/frameworks/base/tests/Camera2Tests/SmartCamera/SimpleCamera/tests/src/androidx/media/filterfw/ |
H A D | MffFilterTestCase.java | 138 Signature signature = filter.getSignature(); 139 for (Entry<String, PortInfo> inputPortEntry : signature.getInputPorts().entrySet()) { 148 Signature signature = filter.getSignature(); 151 for (Entry<String, PortInfo> outputPortEntry : signature.getOutputPorts().entrySet()) {
|
/frameworks/layoutlib/create/tests/com/android/tools/layoutlib/create/ |
H A D | StubMethodAdapterTest.java | 86 public void visit(int version, int access, String name, String signature, String superName, argument 88 super.visit(version, access, mClassName, signature, superName, 93 public MethodVisitor visitMethod(int access, String name, String desc, String signature, argument 101 super.visitMethod(access, name, desc, signature, exceptions);
|
H A D | PromoteClassClassAdapterTest.java | 99 public void visit(int version, int access, String name, String signature, String superName, argument 103 "version=%d, access=%s, name=%s, signature=%s, superName=%s, interfaces=%s", 104 version, formatAccess(access), name, signature, superName, Arrays.toString(interfaces) 107 super.visit(version, access, name, signature, superName, interfaces); 166 "name=com/android/tools/layoutlib/create/PackageProtectedClass, signature=null, " +
|
/frameworks/rs/rsov/compiler/ |
H A D | Wrapper.h | 40 bool AddWrapper(const char *name, const uint32_t signature,
|
/frameworks/support/frameworks/support/samples/Support4Demos/src/main/java/com/example/android/supportv4/media/ |
H A D | PackageValidator.java | 109 Log.w(TAG, "Caller has more than one signature certificate!"); 112 String signature = Base64.encodeToString( 116 ArrayList<CallerInfo> validCallers = mValidCertificates.get(signature); 118 Log.v(TAG, "Signature for caller " + callingPackage + " is not valid: \n" + signature); 141 +" (" + expectedPackages + "). This caller's certificate is: \n" + signature);
|
/frameworks/support/samples/Support4Demos/src/main/java/com/example/android/supportv4/media/ |
H A D | PackageValidator.java | 109 Log.w(TAG, "Caller has more than one signature certificate!"); 112 String signature = Base64.encodeToString( 116 ArrayList<CallerInfo> validCallers = mValidCertificates.get(signature); 118 Log.v(TAG, "Signature for caller " + callingPackage + " is not valid: \n" + signature); 141 +" (" + expectedPackages + "). This caller's certificate is: \n" + signature);
|
/frameworks/support/textclassifier/src/main/java/androidx/textclassifier/ |
H A D | TextSelection.java | 47 @NonNull String signature) { 51 mSignature = signature; 99 * Returns the signature for this object. 112 "TextSelection {startIndex=%d, endIndex=%d, entities=%s, signature=%s}", 187 * Sets a signature for the TextSelection object. 192 public Builder setSignature(@NonNull String signature) { argument 193 mSignature = Preconditions.checkNotNull(signature); 45 TextSelection( int startIndex, int endIndex, @NonNull Map<String, Float> entityConfidence, @NonNull String signature) argument
|
/frameworks/layoutlib/create/src/com/android/tools/layoutlib/create/ |
H A D | RefactorClassAdapter.java | 35 public MethodVisitor visitMethod(int access, String name, String desc, String signature, argument 37 MethodVisitor mw = super.visitMethod(access, name, desc, signature, exceptions);
|
H A D | AsmAnalyzer.java | 27 import org.objectweb.asm.signature.SignatureReader; 28 import org.objectweb.asm.signature.SignatureVisitor; 472 * Considers this signature or type signature by invoking the {@link SignatureVisitor} 475 public void considerSignature(String signature) { argument 476 if (signature != null) { 477 SignatureReader sr = new SignatureReader(signature); 479 // to differentiate where the signature comes from. 521 String signature, String superName, String[] interfaces) { 522 // signature i 520 visit(int version, int access, String name, String signature, String superName, String[] interfaces) argument 583 visitField(int access, String name, String desc, String signature, Object value) argument 602 visitMethod(int access, String name, String desc, String signature, String[] exceptions) argument 701 visitLocalVariable(String name, String desc, String signature, Label start, Label end, int index) argument [all...] |
H A D | DependencyFinder.java | 30 import org.objectweb.asm.signature.SignatureReader; 31 import org.objectweb.asm.signature.SignatureVisitor; 335 * Considers this signature or type signature by invoking the {@link SignatureVisitor} 338 public void considerSignature(String signature) { argument 339 if (signature != null) { 340 SignatureReader sr = new SignatureReader(signature); 342 // to differentiate where the signature comes from. 398 String signature, String superName, String[] interfaces) { 399 // signature i 397 visit(int version, int access, String name, String signature, String superName, String[] interfaces) argument 460 visitField(int access, String name, String desc, String signature, Object value) argument 483 visitMethod(int access, String name, String desc, String signature, String[] exceptions) argument 579 visitLocalVariable(String name, String desc, String signature, Label start, Label end, int index) argument [all...] |
/frameworks/base/core/jni/ |
H A D | android_animation_PropertyValuesHolder.cpp | 54 char *signature = new char[parameterCount + 4]; local 55 signature[0] = '('; 56 memset(&(signature[1]), parameterType, parameterCount); 57 strcpy(&(signature[parameterCount + 1]), ")V"); 58 jmethodID mid = env->GetMethodID(targetClass, nativeString, signature); 59 delete[] signature;
|
H A D | android_ddm_DdmHandleNativeHeap.cpp | 43 uint32_t signature; member in struct:Header 89 header.signature = DDMS_HEADER_SIGNATURE;
|
/frameworks/base/keystore/java/android/security/keystore/ |
H A D | AndroidKeyStoreSignatureSpiBase.java | 136 * Configures this signature instance to use the provided key. 321 byte[] signature; 328 signature = mMessageStreamer.doFinal( 330 null, // no signature provided -- it'll be generated by this invocation 337 return signature; 341 protected final boolean engineVerify(byte[] signature) throws SignatureException { argument 356 signature, 403 * Returns {@code true} if this signature is initialized for signing, {@code false} if this 404 * signature is initialized for verification. 414 * {@code finish} operation when generating a signature [all...] |
H A D | KeyStoreCryptoOperationChunkedStreamer.java | 209 byte[] signature, byte[] additionalEntropy) throws KeyStoreException { 220 OperationResult opResult = mKeyStoreStream.finish(signature, additionalEntropy); 337 public OperationResult finish(byte[] signature, byte[] additionalEntropy) { argument 338 return mKeyStore.finish(mOperationToken, null, signature, additionalEntropy); 208 doFinal(byte[] input, int inputOffset, int inputLength, byte[] signature, byte[] additionalEntropy) argument
|
H A D | AndroidKeyStoreECDSASignatureSpi.java | 83 public byte[] doFinal(byte[] input, int inputOffset, int inputLength, byte[] signature, argument 96 signature, additionalEntropy);
|
/frameworks/base/telephony/java/android/telephony/ |
H A D | UiccAccessRule.java | 194 * @param signature The signature of the certificate. 199 public int getCarrierPrivilegeStatus(Signature signature, String packageName) { argument 201 byte[] certHash = getCertHash(signature, "SHA-1"); 202 byte[] certHash256 = getCertHash(signature, "SHA-256"); 253 private static byte[] getCertHash(Signature signature, String algo) { argument 256 return md.digest(signature.toByteArray());
|
/frameworks/av/drm/mediadrm/plugins/clearkey/default/include/ |
H A D | DrmPlugin.h | 225 Vector<uint8_t>& signature) { 230 UNUSED(signature); 238 const Vector<uint8_t>& signature, bool& match) { 240 message.size() == 0 || signature.size() == 0) { 252 Vector<uint8_t>& signature) { 257 UNUSED(signature); 221 sign( const Vector<uint8_t>& sessionId, const Vector<uint8_t>& keyId, const Vector<uint8_t>& message, Vector<uint8_t>& signature) argument 234 verify( const Vector<uint8_t>& sessionId, const Vector<uint8_t>& keyId, const Vector<uint8_t>& message, const Vector<uint8_t>& signature, bool& match) argument 247 signRSA( const Vector<uint8_t>& sessionId, const String8& algorithm, const Vector<uint8_t>& message, const Vector<uint8_t>& wrappedKey, Vector<uint8_t>& signature) argument
|
/frameworks/base/packages/StatementService/src/com/android/statementservice/retriever/ |
H A D | Utils.java | 114 public static String computeNormalizedSha256Fingerprint(byte[] signature) { argument 121 digester.update(signature);
|
/frameworks/base/services/core/java/com/android/server/oemlock/ |
H A D | VendorLock.java | 58 void setOemUnlockAllowedByCarrier(boolean allowed, @Nullable byte[] signature) { argument 60 switch (mOemLock.setOemUnlockAllowedByCarrier(allowed, toByteArrayList(signature))) { 67 "Invalid signature used in attempt to carrier unlock");
|
H A D | OemLockService.java | 116 public void setOemUnlockAllowedByCarrier(boolean allowed, @Nullable byte[] signature) { 122 mOemLock.setOemUnlockAllowedByCarrier(allowed, signature);
|
/frameworks/opt/telephony/tests/telephonytests/src/com/android/internal/telephony/uicc/ |
H A D | UiccCarrierPrivilegeRulesTest.java | 165 Signature signature = new Signature("abcd92cbb156b280fa4e1429a6eceeb6e5c1bfe4"); 166 assertEquals(0, mUiccCarrierPrivilegeRules.getCarrierPrivilegeStatus(signature, 363 Signature signature = new Signature("abcd92cbb156b280fa4e1429a6eceeb6e5c1bfe4"); 364 assertEquals(0, mUiccCarrierPrivilegeRules.getCarrierPrivilegeStatus(signature, 426 Signature signature = new Signature("abcd92cbb156b280fa4e1429a6eceeb6e5c1bfe4"); 427 assertEquals(0, mUiccCarrierPrivilegeRules.getCarrierPrivilegeStatus(signature, 482 Signature signature = new Signature("abcd92cbb156b280fa4e1429a6eceeb6e5c1bfe4"); 487 assertEquals(0, mUiccCarrierPrivilegeRules.getCarrierPrivilegeStatus(signature, 491 assertEquals(0, mUiccCarrierPrivilegeRules.getCarrierPrivilegeStatus(signature, 616 Signature signature [all...] |
/frameworks/compile/mclinker/lib/LD/ |
H A D | ELFObjectReader.cpp | 121 ResolveInfo* signature = m_pELFReader->readSignature( local 125 if (signature->nameSize() == 0 && 126 ResolveInfo::Section == signature->type()) { 127 // if the signature is a section symbol in input object, we use the 128 // section name as group signature. 131 signatures().insert(signature->name(), exist); 135 // if this is not the first time we see this group signature, then 150 ResolveInfo::Destroy(signature);
|
/frameworks/av/drm/libdrmframework/plugins/forward-lock/internal-format/decoder/ |
H A D | FwdLockFile.c | 376 unsigned char signature[SHA1_HASH_SIZE]; member in struct:FwdLockFile_CheckDataIntegrity_Data 396 HMAC_Final(&pSession->signingContext, pData->signature, &signatureSize); 398 result = memcmp(pData->signature, pSession->dataSignature, SHA1_HASH_SIZE) == 0; 417 unsigned char signature[SHA1_HASH_SIZE]; local 425 HMAC_Final(&pSession->signingContext, signature, &signatureSize); 427 result = memcmp(signature, pSession->headerSignature, SHA1_HASH_SIZE) == 0;
|
/frameworks/av/media/ndk/include/media/ |
H A D | NdkMediaDrm.h | 302 * secure stop message to the server which verifies the signature and notifies the 426 * Generate a signature using the specified macAlgorithm over the message data 427 * referenced by message of size messageSize and store the signature in the 428 * buffer referenced signature of max size *signatureSize. If the buffer is not 429 * large enough to hold the signature, MEDIADRM_SHORT_BUFFER is returned and 436 uint8_t *signature, size_t *signatureSize); 439 * Perform a signature verification using the specified macAlgorithm over the message 441 * if the signature matches, otherwise MEDAIDRM_VERIFY_FAILED is returned. The key to 447 const uint8_t *signature, size_t signatureSize);
|
/frameworks/base/core/java/android/view/textclassifier/ |
H A D | TextClassificationSession.java | 223 private static boolean isPlatformLocalTextClassifierSmartSelection(String signature) { argument 225 SelectionSessionLogger.SignatureParser.getClassifierId(signature));
|