/external/tensorflow/tensorflow/contrib/session_bundle/ |
D | signature.cc | 50 Signatures* signatures) { in GetSignatures() argument 55 strings::StrCat("Expected exactly one signatures proto in : ", in GetSignatures() 59 return ParseAny(any, signatures, "tensorflow.serving.Signatures"); in GetSignatures() 62 Status SetSignatures(const Signatures& signatures, in SetSignatures() argument 68 signatures.SerializeToString( in SetSignatures() 71 any_list->mutable_value()->Add()->PackFrom(signatures); in SetSignatures() 79 Signatures signatures; in GetClassificationSignature() local 80 TF_RETURN_IF_ERROR(GetSignatures(meta_graph_def, &signatures)); in GetClassificationSignature() 81 if (!signatures.has_default_signature()) { in GetClassificationSignature() 84 DebugStringIfAvailable(signatures))); in GetClassificationSignature() [all …]
|
D | signature_test.cc | 45 Signatures signatures; in TEST() local 47 signatures.mutable_default_signature() in TEST() 53 ->PackFrom(signatures); in TEST() 63 Signatures signatures; in TEST() local 64 signatures.mutable_default_signature(); in TEST() 68 ->PackFrom(signatures); in TEST() 80 Signatures signatures; in TEST() local 81 signatures.mutable_default_signature()->mutable_regression_signature(); in TEST() 85 ->PackFrom(signatures); in TEST() 97 Signatures signatures; in TEST() local [all …]
|
D | bundle_shim_test.cc | 149 // Signatures signatures; in TEST() 156 Signatures signatures; in TEST() local 157 signatures.mutable_default_signature(); in TEST() 163 ->PackFrom(signatures); in TEST() 170 Signatures signatures; in TEST() local 172 signatures.mutable_default_signature()->mutable_regression_signature(); in TEST() 179 ->PackFrom(signatures); in TEST() 196 Signatures signatures; in TEST() local 198 signatures.mutable_default_signature() in TEST() 207 ->PackFrom(signatures); in TEST() [all …]
|
D | bundle_shim.py | 69 def _convert_default_signature_to_signature_def(signatures): argument 73 signatures: object of type manifest_pb2.Signatures() 77 signature from input signatures object 83 default_signature = signatures.default_signature 109 logging.error("Only classification and regression default signatures " 116 def _convert_named_signatures_to_signature_def(signatures): argument 117 """Convert named signatures to object of type SignatureDef. 120 signatures: object of type manifest_pb2.Signatures() 124 signatures from input signatures object 127 RuntimeError: if input and output named signatures are not of type [all …]
|
D | bundle_shim.cc | 84 // Ensure that named signatures corresponding to `inputs` and `outputs` keys in MaybeBuildPredictSignatureDef() 91 "Named signatures can only be up-converted if entries " in MaybeBuildPredictSignatureDef() 94 // Ensure the `inputs` and `outputs` named signatures are generic signatures. in MaybeBuildPredictSignatureDef() 98 "Named signatures corresponding to `inputs` and `outputs` " in MaybeBuildPredictSignatureDef() 155 // Helper functions to convert `Default` and `Named` signatures to 158 // Up-conversion of default signatures is supported for classification and 161 const Signatures& signatures, in ConvertDefaultSignatureToSignatureDef() argument 164 if (!signatures.has_default_signature()) { in ConvertDefaultSignatureToSignatureDef() 176 const Signature& signature = signatures.default_signature(); in ConvertDefaultSignatureToSignatureDef() 197 const Signatures& signatures, in ConvertNamedSignaturesToSignatureDef() argument [all …]
|
D | session_bundle_test.py | 55 def _checkRegressionSignature(self, signatures, sess): argument 56 default_signature = signatures.default_signature 67 def _checkNamedSignatures(self, signatures, sess): argument 68 named_signatures = signatures.named_signatures 110 signatures = manifest_pb2.Signatures() 111 signatures_any[0].Unpack(signatures) 112 self._checkRegressionSignature(signatures, sess) 113 self._checkNamedSignatures(signatures, sess) 148 signatures = manifest_pb2.Signatures() 149 signatures_any[0].Unpack(signatures) [all …]
|
D | README.md | 57 that can be used for building signatures. Use the `BaseEstimator.export` 68 ## Signatures section in TensorFlow Inference Model Format 73 ### Standard Signatures (standard usage) argument 107 #### TF.learn signatures 122 #### Recovering signatures 139 ### Generic Signatures (custom or advanced usage) argument 141 Generic Signatures enable fully custom usage of the `tensorflow::Session` API. 142 They are recommended for when the Standard Signatures do not satisfy a 158 Generic Signatures can be used to compliment a Standard Signature, for example 165 signatures = { [all …]
|
D | signature.h | 16 // Helpers for working with TensorFlow exports and their signatures. 38 // Get Signatures from a MetaGraphDef. 40 Signatures* signatures); 42 // (Re)set Signatures in a MetaGraphDef. 43 Status SetSignatures(const Signatures& signatures,
|
/external/tensorflow/tensorflow/contrib/learn/python/learn/estimators/ |
D | tensor_signature.py | 52 signatures = tensor_signature.create_signatures(inputs) 54 signatures, examples) 55 self.assertTrue(tensor_signature.tensors_compatible(result, signatures)) 71 """Returns True if signatures are compatible.""" 112 def tensors_compatible(tensors, signatures): argument 113 """Check that tensors are compatible with signatures. 117 signatures: Dict of `TensorSignature` objects or 125 return signatures is None 128 if not isinstance(signatures, dict): 130 for key in signatures: [all …]
|
D | tensor_signature_test.py | 46 signatures = tensor_signature.create_signatures(placeholder_a) 48 self.assertFalse(tensor_signature.tensors_compatible(None, signatures)) 51 tensor_signature.tensors_compatible(placeholder_a, signatures)) 53 tensor_signature.tensors_compatible(placeholder_b, signatures)) 55 tensor_signature.tensors_compatible(placeholder_c, signatures)) 57 tensor_signature.tensors_compatible(placeholder_d, signatures)) 60 signatures = tensor_signature.create_signatures(inputs) 61 self.assertTrue(tensor_signature.tensors_compatible(inputs, signatures)) 63 tensor_signature.tensors_compatible(placeholder_a, signatures)) 65 tensor_signature.tensors_compatible(placeholder_b, signatures)) [all …]
|
/external/boringssl/src/third_party/wycheproof_testvectors/ |
D | dsa_test.json | 5 …coding instead of DER encoding. Implementations should not accept such signatures to limit signatu… 7 …t to do this an therefore generated invalid DSA signatures. Some providers, accept such legacy sig… 1174 "comment" : "Signatures with special case values for r and s.", 1184 "comment" : "Signatures with special case values for r and s.", 1194 "comment" : "Signatures with special case values for r and s.", 1204 "comment" : "Signatures with special case values for r and s.", 1214 "comment" : "Signatures with special case values for r and s.", 1224 "comment" : "Signatures with special case values for r and s.", 1234 "comment" : "Signatures with special case values for r and s.", 1244 "comment" : "Signatures with special case values for r and s.", [all …]
|
D | dsa_test.txt | 24 # generated invalid DSA signatures. Some providers, accept such legacy 25 # signatures for compatibility. 880 # Signatures with special case values for r and s. 889 # Signatures with special case values for r and s. 898 # Signatures with special case values for r and s. 907 # Signatures with special case values for r and s. 916 # Signatures with special case values for r and s. 925 # Signatures with special case values for r and s. 934 # Signatures with special case values for r and s. 943 # Signatures with special case values for r and s. [all …]
|
D | eddsa_test.txt | 382 # EdDSA signatures are non-malleable, if implemented accordingly. Failing to 383 # check the range of S allows to modify signatures. See RFC 8032, Section 5.2.7 391 # EdDSA signatures are non-malleable, if implemented accordingly. Failing to 392 # check the range of S allows to modify signatures. See RFC 8032, Section 5.2.7 400 # EdDSA signatures are non-malleable, if implemented accordingly. Failing to 401 # check the range of S allows to modify signatures. See RFC 8032, Section 5.2.7 409 # EdDSA signatures are non-malleable, if implemented accordingly. Failing to 410 # check the range of S allows to modify signatures. See RFC 8032, Section 5.2.7 418 # EdDSA signatures are non-malleable, if implemented accordingly. Failing to 419 # check the range of S allows to modify signatures. See RFC 8032, Section 5.2.7 [all …]
|
/external/tensorflow/tensorflow/python/saved_model/ |
D | signature_serialization.py | 15 """Helpers for working with signatures in tf.saved_model.save.""" 35 SIGNATURE_ATTRIBUTE_NAME = "signatures" 50 # Functions without outputs don't make sense as signatures. We just don't 63 # If the user did not specify signatures, check the root object for a function 86 def canonicalize_signatures(signatures): argument 87 """Converts `signatures` into a dictionary of concrete functions.""" 88 if signatures is None: 90 if not isinstance(signatures, collections.Mapping): 91 signatures = { 92 signature_constants.DEFAULT_SERVING_SIGNATURE_DEF_KEY: signatures} [all …]
|
D | load_v1_in_v2_test.py | 82 fn = imported.signatures["serving_default"] 102 fn = imported.signatures["serving_default"] 140 self.evaluate(first_imported.signatures["first_key"]( 145 second_imported.signatures["second_key"](x=constant_op.constant(2.)) 147 second_imported.signatures["second_key"]( 151 self.evaluate(second_imported.signatures["second_key"]( 186 fn = imported.signatures["serving_default"] 191 save.save(imported, second_path, signatures=imported.signatures) 194 fn = second_import.signatures["serving_default"] 200 save.save(second_import, third_path, signatures=second_import.signatures) [all …]
|
D | save.py | 72 attached to in the saving program. For example a `.signatures` attribute is 329 # must refer to multiple Tensors. The resulting signatures would be 338 "Signatures have one Tensor per named input, so to have " 340 "signatures should avoid *args and Tensors in nested " 397 signatures = {} 408 signatures[signature_key] = signature_def_utils.build_signature_def( 412 return signatures 482 functions containing signatures to add to the MetaGraph. 529 signatures = _generate_signatures(signature_functions, resource_map) 539 for signature_key, signature in signatures.items(): [all …]
|
/external/vboot_reference/tests/ |
D | rsa_padding_test.c | 16 /* Test valid and invalid signatures */ 22 TEST_EQ(RSAVerify(key, signatures[0], RSA1024NUMBYTES, 0, in TestSignatures() 25 /* All other signatures should fail verification. */ in TestSignatures() 27 for (i = 1; i < sizeof(signatures) / sizeof(signatures[0]); i++) { in TestSignatures() 28 if (RSAVerify(key, signatures[i], RSA1024NUMBYTES, 0, in TestSignatures() 43 TEST_EQ(RSAVerify(key, signatures[0], RSA1024NUMBYTES, 0, in TestRSAVerify() 45 TEST_EQ(RSAVerify(key, signatures[0], RSA1024NUMBYTES - 1, 0, in TestRSAVerify() 47 TEST_EQ(RSAVerify(key, signatures[0], RSA1024NUMBYTES, kNumAlgorithms, in TestRSAVerify() 49 TEST_EQ(RSAVerify(key, signatures[0], RSA1024NUMBYTES, 3, in TestRSAVerify() 53 Memcpy(sig, signatures[0], RSA1024NUMBYTES); in TestRSAVerify() [all …]
|
D | vb20_rsa_padding_tests.c | 41 * Test valid and invalid signatures. 55 Memcpy(sig, signatures[0], sizeof(sig)); in test_signatures() 59 /* All other signatures should fail verification. */ in test_signatures() 61 for (i = 1; i < sizeof(signatures) / sizeof(signatures[0]); i++) { in test_signatures() 62 Memcpy(sig, signatures[i], sizeof(sig)); in test_signatures() 86 Memcpy(sig, signatures[0], sizeof(sig)); in test_verify_digest() 90 Memcpy(sig, signatures[0], sizeof(sig)); in test_verify_digest() 98 Memcpy(sig, signatures[0], sizeof(sig)); in test_verify_digest() 105 Memcpy(sig, signatures[0], sizeof(sig)); in test_verify_digest() 112 Memcpy(sig, signatures[0], sizeof(sig)); in test_verify_digest() [all …]
|
/external/tensorflow/tensorflow/python/saved_model/model_utils/ |
D | export_utils.py | 79 additional serving signatures, which may be used to feed inputs at 84 valid serving signatures. If false, all requested signatures will be 128 # valid signatures; if there is a validity problem, they raise a ValueError, 130 # The is_valid_signature check ensures that the signatures produced are 132 # signatures produced for serving. We skip this check for training and eval 133 # signatures, which are not intended for serving. 153 """Log a report of which signatures were produced.""" 158 # have no signatures. 165 # TODO(b/67733540): consider printing the full signatures, not just names 169 logging.info('Signatures INCLUDED in export for {}: {}'.format( [all …]
|
/external/junit/src/main/java/org/junit/experimental/theories/internal/ |
D | Assignments.java | 41 List<ParameterSignature> signatures; in allUnassigned() local 42 signatures = ParameterSignature.signatures(testClass in allUnassigned() 44 signatures.addAll(ParameterSignature.signatures(testMethod)); in allUnassigned() 46 signatures, testClass); in allUnassigned() 140 List<ParameterSignature> signatures = ParameterSignature in getConstructorParameterCount() local 141 .signatures(clazz.getOnlyConstructor()); in getConstructorParameterCount() 142 int constructorParameterCount = signatures.size(); in getConstructorParameterCount()
|
/external/tensorflow/tensorflow/contrib/timeseries/python/timeseries/ |
D | estimators_test.py | 105 signatures = loader.load(sess, [tag_constants.SERVING], export_location) 111 signatures=signatures, 126 signatures=signatures, 136 signatures=signatures, 149 signatures=signatures, 158 signatures.signature_def[ 164 signatures=signatures, 181 signatures=signatures,
|
D | saved_model_utils.py | 62 signatures, argument 76 signatures: The `MetaGraphDef` protocol buffer returned from 108 predict_signature = signatures.signature_def[ 121 def cold_start_filter(signatures, session, features): argument 131 signatures: The `MetaGraphDef` protocol buffer returned from 153 filter_signature = signatures.signature_def[ 170 def filter_continuation(continue_from, signatures, session, features): argument 181 signatures: The `MetaGraphDef` protocol buffer returned from 203 filter_signature = signatures.signature_def[
|
/external/tensorflow/tensorflow/compiler/jit/ |
D | xla_compilation_cache_test.cc | 44 std::vector<XlaCompilationCache::Signature> signatures = {s1, s2, s3}; in TEST() local 45 for (int i = 0; i < signatures.size(); ++i) { in TEST() 46 for (int j = 0; j < signatures.size(); ++j) { in TEST() 47 EXPECT_EQ(i == j, signatures[i] == signatures[j]) in TEST() 48 << signatures[i].HumanString() << " " << signatures[j].HumanString(); in TEST()
|
/external/wycheproof/java/com/google/security/wycheproof/testcases/ |
D | DsaTest.java | 54 * Tests DSA against invalid signatures. The motivation for this test is the DSA implementation in 55 * gpg4browsers. This implementation accepts signatures with r=1 and s=0 as valid. 110 // Signatures for Key1. 119 * Accepting such signatures is in many cases benign. Hence the tests 120 * below will pass if such signatures are accepted as valid. 150 // The Sun provider accepts DSA signatures where a leading 00 has 157 * The following test vectors are invalid DSA signatures. 160 * We expect that a correct implementation of DSA signatures satisfies this contract. 164 * <p>A list of problems that are caught by these signatures: 166 * some invalid DSA signatures. [all …]
|
/external/epid-sdk/doc/html/ |
D | _basenames.html | 66 …e Intel® EPID scheme. It provides detail on name based signatures, random base signatures and … 70 Random Base Signatures</h1> 75 … random base, the basename is chosen at random for each signature. Two signatures using a random b… 77 Name Based Signatures</h1> 81 …ity to link Intel® EPID signatures from the same member, reducing the member's privacy. When u… 82 …oses. If the member agrees to use a name based signature, then all the signatures created by the m…
|