/cts/tools/dasm/src/dasm/ |
Utils.java | 85 String signature = convertDotsToSlashes(name); local 92 sigpos = signature.indexOf('('); 95 i = signature.length() - 1; 102 if (signature.charAt(i) == '/') { 108 result[0] = signature.substring(0, mpos); 109 result[1] = signature.substring(mpos + 1, sigpos); 110 result[2] = signature.substring(sigpos); 112 throw new IllegalArgumentException("malformed method signature : "
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/tests/ |
test_pkcs1.py | 64 signature = pkcs1.sign(message, self.priv, 'SHA-256') 65 print("\tSignature: %r" % signature) 67 self.assertTrue(pkcs1.verify(message, signature, self.pub)) 72 signature = pkcs1.sign(b('je moeder'), self.priv, 'SHA-256') 74 b('mijn moeder'), signature, self.pub) 82 signature = pkcs1.sign(message, self.priv, 'SHA-256') 84 message, signature, otherpub)
|
/frameworks/base/tools/layoutlib/create/src/com/android/tools/layoutlib/create/ |
DelegateClassAdapter.java | 76 public FieldVisitor visitField(int access, String name, String desc, String signature, 83 return super.visitField(access, name, desc, signature, value); 88 String signature, String[] exceptions) { 98 return super.visitMethod(access, name, desc, signature, exceptions); 112 MethodVisitor mwDelegate = super.visitMethod(access, name, desc, signature, exceptions); 135 desc, signature, exceptions); 137 desc, signature, exceptions);
|
AbstractClassAdapter.java | 25 import org.objectweb.asm.signature.SignatureReader; 26 import org.objectweb.asm.signature.SignatureVisitor; 27 import org.objectweb.asm.signature.SignatureWriter; 168 public void visit(int version, int access, String name, String signature, 172 signature = renameTypeSignature(signature); 179 super.visit(version, access, name, signature, superName, interfaces); 196 String signature, String[] exceptions) { 198 signature = renameTypeSignature(signature); [all...] |
/external/ImageMagick/MagickCore/ |
timer.c | 99 timer_info->signature=MagickCoreSignature; 131 assert(time_info->signature == MagickCoreSignature); 170 assert(timer_info->signature == MagickCoreSignature); 171 timer_info->signature=(~MagickCoreSignature); 240 assert(time_info->signature == MagickCoreSignature); 279 time_info->signature=MagickCoreSignature; 311 assert(time_info->signature == MagickCoreSignature); 345 assert(time_info->signature == MagickCoreSignature); 381 assert(time_info->signature == MagickCoreSignature); 424 assert(time_info->signature == MagickCoreSignature) [all...] |
/external/jacoco/org.jacoco.core/src/org/jacoco/core/internal/flow/ |
ClassProbesAdapter.java | 54 final String signature, final String superName, 57 super.visit(version, access, name, signature, superName, interfaces); 62 final String desc, final String signature, final String[] exceptions) { 65 signature, exceptions); 73 return new MethodSanitizer(null, access, name, desc, signature,
|
/external/mesa3d/src/glsl/ |
opt_dead_functions.cpp | 42 this->signature = sig; 46 ir_function_signature *signature; member in class:__anon20961::signature_entry 79 if (entry->signature == sig) 130 entry->signature->remove(); 131 delete entry->signature; 137 /* We don't just do this above when we nuked a signature because of
|
/external/oauth/core/src/main/java/net/oauth/signature/ |
HMAC_SHA1.java | 17 package net.oauth.signature; 39 String signature = base64Encode(computeSignature(baseString)); local 40 return signature; 49 protected boolean isValid(String signature, String baseString) 53 byte[] actual = decodeBase64(signature);
|
/external/vboot_reference/host/lib/ |
signature_digest.c | 45 uint8_t* signature = NULL; local 56 signature = (uint8_t*) malloc(siglen_map[algorithm]); 60 if (signature) { 63 signature, /* Output signature. */ 72 return signature;
|
/external/vboot_reference/tests/ |
rsa_verify_benchmark.c | 16 #define NUM_OPERATIONS 100 /* Number of signature operations to time. */ 24 uint8_t* signature = NULL; local 55 /* Get signature to verify against. */ 58 signature = BufferFromFile(file_name, &sig_len); 59 if (!signature) { 60 VBDEBUG(("Couldn't read signature file.\n")); 67 if (!RSAVerify(key, signature, sig_len, algorithm, digest)) 68 VBDEBUG(("Warning: Signature Check Failed.\n")); 81 free(signature);
|
/libcore/ojluni/src/main/java/java/security/ |
SignedObject.java | 36 * object, the (to-be-)signed object and its signature. 42 * <p> The underlying signing algorithm is designated by the Signature 47 * Signature signingEngine = Signature.getInstance(algorithm, 57 * Signature verificationEngine = 58 * Signature.getInstance(algorithm, provider); 74 * customized signature engines, which can implement signature 77 * verifier code be aware what <code>Signature</code> engine is being 79 * is invoked to verify a signature. In other words, a maliciou 130 private byte[] signature; field in class:SignedObject [all...] |
/external/apache-harmony/jdwp/src/test/java/org/apache/harmony/jpda/tests/framework/jdwp/ |
Frame.java | 209 private String signature; field in class:Frame.Variable 226 signature = "unknown"; 271 * Gets signature of the variable reference type. 276 return signature; 280 * Sets new signature and detects value of a type tag. 282 * @param signature 284 public void setSignature(String signature) { 285 switch (signature.charAt(0)) { 336 this.signature = signature; [all...] |
/external/mockito/cglib-and-asm/src/org/mockito/asm/ |
FieldWriter.java | 67 * The index of the constant pool item that contains the signature of this
70 private int signature;
field in class:FieldWriter 104 * @param signature the field's signature. May be <tt>null</tt>.
112 final String signature,
125 if (ClassReader.SIGNATURES && signature != null) {
126 this.signature = cw.newUTF8(signature);
191 if (ClassReader.SIGNATURES && signature != 0) {
192 cw.newUTF8("Signature");
[all...] |
/external/mockito/cglib-and-asm/src/org/mockito/asm/tree/ |
ClassNode.java | 66 * The signature of the class. Mayt be <tt>null</tt>.
68 public String signature;
field in class:ClassNode 157 final String signature,
164 this.signature = signature;
203 final String signature,
206 FieldNode fn = new FieldNode(access, name, desc, signature, value);
215 final String signature,
221 signature,
240 cv.visit(version, access, name, signature, superName, interfaces); [all...] |
/external/eclipse-windowbuilder/propertysheet/src/org/eclipse/wb/internal/core/utils/reflect/ |
ReflectionUtils.java | 44 // Signature 136 String signature = getMethodSignature(method); local 137 if (!methods.containsKey(signature)) { 139 methods.put(signature, method); 146 String signature = getMethodSignature(method); local 147 if (!methods.containsKey(signature)) { 149 methods.put(signature, method); 158 * @return signature for given {@link Method}. This signature is not same signature as in JVM o 255 String signature = getMethodSignature(name, parameterTypes); local [all...] |
/art/tools/dexfuzz/src/dexfuzz/program/ |
IdCreator.java | 47 private int findProtoIdInsertionPoint(String signature) { 48 int returnTypeIdx = findTypeId(convertSignatureToReturnType(signature)); 49 String[] parameterListStrings = convertSignatureToParameterList(signature); 86 private int findMethodIdInsertionPoint(String className, String methodName, String signature) { 89 int protoIdx = findProtoId(signature); 169 private int createMethodId(String className, String methodName, String signature) { 175 int protoIdx = findOrCreateProtoId(signature); 194 int newMethodIdIdx = findMethodIdInsertionPoint(className, methodName, signature); 208 className, methodName, signature, newMethodIdIdx)); 218 private int findMethodId(String className, String methodName, String signature) { [all...] |
/external/jacoco/org.jacoco.core/src/org/jacoco/core/internal/analysis/ |
ClassAnalyzer.java | 66 final String signature, final String superName, 69 noMatch, stringPool.get(signature), stringPool.get(superName), 80 final String desc, final String signature, final String[] exceptions) { 89 stringPool.get(signature), probes) { 110 final String desc, final String signature, final Object value) { 112 return super.visitField(access, name, desc, signature, value);
|
/libcore/benchmarks/src/benchmarks/regression/ |
SignatureBenchmark.java | 25 import java.security.Signature; 30 * Tests RSA and DSA signature creation and verification. 62 private byte[] signature; field in class:SignatureBenchmark 81 this.signature = SIGNATURES.get(signatureAlgorithm); 82 if (this.signature == null) { 83 Signature signer = Signature.getInstance(signatureAlgorithm); 86 this.signature = signer.sign(); 87 SIGNATURES.put(signatureAlgorithm, signature); 93 Signature signer [all...] |
/external/dbus/dbus/ |
dbus-marshal-validate-util.c | 227 "not a valid signature", 234 /* Signature with reason */ 435 /* Signature validation */ 444 _dbus_warn ("Signature \"%s\" should have been valid\n", valid_signatures[i]); 445 _dbus_assert_not_reached ("invalid signature"); 459 _dbus_warn ("Signature \"%s\" should have been invalid\n", invalid_signatures[i]); 460 _dbus_assert_not_reached ("valid signature"); 481 _dbus_assert_not_reached ("validated too-long signature"); 523 DBusString signature; local 526 if (!_dbus_string_init (&signature) || !_dbus_string_init (&body) [all...] |
/prebuilts/gdb/darwin-x86/lib/python2.7/xml/etree/ |
ElementPath.py | 150 signature = [] 158 signature.append(token[0] or "-") 160 signature = "".join(signature) 161 # use signature to determine predicate type 162 if signature == "@-": 170 if signature == "@-='": 179 if signature == "-" and not re.match("\d+$", predicate[0]): 187 if signature == "-='" and not re.match("\d+$", predicate[0]): 198 if signature == "-" or signature == "-()" or signature == "-()-" [all...] |
/prebuilts/gdb/linux-x86/lib/python2.7/xml/etree/ |
ElementPath.py | 150 signature = [] 158 signature.append(token[0] or "-") 160 signature = "".join(signature) 161 # use signature to determine predicate type 162 if signature == "@-": 170 if signature == "@-='": 179 if signature == "-" and not re.match("\d+$", predicate[0]): 187 if signature == "-='" and not re.match("\d+$", predicate[0]): 198 if signature == "-" or signature == "-()" or signature == "-()-" [all...] |
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/xml/etree/ |
ElementPath.py | 150 signature = [] 158 signature.append(token[0] or "-") 160 signature = "".join(signature) 161 # use signature to determine predicate type 162 if signature == "@-": 170 if signature == "@-='": 179 if signature == "-" and not re.match("\d+$", predicate[0]): 187 if signature == "-='" and not re.match("\d+$", predicate[0]): 198 if signature == "-" or signature == "-()" or signature == "-()-" [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/xml/etree/ |
ElementPath.py | 150 signature = [] 158 signature.append(token[0] or "-") 160 signature = "".join(signature) 161 # use signature to determine predicate type 162 if signature == "@-": 170 if signature == "@-='": 179 if signature == "-" and not re.match("\d+$", predicate[0]): 187 if signature == "-='" and not re.match("\d+$", predicate[0]): 198 if signature == "-" or signature == "-()" or signature == "-()-" [all...] |
/external/boringssl/src/crypto/x509/ |
x_spki.c | 75 ASN1_SIMPLE(NETSCAPE_SPKI, signature, ASN1_BIT_STRING)
|
/external/glide/library/src/main/java/com/bumptech/glide/load/engine/ |
EngineKeyFactory.java | 13 public EngineKey buildKey(String id, Key signature, int width, int height, ResourceDecoder cacheDecoder, 16 return new EngineKey(id, signature, width, height, cacheDecoder, sourceDecoder, transformation, encoder,
|