/external/vboot_reference/tests/ |
H A D | rsa_padding_test.h | 40 /* The test signatures (RSA-1024/SHA-1). signature[0] is correct, 41 * all other signatures are incorrect. 45 static const uint8_t signatures[][RSA1024NUMBYTES] = { variable
|
/external/v8/tools/testrunner/server/ |
H A D | work_handler.py | 37 from . import signatures namespace 98 if not signatures.VerifySignature(target, binary["blob"],
|
H A D | main.py | 39 from . import signatures namespace 211 result = signatures.ReadFileAndSignature(filename) # Format: [key, sig]. 227 if not signatures.VerifySignature(filename, pubkey, signature,
|
/external/v8/tools/testrunner/network/ |
H A D | network_execution.py | 43 from ..server import signatures namespace 128 libv8 = signatures.ReadFileAndSignature(ldd[2]) 131 binary = signatures.ReadFileAndSignature(path)
|
/external/junit/src/main/java/org/junit/experimental/theories/ |
H A D | ParameterSignature.java | 37 public static ArrayList<ParameterSignature> signatures(Method method) { method in class:ParameterSignature 38 return signatures(method.getParameterTypes(), method 42 public static List<ParameterSignature> signatures(Constructor<?> constructor) { method in class:ParameterSignature 43 return signatures(constructor.getParameterTypes(), constructor 47 private static ArrayList<ParameterSignature> signatures( method in class:ParameterSignature
|
/external/libvpx/libvpx/test/ |
H A D | test_intra_pred_speed.cc | 68 void CheckMd5Signature(const char name[], const char *const signatures[], argument 75 EXPECT_STREQ(signatures[idx], md5.Get()); 79 const char *const signatures[], int block_size) { 101 CheckMd5Signature(name, signatures, intra_pred_test_mem.src, 352 const char *const signatures[], int block_size) { 374 CheckMd5Signature(name, signatures, intra_pred_test_mem.src, 78 TestIntraPred(const char name[], VpxPredFunc const *pred_funcs, const char *const signatures[], int block_size) argument 351 TestHighbdIntraPred(const char name[], VpxHighbdPredFunc const *pred_funcs, const char *const signatures[], int block_size) argument
|
/external/mesa3d/src/compiler/glsl/ |
H A D | ir_expression_operation.py | 35 """Basic iterator for a set of type signatures. Various kinds of sequences of 42 operands. This is for signatures where all the operands have the same 53 number operands. This is for signatures where all the operands have the 100 % for dst_type, src_types in op.signatures(): 131 % for dst_type, src_types in op.signatures(): 154 % for dst_type, src_types in op.signatures(): 212 % for dst_type, src_types in op.signatures(): 229 % for dst_type, src_types in op.signatures(): 248 % for dst_type, src_types in op.signatures(): 264 % for dst_type, src_types in op.signatures() 410 def signatures(self): member in class:operation [all...] |
H A D | ir.h | 1126 /* An ir_function_signature will be part of the list of signatures in 1164 * invariants (i.e., a function signature is in the list of signatures for 1280 this->signatures.push_tail(sig); 1318 struct exec_list signatures; member in class:ir_function
|
/external/wycheproof/java/com/google/security/wycheproof/testcases/ |
H A D | DsaTest.java | 54 * Tests DSA against invalid signatures. The motivation for this test is the DSA implementation in 55 * gpg4browsers. This implementation accepts signatures with r=1 and s=0 as valid. 119 * Accepting such signatures is in many cases benign. Hence the tests 120 * below will pass if such signatures are accepted as valid. 150 // The Sun provider accepts DSA signatures where a leading 00 has 157 * The following test vectors are invalid DSA signatures. 160 * We expect that a correct implementation of DSA signatures satisfies this contract. 164 * <p>A list of problems that are caught by these signatures: 166 * some invalid DSA signatures. 678 String[] signatures, 677 testVectors( String[] signatures, DSAPublicKeySpec key, String message, String algorithm, String signatureType, boolean isValidDER, boolean isValidBER) argument [all...] |
H A D | EcdsaTest.java | 42 * Tests ECDSA against invalid signatures. 52 // - CVE-2015-2730: Firefox failed to handle some signatures correctly because of incorrect 65 // Valid signatures for MESSAGE 74 * Whether such signatures are accepted as valid or rejected depends on the implementation. 80 // New test vectors should best be done by extending this code. Some of the signatures 125 * Test vectors with invalid signatures. 128 * <li> The implementation of DSA in gpg4browsers accepted signatures with r=1 and s=q as valid. 131 * <li> CVE-2013-2944: strongSwan 5.0.4 accepts invalid ECDSA signatures when openssl is used. 136 * such situations. The test vectors below contain incorrectly encoded signatures. 142 * <li> CVE-2016-5546: OpenJDK8 throwed an OutOfmemoryError on some signatures 605 testVectors( String[] signatures, ECPublicKeySpec pubSpec, String message, String algorithm, String signatureType, boolean isValidDER, boolean isValidBER) argument [all...] |
/external/google-breakpad/src/tools/linux/md2core/ |
H A D | minidump-2-core.cc | 229 std::map<uintptr_t, std::string> signatures; member in struct:CrashedProcess 833 crashinfo->signatures[rawmodule->base_of_image] = prefix + basename; 939 crashinfo->signatures.find((uintptr_t)iter->addr); 940 if (guid != crashinfo->signatures.end()) {
|
/external/lzma/CPP/7zip/UI/Common/ |
H A D | LoadCodecs.cpp | 191 static bool ParseSignatures(const Byte *data, unsigned size, CObjectVector<CByteBuffer> &signatures)
argument 193 signatures.Clear();
200 signatures.AddNew().CopyFrom(data, len);
|
/external/v8/src/wasm/ |
H A D | wasm-module.h | 164 std::vector<FunctionSig*> signatures; // signatures in this module. member in struct:v8::internal::wasm::WasmModule 286 return module && index < module->signatures.size(); 301 return module->signatures[index];
|
/external/v8/src/compiler/ |
H A D | wasm-compiler.cc | 2311 Node* signatures = signature_tables_[table_index]; local 2314 // The table is a FixedArray; signatures are encoded as SMIs. 2320 machine->Load(MachineType::AnyTagged()), signatures,
|
/external/owasp/sanitizer/lib/junit/ |
H A D | junit-dep.jar | META-INF/ META-INF/MANIFEST.MF junit/ junit/extensions/ junit/framework/ junit/runner/ junit/textui/ org/ ... |
H A D | junit.jar | META-INF/ META-INF/MANIFEST.MF junit/ junit/extensions/ junit/framework/ junit/runner/ junit/textui/ org/ ... |
/external/libphonenumber/lib/ |
H A D | junit-4.8.1.jar | META-INF/ META-INF/MANIFEST.MF junit/ junit/extensions/ junit/framework/ junit/runner/ junit/textui/ org/ ... |
/external/guice/lib/build/ |
H A D | cglib-3.1.jar | META-INF/ META-INF/MANIFEST.MF net/ net/sf/ net/sf/cglib/ net/sf/cglib/beans/ ... |
/external/guice/extensions/persist/lib/ |
H A D | cglib-nodep-3.0.jar | META-INF/MANIFEST.MF LICENSE NOTICE net/sf/cglib/beans/BeanCopier$BeanCopierKey.class BeanCopier. ... |
/external/robolectric/v1/lib/test/ |
H A D | mockito-core-1.8.5.jar | META-INF/ META-INF/MANIFEST.MF org/ org/mockito/ org/mockito/asm/ org/mockito/asm/signature/ ... |
/external/testng/lib-supplied/ |
H A D | guice-2.0.jar | META-INF/ META-INF/MANIFEST.MF LICENSE NOTICE org/ org/testng/ org/testng/guice/ org/testng/ ... |
/external/junit-params/lib/ |
H A D | assertj-core-1.7.1.jar | META-INF/MANIFEST.MF META-INF/maven/ META-INF/maven/org.assertj/ META- ... |
/external/guice/extensions/struts2/lib/ |
H A D | freemarker-2.3.16.jar | META-INF/ META-INF/MANIFEST.MF freemarker/ freemarker/cache/ freemarker/core/ freemarker/debug/ freemarker/debug/impl/ ... |
H A D | core-3.1.1.jar | META-INF/ org/ org/eclipse/ org/eclipse/jdt/ org/eclipse/jdt/core/ org/eclipse/jdt/core/compiler/ org/ ... |
/external/icu/tools/srcgen/currysrc/libs/ |
H A D | org.eclipse.jdt.core_3.11.0.v20150602-1242.jar | META-INF/MANIFEST.MF META-INF/ECLIPSE_.SF META-INF/ECLIPSE_.RSA META ... |