/external/glide/library/src/main/java/com/bumptech/glide/ |
RequestManager.java | 21 import com.bumptech.glide.signature.ApplicationVersionSignature; 22 import com.bumptech.glide.signature.MediaStoreSignature; 23 import com.bumptech.glide.signature.StringSignature; 225 * signature. 237 * Returns a request builder that loads data from {@link String}s using an empty signature. 243 * {@link com.bumptech.glide.GenericRequestBuilder#signature(com.bumptech.glide.load.Key)} to mixin a signature 270 * Returns a request builder to load data from {@link android.net.Uri}s using no signature. 276 * {@link com.bumptech.glide.GenericRequestBuilder#signature(com.bumptech.glide.load.Key)} to mixin a signature 317 Key signature = new MediaStoreSignature(mimeType, dateModified, orientation); local [all...] |
/external/libweave/src/privet/ |
security_manager_unittest.cc | 89 void PairAndAuthenticate(std::string* fingerprint, std::string* signature) { 105 fingerprint, signature, nullptr)); 107 EXPECT_TRUE(IsBase64(*signature)); 180 std::string signature; local 183 security_.ConfirmPairing("123", "345", &fingerprint, &signature, &error)); 225 std::string fingerprint, signature; local 229 &fingerprint, &signature, nullptr); 285 std::string signature; local 286 PairAndAuthenticate(&fingerprint, &signature);
|
/external/proguard/src/proguard/optimize/evaluation/ |
SimpleEnumDescriptorSimplifier.java | 199 // Simplify the signature. 213 // Simplify the code, the signature, and the parameter annotations, 290 // Update the signature if it has any simple enum classes. 291 String signature = signatureAttribute.getSignature(clazz); local 292 String newSignature = simplifyDescriptor(signature, 295 if (!signature.equals(newSignature)) 297 // Update the signature. 310 // Compute the new signature. 311 String signature = signatureAttribute.getSignature(clazz); local 312 String newSignature = simplifyDescriptor(signature, 353 String signature = localVariableTypeInfo.getSignature(clazz); local [all...] |
/developers/build/prebuilts/gradle/BasicAndroidKeyStore/Application/src/main/java/com/example/android/basicandroidkeystore/ |
BasicAndroidKeyStoreFragment.java | 38 import java.security.Signature; 55 // Some sample data to sign, and later verify using the generated signature. 58 // Just a handy place to store the signature in between signing and verifying. 108 Log.w(TAG, "Invalid Signature", e); 114 Log.d(TAG, "Signature: " + mSignatureStr); 136 Log.w(TAG, "Invalid Signature", e); 139 Log.d(TAG, "Data Signature Verified"); 195 * Signs the data using the key pair stored in the Android Key Store. This signature can be 197 * @return A string encoding of the data signature generated 240 // This class doesn't actually represent the signature, [all...] |
/developers/samples/android/security/keystore/BasicAndroidKeyStore/Application/src/main/java/com/example/android/basicandroidkeystore/ |
BasicAndroidKeyStoreFragment.java | 38 import java.security.Signature; 55 // Some sample data to sign, and later verify using the generated signature. 58 // Just a handy place to store the signature in between signing and verifying. 108 Log.w(TAG, "Invalid Signature", e); 114 Log.d(TAG, "Signature: " + mSignatureStr); 136 Log.w(TAG, "Invalid Signature", e); 139 Log.d(TAG, "Data Signature Verified"); 195 * Signs the data using the key pair stored in the Android Key Store. This signature can be 197 * @return A string encoding of the data signature generated 240 // This class doesn't actually represent the signature, [all...] |
/development/samples/browseable/BasicAndroidKeyStore/src/com.example.android.basicandroidkeystore/ |
BasicAndroidKeyStoreFragment.java | 38 import java.security.Signature; 55 // Some sample data to sign, and later verify using the generated signature. 58 // Just a handy place to store the signature in between signing and verifying. 108 Log.w(TAG, "Invalid Signature", e); 114 Log.d(TAG, "Signature: " + mSignatureStr); 136 Log.w(TAG, "Invalid Signature", e); 139 Log.d(TAG, "Data Signature Verified"); 195 * Signs the data using the key pair stored in the Android Key Store. This signature can be 197 * @return A string encoding of the data signature generated 240 // This class doesn't actually represent the signature, [all...] |
/external/apache-harmony/jdwp/src/test/java/org/apache/harmony/jpda/tests/jdwp/StackFrame/ |
JDWPStackFrameTestCase.java | 63 String signature, name; field in class:JDWPStackFrameTestCase.VarInfo 66 public VarInfo(String name, int slot, String signature) { 68 this.signature = signature; 77 return signature;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/ |
X509V2AttributeCertificate.java | 11 import java.security.Signature; 176 Signature signature = null; local 180 throw new CertificateException("Signature algorithm in certificate info not same as outer certificate"); 183 signature = Signature.getInstance(cert.getSignatureAlgorithm().getAlgorithm().getId(), provider); 185 signature.initVerify(key); 189 signature.update(cert.getAcinfo().getEncoded()); 196 if (!signature.verify(this.getSignature())) 198 throw new InvalidKeyException("Public key presented not for certificate signature"); [all...] |
/external/glide/library/src/main/java/com/bumptech/glide/load/resource/gif/ |
GifFrameManager.java | 32 private final FrameSignature signature; field in class:GifFrameManager 55 this.signature = new FrameSignature(); 65 .signature(signature) 92 // Use an incrementing signature to make sure we never hit an active resource that matches one of our frames. 93 signature.increment();
|
/frameworks/base/keystore/java/android/security/keystore/ |
AndroidKeyStoreSignatureSpiBase.java | 136 * Configures this signature instance to use the provided key. 321 byte[] signature; 328 signature = mMessageStreamer.doFinal( 330 null, // no signature provided -- it'll be generated by this invocation 337 return signature; 341 protected final boolean engineVerify(byte[] signature) throws SignatureException { 356 signature, 361 "Signature verification unexpected produced output: " + output.length 403 * Returns {@code true} if this signature is initialized for signing, {@code false} if this 404 * signature is initialized for verification [all...] |
/system/keymaster/ |
ecdsa_operation.cpp | 139 const Buffer& input, const Buffer& /* signature */, 162 if (EVP_DigestSignFinal(&digest_ctx_, nullptr /* signature */, &siglen) != 1) 204 const Buffer& input, const Buffer& signature, 218 signature.peek_read(), signature.available_read(), ecdsa.get()); 223 } else if (!EVP_DigestVerifyFinal(&digest_ctx_, signature.peek_read(), 224 signature.available_read()))
|
/external/tpm2/ |
CryptUtil.c | 630 TPMT_SIGNATURE *signature // OUT: signature 644 (BYTE *) &signature->signature.hmac.digest); 646 signature->signature.hmac.hashAlg = scheme->details.hmac.hashAlg; 653 // This function will verify a signature signed by a HMAC key. 657 // TPM_RC_SIGNATURE if invalid input or signature is not genuine 663 TPMT_SIGNATURE *signature // IN: signature to be verifie [all...] |
Attest_spt.c | 107 // Sign a TPMS_ATTEST structure. If signHandle is TPM_RH_NULL, a null signature is returned. 128 TPMT_SIGNATURE *signature // OUT: signature 143 signature->sigAlg = TPM_ALG_NULL; 180 signature);
|
/development/tools/mkstubs/src/com/android/mkstubs/sourcer/ |
SignatureSourcer.java | 22 import org.objectweb.asm.signature.SignatureReader; 23 import org.objectweb.asm.signature.SignatureVisitor; 24 import org.objectweb.asm.signature.SignatureWriter; 29 * A signature visitor that can be used to generate Java source corresponding to 32 * Terminology: a "signature" is a type descriptor for generics. There are different types 39 * Note: When processing a method's signature, the signature order is the reverse of the source 40 * order, e.g. the signature is written as "(parameters)return-type" where we want to generate 49 * Buffer used to construct the signature. 54 * Buffer used to construct the formals signature [all...] |
/external/apache-harmony/jdwp/src/test/java/org/apache/harmony/jpda/tests/jdwp/ClassType/ |
SuperClassTest.java | 63 String signature = getClassSignature(superClassID); local 64 logWriter.println("Signature: "+signature); 65 assertString("ClassType::Superclass command returned invalid signature,", 66 expectedSignature, signature); 90 // complare returned signature with superclass signature 100 // complare returned signature with superclass signature 110 // complare returned signature with superclass signatur [all...] |
/external/apache-harmony/jdwp/src/test/java/org/apache/harmony/jpda/tests/jdwp/ReferenceType/ |
ClassLoaderTest.java | 111 private void classLoaderTest(String thisTestName, String signature, boolean expectZero) { 115 long refTypeID = getClassIDBySignature(signature); 117 logWriter.println("=> Debuggee class = " + signature);
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/x509/ |
CertificateTest.java | 68 * signature AlgorithmIdentifier, 125 AlgorithmIdentifier signature = new AlgorithmIdentifier("1.2.3.44.555"); // random value local 161 signature, issuer, validity, subject, subjectPublicKeyInfo, 167 Certificate certificate = new Certificate(tbsCertificate, signature, new byte[10]);
|
/external/autotest/client/cros/tendo/ |
peerd_dbus_helper.py | 136 dbus.Dictionary(signature='sv')) 173 options = dbus.Dictionary(signature='sv') 176 signature='sv')
|
/external/boringssl/src/crypto/x509/ |
x_x509.c | 76 ASN1_SIMPLE(X509_CINF, signature, X509_ALGOR), 137 ASN1_SIMPLE(X509, signature, ASN1_BIT_STRING) 219 *psig = x->signature;
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/oauth2client/tests/ |
test_service_account.py | 55 private_key_id, signature = self.credentials.sign_blob('Google') 61 self.assertTrue(rsa.pkcs1.verify(b'Google', signature, pub_key)) 64 rsa.pkcs1.verify(b'Orest', signature, pub_key) 70 rsa.pkcs1.verify(b'Google', b'bad signature', pub_key)
|
/external/jhead/ |
iptc.c | 39 // - IPTC Signature: 14 bytes ("Photoshop 3.0\0") 40 // - 8BIM Signature 4 bytes ("8BIM") 46 // - Signature 2 bytes (0x1C02) 74 ErrNonfatal("IPTC type signature mismatch\n",0,0); 99 short signature; local 106 signature = (*pos << 8) + (*(pos+1)); 109 if (signature != 0x1C02){
|
/external/mockito/cglib-and-asm/src/org/mockito/asm/ |
ClassWriter.java | 48 * method will be ignored, and computed automatically from the signature and
314 * The constant pool item that contains the signature of this class.
316 private int signature;
field in class:ClassWriter 584 final String signature,
592 if (ClassReader.SIGNATURES && signature != null) {
593 this.signature = newUTF8(signature);
671 final String signature,
674 return new FieldWriter(this, access, name, desc, signature, value);
681 final String signature,
[all...] |
/external/opencv3/modules/imgcodecs/src/ |
grfmt_webp.cpp | 74 bool WebPDecoder::checkSignature(const String & signature) const 78 if(signature.size() >= WEBP_HEADER_SIZE) 81 if(VP8_STATUS_OK == WebPGetFeatures((uint8_t *)signature.c_str(),
|
/external/piex/src/image_type_recognition/ |
image_type_recognition_lite.cc | 19 // of magic numbers or signature strings. Other checks (e.g endianness, general 23 // the magic numbers and signature strings may have different binary values 117 // Check if signature string can match to the same length string start from 118 // (source + offset). The signature string will be used as longer magic number 121 const size_t source_offset, const string& signature) { 122 return source.substr(source_offset, signature.size()) == signature; 125 // Check if signature is found in [source + offset, source + offset + range]. 128 const string& signature, size_t* first_matched) { 133 // The index must be in range [offset, offset + range - sizeof(signature)], s 250 string signature; local [all...] |
/external/replicaisland/src/com/replica/replicaisland/ |
LevelSystem.java | 103 int signature; local 105 signature = (byte)byteStream.read(); 106 if (signature == 96) {
|