Home
last modified time | relevance | path

Searched full:signatures (Results 1 – 25 of 864) sorted by relevance

12345678910>>...35

/external/tensorflow/tensorflow/contrib/session_bundle/
Dsignature.cc50 Signatures* signatures) { in GetSignatures() argument
55 strings::StrCat("Expected exactly one signatures proto in : ", in GetSignatures()
59 return ParseAny(any, signatures, "tensorflow.serving.Signatures"); in GetSignatures()
62 Status SetSignatures(const Signatures& signatures, in SetSignatures() argument
68 signatures.SerializeToString( in SetSignatures()
71 any_list->mutable_value()->Add()->PackFrom(signatures); in SetSignatures()
79 Signatures signatures; in GetClassificationSignature() local
80 TF_RETURN_IF_ERROR(GetSignatures(meta_graph_def, &signatures)); in GetClassificationSignature()
81 if (!signatures.has_default_signature()) { in GetClassificationSignature()
84 DebugStringIfAvailable(signatures))); in GetClassificationSignature()
[all …]
Dsignature_test.cc45 Signatures signatures; in TEST() local
47 signatures.mutable_default_signature() in TEST()
53 ->PackFrom(signatures); in TEST()
63 Signatures signatures; in TEST() local
64 signatures.mutable_default_signature(); in TEST()
68 ->PackFrom(signatures); in TEST()
80 Signatures signatures; in TEST() local
81 signatures.mutable_default_signature()->mutable_regression_signature(); in TEST()
85 ->PackFrom(signatures); in TEST()
97 Signatures signatures; in TEST() local
[all …]
Dbundle_shim_test.cc149 // Signatures signatures; in TEST()
156 Signatures signatures; in TEST() local
157 signatures.mutable_default_signature(); in TEST()
163 ->PackFrom(signatures); in TEST()
170 Signatures signatures; in TEST() local
172 signatures.mutable_default_signature()->mutable_regression_signature(); in TEST()
179 ->PackFrom(signatures); in TEST()
196 Signatures signatures; in TEST() local
198 signatures.mutable_default_signature() in TEST()
207 ->PackFrom(signatures); in TEST()
[all …]
Dbundle_shim.py69 def _convert_default_signature_to_signature_def(signatures): argument
73 signatures: object of type manifest_pb2.Signatures()
77 signature from input signatures object
83 default_signature = signatures.default_signature
109 logging.error("Only classification and regression default signatures "
116 def _convert_named_signatures_to_signature_def(signatures): argument
117 """Convert named signatures to object of type SignatureDef.
120 signatures: object of type manifest_pb2.Signatures()
124 signatures from input signatures object
127 RuntimeError: if input and output named signatures are not of type
[all …]
Dbundle_shim.cc84 // Ensure that named signatures corresponding to `inputs` and `outputs` keys in MaybeBuildPredictSignatureDef()
91 "Named signatures can only be up-converted if entries " in MaybeBuildPredictSignatureDef()
94 // Ensure the `inputs` and `outputs` named signatures are generic signatures. in MaybeBuildPredictSignatureDef()
98 "Named signatures corresponding to `inputs` and `outputs` " in MaybeBuildPredictSignatureDef()
155 // Helper functions to convert `Default` and `Named` signatures to
158 // Up-conversion of default signatures is supported for classification and
161 const Signatures& signatures, in ConvertDefaultSignatureToSignatureDef() argument
164 if (!signatures.has_default_signature()) { in ConvertDefaultSignatureToSignatureDef()
176 const Signature& signature = signatures.default_signature(); in ConvertDefaultSignatureToSignatureDef()
197 const Signatures& signatures, in ConvertNamedSignaturesToSignatureDef() argument
[all …]
Dsession_bundle_test.py55 def _checkRegressionSignature(self, signatures, sess): argument
56 default_signature = signatures.default_signature
67 def _checkNamedSignatures(self, signatures, sess): argument
68 named_signatures = signatures.named_signatures
110 signatures = manifest_pb2.Signatures()
111 signatures_any[0].Unpack(signatures)
112 self._checkRegressionSignature(signatures, sess)
113 self._checkNamedSignatures(signatures, sess)
148 signatures = manifest_pb2.Signatures()
149 signatures_any[0].Unpack(signatures)
[all …]
DREADME.md57 that can be used for building signatures. Use the `BaseEstimator.export`
68 ## Signatures section in TensorFlow Inference Model Format
73 ### Standard Signatures (standard usage) argument
107 #### TF.learn signatures
122 #### Recovering signatures
139 ### Generic Signatures (custom or advanced usage) argument
141 Generic Signatures enable fully custom usage of the `tensorflow::Session` API.
142 They are recommended for when the Standard Signatures do not satisfy a
158 Generic Signatures can be used to compliment a Standard Signature, for example
165 signatures = {
[all …]
Dsignature.h16 // Helpers for working with TensorFlow exports and their signatures.
38 // Get Signatures from a MetaGraphDef.
40 Signatures* signatures);
42 // (Re)set Signatures in a MetaGraphDef.
43 Status SetSignatures(const Signatures& signatures,
/external/tensorflow/tensorflow/contrib/learn/python/learn/estimators/
Dtensor_signature.py52 signatures = tensor_signature.create_signatures(inputs)
54 signatures, examples)
55 self.assertTrue(tensor_signature.tensors_compatible(result, signatures))
71 """Returns True if signatures are compatible."""
112 def tensors_compatible(tensors, signatures): argument
113 """Check that tensors are compatible with signatures.
117 signatures: Dict of `TensorSignature` objects or
125 return signatures is None
128 if not isinstance(signatures, dict):
130 for key in signatures:
[all …]
Dtensor_signature_test.py46 signatures = tensor_signature.create_signatures(placeholder_a)
48 self.assertFalse(tensor_signature.tensors_compatible(None, signatures))
51 tensor_signature.tensors_compatible(placeholder_a, signatures))
53 tensor_signature.tensors_compatible(placeholder_b, signatures))
55 tensor_signature.tensors_compatible(placeholder_c, signatures))
57 tensor_signature.tensors_compatible(placeholder_d, signatures))
60 signatures = tensor_signature.create_signatures(inputs)
61 self.assertTrue(tensor_signature.tensors_compatible(inputs, signatures))
63 tensor_signature.tensors_compatible(placeholder_a, signatures))
65 tensor_signature.tensors_compatible(placeholder_b, signatures))
[all …]
/external/boringssl/src/third_party/wycheproof_testvectors/
Ddsa_test.json5 …coding instead of DER encoding. Implementations should not accept such signatures to limit signatu…
7 …t to do this an therefore generated invalid DSA signatures. Some providers, accept such legacy sig…
1174 "comment" : "Signatures with special case values for r and s.",
1184 "comment" : "Signatures with special case values for r and s.",
1194 "comment" : "Signatures with special case values for r and s.",
1204 "comment" : "Signatures with special case values for r and s.",
1214 "comment" : "Signatures with special case values for r and s.",
1224 "comment" : "Signatures with special case values for r and s.",
1234 "comment" : "Signatures with special case values for r and s.",
1244 "comment" : "Signatures with special case values for r and s.",
[all …]
Ddsa_test.txt24 # generated invalid DSA signatures. Some providers, accept such legacy
25 # signatures for compatibility.
880 # Signatures with special case values for r and s.
889 # Signatures with special case values for r and s.
898 # Signatures with special case values for r and s.
907 # Signatures with special case values for r and s.
916 # Signatures with special case values for r and s.
925 # Signatures with special case values for r and s.
934 # Signatures with special case values for r and s.
943 # Signatures with special case values for r and s.
[all …]
Deddsa_test.txt382 # EdDSA signatures are non-malleable, if implemented accordingly. Failing to
383 # check the range of S allows to modify signatures. See RFC 8032, Section 5.2.7
391 # EdDSA signatures are non-malleable, if implemented accordingly. Failing to
392 # check the range of S allows to modify signatures. See RFC 8032, Section 5.2.7
400 # EdDSA signatures are non-malleable, if implemented accordingly. Failing to
401 # check the range of S allows to modify signatures. See RFC 8032, Section 5.2.7
409 # EdDSA signatures are non-malleable, if implemented accordingly. Failing to
410 # check the range of S allows to modify signatures. See RFC 8032, Section 5.2.7
418 # EdDSA signatures are non-malleable, if implemented accordingly. Failing to
419 # check the range of S allows to modify signatures. See RFC 8032, Section 5.2.7
[all …]
/external/tensorflow/tensorflow/python/saved_model/
Dsignature_serialization.py15 """Helpers for working with signatures in tf.saved_model.save."""
35 SIGNATURE_ATTRIBUTE_NAME = "signatures"
50 # Functions without outputs don't make sense as signatures. We just don't
63 # If the user did not specify signatures, check the root object for a function
86 def canonicalize_signatures(signatures): argument
87 """Converts `signatures` into a dictionary of concrete functions."""
88 if signatures is None:
90 if not isinstance(signatures, collections.Mapping):
91 signatures = {
92 signature_constants.DEFAULT_SERVING_SIGNATURE_DEF_KEY: signatures}
[all …]
Dload_v1_in_v2_test.py82 fn = imported.signatures["serving_default"]
102 fn = imported.signatures["serving_default"]
140 self.evaluate(first_imported.signatures["first_key"](
145 second_imported.signatures["second_key"](x=constant_op.constant(2.))
147 second_imported.signatures["second_key"](
151 self.evaluate(second_imported.signatures["second_key"](
186 fn = imported.signatures["serving_default"]
191 save.save(imported, second_path, signatures=imported.signatures)
194 fn = second_import.signatures["serving_default"]
200 save.save(second_import, third_path, signatures=second_import.signatures)
[all …]
Dsave.py72 attached to in the saving program. For example a `.signatures` attribute is
329 # must refer to multiple Tensors. The resulting signatures would be
338 "Signatures have one Tensor per named input, so to have "
340 "signatures should avoid *args and Tensors in nested "
397 signatures = {}
408 signatures[signature_key] = signature_def_utils.build_signature_def(
412 return signatures
482 functions containing signatures to add to the MetaGraph.
529 signatures = _generate_signatures(signature_functions, resource_map)
539 for signature_key, signature in signatures.items():
[all …]
/external/vboot_reference/tests/
Drsa_padding_test.c16 /* Test valid and invalid signatures */
22 TEST_EQ(RSAVerify(key, signatures[0], RSA1024NUMBYTES, 0, in TestSignatures()
25 /* All other signatures should fail verification. */ in TestSignatures()
27 for (i = 1; i < sizeof(signatures) / sizeof(signatures[0]); i++) { in TestSignatures()
28 if (RSAVerify(key, signatures[i], RSA1024NUMBYTES, 0, in TestSignatures()
43 TEST_EQ(RSAVerify(key, signatures[0], RSA1024NUMBYTES, 0, in TestRSAVerify()
45 TEST_EQ(RSAVerify(key, signatures[0], RSA1024NUMBYTES - 1, 0, in TestRSAVerify()
47 TEST_EQ(RSAVerify(key, signatures[0], RSA1024NUMBYTES, kNumAlgorithms, in TestRSAVerify()
49 TEST_EQ(RSAVerify(key, signatures[0], RSA1024NUMBYTES, 3, in TestRSAVerify()
53 Memcpy(sig, signatures[0], RSA1024NUMBYTES); in TestRSAVerify()
[all …]
Dvb20_rsa_padding_tests.c41 * Test valid and invalid signatures.
55 Memcpy(sig, signatures[0], sizeof(sig)); in test_signatures()
59 /* All other signatures should fail verification. */ in test_signatures()
61 for (i = 1; i < sizeof(signatures) / sizeof(signatures[0]); i++) { in test_signatures()
62 Memcpy(sig, signatures[i], sizeof(sig)); in test_signatures()
86 Memcpy(sig, signatures[0], sizeof(sig)); in test_verify_digest()
90 Memcpy(sig, signatures[0], sizeof(sig)); in test_verify_digest()
98 Memcpy(sig, signatures[0], sizeof(sig)); in test_verify_digest()
105 Memcpy(sig, signatures[0], sizeof(sig)); in test_verify_digest()
112 Memcpy(sig, signatures[0], sizeof(sig)); in test_verify_digest()
[all …]
/external/tensorflow/tensorflow/python/saved_model/model_utils/
Dexport_utils.py79 additional serving signatures, which may be used to feed inputs at
84 valid serving signatures. If false, all requested signatures will be
128 # valid signatures; if there is a validity problem, they raise a ValueError,
130 # The is_valid_signature check ensures that the signatures produced are
132 # signatures produced for serving. We skip this check for training and eval
133 # signatures, which are not intended for serving.
153 """Log a report of which signatures were produced."""
158 # have no signatures.
165 # TODO(b/67733540): consider printing the full signatures, not just names
169 logging.info('Signatures INCLUDED in export for {}: {}'.format(
[all …]
/external/junit/src/main/java/org/junit/experimental/theories/internal/
DAssignments.java41 List<ParameterSignature> signatures; in allUnassigned() local
42 signatures = ParameterSignature.signatures(testClass in allUnassigned()
44 signatures.addAll(ParameterSignature.signatures(testMethod)); in allUnassigned()
46 signatures, testClass); in allUnassigned()
140 List<ParameterSignature> signatures = ParameterSignature in getConstructorParameterCount() local
141 .signatures(clazz.getOnlyConstructor()); in getConstructorParameterCount()
142 int constructorParameterCount = signatures.size(); in getConstructorParameterCount()
/external/tensorflow/tensorflow/contrib/timeseries/python/timeseries/
Destimators_test.py105 signatures = loader.load(sess, [tag_constants.SERVING], export_location)
111 signatures=signatures,
126 signatures=signatures,
136 signatures=signatures,
149 signatures=signatures,
158 signatures.signature_def[
164 signatures=signatures,
181 signatures=signatures,
Dsaved_model_utils.py62 signatures, argument
76 signatures: The `MetaGraphDef` protocol buffer returned from
108 predict_signature = signatures.signature_def[
121 def cold_start_filter(signatures, session, features): argument
131 signatures: The `MetaGraphDef` protocol buffer returned from
153 filter_signature = signatures.signature_def[
170 def filter_continuation(continue_from, signatures, session, features): argument
181 signatures: The `MetaGraphDef` protocol buffer returned from
203 filter_signature = signatures.signature_def[
/external/tensorflow/tensorflow/compiler/jit/
Dxla_compilation_cache_test.cc44 std::vector<XlaCompilationCache::Signature> signatures = {s1, s2, s3}; in TEST() local
45 for (int i = 0; i < signatures.size(); ++i) { in TEST()
46 for (int j = 0; j < signatures.size(); ++j) { in TEST()
47 EXPECT_EQ(i == j, signatures[i] == signatures[j]) in TEST()
48 << signatures[i].HumanString() << " " << signatures[j].HumanString(); in TEST()
/external/wycheproof/java/com/google/security/wycheproof/testcases/
DDsaTest.java54 * Tests DSA against invalid signatures. The motivation for this test is the DSA implementation in
55 * gpg4browsers. This implementation accepts signatures with r=1 and s=0 as valid.
110 // Signatures for Key1.
119 * Accepting such signatures is in many cases benign. Hence the tests
120 * below will pass if such signatures are accepted as valid.
150 // The Sun provider accepts DSA signatures where a leading 00 has
157 * The following test vectors are invalid DSA signatures.
160 * We expect that a correct implementation of DSA signatures satisfies this contract.
164 * <p>A list of problems that are caught by these signatures:
166 * some invalid DSA signatures.
[all …]
/external/epid-sdk/doc/html/
D_basenames.html66 …e Intel&reg; EPID scheme. It provides detail on name based signatures, random base signatures and …
70 Random Base Signatures</h1>
75 … random base, the basename is chosen at random for each signature. Two signatures using a random b…
77 Name Based Signatures</h1>
81 …ity to link Intel&reg; EPID signatures from the same member, reducing the member's privacy. When u…
82 …oses. If the member agrees to use a name based signature, then all the signatures created by the m…

12345678910>>...35