/external/opencv/otherlibs/highgui/ |
grfmt_pxm.cpp | 61 bool GrFmtPxM::CheckSignature( const char* signature ) 63 return signature[0] == 'P' && 64 '1' <= signature[1] && signature[1] <= '6' && 65 isspace(signature[2]);
|
grfmt_tiff.cpp | 64 bool GrFmtTiff::CheckSignature( const char* signature ) 66 return memcmp( signature, fmtSignTiffII, 4 ) == 0 || 67 memcmp( signature, fmtSignTiffMM, 4 ) == 0; 122 bool GrFmtTiffReader::CheckFormat( const char* signature ) 124 return memcmp( signature, fmtSignTiffII, 4 ) == 0 || 125 memcmp( signature, fmtSignTiffMM, 4 ) == 0; 269 bool GrFmtTiffReader::CheckFormat( const char* signature ) 271 return memcmp( signature, fmtSignTiffII, 4 ) == 0 || 272 memcmp( signature, fmtSignTiffMM, 4 ) == 0;
|
/frameworks/compile/mclinker/lib/LD/ |
ELFObjectReader.cpp | 121 ResolveInfo* signature = m_pELFReader->readSignature( local 125 if (signature->nameSize() == 0 && 126 ResolveInfo::Section == signature->type()) { 127 // if the signature is a section symbol in input object, we use the 128 // section name as group signature. 131 signatures().insert(signature->name(), exist); 135 // if this is not the first time we see this group signature, then 150 ResolveInfo::Destroy(signature);
|
/system/core/crash_reporter/ |
kernel_collector.cc | 41 // Byte length of maximum human readable portion of a kernel crash signature. 45 // to count towards the signature of the kcrash. 548 std::string signature; local 549 if (!ComputeKernelStackSignature(kernel_dump, &signature, false)) { 550 signature = kDefaultKernelStackSignature; 564 << "kernel (signature " << signature << ") (" << reason << ")"; 592 AddCrashMetaData(kKernelSignatureKey, signature);
|
/system/gatekeeper/ |
gatekeeper.cpp | 149 // Signature matches 196 ComputePasswordSignature(password_handle->signature, sizeof(password_handle->signature), 213 return memcmp_s(generated_handle->signature, expected_handle->signature, 214 sizeof(expected_handle->signature)) == 0;
|
/system/vold/ |
Keymaster.cpp | 45 const keymaster_blob_t* signature, 93 const keymaster_blob_t* signature, 96 return mDevice->finish(mDevice, operation_handle, in_params, signature, out_params, output); 106 const keymaster_blob_t* signature, 109 return mDevice->finish(mDevice, operation_handle, in_params, nullptr, signature, out_params,
|
/external/jetty/src/java/org/eclipse/jetty/jmx/ |
ObjectMBean.java | 463 public Object invoke(String name, Object[] params, String[] signature) throws MBeanException, ReflectionException 469 if (signature != null) 470 for (int i = 0; i < signature.length; i++) 471 methodKey += (i > 0 ? "," : "") + signature[i]; 688 * found with a call to findDescription on "name(signature)". The name and description of each 689 * parameter is found with a call to findDescription with "name(signature)[n]", the returned 690 * description is for the last parameter of the partial signature and is assumed to start with 697 private MBeanOperationInfo defineOperation(String signature, String metaData, ResourceBundle bundle) 709 LOG.debug("defineOperation "+signature+" "+onMBean+":"+impact_name+":"+description); 726 LOG.warn("Unknown impact '"+impact_name+"' for "+signature); [all...] |
/frameworks/av/media/libmedia/ |
IDrm.cpp | 470 Vector<uint8_t> &signature) { 482 readVector(reply, signature); 490 Vector<uint8_t> const &signature, 498 writeVector(data, signature); 512 Vector<uint8_t> &signature) { 525 readVector(reply, signature); 876 Vector<uint8_t> sessionId, keyId, message, signature; local 880 uint32_t result = sign(sessionId, keyId, message, signature); 881 writeVector(reply, signature); 889 Vector<uint8_t> sessionId, keyId, message, signature; local 904 Vector<uint8_t> sessionId, message, wrappedKey, signature; local [all...] |
/libcore/luni/src/test/java/libcore/java/security/ |
SignatureTest.java | 36 import java.security.Signature; 82 put("Signature.FOO", MockSignatureSpi.AllKeyTypes.class.getName()); 87 Signature s = Signature.getInstance("FOO", mockProvider); 96 put("Signature.FOO", MockSignatureSpi.AllKeyTypes.class.getName()); 97 put("Signature.FOO SupportedKeyClasses", "None"); 103 Signature s = Signature.getInstance("FOO", mockProvider); 120 put("Signature.FOO", MockSignatureSpi.AllKeyTypes.class.getName()); 121 put("Signature.FOO SupportedKeyClasses", "None") 377 assertNotNull(sig.getAlgorithm(), signature); local 3097 Signature signature = Signature.getInstance(oid, "BC"); local [all...] |
/external/jarjar/lib/ |
asm-4.0.jar | |
/external/owasp/sanitizer/tools/findbugs/lib/ |
asm-3.3.jar | |
/prebuilts/devtools/tools/lib/ |
asm-4.0.jar | |
/prebuilts/tools/common/asm-tools/ |
asm-3.3.1.jar | |
asm-4.0.jar | |
/prebuilts/tools/common/m2/repository/asm/asm/3.3/ |
asm-3.3.jar | |
/prebuilts/tools/common/m2/repository/asm/asm/3.3.1/ |
asm-3.3.1.jar | |
/prebuilts/tools/common/m2/repository/org/apache/maven/shared/maven-dependency-analyzer/1.4/ |
maven-dependency-analyzer-1.4.jar | |
/prebuilts/tools/common/m2/repository/org/ow2/asm/asm/4.0/ |
asm-4.0.jar | |
/prebuilts/tools/common/offline-m2/org/ow2/asm/asm/4.0/ |
asm-4.0.jar | |
/system/tpm/trunks/ |
trunks_client_test.cc | 123 std::string signature; local 126 &signature); 132 std::string(32, 'a'), signature, nullptr); 464 std::string signature; local 468 &signature); 474 std::string(32, 0), signature, nullptr); 596 std::string signature; local 601 &signature); 633 &signature); 639 std::string(32, 'a'), signature, nullptr) 807 std::string signature; local 1064 std::string signature; local [all...] |
/device/google/dragon/recovery/updater/ |
vboot_interface.c | 130 * Try to find the FMAP signature at 64-byte boundaries 135 res = flash_read(dev, off, &h, sizeof(h.signature)); 138 if (!memcmp(&h.signature, FMAP_SIGNATURE, sizeof(h.signature))) 159 if (memcmp(&hdr.signature, FMAP_SIGNATURE, sizeof(hdr.signature))) { 253 if (!gbb || memcmp(hdr->signature, GBB_SIGNATURE, GBB_SIGNATURE_SIZE) ||
|
/external/clang/lib/CodeGen/ |
CGObjCRuntime.cpp | 361 const CGFunctionInfo &signature = local 365 CGM.getTypes().GetFunctionType(signature)->getPointerTo(); 369 if (!signature.isVariadic()) 370 return MessageSendInfo(signature, signatureType); 373 FunctionType::ExtInfo einfo = signature.getExtInfo(); 376 signature.getRequiredArgs()); 387 // Derive the signature to call from that.
|
/external/mockito/cglib-and-asm/src/org/mockito/asm/util/ |
ASMifierClassVisitor.java | 213 final String signature,
266 appendConstant(signature);
333 final String signature,
345 appendConstant(signature);
360 final String signature,
372 appendConstant(signature);
|
/external/proguard/src/proguard/classfile/editor/ |
ClassReferenceFixer.java | 309 // Has the signature changed? 310 String signature = signatureAttribute.getSignature(clazz); local 311 String newSignature = newDescriptor(signature, 314 if (!signature.equals(newSignature)) 316 // Update the signature. 386 // Has the signature changed? 387 String signature = localVariableTypeInfo.getSignature(clazz); local 388 String newSignature = newDescriptor(signature, 391 if (!signature.equals(newSignature)) 393 // Update the signature [all...] |
/frameworks/av/drm/libdrmframework/plugins/forward-lock/internal-format/decoder/ |
FwdLockFile.c | 376 unsigned char signature[SHA1_HASH_SIZE]; member in struct:FwdLockFile_CheckDataIntegrity_Data 396 HMAC_Final(&pSession->signingContext, pData->signature, &signatureSize); 398 result = memcmp(pData->signature, pSession->dataSignature, SHA1_HASH_SIZE) == 0; 417 unsigned char signature[SHA1_HASH_SIZE]; local 425 HMAC_Final(&pSession->signingContext, signature, &signatureSize); 427 result = memcmp(signature, pSession->headerSignature, SHA1_HASH_SIZE) == 0;
|