/external/chromium_org/third_party/libvpx/source/libvpx/third_party/libwebm/ |
H A D | mkvparser.hpp | 218 unsigned char* signature; member in struct:mkvparser::ContentEncoding::ContentEncryption
|
/external/chromium_org/third_party/mesa/src/src/glsl/ |
H A D | glsl_parser_extras.cpp | 686 : is_definition(false), signature(NULL)
|
/external/chromium_org/tools/telemetry/third_party/png/ |
H A D | png.py | 194 # The PNG signature. 195 # http://www.w3.org/TR/PNG/#5PNG-file-signature 671 # http://www.w3.org/TR/PNG/#5PNG-file-signature 1352 self.signature = None 1690 """If signature (header) has not been read then read and 1694 if self.signature: 1696 self.signature = self.file.read(8) 1697 if self.signature != _signature: 1698 raise FormatError("PNG file has invalid signature.") 2802 """Test file containing just signature byte [all...] |
/external/chromium_org/v8/test/cctest/ |
H A D | test-cpu-profiler.cc | 937 v8::Local<v8::Signature> signature = local 942 data, signature, 0)); 983 v8::Local<v8::Signature> signature = local 988 data, signature, 0));
|
/external/libvpx/libvpx/third_party/libwebm/ |
H A D | mkvparser.hpp | 243 unsigned char* signature; member in struct:mkvparser::ContentEncoding::ContentEncryption
|
/external/libvpx/libwebm/ |
H A D | mkvparser.hpp | 218 unsigned char* signature; member in struct:mkvparser::ContentEncoding::ContentEncryption
|
/external/lldb/source/Interpreter/ |
H A D | ScriptInterpreterPython.cpp | 1640 ScriptInterpreterPython::GenerateFunction(const char *signature, const StringList &input) argument 1646 if (!signature || *signature == 0) 1651 auto_generated_function.AppendString (signature);
|
/external/mesa3d/src/glsl/ |
H A D | glsl_parser_extras.cpp | 686 : is_definition(false), signature(NULL)
|
/external/smali/smali/src/main/antlr3/ |
H A D | smaliTreeWalker.g | 602 : ^(I_LOCAL REGISTER ((NULL_LITERAL | name=string_literal) nonvoid_type_descriptor? signature=string_literal?)?) 608 dexBuilder.internNullableStringReference($signature.value));
|
/external/tcpdump/ |
H A D | print-tcp.c | 61 #include <signature.h>
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
H A D | org.eclipse.jdt.core_3.6.2.v_A76_R36x.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
H A D | javax.servlet.jsp_2.0.0.v200806031607.jar | META-INF/MANIFEST.MF META-INF/ECLIPSE.SF META-INF/ECLIPSE.RSA META ... |
/external/robolectric/lib/main/ |
H A D | javassist-3.14.0-GA.jar | META-INF/ META-INF/MANIFEST.MF javassist/ javassist/bytecode/ javassist/bytecode/analysis/ javassist/bytecode/annotation/ javassist/ ... |
/external/antlr/antlr-3.4/runtime/ActionScript/project/src/org/antlr/runtime/tree/ |
H A D | BaseTreeAdaptor.as | 308 throw new Error("No methods signature for arguments : " + ObjectUtil.toString(args));
|
/external/chromium_org/chrome/common/net/ |
H A D | x509_certificate_model_openssl.cc | 1168 return Asn1ObjectToString(cert_handle->cert_info->signature->algorithm); 1211 return ProcessRawAsn1String(cert_handle->signature);
|
/external/chromium_org/third_party/cython/src/Cython/Tempita/ |
H A D | _tempita.py | 254 signature = code[3] 256 ns[name] = defs[name] = TemplateDef(self, name, signature, body=parts, ns=ns, 1054 raise TemplateError('Invalid signature: (%s)' % sig_text, 1069 raise TemplateError('Invalid signature: (%s)' % sig_text, 1083 raise TemplateError('Invalid signature: (%s)' % sig_text,
|
/external/opencv/cxcore/include/ |
H A D | cxtypes.h | 1162 int signature; member in struct:CvMemStorage 1173 (((CvMemStorage*)(storage))->signature & CV_MAGIC_MASK) == CV_STORAGE_MAGIC_VAL)
|
/external/chromium_org/third_party/cython/src/Cython/Compiler/ |
H A D | ModuleNode.py | 2382 signature = entry.type.declaration_code("") 2385 name, entry.cname, signature, 2400 signature = entry.type.signature_string() 2404 signature, 2450 signature = entry.type.declaration_code("") 2453 temp, entry.name, cname, signature,
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.eclipse.jdt.debug_3.6.1.v20100715_r361/ |
H A D | jdi.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
/external/chromium_org/net/third_party/nss/ssl/ |
H A D | ssl3con.c | 1005 /* This also works for an ECDSA signature */ 1008 PORT_Free(buf->data); /* discard unencoded signature. */ 1009 *buf = derSig; /* give caller encoded signature. */ 1030 SECItem * signature = NULL; local 1066 signature = DSAU_DecodeDerSigToLen(buf, SECKEY_SignatureLen(key)); 1067 if (!signature) { 1071 buf = signature; 1116 if (signature) { 1117 SECITEM_FreeItem(signature, PR_TRUE); 4033 * signature 6800 SECItem signature = {siBuffer, NULL, 0}; local 10806 unsigned char signature[64]; local [all...] |
/external/apache-harmony/security/src/test/impl/java.injected/java/security/cert/ |
H A D | X509CertSelectorTest.java | 2118 AlgorithmIdentifier signature = new AlgorithmIdentifier("1.2.3.44.555"); 2137 serialNumber, signature, issuer, validity, subject, 2144 (tbsCertificate, signature, new byte[10]);
|
/external/chromium_org/extensions/browser/ |
H A D | extension_prefs.cc | 191 // A list of installed ids and a signature. 1840 const base::DictionaryValue* signature) { 1841 if (signature) { 1842 prefs_->Set(kInstallSignature, *signature); 1839 SetInstallSignature( const base::DictionaryValue* signature) argument
|
/external/doclava/src/com/google/doclava/ |
H A D | ClassInfo.java | 689 methods.put(m.name() + m.signature(), m.cloneForClass(owner, ctp.getTypeArgumentMapping())); 716 methods.put(m.name() + m.signature(), m); 750 (method.findOverriddenMethod(method.name(), method.signature()) == null)) {
|
/external/chromium_org/v8/include/ |
H A D | v8.h | 3370 * \param signature The signature describes valid receivers for the accessor 3382 Local<AccessorSignature> signature = 3391 Local<AccessorSignature> signature = 3399 Local<AccessorSignature> signature = 3635 Handle<Signature> signature = Handle<Signature>(), 3749 * \param signature The signature describes valid receivers for the accessor 3761 Handle<AccessorSignature> signature = 3769 Handle<AccessorSignature> signature [all...] |
/external/bluetooth/bluedroid/stack/btm/ |
H A D | btm_ble.c | 1838 ** signature: output parameter where data signature is going to 1845 BLE_SIGNATURE signature) 1856 UINT8 *p=temp, *p_mac = (UINT8 *)signature; 1955 ** Description This function is called to verify the data signature 1958 ** p_orig: original data before signature. 1961 ** p_comp: signature to be compared against. 1963 ** Returns TRUE if signature verified correctly; otherwise FALSE. 1976 BTM_TRACE_ERROR("can not verify signature for unknown device"); 1980 BTM_TRACE_ERROR("signature receive 1844 BTM_BleDataSignature(BD_ADDR bd_addr, UINT8 *p_text, UINT16 len, BLE_SIGNATURE signature) argument [all...] |