/prebuilts/ndk/current/platforms/android-24/arch-arm/usr/include/media/ |
NdkMediaDrm.h | 304 * secure stop message to the server which verifies the signature and notifies the 428 * Generate a signature using the specified macAlgorithm over the message data 429 * referenced by message of size messageSize and store the signature in the 430 * buffer referenced signature of max size *signatureSize. If the buffer is not 431 * large enough to hold the signature, MEDIADRM_SHORT_BUFFER is returned and 438 uint8_t *signature, size_t *signatureSize); 441 * Perform a signature verification using the specified macAlgorithm over the message 443 * if the signature matches, otherwise MEDAIDRM_VERIFY_FAILED is returned. The key to 449 const uint8_t *signature, size_t signatureSize);
|
/prebuilts/ndk/current/platforms/android-24/arch-arm64/usr/include/linux/ |
msdos_fs.h | 129 __u8 signature; member in struct:fat_boot_sector::__anon64819::__anon64820 147 __u8 signature; member in struct:fat_boot_sector::__anon64819::__anon64821
|
/prebuilts/ndk/current/platforms/android-24/arch-arm64/usr/include/media/ |
NdkMediaDrm.h | 304 * secure stop message to the server which verifies the signature and notifies the 428 * Generate a signature using the specified macAlgorithm over the message data 429 * referenced by message of size messageSize and store the signature in the 430 * buffer referenced signature of max size *signatureSize. If the buffer is not 431 * large enough to hold the signature, MEDIADRM_SHORT_BUFFER is returned and 438 uint8_t *signature, size_t *signatureSize); 441 * Perform a signature verification using the specified macAlgorithm over the message 443 * if the signature matches, otherwise MEDAIDRM_VERIFY_FAILED is returned. The key to 449 const uint8_t *signature, size_t signatureSize);
|
/prebuilts/ndk/current/platforms/android-24/arch-mips/usr/include/linux/ |
msdos_fs.h | 129 __u8 signature; member in struct:fat_boot_sector::__anon65598::__anon65599 147 __u8 signature; member in struct:fat_boot_sector::__anon65598::__anon65600
|
/prebuilts/ndk/current/platforms/android-24/arch-mips/usr/include/media/ |
NdkMediaDrm.h | 304 * secure stop message to the server which verifies the signature and notifies the 428 * Generate a signature using the specified macAlgorithm over the message data 429 * referenced by message of size messageSize and store the signature in the 430 * buffer referenced signature of max size *signatureSize. If the buffer is not 431 * large enough to hold the signature, MEDIADRM_SHORT_BUFFER is returned and 438 uint8_t *signature, size_t *signatureSize); 441 * Perform a signature verification using the specified macAlgorithm over the message 443 * if the signature matches, otherwise MEDAIDRM_VERIFY_FAILED is returned. The key to 449 const uint8_t *signature, size_t signatureSize);
|
/prebuilts/ndk/current/platforms/android-24/arch-mips64/usr/include/linux/ |
msdos_fs.h | 129 __u8 signature; member in struct:fat_boot_sector::__anon66376::__anon66377 147 __u8 signature; member in struct:fat_boot_sector::__anon66376::__anon66378
|
/prebuilts/ndk/current/platforms/android-24/arch-mips64/usr/include/media/ |
NdkMediaDrm.h | 304 * secure stop message to the server which verifies the signature and notifies the 428 * Generate a signature using the specified macAlgorithm over the message data 429 * referenced by message of size messageSize and store the signature in the 430 * buffer referenced signature of max size *signatureSize. If the buffer is not 431 * large enough to hold the signature, MEDIADRM_SHORT_BUFFER is returned and 438 uint8_t *signature, size_t *signatureSize); 441 * Perform a signature verification using the specified macAlgorithm over the message 443 * if the signature matches, otherwise MEDAIDRM_VERIFY_FAILED is returned. The key to 449 const uint8_t *signature, size_t signatureSize);
|
/prebuilts/ndk/current/platforms/android-24/arch-x86/usr/include/linux/ |
msdos_fs.h | 129 __u8 signature; member in struct:fat_boot_sector::__anon67152::__anon67153 147 __u8 signature; member in struct:fat_boot_sector::__anon67152::__anon67154
|
/prebuilts/ndk/current/platforms/android-24/arch-x86/usr/include/media/ |
NdkMediaDrm.h | 304 * secure stop message to the server which verifies the signature and notifies the 428 * Generate a signature using the specified macAlgorithm over the message data 429 * referenced by message of size messageSize and store the signature in the 430 * buffer referenced signature of max size *signatureSize. If the buffer is not 431 * large enough to hold the signature, MEDIADRM_SHORT_BUFFER is returned and 438 uint8_t *signature, size_t *signatureSize); 441 * Perform a signature verification using the specified macAlgorithm over the message 443 * if the signature matches, otherwise MEDAIDRM_VERIFY_FAILED is returned. The key to 449 const uint8_t *signature, size_t signatureSize);
|
/prebuilts/ndk/current/platforms/android-24/arch-x86_64/usr/include/linux/ |
msdos_fs.h | 129 __u8 signature; member in struct:fat_boot_sector::__anon67929::__anon67930 147 __u8 signature; member in struct:fat_boot_sector::__anon67929::__anon67931
|
/prebuilts/ndk/current/platforms/android-24/arch-x86_64/usr/include/media/ |
NdkMediaDrm.h | 304 * secure stop message to the server which verifies the signature and notifies the 428 * Generate a signature using the specified macAlgorithm over the message data 429 * referenced by message of size messageSize and store the signature in the 430 * buffer referenced signature of max size *signatureSize. If the buffer is not 431 * large enough to hold the signature, MEDIADRM_SHORT_BUFFER is returned and 438 uint8_t *signature, size_t *signatureSize); 441 * Perform a signature verification using the specified macAlgorithm over the message 443 * if the signature matches, otherwise MEDAIDRM_VERIFY_FAILED is returned. The key to 449 const uint8_t *signature, size_t signatureSize);
|
/system/tpm/attestation/client/ |
main.cc | 84 --signature=<signature_file> 85 Verifies the signature in |signature_file| against the contents of 238 !command_line->HasSwitch("signature")) { 247 std::string signature; local 248 base::FilePath filename2(command_line->GetSwitchValueASCII("signature")); 249 if (!base::ReadFileToString(filename2, &signature)) { 258 signature); 450 WriteOutput(reply.signature()); 458 const std::string& signature) { 464 input, signature)); [all...] |
/system/tpm/trunks/ |
tpm_utility.h | 130 // and uses it to sign the hash of |plaintext|. The signature produced is 131 // returned using the |signature| argument. |scheme| is used to specify the 132 // signature scheme used. By default it is TPM_ALG_RSASSA, but TPM_ALG_RSAPPS 141 std::string* signature) = 0; 143 // This method verifies that the signature produced on the plaintext was 144 // performed by |key_handle|. |scheme| and |hash| refer to the signature 145 // scheme used to sign the hash of |plaintext| and produce the signature. 148 // tpm. Returns TPM_RC_SUCCESS when the signature is correct. 154 const std::string& signature,
|
/toolchain/binutils/binutils-2.25/gold/ |
gdb-index.h | 78 add_type_unit(off_t tu_offset, off_t type_offset, uint64_t signature) 80 this->type_units_.push_back(Type_unit(tu_offset, type_offset, signature));
|
/external/antlr/antlr-3.4/runtime/Ruby/lib/antlr3/ |
template.rb | 326 signature = join( ', ' ) 327 @splat and signature << ", *" << @splat.to_s 328 @block and signature << ", &" << @block.to_s 329 return( signature )
|
/external/autotest/client/cros/tendo/n_faced_peerd/ |
dbus_property_exposer.py | 94 signature='sa{sv}as')
|
/external/autotest/client/site_tests/security_EnableChromeTesting/ |
security_EnableChromeTesting.py | 50 # Pass an empty dbus.Array with the correct signature, taken from 52 empty_string_array = dbus.Array(signature="as")
|
/external/boringssl/src/crypto/x509/ |
t_crl.c | 125 X509_signature_print(out, x->sig_alg, x->signature);
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/oauth2client/tests/ |
test_jwt.py | 71 signature = signer.sign('foo') 74 self.assertTrue(verifier.verify(b'foo', signature)) 76 self.assertFalse(verifier.verify(b'bar', signature)) 145 # Bad signature 147 self._check_jwt_failure(jwt, 'Invalid token signature')
|
/external/glide/library/src/main/java/com/bumptech/glide/ |
BitmapRequestBuilder.java | 456 public BitmapRequestBuilder<ModelType, TranscodeType> signature(Key signature) { method in class:BitmapRequestBuilder 457 super.signature(signature);
|
/external/jacoco/ |
asm-debug-all-5.0.1.jar | |
/external/mockito/cglib-and-asm/src/org/mockito/asm/signature/ |
SignatureWriter.java | 30 package org.mockito.asm.signature;
33 * A signature visitor that generates signatures in string format.
41 * Buffer used to construct the signature.
46 * Indicates if the signature contains formal type parameters.
51 * Indicates if the signature contains method parameter types.
176 * Returns the signature that was built by this signature writer.
178 * @return the signature that was built by this signature writer.
189 * Ends the formal type parameters section of the signature. [all...] |
/external/oauth/core/src/main/java/net/oauth/ |
SimpleOAuthValidator.java | 21 import net.oauth.signature.OAuthSignatureMethod; 25 * is close to now and the signature is valid. Each check may be overridden. 39 * signature.
|
/external/opencv3/3rdparty/libpng/ |
pnginfo.h | 77 png_byte signature[8]; /* magic bytes read by libpng from start of file */ member in struct:png_info_def
|
/external/tpm2/ |
Marshal_Certify.c | 28 total_size += TPMT_SIGNATURE_Marshal(&source->signature, buffer, size);
|