKeyStore/src/com.example.android.basicandroidkeystore/
BasicAndroidKeyStoreFragment.java 38 import java.security.Signature;
55 // Some sample data to sign, and later verify using the generated signature.
58 // Just a handy place to store the signature in between signing and verifying.
108 Log.w(TAG, "Invalid Signature", e);
114 Log.d(TAG, "Signature: " + mSignatureStr);
136 Log.w(TAG, "Invalid Signature", e);
139 Log.d(TAG, "Data Signature Verified");
195 * Signs the data using the key pair stored in the Android Key Store. This signature can be
197 * @return A string encoding of the data signature generated
240 // This class doesn't actually represent the signature,
    [all...]
  /external/apache-harmony/jdwp/src/test/java/org/apache/harmony/jpda/tests/jdwp/StackFrame/
JDWPStackFrameTestCase.java 63 String signature, name; field in class:JDWPStackFrameTestCase.VarInfo
66 public VarInfo(String name, int slot, String signature) {
68 this.signature = signature;
77 return signature;
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/
X509V2AttributeCertificate.java 11 import java.security.Signature;
176 Signature signature = null; local
180 throw new CertificateException("Signature algorithm in certificate info not same as outer certificate");
183 signature = Signature.getInstance(cert.getSignatureAlgorithm().getAlgorithm().getId(), provider);
185 signature.initVerify(key);
189 signature.update(cert.getAcinfo().getEncoded());
196 if (!signature.verify(this.getSignature()))
198 throw new InvalidKeyException("Public key presented not for certificate signature");
    [all...]
  /external/glide/library/src/main/java/com/bumptech/glide/load/resource/gif/
GifFrameManager.java 32 private final FrameSignature signature; field in class:GifFrameManager
55 this.signature = new FrameSignature();
65 .signature(signature)
92 // Use an incrementing signature to make sure we never hit an active resource that matches one of our frames.
93 signature.increment();
  /frameworks/base/keystore/java/android/security/keystore/
AndroidKeyStoreSignatureSpiBase.java 136 * Configures this signature instance to use the provided key.
321 byte[] signature;
328 signature = mMessageStreamer.doFinal(
330 null, // no signature provided -- it'll be generated by this invocation
337 return signature;
341 protected final boolean engineVerify(byte[] signature) throws SignatureException {
356 signature,
361 "Signature verification unexpected produced output: " + output.length
403 * Returns {@code true} if this signature is initialized for signing, {@code false} if this
404 * signature is initialized for verification
    [all...]
  /system/keymaster/
ecdsa_operation.cpp 139 const Buffer& input, const Buffer& /* signature */,
162 if (EVP_DigestSignFinal(&digest_ctx_, nullptr /* signature */, &siglen) != 1)
204 const Buffer& input, const Buffer& signature,
218 signature.peek_read(), signature.available_read(), ecdsa.get());
223 } else if (!EVP_DigestVerifyFinal(&digest_ctx_, signature.peek_read(),
224 signature.available_read()))
  /external/tpm2/
CryptUtil.c 630 TPMT_SIGNATURE *signature // OUT: signature
644 (BYTE *) &signature->signature.hmac.digest);
646 signature->signature.hmac.hashAlg = scheme->details.hmac.hashAlg;
653 // This function will verify a signature signed by a HMAC key.
657 // TPM_RC_SIGNATURE if invalid input or signature is not genuine
663 TPMT_SIGNATURE *signature // IN: signature to be verifie
    [all...]
Attest_spt.c 107 // Sign a TPMS_ATTEST structure. If signHandle is TPM_RH_NULL, a null signature is returned.
128 TPMT_SIGNATURE *signature // OUT: signature
143 signature->sigAlg = TPM_ALG_NULL;
180 signature);
  /development/tools/mkstubs/src/com/android/mkstubs/sourcer/
SignatureSourcer.java 22 import org.objectweb.asm.signature.SignatureReader;
23 import org.objectweb.asm.signature.SignatureVisitor;
24 import org.objectweb.asm.signature.SignatureWriter;
29 * A signature visitor that can be used to generate Java source corresponding to
32 * Terminology: a "signature" is a type descriptor for generics. There are different types
39 * Note: When processing a method's signature, the signature order is the reverse of the source
40 * order, e.g. the signature is written as "(parameters)return-type" where we want to generate
49 * Buffer used to construct the signature.
54 * Buffer used to construct the formals signature
    [all...]
  /external/apache-harmony/jdwp/src/test/java/org/apache/harmony/jpda/tests/jdwp/ClassType/
SuperClassTest.java 63 String signature = getClassSignature(superClassID); local
64 logWriter.println("Signature: "+signature);
65 assertString("ClassType::Superclass command returned invalid signature,",
66 expectedSignature, signature);
90 // complare returned signature with superclass signature
100 // complare returned signature with superclass signature
110 // complare returned signature with superclass signatur
    [all...]
  /external/apache-harmony/jdwp/src/test/java/org/apache/harmony/jpda/tests/jdwp/ReferenceType/
ClassLoaderTest.java 111 private void classLoaderTest(String thisTestName, String signature, boolean expectZero) {
115 long refTypeID = getClassIDBySignature(signature);
117 logWriter.println("=> Debuggee class = " + signature);
  /external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/x509/
CertificateTest.java 68 * signature AlgorithmIdentifier,
125 AlgorithmIdentifier signature = new AlgorithmIdentifier("1.2.3.44.555"); // random value local
161 signature, issuer, validity, subject, subjectPublicKeyInfo,
167 Certificate certificate = new Certificate(tbsCertificate, signature, new byte[10]);
  /external/autotest/client/cros/tendo/
peerd_dbus_helper.py 136 dbus.Dictionary(signature='sv'))
173 options = dbus.Dictionary(signature='sv')
176 signature='sv')
  /external/boringssl/src/crypto/x509/
x_x509.c 76 ASN1_SIMPLE(X509_CINF, signature, X509_ALGOR),
137 ASN1_SIMPLE(X509, signature, ASN1_BIT_STRING)
219 *psig = x->signature;
  /external/chromium-trace/catapult/third_party/gsutil/third_party/oauth2client/tests/
test_service_account.py 55 private_key_id, signature = self.credentials.sign_blob('Google')
61 self.assertTrue(rsa.pkcs1.verify(b'Google', signature, pub_key))
64 rsa.pkcs1.verify(b'Orest', signature, pub_key)
70 rsa.pkcs1.verify(b'Google', b'bad signature', pub_key)
  /external/jhead/
iptc.c 39 // - IPTC Signature: 14 bytes ("Photoshop 3.0\0")
40 // - 8BIM Signature 4 bytes ("8BIM")
46 // - Signature 2 bytes (0x1C02)
74 ErrNonfatal("IPTC type signature mismatch\n",0,0);
99 short signature; local
106 signature = (*pos << 8) + (*(pos+1));
109 if (signature != 0x1C02){
  /external/mockito/cglib-and-asm/src/org/mockito/asm/
ClassWriter.java 48 * method will be ignored, and computed automatically from the signature and
314 * The constant pool item that contains the signature of this class.
316 private int signature; field in class:ClassWriter
584 final String signature,
592 if (ClassReader.SIGNATURES && signature != null) {
593 this.signature = newUTF8(signature);
671 final String signature,
674 return new FieldWriter(this, access, name, desc, signature, value);
681 final String signature,
    [all...]
  /external/opencv3/modules/imgcodecs/src/
grfmt_webp.cpp 74 bool WebPDecoder::checkSignature(const String & signature) const
78 if(signature.size() >= WEBP_HEADER_SIZE)
81 if(VP8_STATUS_OK == WebPGetFeatures((uint8_t *)signature.c_str(),
  /external/piex/src/image_type_recognition/
image_type_recognition_lite.cc 19 // of magic numbers or signature strings. Other checks (e.g endianness, general
23 // the magic numbers and signature strings may have different binary values
117 // Check if signature string can match to the same length string start from
118 // (source + offset). The signature string will be used as longer magic number
121 const size_t source_offset, const string& signature) {
122 return source.substr(source_offset, signature.size()) == signature;
125 // Check if signature is found in [source + offset, source + offset + range].
128 const string& signature, size_t* first_matched) {
133 // The index must be in range [offset, offset + range - sizeof(signature)], s
250 string signature; local
    [all...]
  /external/replicaisland/src/com/replica/replicaisland/
LevelSystem.java 103 int signature; local
105 signature = (byte)byteStream.read();
106 if (signature == 96) {

Completed in 892 milliseconds

<<11121314151617181920>>