/external/chromium_org/net/tools/quic/test_tools/ |
H A D | quic_test_client.cc | 48 const string& signature,
|
/external/chromium_org/third_party/jinja2/ |
H A D | compiler.py | 519 def signature(self, node, frame, extra_kwargs=None): member in class:CodeGenerator 1539 self.signature(node, frame) 1547 self.signature(node, frame) 1573 self.signature(node, frame, extra_kwargs)
|
/external/chromium_org/third_party/mesa/src/src/glsl/ |
H A D | ast.h | 610 * Function signature corresponding to this function prototype instance 617 class ir_function_signature *signature; member in class:ast_function
|
/external/chromium_org/third_party/tlslite/tlslite/ |
H A D | tlsconnection.py | 107 serverKeyExchange.signature = self.privateKey.sign( 694 "TackExtension contains an invalid signature"): 800 #Check the server's signature, if server chose an 807 #Extract signature bytes from ServerKeyExchange 808 sigBytes = serverKeyExchange.signature 813 "message without a signature"): 825 #Verify signature 1569 serverKeyExchange.signature = privateKey.sign(hashBytes) 1723 if not publicKey.verify(certificateVerify.signature, verifyBytes):
|
/external/doclava/src/com/google/doclava/ |
H A D | Stubs.java | 491 if (("values".equals(method.name()) && "()".equals(method.signature())) || 493 "(java.lang.String)".equals(method.signature()))) { 510 method.findRealOverriddenMethod(method.name(), method.signature(), notStrippable); 512 method.findRealOverriddenClass(method.name(), method.signature());
|
/external/mesa3d/src/glsl/ |
H A D | ast.h | 610 * Function signature corresponding to this function prototype instance 617 class ir_function_signature *signature; member in class:ast_function
|
/external/openssl/crypto/cms/ |
H A D | cms_asn1.c | 110 ASN1_SIMPLE(CMS_SignerInfo, signature, ASN1_OCTET_STRING),
|
/external/smali/dexlib2/src/main/java/org/jf/dexlib2/writer/ |
H A D | DexWriter.java | 246 byte[] signature = md.digest(); 247 if (signature.length != HeaderItem.SIGNATURE_SIZE) { 248 throw new RuntimeException("unexpected digest write: " + signature.length + " bytes"); 251 // write signature 253 output.write(signature); 1183 // signature placeholder
|
/external/smali/smali/src/main/antlr3/ |
H A D | smaliParser.g | 772 (COMMA signature=STRING_LITERAL)? )? 773 -> ^(I_LOCAL[$start, "I_LOCAL"] REGISTER NULL_LITERAL? $name? nonvoid_type_descriptor? $signature?);
|
/external/chromium_org/third_party/cython/src/Cython/Compiler/ |
H A D | Nodes.py | 2386 # If the C signature of a function has changed, we need to generate 2562 """Determines if the function's signature is compatible with a 2598 self.return_type = self.entry.signature.return_type() 2671 # Use the simpler calling signature for zero- and one-argument functions. 2672 if self.entry.signature is TypeSlots.pyfunction_signature: 2674 self.entry.signature = TypeSlots.pyfunction_noargs 2677 self.entry.signature = TypeSlots.pyfunction_onearg 2678 elif self.entry.signature is TypeSlots.pymethod_signature: 2680 self.entry.signature = TypeSlots.unaryfunc 2683 self.entry.signature [all...] |
/external/chromium_org/components/policy/core/common/cloud/ |
H A D | policy_builder.cc | 52 // SHA256 signature of kSigningKey for "example.com" domain. 111 // SHA256 signature of kNewSigningKey for "example.com" domain. 249 // PolicyData signature. 296 std::string* signature) { 304 signature->assign( 294 SignData(const std::string& data, crypto::RSAPrivateKey* key, std::string* signature) argument
|
/external/chromium_org/third_party/icu/source/common/ |
H A D | utrie.cpp | 806 header->signature=0x54726965; /* "Trie" */ 870 /* check the signature */ 872 if(header->signature!=0x54726965) {
|
/external/chromium_org/third_party/yasm/source/patched-yasm/tools/python-yasm/pyxelator/ |
H A D | ir.py | 133 def signature( self, tank=None ): member in class:Node 149 tank = self.signature(tank) 837 def __init__( self, item ): # XX __init__ uses different signature ! XX
|
/external/conscrypt/src/main/java/org/conscrypt/ |
H A D | NativeCrypto.java | 313 public static native int EVP_SignFinal(OpenSSLDigestContext ctx, byte[] signature, int offset, argument 321 public static native int EVP_VerifyFinal(OpenSSLDigestContext ctx, byte[] signature, argument 1043 /** GOST R 34.10-94 signature auth */ 1045 /** GOST R 34.10-2001 signature auth */
|
/external/icu/icu4c/source/common/ |
H A D | utrie.cpp | 806 header->signature=0x54726965; /* "Trie" */ 870 /* check the signature */ 872 if(header->signature!=0x54726965) {
|
/external/jarjar/lib/ |
H A D | asm-commons-4.0.jar | META-INF/MANIFEST.MF org/objectweb/asm/commons/AdviceAdapter.class " package org.objectweb.asm ... |
/external/owasp/sanitizer/tools/findbugs/lib/ |
H A D | asm-commons-3.3.jar | META-INF/MANIFEST.MF org/objectweb/asm/commons/AdviceAdapter.class " package org.objectweb.asm ... |
/external/srec/srec/crec/ |
H A D | srec_context.c | 2723 asr_int32_t signature = 0; local 2724 ENCODE(signature, arcID); 2725 ENCODE(signature, nodeID); 2726 ENCODE(signature, wordID); 2727 ENCODE(signature, labelID); 2728 ENCODE(signature, costdata); 2729 return signature;
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
H A D | org.eclipse.equinox.p2.repository.tools_2.0.1.R36x_v20100823.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
/external/chromium_org/extensions/browser/api/cast_channel/ |
H A D | cast_auth_util_nss.cc | 637 // 1. |signature| verification of |data| using |certificate|. 643 const std::string& signature = response.signature(); local 705 // Verify that the |signature| matches |data|. 716 const_cast<char*>(signature.data())); 717 signature_item.len = signature.length();
|
/external/chromium_org/extensions/browser/ |
H A D | extension_prefs.h | 548 void SetInstallSignature(const base::DictionaryValue* signature);
|
/external/chromium_org/net/cert/ |
H A D | x509_util_nss.cc | 164 SECStatus rv = SECOID_SetAlgorithmID(arena, &cert->signature, algo_id, 0);
|
/external/chromium_org/net/quic/ |
H A D | quic_client_session.cc | 669 state->server_config_sig = cached.signature();
|
/external/chromium_org/third_party/boringssl/src/ssl/ |
H A D | s3_srvr.c | 554 * we need them to verify a ChannelID signature on a 1602 /* send signature algorithm */ 2222 CBS certificate_verify, signature; local 2280 /* Parse and verify the signature. */ 2281 if (!CBS_get_u16_length_prefixed(&certificate_verify, &signature) || 2294 !EVP_PKEY_verify(pctx, CBS_data(&signature), CBS_len(&signature),
|
H A D | t1_lib.c | 708 /* List of supported signature algorithms and hashes. Should make this 749 * signature algorithms and, if so, writes the relevant digest into 759 uint8_t hash, signature; local 768 !CBS_get_u8(cbs, &signature)) 774 /* Check key type is consistent with signature */ 775 if (sigalg != signature) 799 /* Check signature matches a type we sent */ 803 if (hash == sent_sigs[0] && signature == sent_sigs[1]) 828 * if it isn't supported or doesn't appear in supported signature 846 /* Now go through all signature algorithm [all...] |