/external/parameter-framework/asio-1.10.6/include/asio/ |
D | handler_type.hpp | 25 * be determined at the point where the specific completion handler signature 30 template <typename Handler, typename Signature> 33 /// The handler type for the specific signature. 38 template <typename Handler, typename Signature> 39 struct handler_type<const Handler, Signature> 40 : handler_type<Handler, Signature> {}; 42 template <typename Handler, typename Signature> 43 struct handler_type<volatile Handler, Signature> 44 : handler_type<Handler, Signature> {}; 46 template <typename Handler, typename Signature> [all …]
|
/external/javasqlite/src/main/native/ |
D | sqlite_jni.h | 13 * Signature: (Ljava/lang/String;I)V 21 * Signature: (Ljava/lang/String;)V 29 * Signature: ()V 37 * Signature: ()V 45 * Signature: (Ljava/lang/String;LSQLite/Callback;)V 53 * Signature: (Ljava/lang/String;LSQLite/Callback;[Ljava/lang/String;)V 61 * Signature: ()J 69 * Signature: ()V 77 * Signature: ()J 85 * Signature: (LSQLite/BusyHandler;)V [all …]
|
/external/ImageMagick/Magick++/tests/ |
D | readWriteBlob.cpp | 72 string signature(""); in main() local 75 signature = image.signature(); in main() 109 if ( image.signature() != signature ) in main() 113 << " Image signature " in main() 114 << image.signature() in main() 116 << signature << endl; in main() 123 if ( image.signature() != signature ) in main() 127 << " Image signature " in main() 128 << image.signature() in main() 130 << signature << endl; in main() [all …]
|
/external/libchrome/base/android/jni_generator/ |
D | testMotionEvent.javap | 162 const #152 = Asciz Signature; 319 Signature: I 323 Signature: I 327 Signature: I 331 Signature: I 335 Signature: I 339 Signature: I 343 Signature: I 347 Signature: I 351 Signature: I [all …]
|
D | testMotionEvent.javap7 | 166 #152 = Utf8 Signature 322 Signature: I 328 Signature: I 334 Signature: I 340 Signature: I 346 Signature: I 352 Signature: I 358 Signature: I 364 Signature: I 370 Signature: I [all …]
|
/external/apache-commons-bcel/src/main/java/org/apache/bcel/generic/ |
D | Type.java | 45 protected String signature; // signature for the type TODO should be private field in Type 71 signature = s; in Type() 80 return type ^ signature.hashCode(); in hashCode() 91 return (type == t.type) && signature.equals(t.signature); in equals() 98 * @return signature for given type. 101 return signature; in getSignature() 146 return ((this.equals(Type.NULL) || (type >= Const.T_UNKNOWN))) ? signature : Utility in toString() 147 .signatureToString(signature, false); in toString() 152 * Convert type to Java method signature, e.g. int[] f(java.lang.String x) 157 * @return method signature for given type(s). [all …]
|
/external/boringssl/src/util/fipstools/acvp/acvptool/test/vectors/ |
D | RSA.bz2 | ... : [
26 {
27 "message": "CFCE9895A3633594F902CEF8189A46F06302BAB44E7055831C7493253A8082C3B01B27D08C994036B09EC2631211A1383B7FC06C36AE75F79E242EE499E633BB",
28 "signature": "2DD571DC242EC2C6E2FDE4898985F88218CAFE10830FF8BD2BD8A0742480E098A0DD72B6AB73E7EF2F1188888BF13DFE1FCADFD90F7F5E7D6ABA1912795117EDAF9351E2BCB4EEACC81B484E04B946F091FCF10492B5F61A62B4B43872EC75AF667C14F2322D06099A682AD63CF818366EC94200FD70476111B1EAFB56B3C0FE",
29 "tcId": 6
30 } ... |
/external/rust/crates/ring/tests/ |
D | ecdsa_tests.rs | 35 signature::{self, KeyPair}, 52 &signature::ECDSA_P256_SHA256_FIXED_SIGNING, in ecdsa_from_pkcs8_test() 53 &signature::ECDSA_P256_SHA256_ASN1_SIGNING, in ecdsa_from_pkcs8_test() 56 &signature::ECDSA_P384_SHA384_FIXED_SIGNING, in ecdsa_from_pkcs8_test() 57 &signature::ECDSA_P384_SHA384_ASN1_SIGNING, in ecdsa_from_pkcs8_test() 62 &signature::ECDSA_P384_SHA384_FIXED_SIGNING, in ecdsa_from_pkcs8_test() 63 &signature::ECDSA_P384_SHA384_ASN1_SIGNING, in ecdsa_from_pkcs8_test() 66 &signature::ECDSA_P256_SHA256_FIXED_SIGNING, in ecdsa_from_pkcs8_test() 67 &signature::ECDSA_P256_SHA256_ASN1_SIGNING, in ecdsa_from_pkcs8_test() 78 signature::EcdsaKeyPair::from_pkcs8(this_fixed, &input), in ecdsa_from_pkcs8_test() [all …]
|
D | ecdsa_verify_fixed_tests.txt | 61 # In all cases, the `s` component of the signature was selected 63 # smallest value where the public key recovery from the signature 66 # The signature has r < q - n. This is the control case for the next 67 # test case; this signature is the same but the public key is 68 # different. Notice that both public keys work for the same signature! 69 # This signature will validate even if the implementation doesn't 78 # The signature has r < q - n. s Since r < q - n, r + n < q. Notice 79 # that this signature is the same as the signature in the preceding 80 # test case, but the public key is different. That the signature 93 # The signature has r > q - n. The signature is for the public key [all …]
|
/external/oj-libjdwp/src/share/classes/com/sun/tools/jdi/ |
D | JNITypeParser.java | 37 private String signature; field in JNITypeParser 42 JNITypeParser(String signature) { in JNITypeParser() argument 43 this.signature = signature; in JNITypeParser() 46 static String typeNameToSignature(String signature) { in typeNameToSignature() argument 48 int firstIndex = signature.indexOf('['); in typeNameToSignature() 52 index = signature.indexOf('[', index + 1); in typeNameToSignature() 56 signature = signature.substring(0, firstIndex); in typeNameToSignature() 59 if (signature.equals("boolean")) { in typeNameToSignature() 61 } else if (signature.equals("byte")) { in typeNameToSignature() 63 } else if (signature.equals("char")) { in typeNameToSignature() [all …]
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/ |
D | DSA.java | 31 // provider.addAlgorithm("Signature.DSA", PREFIX + "DSASigner$stdDSA"); in configure() 32 provider.addAlgorithm("Signature.SHA1withDSA", PREFIX + "DSASigner$stdDSA"); in configure() 33 provider.addAlgorithm("Alg.Alias.Signature.DSA", "SHA1withDSA"); in configure() 35 provider.addAlgorithm("Signature.NONEWITHDSA", PREFIX + "DSASigner$noneDSA"); in configure() 37 provider.addAlgorithm("Alg.Alias.Signature.RAWDSA", "NONEWITHDSA"); in configure() 41 provider.addAlgorithm("Signature.DETDSA", PREFIX + "DSASigner$detDSA"); in configure() 42 provider.addAlgorithm("Signature.SHA1WITHDETDSA", PREFIX + "DSASigner$detDSA"); in configure() 43 provider.addAlgorithm("Signature.SHA224WITHDETDSA", PREFIX + "DSASigner$detDSA224"); in configure() 44 provider.addAlgorithm("Signature.SHA256WITHDETDSA", PREFIX + "DSASigner$detDSA256"); in configure() 45 provider.addAlgorithm("Signature.SHA384WITHDETDSA", PREFIX + "DSASigner$detDSA384"); in configure() [all …]
|
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/jcajce/provider/asymmetric/ |
D | DSA.java | 38 // provider.addAlgorithm("Signature.DSA", PREFIX + "DSASigner$stdDSA"); in configure() 39 provider.addAlgorithm("Signature.SHA1withDSA", PREFIX + "DSASigner$stdDSA"); in configure() 40 provider.addAlgorithm("Alg.Alias.Signature.DSA", "SHA1withDSA"); in configure() 42 provider.addAlgorithm("Signature.NONEWITHDSA", PREFIX + "DSASigner$noneDSA"); in configure() 44 provider.addAlgorithm("Alg.Alias.Signature.RAWDSA", "NONEWITHDSA"); in configure() 48 provider.addAlgorithm("Signature.DETDSA", PREFIX + "DSASigner$detDSA"); in configure() 49 provider.addAlgorithm("Signature.SHA1WITHDETDSA", PREFIX + "DSASigner$detDSA"); in configure() 50 provider.addAlgorithm("Signature.SHA224WITHDETDSA", PREFIX + "DSASigner$detDSA224"); in configure() 51 provider.addAlgorithm("Signature.SHA256WITHDETDSA", PREFIX + "DSASigner$detDSA256"); in configure() 52 provider.addAlgorithm("Signature.SHA384WITHDETDSA", PREFIX + "DSASigner$detDSA384"); in configure() [all …]
|
/external/bouncycastle/repackaged_platform/bcprov/src/main/java/com/android/internal/org/bouncycastle/jcajce/provider/asymmetric/ |
D | DSA.java | 38 // provider.addAlgorithm("Signature.DSA", PREFIX + "DSASigner$stdDSA"); in configure() 39 provider.addAlgorithm("Signature.SHA1withDSA", PREFIX + "DSASigner$stdDSA"); in configure() 40 provider.addAlgorithm("Alg.Alias.Signature.DSA", "SHA1withDSA"); in configure() 42 provider.addAlgorithm("Signature.NONEWITHDSA", PREFIX + "DSASigner$noneDSA"); in configure() 44 provider.addAlgorithm("Alg.Alias.Signature.RAWDSA", "NONEWITHDSA"); in configure() 48 provider.addAlgorithm("Signature.DETDSA", PREFIX + "DSASigner$detDSA"); in configure() 49 provider.addAlgorithm("Signature.SHA1WITHDETDSA", PREFIX + "DSASigner$detDSA"); in configure() 50 provider.addAlgorithm("Signature.SHA224WITHDETDSA", PREFIX + "DSASigner$detDSA224"); in configure() 51 provider.addAlgorithm("Signature.SHA256WITHDETDSA", PREFIX + "DSASigner$detDSA256"); in configure() 52 provider.addAlgorithm("Signature.SHA384WITHDETDSA", PREFIX + "DSASigner$detDSA384"); in configure() [all …]
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/ocsp/ |
D | Signature.java | 13 public class Signature class 17 DERBitString signature; field in Signature 20 public Signature( in Signature() method in Signature 22 DERBitString signature) in Signature() argument 25 this.signature = signature; in Signature() 28 public Signature( in Signature() method in Signature 30 DERBitString signature, in Signature() argument 34 this.signature = signature; in Signature() 38 private Signature( in Signature() method in Signature 42 signature = (DERBitString)seq.getObjectAt(1); in Signature() [all …]
|
/external/tensorflow/tensorflow/compiler/mlir/tensorflow/tests/graphdef2mlir/ |
D | graph-function-name-bug.pbtxt | 16 signature { 21 signature { 26 signature { 31 signature { 36 signature { 41 signature { 46 signature { 51 signature { 56 signature { 61 signature { [all …]
|
/external/bouncycastle/repackaged_platform/bcprov/src/main/java/com/android/internal/org/bouncycastle/asn1/ocsp/ |
D | Signature.java | 17 public class Signature class 21 DERBitString signature; field in Signature 24 public Signature( in Signature() method in Signature 26 DERBitString signature) in Signature() argument 29 this.signature = signature; in Signature() 32 public Signature( in Signature() method in Signature 34 DERBitString signature, in Signature() argument 38 this.signature = signature; in Signature() 42 private Signature( in Signature() method in Signature 46 signature = (DERBitString)seq.getObjectAt(1); in Signature() [all …]
|
/external/tensorflow/tensorflow/compiler/mlir/lite/quantization/ |
D | device_target.h | 61 // Each kernel signature has its own specification for scales. 73 using Signature = llvm::SmallVector<quant::AnyQuantizedType, 4>; 75 // Returns the kernel specification for the kernel signature. 76 Optional<KernelSpec> Find(const Signature& signature) const { in Find() argument 77 auto spec_it = all_signatures_.find(signature); in Find() 87 // Adds the kernel signature with the kernel specification. 88 LogicalResult Add(const Signature& signature, const KernelSpec& spec) { in Add() argument 89 if (all_signatures_.insert({signature, spec}).second) return success(); in Add() 93 KernelSpecs& WithSignature(const KernelSpecs::Signature& signature, in WithSignature() argument 95 (void)Add(signature, {ScaleConstraintType::CustomScale, fn}); in WithSignature() [all …]
|
/external/python/funcsigs/tests/ |
D | test_inspect.py | 16 def signature(func): member in TestSignatureObject 17 sig = inspect.signature(func) 35 S = inspect.Signature 42 sig = inspect.signature(test) 71 sig = inspect.signature(test) 86 self.assertEqual(self.signature(test), ((), Ellipsis)) 93 self.assertEqual(self.signature(test), 104 self.assertEqual(self.signature(test), 115 self.assertEqual(self.signature(test), 126 with self.assertRaisesRegex(ValueError, 'not supported by signature'): [all …]
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/jcajce/ |
D | JcaContentVerifierProviderBuilder.java | 7 import java.security.Signature; 96 Signature sig; in build() 108 Signature rawSig = createRawSig(algorithm, certificate.getPublicKey()); in build() 154 Signature sig = createSignature(algorithm, (PublicKey)keys.get(i)); 156 Signature rawSig = createRawSig(algorithm, (PublicKey)keys.get(i)); 177 Signature sig = createSignature(algorithm, publicKey); 179 Signature rawSig = createRawSig(algorithm, publicKey); 207 Signature[] sigs = new Signature[keySeq.size()]; 226 Signature[] sigs = new Signature[keySeq.size()]; 245 private Signature createSignature(AlgorithmIdentifier algorithm, PublicKey publicKey) [all …]
|
/external/openssh/ |
D | PROTOCOL.sshsig | 1 This document describes a lightweight SSH Signature format 11 The header is the string "-----BEGIN SSH SIGNATURE-----" 13 "-----END SSH SIGNATURE-----" immediately after a newline. 15 The header MUST be present at the start of every signature. 16 Files containing the signature MUST start with the header. 18 signature. 25 -----BEGIN SSH SIGNATURE----- 30 -----END SSH SIGNATURE----- 43 string signature 46 public key used to make the signature using the usual SSH [all …]
|
/external/apache-commons-bcel/src/main/java/org/apache/bcel/classfile/ |
D | Utility.java | 534 * to a byte code method signature. 538 * @return Byte code representation of method signature 540 * @throws ClassFormatException if the signature is for Void 562 * @param signature Method signature 566 public static String[] methodSignatureArgumentTypes( final String signature ) in methodSignatureArgumentTypes() argument 568 return methodSignatureArgumentTypes(signature, true); in methodSignatureArgumentTypes() 573 * @param signature Method signature 578 …public static String[] methodSignatureArgumentTypes( final String signature, final boolean chopit ) in methodSignatureArgumentTypes() argument 583 if (signature.charAt(0) != '(') { in methodSignatureArgumentTypes() 584 throw new ClassFormatException("Invalid method signature: " + signature); in methodSignatureArgumentTypes() [all …]
|
/external/python/funcsigs/docs/ |
D | index.rst | 12 *funcsigs* is a backport of the `PEP 362`_ function signature features from 17 …ct: http://docs.python.org/3/library/inspect.html#introspecting-callables-with-the-signature-object 48 Introspecting callables with the Signature object 56 The Signature object represents the call signature of a callable object and its 57 return annotation. To retrieve a Signature object, use the :func:`signature` 60 .. function:: signature(callable) 62 Return a :class:`Signature` object for the given ``callable``:: 64 >>> from inspect import signature 68 >>> sig = signature(foo) 89 .. class:: Signature [all …]
|
/external/llvm-project/llvm/test/tools/llvm-readobj/ELF/ |
D | groups.test | 15 # CHECK-NEXT: Signature: foo 27 # CHECK-NEXT: Signature: bar 108 # DUP-LLVM-NEXT: Signature: foo 120 # DUP-LLVM-NEXT: Signature: bar 139 ## Check what we do when we are unable to dump the signature symbol name. 158 # SYMTAB-LLVM-NEXT: Signature: <?> 170 # SYMTAB-LLVM-NEXT: Signature: <?> 190 ## This tests the behavior for two more cases when we are unable to dump the signature symbol name. 195 ## when we are unable to read a signature symbol. 199 # RUN: FileCheck -DFILE=%t.symtab2.o %s --check-prefix=SIGNATURE-LLVM --implicit-check-not=warnin… [all …]
|
/external/vboot_reference/utility/ |
D | verify_data.c | 6 /* Routines for verifying a file's signature. Useful in testing the core 29 uint8_t* signature = NULL; in read_signature() local 31 fprintf(stderr, "Couldn't open signature file\n"); in read_signature() 35 /* Read the signature into a buffer*/ in read_signature() 36 signature = (uint8_t*) malloc(len); in read_signature() 37 if (!signature) in read_signature() 40 if( (i = read(sigfd, signature, len)) != len ) { in read_signature() 41 fprintf(stderr, "Wrong signature length - Expected = %d, Received = %d\n", in read_signature() 48 return signature; in read_signature() 55 uint8_t* signature = NULL; in main() local [all …]
|
/external/tpm2-tss/src/tss2-fapi/api/ |
D | Fapi_VerifySignature.c | 28 * Verifies a signature using a public key found in a keyPath. 34 * @param[in] signature The signature to be verified 35 * @param[in] signatureSize The size of signature in bytes 38 * @retval TSS2_FAPI_RC_BAD_REFERENCE: if context, keyPath, signature, or 44 * @retval TSS2_FAPI_RC_BAD_VALUE: if signature is invalid (has the wrong format) 46 * @retval TSS2_FAPI_RC_SIGNATURE_VERIFICATION_FAILED: if the signature fails to 65 uint8_t const *signature, in Fapi_VerifySignature() argument 76 check_not_null(signature); in Fapi_VerifySignature() 79 signature, signatureSize); in Fapi_VerifySignature() 101 * Verifies a signature using a public key found in a keyPath. [all …]
|