HomeSort by relevance Sort by last modified time
    Searched refs:signature (Results 626 - 650 of 2070) sorted by null

<<21222324252627282930>>

  /prebuilts/ndk/current/platforms/android-24/arch-arm/usr/include/media/
NdkMediaDrm.h 304 * secure stop message to the server which verifies the signature and notifies the
428 * Generate a signature using the specified macAlgorithm over the message data
429 * referenced by message of size messageSize and store the signature in the
430 * buffer referenced signature of max size *signatureSize. If the buffer is not
431 * large enough to hold the signature, MEDIADRM_SHORT_BUFFER is returned and
438 uint8_t *signature, size_t *signatureSize);
441 * Perform a signature verification using the specified macAlgorithm over the message
443 * if the signature matches, otherwise MEDAIDRM_VERIFY_FAILED is returned. The key to
449 const uint8_t *signature, size_t signatureSize);
  /prebuilts/ndk/current/platforms/android-24/arch-arm64/usr/include/linux/
msdos_fs.h 129 __u8 signature; member in struct:fat_boot_sector::__anon64819::__anon64820
147 __u8 signature; member in struct:fat_boot_sector::__anon64819::__anon64821
  /prebuilts/ndk/current/platforms/android-24/arch-arm64/usr/include/media/
NdkMediaDrm.h 304 * secure stop message to the server which verifies the signature and notifies the
428 * Generate a signature using the specified macAlgorithm over the message data
429 * referenced by message of size messageSize and store the signature in the
430 * buffer referenced signature of max size *signatureSize. If the buffer is not
431 * large enough to hold the signature, MEDIADRM_SHORT_BUFFER is returned and
438 uint8_t *signature, size_t *signatureSize);
441 * Perform a signature verification using the specified macAlgorithm over the message
443 * if the signature matches, otherwise MEDAIDRM_VERIFY_FAILED is returned. The key to
449 const uint8_t *signature, size_t signatureSize);
  /prebuilts/ndk/current/platforms/android-24/arch-mips/usr/include/linux/
msdos_fs.h 129 __u8 signature; member in struct:fat_boot_sector::__anon65598::__anon65599
147 __u8 signature; member in struct:fat_boot_sector::__anon65598::__anon65600
  /prebuilts/ndk/current/platforms/android-24/arch-mips/usr/include/media/
NdkMediaDrm.h 304 * secure stop message to the server which verifies the signature and notifies the
428 * Generate a signature using the specified macAlgorithm over the message data
429 * referenced by message of size messageSize and store the signature in the
430 * buffer referenced signature of max size *signatureSize. If the buffer is not
431 * large enough to hold the signature, MEDIADRM_SHORT_BUFFER is returned and
438 uint8_t *signature, size_t *signatureSize);
441 * Perform a signature verification using the specified macAlgorithm over the message
443 * if the signature matches, otherwise MEDAIDRM_VERIFY_FAILED is returned. The key to
449 const uint8_t *signature, size_t signatureSize);
  /prebuilts/ndk/current/platforms/android-24/arch-mips64/usr/include/linux/
msdos_fs.h 129 __u8 signature; member in struct:fat_boot_sector::__anon66376::__anon66377
147 __u8 signature; member in struct:fat_boot_sector::__anon66376::__anon66378
  /prebuilts/ndk/current/platforms/android-24/arch-mips64/usr/include/media/
NdkMediaDrm.h 304 * secure stop message to the server which verifies the signature and notifies the
428 * Generate a signature using the specified macAlgorithm over the message data
429 * referenced by message of size messageSize and store the signature in the
430 * buffer referenced signature of max size *signatureSize. If the buffer is not
431 * large enough to hold the signature, MEDIADRM_SHORT_BUFFER is returned and
438 uint8_t *signature, size_t *signatureSize);
441 * Perform a signature verification using the specified macAlgorithm over the message
443 * if the signature matches, otherwise MEDAIDRM_VERIFY_FAILED is returned. The key to
449 const uint8_t *signature, size_t signatureSize);
  /prebuilts/ndk/current/platforms/android-24/arch-x86/usr/include/linux/
msdos_fs.h 129 __u8 signature; member in struct:fat_boot_sector::__anon67152::__anon67153
147 __u8 signature; member in struct:fat_boot_sector::__anon67152::__anon67154
  /prebuilts/ndk/current/platforms/android-24/arch-x86/usr/include/media/
NdkMediaDrm.h 304 * secure stop message to the server which verifies the signature and notifies the
428 * Generate a signature using the specified macAlgorithm over the message data
429 * referenced by message of size messageSize and store the signature in the
430 * buffer referenced signature of max size *signatureSize. If the buffer is not
431 * large enough to hold the signature, MEDIADRM_SHORT_BUFFER is returned and
438 uint8_t *signature, size_t *signatureSize);
441 * Perform a signature verification using the specified macAlgorithm over the message
443 * if the signature matches, otherwise MEDAIDRM_VERIFY_FAILED is returned. The key to
449 const uint8_t *signature, size_t signatureSize);
  /prebuilts/ndk/current/platforms/android-24/arch-x86_64/usr/include/linux/
msdos_fs.h 129 __u8 signature; member in struct:fat_boot_sector::__anon67929::__anon67930
147 __u8 signature; member in struct:fat_boot_sector::__anon67929::__anon67931
  /prebuilts/ndk/current/platforms/android-24/arch-x86_64/usr/include/media/
NdkMediaDrm.h 304 * secure stop message to the server which verifies the signature and notifies the
428 * Generate a signature using the specified macAlgorithm over the message data
429 * referenced by message of size messageSize and store the signature in the
430 * buffer referenced signature of max size *signatureSize. If the buffer is not
431 * large enough to hold the signature, MEDIADRM_SHORT_BUFFER is returned and
438 uint8_t *signature, size_t *signatureSize);
441 * Perform a signature verification using the specified macAlgorithm over the message
443 * if the signature matches, otherwise MEDAIDRM_VERIFY_FAILED is returned. The key to
449 const uint8_t *signature, size_t signatureSize);
  /system/tpm/attestation/client/
main.cc 84 --signature=<signature_file>
85 Verifies the signature in |signature_file| against the contents of
238 !command_line->HasSwitch("signature")) {
247 std::string signature; local
248 base::FilePath filename2(command_line->GetSwitchValueASCII("signature"));
249 if (!base::ReadFileToString(filename2, &signature)) {
258 signature);
450 WriteOutput(reply.signature());
458 const std::string& signature) {
464 input, signature));
    [all...]
  /system/tpm/trunks/
tpm_utility.h 130 // and uses it to sign the hash of |plaintext|. The signature produced is
131 // returned using the |signature| argument. |scheme| is used to specify the
132 // signature scheme used. By default it is TPM_ALG_RSASSA, but TPM_ALG_RSAPPS
141 std::string* signature) = 0;
143 // This method verifies that the signature produced on the plaintext was
144 // performed by |key_handle|. |scheme| and |hash| refer to the signature
145 // scheme used to sign the hash of |plaintext| and produce the signature.
148 // tpm. Returns TPM_RC_SUCCESS when the signature is correct.
154 const std::string& signature,
  /toolchain/binutils/binutils-2.25/gold/
gdb-index.h 78 add_type_unit(off_t tu_offset, off_t type_offset, uint64_t signature)
80 this->type_units_.push_back(Type_unit(tu_offset, type_offset, signature));
  /external/antlr/antlr-3.4/runtime/Ruby/lib/antlr3/
template.rb 326 signature = join( ', ' )
327 @splat and signature << ", *" << @splat.to_s
328 @block and signature << ", &" << @block.to_s
329 return( signature )
  /external/autotest/client/cros/tendo/n_faced_peerd/
dbus_property_exposer.py 94 signature='sa{sv}as')
  /external/autotest/client/site_tests/security_EnableChromeTesting/
security_EnableChromeTesting.py 50 # Pass an empty dbus.Array with the correct signature, taken from
52 empty_string_array = dbus.Array(signature="as")
  /external/boringssl/src/crypto/x509/
t_crl.c 125 X509_signature_print(out, x->sig_alg, x->signature);
  /external/chromium-trace/catapult/third_party/gsutil/third_party/oauth2client/tests/
test_jwt.py 71 signature = signer.sign('foo')
74 self.assertTrue(verifier.verify(b'foo', signature))
76 self.assertFalse(verifier.verify(b'bar', signature))
145 # Bad signature
147 self._check_jwt_failure(jwt, 'Invalid token signature')
  /external/glide/library/src/main/java/com/bumptech/glide/
BitmapRequestBuilder.java 456 public BitmapRequestBuilder<ModelType, TranscodeType> signature(Key signature) { method in class:BitmapRequestBuilder
457 super.signature(signature);
  /external/jacoco/
asm-debug-all-5.0.1.jar 
  /external/mockito/cglib-and-asm/src/org/mockito/asm/signature/
SignatureWriter.java 30 package org.mockito.asm.signature;
33 * A signature visitor that generates signatures in string format.
41 * Buffer used to construct the signature.
46 * Indicates if the signature contains formal type parameters.
51 * Indicates if the signature contains method parameter types.
176 * Returns the signature that was built by this signature writer.
178 * @return the signature that was built by this signature writer.
189 * Ends the formal type parameters section of the signature.
    [all...]
  /external/oauth/core/src/main/java/net/oauth/
SimpleOAuthValidator.java 21 import net.oauth.signature.OAuthSignatureMethod;
25 * is close to now and the signature is valid. Each check may be overridden.
39 * signature.
  /external/opencv3/3rdparty/libpng/
pnginfo.h 77 png_byte signature[8]; /* magic bytes read by libpng from start of file */ member in struct:png_info_def
  /external/tpm2/
Marshal_Certify.c 28 total_size += TPMT_SIGNATURE_Marshal(&source->signature, buffer, size);

Completed in 1573 milliseconds

<<21222324252627282930>>