/external/chromium_org/chrome/browser/extensions/ |
H A D | install_signer.cc | 50 const char kSignatureKey[] = "signature"; 170 base::Base64Encode(signature, &signature_base64); 198 !base::Base64Decode(signature_base64, &result->signature)) { 235 bool InstallSigner::VerifySignature(const InstallSignature& signature) { argument 236 if (signature.ids.empty()) 240 for (ExtensionIdSet::const_iterator i = signature.ids.begin(); 241 i != signature.ids.end(); ++i) 245 if (!HashWithMachineId(signature.salt, &hash_base64)) 249 signed_data.append(signature.expire_date); 259 signature 448 std::string signature; local 482 HandleSignatureResult(const std::string& signature, const std::string& expire_date, const ExtensionIdSet& invalid_ids) argument [all...] |
/external/chromium_org/tools/generate_stubs/ |
H A D | generate_stubs.py | 15 signatures (one signature per line). The output is either a windows def file, 394 The format of the input file is one C-style function signature per line, no 409 signature. 412 BadSignatureError: A line could not be parsed as a signature. 437 signatures: The list of signature hashes, as produced by ParseSignatures, 469 signatures: The list of signature hashes, as produced by ParseSignatures, 530 signatures: The list of signature hashes, as produced by ParseSignatures, 615 def StubFunctionPointer(cls, signature): 616 """Generates a function pointer declaration for the given signature. 619 signature [all...] |
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/x509/ |
H A D | CertificateListTest.java | 60 private static AlgorithmIdentifier signature; field in class:CertificateListTest 64 signature = new AlgorithmIdentifier(algOID, algParams); 142 new TBSCertList(2, signature, issuer, thisUpdate, 146 new CertificateList(tbscertlist, signature, signatureValue); 166 AlgorithmIdentifier signature = 170 new TBSCertList(signature, issuer, thisUpdate); 172 new CertificateList(tbscl, signature, new byte[] { 0 }); 177 tbscl = new TBSCertList(2, signature, issuer, thisUpdate, 180 cl = new CertificateList(tbscl, signature, new byte[] { 0 }); 204 signature [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/ |
H A D | V3TBSCertificateGenerator.java | 17 * signature AlgorithmIdentifier, 34 AlgorithmIdentifier signature; field in class:V3TBSCertificateGenerator 56 AlgorithmIdentifier signature) 58 this.signature = signature; 160 if ((serialNumber == null) || (signature == null) 171 v.add(signature); 55 setSignature( AlgorithmIdentifier signature) argument
|
/external/conscrypt/src/test/java/org/conscrypt/ |
H A D | SignatureTest.java | 109 byte[] signature = sig.sign(); 110 assertNotNull(sig.getAlgorithm(), signature); 111 assertTrue(sig.getAlgorithm(), signature.length > 0); 115 assertTrue(sig.getAlgorithm(), sig.verify(signature)); 119 assertTrue(sig.getAlgorithm(), sig.verify(signature)); 123 sig.verify(signature);
|
/external/javassist/src/main/javassist/expr/ |
H A D | MethodCall.java | 118 * Returns the method signature (the parameter types 120 * The method signature is represented by a character string 184 String classname, methodname, signature; 191 signature = constPool.getInterfaceMethodrefType(index); 198 signature = constPool.getMethodrefType(index); 207 CtClass[] params = Descriptor.getParameterTypes(signature, cp); 208 CtClass retType = Descriptor.getReturnType(signature, cp); 217 methodname, signature);
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/pkcs10/ |
H A D | CertificationRequestTest.java | 56 byte[] signature = { (byte) 0x01, (byte) 0x02, (byte) 0x03, 60 signatureAlgId, signature); 65 assertTrue(Arrays.equals(signature, certReq.getSignature()));
|
/external/chromium_org/crypto/third_party/nss/ |
H A D | secsign.cc | 99 // Compute signature of hash. 120 rv = DSAU_EncodeDerSigWithLen(&sd.signature, &sig, sig.len); 123 sd.signature.len <<= 3; // Convert to bit string. 129 PORT_Free(sd.signature.data);
|
/external/chromium_org/third_party/mesa/src/src/mesa/main/ |
H A D | remap.c | 80 * It begins with the parameter signature of the function, 90 const char *signature; local 97 signature = spec; 114 return _glapi_add_dispatch(names, signature);
|
/external/mesa3d/src/mesa/main/ |
H A D | remap.c | 80 * It begins with the parameter signature of the function, 90 const char *signature; local 97 signature = spec; 114 return _glapi_add_dispatch(names, signature);
|
/external/opencv/otherlibs/highgui/ |
H A D | grfmt_tiff.h | 99 bool CheckFormat( const char* signature ); 119 bool CheckFormat( const char* signature ); 175 bool CheckSignature( const char* signature );
|
/external/replicaisland/src/com/replica/replicaisland/ |
H A D | TiledWorld.java | 68 // First byte: signature. Must always be decimal 42. 76 int signature; 78 signature = (byte)byteStream.read(); 79 if (signature == 42) {
|
/external/apache-harmony/jdwp/src/test/java/org/apache/harmony/jpda/tests/jdwp/VirtualMachine/ |
H A D | ClassesBySignatureTest.java | 51 * for signature of HelloWorld class and checks that: 54 * returned referenceTypeID returns the expected string signature; 70 String signature; 103 signature = replySignature.getNextValueAsString(); 105 logWriter.println("\ttypeID = " + typeID + "(" + signature + ")"); 106 if (!SIGNATURE001.equals(signature)) {
|
/external/chromium_org/chrome/browser/renderer_host/pepper/ |
H A D | pepper_platform_verification_message_filter.cc | 93 const std::string& signature, 102 DCHECK_EQ(signature.size(), 0u); 109 std::vector<uint8_t>(signature.begin(), signature.end()), 89 ChallengePlatformCallback( ppapi::host::ReplyMessageContext reply_context, chromeos::attestation::PlatformVerificationFlow::Result challenge_result, const std::string& signed_data, const std::string& signature, const std::string& platform_key_certificate) argument
|
/external/chromium_org/chrome/common/extensions/api/networking_private/ |
H A D | networking_private_crypto.h | 21 // 3) |signature| is a valid signature for |data|, using the public key in 24 const std::string& signature,
|
/external/chromium_org/chromeos/network/onc/ |
H A D | onc_merger.h | 45 const OncValueSignature& signature,
|
H A D | onc_normalizer.cc | 36 const OncValueSignature& signature, 40 Mapper::MapObject(signature, onc_object, error); 48 if (&signature == &kCertificateSignature) 50 else if (&signature == &kEAPSignature) 52 else if (&signature == &kEthernetSignature) 54 else if (&signature == &kIPsecSignature) 56 else if (&signature == &kNetworkConfigurationSignature) 58 else if (&signature == &kOpenVPNSignature) 60 else if (&signature == &kProxySettingsSignature) 62 else if (&signature 35 MapObject( const OncValueSignature& signature, const base::DictionaryValue& onc_object, bool* error) argument [all...] |
/external/chromium_org/crypto/ |
H A D | ec_signature_creator_impl.h | 20 std::vector<uint8>* signature) OVERRIDE;
|
H A D | signature_creator_nss.cc | 75 std::vector<uint8>* signature) { 88 signature->assign(signature_item.data, 104 bool SignatureCreator::Final(std::vector<uint8>* signature) { argument 110 signature->assign(signature_item.data, 71 Sign(RSAPrivateKey* key, HashAlgorithm hash_alg, const uint8* data, int data_len, std::vector<uint8>* signature) argument
|
H A D | signature_verifier_nss.cc | 36 const unsigned char* signature, 49 const_cast<unsigned char*>(signature), 78 const uint8* signature, 85 signature_.assign(signature, signature + signature_len); 115 sig.data = const_cast<uint8*>(signature); 124 // A corrupted RSA signature could be detected without the data, so 141 const uint8* signature, 148 signature_.assign(signature, signature 32 VerifyRSAPSS_End(SECKEYPublicKey* public_key, HASHContext* hash_context, HASH_HashType mask_hash_alg, unsigned int salt_len, const unsigned char* signature, unsigned int signature_len) argument 76 VerifyInit(const uint8* signature_algorithm, int signature_algorithm_len, const uint8* signature, int signature_len, const uint8* public_key_info, int public_key_info_len) argument 138 VerifyInitRSAPSS(HashAlgorithm hash_alg, HashAlgorithm mask_hash_alg, int salt_len, const uint8* signature, int signature_len, const uint8* public_key_info, int public_key_info_len) argument [all...] |
/external/chromium_org/third_party/boringssl/src/crypto/x509/ |
H A D | a_verify.c | 75 ASN1_BIT_STRING *signature, void *asn, EVP_PKEY *pkey) 92 /* Convert signature OID into digest and public key OIDs */ 106 signature, pkey); 160 if (EVP_DigestVerifyFinal(&ctx,signature->data, 161 (size_t)signature->length) <= 0) 74 ASN1_item_verify(const ASN1_ITEM *it, X509_ALGOR *a, ASN1_BIT_STRING *signature, void *asn, EVP_PKEY *pkey) argument
|
/external/kernel-headers/original/uapi/linux/ |
H A D | cycx_cfm.h | 78 * @signature - CFM file signature 87 char signature[80]; member in struct:cycx_firmware
|
/external/mockito/cglib-and-asm/src/org/mockito/asm/signature/ |
H A D | SignatureVisitor.java | 30 package org.mockito.asm.signature;
33 * A visitor to visit a generic signature. The methods of this interface must be
82 * @return a non null visitor to visit the signature of the class bound.
89 * @return a non null visitor to visit the signature of the interface bound.
96 * @return a non null visitor to visit the signature of the super class
104 * @return a non null visitor to visit the signature of the interface type.
111 * @return a non null visitor to visit the signature of the parameter type.
118 * @return a non null visitor to visit the signature of the return type.
125 * @return a non null visitor to visit the signature of the exception type.
130 * Visits a signature correspondin [all...] |
/external/mockito/cglib-and-asm/src/org/mockito/asm/util/ |
H A D | TraceClassVisitor.java | 42 import org.mockito.asm.signature.SignatureReader;
182 final String signature,
201 appendDescriptor(CLASS_SIGNATURE, signature);
202 if (signature != null) {
204 SignatureReader r = new SignatureReader(signature);
239 cv.visit(version, access, name, signature, superName, interfaces);
338 final String signature,
347 if (signature != null) {
349 appendDescriptor(FIELD_SIGNATURE, signature);
352 SignatureReader r = new SignatureReader(signature);
178 visit( final int version, final int access, final String name, final String signature, final String superName, final String[] interfaces) argument 334 visitField( final int access, final String name, final String desc, final String signature, final Object value) argument 387 visitMethod( final int access, final String name, final String desc, final String signature, final String[] exceptions) argument [all...] |
/external/chromium_org/net/quic/crypto/ |
H A D | proof_verifier_chromium.cc | 57 const std::string& signature, 75 const std::string& signature, 119 const string& signature, 160 // signature. 161 if (!VerifySignature(server_config, signature, certs[0])) { 162 *error_details = "Failed to verify signature of server config"; 266 const string& signature, 288 reinterpret_cast<const uint8*>(signature.data()), signature.size(), 315 reinterpret_cast<const uint8*>(signature 115 VerifyProof( const string& hostname, const string& server_config, const vector<string>& certs, const string& signature, std::string* error_details, scoped_ptr<ProofVerifyDetails>* verify_details, ProofVerifierCallback* callback) argument 265 VerifySignature(const string& signed_data, const string& signature, const string& cert) argument 352 VerifyProof( const std::string& hostname, const std::string& server_config, const std::vector<std::string>& certs, const std::string& signature, const ProofVerifyContext* verify_context, std::string* error_details, scoped_ptr<ProofVerifyDetails>* verify_details, ProofVerifierCallback* callback) argument [all...] |