/external/glide/library/src/main/java/com/bumptech/glide/ |
RequestManager.java | 21 import com.bumptech.glide.signature.ApplicationVersionSignature; 22 import com.bumptech.glide.signature.MediaStoreSignature; 23 import com.bumptech.glide.signature.StringSignature; 225 * signature. 237 * Returns a request builder that loads data from {@link String}s using an empty signature. 243 * {@link com.bumptech.glide.GenericRequestBuilder#signature(com.bumptech.glide.load.Key)} to mixin a signature 270 * Returns a request builder to load data from {@link android.net.Uri}s using no signature. 276 * {@link com.bumptech.glide.GenericRequestBuilder#signature(com.bumptech.glide.load.Key)} to mixin a signature 317 Key signature = new MediaStoreSignature(mimeType, dateModified, orientation); local [all...] |
/external/libweave/src/privet/ |
security_manager_unittest.cc | 89 void PairAndAuthenticate(std::string* fingerprint, std::string* signature) { 105 fingerprint, signature, nullptr)); 107 EXPECT_TRUE(IsBase64(*signature)); 180 std::string signature; local 183 security_.ConfirmPairing("123", "345", &fingerprint, &signature, &error)); 225 std::string fingerprint, signature; local 229 &fingerprint, &signature, nullptr); 285 std::string signature; local 286 PairAndAuthenticate(&fingerprint, &signature);
|
/external/proguard/src/proguard/optimize/evaluation/ |
SimpleEnumDescriptorSimplifier.java | 199 // Simplify the signature. 213 // Simplify the code, the signature, and the parameter annotations, 290 // Update the signature if it has any simple enum classes. 291 String signature = signatureAttribute.getSignature(clazz); local 292 String newSignature = simplifyDescriptor(signature, 295 if (!signature.equals(newSignature)) 297 // Update the signature. 310 // Compute the new signature. 311 String signature = signatureAttribute.getSignature(clazz); local 312 String newSignature = simplifyDescriptor(signature, 353 String signature = localVariableTypeInfo.getSignature(clazz); local [all...] |
/developers/build/prebuilts/gradle/BasicAndroidKeyStore/Application/src/main/java/com/example/android/basicandroidkeystore/ |
BasicAndroidKeyStoreFragment.java | 38 import java.security.Signature; 55 // Some sample data to sign, and later verify using the generated signature. 58 // Just a handy place to store the signature in between signing and verifying. 108 Log.w(TAG, "Invalid Signature", e); 114 Log.d(TAG, "Signature: " + mSignatureStr); 136 Log.w(TAG, "Invalid Signature", e); 139 Log.d(TAG, "Data Signature Verified"); 195 * Signs the data using the key pair stored in the Android Key Store. This signature can be 197 * @return A string encoding of the data signature generated 240 // This class doesn't actually represent the signature, [all...] |
/developers/samples/android/security/keystore/BasicAndroidKeyStore/Application/src/main/java/com/example/android/basicandroidkeystore/ |
BasicAndroidKeyStoreFragment.java | 38 import java.security.Signature; 55 // Some sample data to sign, and later verify using the generated signature. 58 // Just a handy place to store the signature in between signing and verifying. 108 Log.w(TAG, "Invalid Signature", e); 114 Log.d(TAG, "Signature: " + mSignatureStr); 136 Log.w(TAG, "Invalid Signature", e); 139 Log.d(TAG, "Data Signature Verified"); 195 * Signs the data using the key pair stored in the Android Key Store. This signature can be 197 * @return A string encoding of the data signature generated 240 // This class doesn't actually represent the signature, [all...] |
/development/samples/browseable/BasicAndroidKeyStore/src/com.example.android.basicandroidkeystore/ |
BasicAndroidKeyStoreFragment.java | 38 import java.security.Signature; 55 // Some sample data to sign, and later verify using the generated signature. 58 // Just a handy place to store the signature in between signing and verifying. 108 Log.w(TAG, "Invalid Signature", e); 114 Log.d(TAG, "Signature: " + mSignatureStr); 136 Log.w(TAG, "Invalid Signature", e); 139 Log.d(TAG, "Data Signature Verified"); 195 * Signs the data using the key pair stored in the Android Key Store. This signature can be 197 * @return A string encoding of the data signature generated 240 // This class doesn't actually represent the signature, [all...] |
/external/ImageMagick/MagickCore/ |
static.c | 94 assert((*image)->signature == MagickCoreSignature); 127 signature; 132 signature=image_filter(image,argc,argv,exception); 136 if (signature != MagickImageFilterSignature) 140 (unsigned long) signature,(unsigned long) 125 signature; local
|
/external/ImageMagick/MagickWand/ |
wand-view.c | 95 signature; 130 assert(wand_view->signature == MagickWandSignature); 154 clone_view->signature=MagickWandSignature; 199 assert(wand_view->signature == MagickWandSignature); 205 wand_view->signature=(~MagickWandSignature); 231 % The callback signature is: 286 assert(source->signature == MagickWandSignature); 426 assert(wand_view->signature == MagickWandSignature); 478 assert(wand_view->signature == MagickWandSignature); 500 % The callback signature is 93 signature; member in struct:_WandView [all...] |
/external/ImageMagick/coders/ |
aai.c | 132 assert(image_info->signature == MagickCoreSignature); 137 assert(exception->signature == MagickCoreSignature); 358 assert(image_info->signature == MagickCoreSignature); 360 assert(image->signature == MagickCoreSignature); 364 assert(exception->signature == MagickCoreSignature);
|
art.c | 126 assert(image_info->signature == MagickCoreSignature); 131 assert(exception->signature == MagickCoreSignature); 310 assert(image_info->signature == MagickCoreSignature); 312 assert(image->signature == MagickCoreSignature); 316 assert(exception->signature == MagickCoreSignature);
|
avs.c | 134 assert(image_info->signature == MagickCoreSignature); 139 assert(exception->signature == MagickCoreSignature); 361 assert(image_info->signature == MagickCoreSignature); 363 assert(image->signature == MagickCoreSignature); 367 assert(exception->signature == MagickCoreSignature);
|
fax.c | 198 assert(image_info->signature == MagickCoreSignature); 203 assert(exception->signature == MagickCoreSignature); 376 assert(image_info->signature == MagickCoreSignature); 378 assert(image->signature == MagickCoreSignature); 382 assert(exception->signature == MagickCoreSignature);
|
hrz.c | 129 assert(image_info->signature == MagickCoreSignature); 134 assert(exception->signature == MagickCoreSignature); 304 assert(image_info->signature == MagickCoreSignature); 306 assert(image->signature == MagickCoreSignature); 310 assert(exception->signature == MagickCoreSignature);
|
mono.c | 128 assert(image_info->signature == MagickCoreSignature); 133 assert(exception->signature == MagickCoreSignature); 314 assert(image_info->signature == MagickCoreSignature); 316 assert(image->signature == MagickCoreSignature); 320 assert(exception->signature == MagickCoreSignature);
|
mtv.c | 133 assert(image_info->signature == MagickCoreSignature); 138 assert(exception->signature == MagickCoreSignature); 360 assert(image_info->signature == MagickCoreSignature); 362 assert(image->signature == MagickCoreSignature); 366 assert(exception->signature == MagickCoreSignature);
|
otb.c | 131 assert(image_info->signature == MagickCoreSignature); 136 assert(exception->signature == MagickCoreSignature); 333 assert(image_info->signature == MagickCoreSignature); 335 assert(image->signature == MagickCoreSignature); 339 assert(exception->signature == MagickCoreSignature);
|
rgf.c | 134 assert(image_info->signature == MagickCoreSignature); 139 assert(exception->signature == MagickCoreSignature); 339 assert(image_info->signature == MagickCoreSignature); 341 assert(image->signature == MagickCoreSignature); 345 assert(exception->signature == MagickCoreSignature);
|
uyvy.c | 127 assert(image_info->signature == MagickCoreSignature); 132 assert(exception->signature == MagickCoreSignature); 320 assert(image_info->signature == MagickCoreSignature); 322 assert(image->signature == MagickCoreSignature); 328 assert(exception->signature == MagickCoreSignature);
|
vicar.c | 189 assert(image_info->signature == MagickCoreSignature); 194 assert(exception->signature == MagickCoreSignature); 462 assert(image_info->signature == MagickCoreSignature); 464 assert(image->signature == MagickCoreSignature); 468 assert(exception->signature == MagickCoreSignature);
|
wbmp.c | 151 assert(image_info->signature == MagickCoreSignature); 156 assert(exception->signature == MagickCoreSignature); 377 assert(image_info->signature == MagickCoreSignature); 379 assert(image->signature == MagickCoreSignature); 383 assert(exception->signature == MagickCoreSignature);
|
/external/apache-harmony/jdwp/src/test/java/org/apache/harmony/jpda/tests/jdwp/StackFrame/ |
JDWPStackFrameTestCase.java | 63 String signature, name; field in class:JDWPStackFrameTestCase.VarInfo 66 public VarInfo(String name, int slot, String signature) { 68 this.signature = signature; 77 return signature;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/ |
X509V2AttributeCertificate.java | 11 import java.security.Signature; 176 Signature signature = null; local 180 throw new CertificateException("Signature algorithm in certificate info not same as outer certificate"); 183 signature = Signature.getInstance(cert.getSignatureAlgorithm().getAlgorithm().getId(), provider); 185 signature.initVerify(key); 189 signature.update(cert.getAcinfo().getEncoded()); 196 if (!signature.verify(this.getSignature())) 198 throw new InvalidKeyException("Public key presented not for certificate signature"); [all...] |
/external/glide/library/src/main/java/com/bumptech/glide/load/resource/gif/ |
GifFrameManager.java | 32 private final FrameSignature signature; field in class:GifFrameManager 55 this.signature = new FrameSignature(); 65 .signature(signature) 92 // Use an incrementing signature to make sure we never hit an active resource that matches one of our frames. 93 signature.increment();
|
/frameworks/base/keystore/java/android/security/keystore/ |
AndroidKeyStoreSignatureSpiBase.java | 136 * Configures this signature instance to use the provided key. 321 byte[] signature; 328 signature = mMessageStreamer.doFinal( 330 null, // no signature provided -- it'll be generated by this invocation 337 return signature; 341 protected final boolean engineVerify(byte[] signature) throws SignatureException { 356 signature, 361 "Signature verification unexpected produced output: " + output.length 403 * Returns {@code true} if this signature is initialized for signing, {@code false} if this 404 * signature is initialized for verification [all...] |
/system/keymaster/ |
ecdsa_operation.cpp | 139 const Buffer& input, const Buffer& /* signature */, 162 if (EVP_DigestSignFinal(&digest_ctx_, nullptr /* signature */, &siglen) != 1) 204 const Buffer& input, const Buffer& signature, 218 signature.peek_read(), signature.available_read(), ecdsa.get()); 223 } else if (!EVP_DigestVerifyFinal(&digest_ctx_, signature.peek_read(), 224 signature.available_read()))
|