/external/chromium_org/chrome/browser/extensions/ |
H A D | install_signer.cc | 50 const char kSignatureKey[] = "signature"; 170 base::Base64Encode(signature, &signature_base64); 198 !base::Base64Decode(signature_base64, &result->signature)) { 235 bool InstallSigner::VerifySignature(const InstallSignature& signature) { argument 236 if (signature.ids.empty()) 240 for (ExtensionIdSet::const_iterator i = signature.ids.begin(); 241 i != signature.ids.end(); ++i) 245 if (!HashWithMachineId(signature.salt, &hash_base64)) 249 signed_data.append(signature.expire_date); 259 signature 448 std::string signature; local 482 HandleSignatureResult(const std::string& signature, const std::string& expire_date, const ExtensionIdSet& invalid_ids) argument [all...] |
H A D | sandboxed_unpacker.cc | 493 // Excessively large key or signature 533 std::vector<uint8> signature; local 534 signature.resize(header.signature_size); 535 len = fread(&signature.front(), sizeof(uint8), header.signature_size, 538 // Invalid signature 550 &signature.front(), 551 signature.size(),
|
/external/chromium_org/chrome/browser/supervised_user/ |
H A D | supervised_user_sync_service.cc | 95 std::string signature; local 96 dict->GetString(SupervisedUserSyncService::kPasswordSignatureKey, &signature); 107 signature, 333 std::string signature; local 335 &signature); 373 signature, encryption)));
|
/external/chromium_org/chromeos/network/onc/ |
H A D | onc_merger.cc | 345 const OncValueSignature& signature, 351 signature_ = &signature; 485 const OncValueSignature& signature, 493 signature, user_policy, device_policy, user_settings, shared_settings, 344 MergeDictionaries( const OncValueSignature& signature, const base::DictionaryValue* user_policy, const base::DictionaryValue* device_policy, const base::DictionaryValue* user_settings, const base::DictionaryValue* shared_settings, const base::DictionaryValue* active_settings) argument 484 MergeSettingsAndPoliciesToAugmented( const OncValueSignature& signature, const base::DictionaryValue* user_policy, const base::DictionaryValue* device_policy, const base::DictionaryValue* user_settings, const base::DictionaryValue* shared_settings, const base::DictionaryValue* active_settings) argument
|
H A D | onc_signature.cc | 474 const OncFieldSignature* GetFieldSignature(const OncValueSignature& signature, argument 476 if (!signature.fields) 478 for (const OncFieldSignature* field_signature = signature.fields; 483 if (signature.base_signature) 484 return GetFieldSignature(*signature.base_signature, onc_field_name); 508 bool FieldIsCredential(const OncValueSignature& signature, argument 512 if (&signature == entry->value_signature &&
|
/external/chromium_org/content/child/ |
H A D | site_isolation_policy.cc | 65 const StringPiece& signature = signatures[sig_index]; local 66 size_t signature_length = signature.length(); 71 data.begin(), data.begin() + signature_length, signature.data())) 447 // this signature. However, XML is case-sensitive. Don't we have to
|
/external/chromium_org/content/child/webcrypto/test/ |
H A D | rsa_ssa_unittest.cc | 797 std::vector<uint8_t> signature; local 800 // Compute a signature. 803 Sign(algorithm, private_key, CryptoData(data), &signature)); 805 // Ensure truncated signature does not verify by passing one less byte. 810 CryptoData(vector_as_array(&signature), signature.size() - 1), 815 // Ensure truncated signature does not verify by passing no bytes. 824 // Ensure corrupted signature does not verify. 825 std::vector<uint8_t> corrupt_sig = signature; 851 Sign(algorithm, private_key, CryptoData(data), &signature)); 873 &signature)); local 933 std::vector<uint8_t> signature; local [all...] |
/external/chromium_org/google_apis/gaia/ |
H A D | oauth_request_signer.cc | 257 // Implements shared signing logic, generating the signature and storing it in 258 // |parameters|. Returns true if the signature has been generated succesfully. 275 std::string signature; local 278 is_signed = SignHmacSha1(base, key, &signature); 281 is_signed = SignRsaSha1(base, key, &signature); 284 is_signed = SignPlaintext(base, key, &signature); 290 (*parameters)[kOAuthSignatureLabel] = signature;
|
/external/chromium_org/net/android/ |
H A D | keystore_openssl.cc | 466 std::vector<uint8> signature; local 469 if (!RawSignDigestWithPrivateKey(private_key, digest_sp, &signature)) { 474 // Note: With ECDSA, the actual signature may be smaller than 477 if (signature.size() > max_expected_size) { 479 << signature.size() << ", expected <= " 484 memcpy(sig, &signature[0], signature.size()); 485 *sig_len = signature.size();
|
H A D | keystore_unittest.cc | 39 // the generated signature matches 100% of what OpenSSL generates when 224 // random elements in the signature, it is not possible to compare 225 // signature bits directly. However, one can use the public key 228 const base::StringPiece& signature) { 243 reinterpret_cast<const unsigned char*>(signature.data()); 244 int siglen = static_cast<int>(signature.size()); 266 std::string signature; local 279 // With RSA, the signature will always be RSA_size() bytes. 281 unsigned char* p = OpenSSLWriteInto(&signature, 301 // Note, the actual signature ca 227 VerifyTestECDSASignature(const base::StringPiece& message, const base::StringPiece& signature) argument 342 CompareSignatureWithOpenSSL(const base::StringPiece& message, const base::StringPiece& signature, EVP_PKEY* openssl_key) argument 476 std::string signature; local 505 std::string signature; local 531 std::string signature; local 554 std::string signature; local [all...] |
/external/chromium_org/third_party/icu/source/common/ |
H A D | utrie2.cpp | 155 /* check the signature */ 157 if(header->signature!=UTRIE2_SIG) { 299 header->signature=UTRIE2_SIG; /* "Tri2" */ 382 uint32_t signature; local 386 signature=*(const uint32_t *)data; 387 if(signature==UTRIE2_SIG) { 390 if(anyEndianOk && signature==UTRIE2_OE_SIG) { 393 if(signature==UTRIE_SIG) { 396 if(anyEndianOk && signature==UTRIE_OE_SIG) { 426 trie.signature [all...] |
/external/chromium_org/third_party/mesa/src/src/glsl/ |
H A D | lower_jumps.cpp | 161 ir_function_signature* signature; member in struct:loop_record 175 this->signature = p_signature; 188 exec_list& list = this->loop ? this->loop->body_instructions : signature->body; 189 this->execute_flag = new(this->signature) ir_variable(glsl_type::bool_type, "execute_flag", ir_var_temporary); 190 list.push_head(new(this->signature) ir_assignment(new(this->signature) ir_dereference_variable(execute_flag), new(this->signature) ir_constant(true), 0)); 200 this->break_flag = new(this->signature) ir_variable(glsl_type::bool_type, "break_flag", ir_var_temporary); 202 this->loop->insert_before(new(this->signature) ir_assignment(new(this->signature) ir_dereference_variabl 210 ir_function_signature* signature; member in struct:function_record [all...] |
/external/chromium_org/third_party/mesa/src/src/mapi/glapi/ |
H A D | glapi_getproc.c | 305 set_entry_info( struct _glapi_function * entry, const char * signature, unsigned offset ) argument 309 if (signature == NULL) 312 sig_dup = str_dup(signature); 367 * Add code to compare \c parameter_signature with the parameter signature of 369 * the parameter signature of a static function. 409 * FIXME: the parameter signature for static functions?
|
/external/chromium_org/third_party/skia/platform_tools/android/app/jni/ |
H A D | com_skia_SkiaSampleRenderer.cpp | 167 const char signature[]) 169 jmethodID m = env->GetMethodID(clazz, name, signature); 166 GetJMethod(JNIEnv* env, jclass clazz, const char name[], const char signature[]) argument
|
/external/clang/lib/CodeGen/ |
H A D | CGObjCRuntime.cpp | 353 const CGFunctionInfo &signature = local 357 CGM.getTypes().GetFunctionType(signature)->getPointerTo(); 361 if (!signature.isVariadic()) 362 return MessageSendInfo(signature, signatureType); 365 FunctionType::ExtInfo einfo = signature.getExtInfo(); 368 signature.getRequiredArgs()); 379 // Derive the signature to call from that.
|
/external/elfutils/0.153/libasm/ |
H A D | libasmP.h | 220 /* The signature. */ 221 struct AsmSym *signature; member in struct:AsmScnGrp
|
/external/icu/icu4c/source/common/ |
H A D | utrie2.cpp | 155 /* check the signature */ 157 if(header->signature!=UTRIE2_SIG) { 299 header->signature=UTRIE2_SIG; /* "Tri2" */ 382 uint32_t signature; local 386 signature=*(const uint32_t *)data; 387 if(signature==UTRIE2_SIG) { 390 if(anyEndianOk && signature==UTRIE2_OE_SIG) { 393 if(signature==UTRIE_SIG) { 396 if(anyEndianOk && signature==UTRIE_OE_SIG) { 455 trie.signature [all...] |
/external/iproute2/misc/ |
H A D | rtacct.c | 71 char signature[128]; member in struct:rtacct_data 163 fprintf(fp, "#%s\n", kern_db->signature); 225 fprintf(fp, "#%s\n", kern_db->signature); 371 sprintf(kern_db->signature, 605 if (hist_db && hist_db->signature[0] && 606 strcmp(kern_db->signature, hist_db->signature)) { 615 if (hist_db && hist_db->signature[0] && 616 strcmp(hist_db->signature, "kernel")) { 622 strcpy(kern_db->signature, "kerne [all...] |
/external/mesa3d/src/glsl/ |
H A D | lower_jumps.cpp | 161 ir_function_signature* signature; member in struct:loop_record 175 this->signature = p_signature; 188 exec_list& list = this->loop ? this->loop->body_instructions : signature->body; 189 this->execute_flag = new(this->signature) ir_variable(glsl_type::bool_type, "execute_flag", ir_var_temporary); 190 list.push_head(new(this->signature) ir_assignment(new(this->signature) ir_dereference_variable(execute_flag), new(this->signature) ir_constant(true), 0)); 200 this->break_flag = new(this->signature) ir_variable(glsl_type::bool_type, "break_flag", ir_var_temporary); 202 this->loop->insert_before(new(this->signature) ir_assignment(new(this->signature) ir_dereference_variabl 210 ir_function_signature* signature; member in struct:function_record [all...] |
/external/mesa3d/src/mapi/glapi/ |
H A D | glapi_getproc.c | 305 set_entry_info( struct _glapi_function * entry, const char * signature, unsigned offset ) argument 309 if (signature == NULL) 312 sig_dup = str_dup(signature); 367 * Add code to compare \c parameter_signature with the parameter signature of 369 * the parameter signature of a static function. 409 * FIXME: the parameter signature for static functions?
|
/external/mockito/cglib-and-asm/src/org/mockito/asm/tree/ |
H A D | MethodNode.java | 68 * The method's signature. May be <tt>null</tt>.
70 public String signature;
field in class:MethodNode 157 * @param signature the method's signature. May be <tt>null</tt>.
166 final String signature,
173 this.signature = signature;
336 final String signature,
343 signature,
409 signature,
162 MethodNode( final int access, final String name, final String desc, final String signature, final String[] exceptions) argument 333 visitLocalVariable( final String name, final String desc, final String signature, final Label start, final Label end, final int index) argument [all...] |
/external/mockito/cglib-and-asm/src/org/mockito/asm/util/ |
H A D | TraceMethodVisitor.java | 38 import org.mockito.asm.signature.SignatureReader;
440 final String signature,
454 if (signature != null) {
456 appendDescriptor(FIELD_SIGNATURE, signature);
459 SignatureReader r = new SignatureReader(signature);
469 mv.visitLocalVariable(name, desc, signature, start, end, index);
437 visitLocalVariable( final String name, final String desc, final String signature, final Label start, final Label end, final int index) argument
|
/external/skia/platform_tools/android/app/jni/ |
H A D | com_skia_SkiaSampleRenderer.cpp | 167 const char signature[]) 169 jmethodID m = env->GetMethodID(clazz, name, signature); 166 GetJMethod(JNIEnv* env, jclass clazz, const char name[], const char signature[]) argument
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | x509v3.h | 52 struct x509_algorithm_identifier signature; member in struct:x509_certificate
|
/external/wpa_supplicant_8/src/tls/ |
H A D | x509v3.h | 52 struct x509_algorithm_identifier signature; member in struct:x509_certificate
|