/third_party/node/deps/openssl/openssl/crypto/evp/ |
H A D | signature.c | 23 EVP_SIGNATURE *signature = OPENSSL_zalloc(sizeof(EVP_SIGNATURE)); in evp_signature_new() local 25 if (signature == NULL) { in evp_signature_new() 30 signature->lock = CRYPTO_THREAD_lock_new(); in evp_signature_new() 31 if (signature->lock == NULL) { in evp_signature_new() 33 OPENSSL_free(signature); in evp_signature_new() 36 signature->prov = prov; in evp_signature_new() 38 signature->refcnt = 1; in evp_signature_new() 40 return signature; in evp_signature_new() 48 EVP_SIGNATURE *signature = NULL; in evp_signature_from_algorithm() local 53 if ((signature in evp_signature_from_algorithm() 280 EVP_SIGNATURE_free(EVP_SIGNATURE *signature) EVP_SIGNATURE_free() argument 295 EVP_SIGNATURE_up_ref(EVP_SIGNATURE *signature) EVP_SIGNATURE_up_ref() argument 303 EVP_SIGNATURE_get0_provider(const EVP_SIGNATURE *signature) EVP_SIGNATURE_get0_provider() argument 328 EVP_SIGNATURE_is_a(const EVP_SIGNATURE *signature, const char *name) EVP_SIGNATURE_is_a() argument 334 evp_signature_get_number(const EVP_SIGNATURE *signature) evp_signature_get_number() argument 339 EVP_SIGNATURE_get0_name(const EVP_SIGNATURE *signature) EVP_SIGNATURE_get0_name() argument 344 EVP_SIGNATURE_get0_description(const EVP_SIGNATURE *signature) EVP_SIGNATURE_get0_description() argument 349 EVP_SIGNATURE_do_all_provided(OSSL_LIB_CTX *libctx, void (*fn)(EVP_SIGNATURE *signature, void *arg), void *arg) EVP_SIGNATURE_do_all_provided() argument 362 EVP_SIGNATURE_names_do_all(const EVP_SIGNATURE *signature, void (*fn)(const char *name, void *data), void *data) EVP_SIGNATURE_names_do_all() argument 399 EVP_SIGNATURE *signature = NULL; evp_pkey_signature_init() local [all...] |
H A D | m_sigver.c | 46 EVP_SIGNATURE *signature = NULL; in do_sigver_init() local 85 || (signature = locpctx->op.sig.signature) == NULL in do_sigver_init() 107 * Try to derive the supported signature from |locpctx->keymgmt|. in do_sigver_init() 126 * 1. Do the normal signature fetch, using the fetching data given by in do_sigver_init() 128 * 2. Do the provider specific signature fetch, from the same provider in do_sigver_init() 132 * signature, and try to export |ctx->pkey| to that keymgmt (when in do_sigver_init() 148 EVP_SIGNATURE_free(signature); in do_sigver_init() 153 signature = EVP_SIGNATURE_fetch(locpctx->libctx, supported_sig, in do_sigver_init() 155 if (signature ! in do_sigver_init() [all...] |
/third_party/openssl/crypto/evp/ |
H A D | signature.c | 23 EVP_SIGNATURE *signature = OPENSSL_zalloc(sizeof(EVP_SIGNATURE)); in evp_signature_new() local 25 if (signature == NULL) { in evp_signature_new() 30 signature->lock = CRYPTO_THREAD_lock_new(); in evp_signature_new() 31 if (signature->lock == NULL) { in evp_signature_new() 33 OPENSSL_free(signature); in evp_signature_new() 36 signature->prov = prov; in evp_signature_new() 38 signature->refcnt = 1; in evp_signature_new() 40 return signature; in evp_signature_new() 48 EVP_SIGNATURE *signature = NULL; in evp_signature_from_algorithm() local 53 if ((signature in evp_signature_from_algorithm() 280 EVP_SIGNATURE_free(EVP_SIGNATURE *signature) EVP_SIGNATURE_free() argument 295 EVP_SIGNATURE_up_ref(EVP_SIGNATURE *signature) EVP_SIGNATURE_up_ref() argument 303 EVP_SIGNATURE_get0_provider(const EVP_SIGNATURE *signature) EVP_SIGNATURE_get0_provider() argument 328 EVP_SIGNATURE_is_a(const EVP_SIGNATURE *signature, const char *name) EVP_SIGNATURE_is_a() argument 334 evp_signature_get_number(const EVP_SIGNATURE *signature) evp_signature_get_number() argument 339 EVP_SIGNATURE_get0_name(const EVP_SIGNATURE *signature) EVP_SIGNATURE_get0_name() argument 344 EVP_SIGNATURE_get0_description(const EVP_SIGNATURE *signature) EVP_SIGNATURE_get0_description() argument 349 EVP_SIGNATURE_do_all_provided(OSSL_LIB_CTX *libctx, void (*fn)(EVP_SIGNATURE *signature, void *arg), void *arg) EVP_SIGNATURE_do_all_provided() argument 362 EVP_SIGNATURE_names_do_all(const EVP_SIGNATURE *signature, void (*fn)(const char *name, void *data), void *data) EVP_SIGNATURE_names_do_all() argument 399 EVP_SIGNATURE *signature = NULL; evp_pkey_signature_init() local [all...] |
H A D | m_sigver.c | 46 EVP_SIGNATURE *signature = NULL; in do_sigver_init() local 85 || (signature = locpctx->op.sig.signature) == NULL in do_sigver_init() 107 * Try to derive the supported signature from |locpctx->keymgmt|. in do_sigver_init() 126 * 1. Do the normal signature fetch, using the fetching data given by in do_sigver_init() 128 * 2. Do the provider specific signature fetch, from the same provider in do_sigver_init() 132 * signature, and try to export |ctx->pkey| to that keymgmt (when in do_sigver_init() 148 EVP_SIGNATURE_free(signature); in do_sigver_init() 153 signature = EVP_SIGNATURE_fetch(locpctx->libctx, supported_sig, in do_sigver_init() 155 if (signature ! in do_sigver_init() [all...] |
/third_party/mbedtls/tests/src/drivers/ |
H A D | test_driver_signature.c | 2 * Test driver for signature functions. 21 #include "test/drivers/signature.h" 48 uint8_t *signature, in sign_hash() 62 signature, signature_size, signature_length); in sign_hash() 69 signature, signature_size, signature_length); in sign_hash() 83 signature, signature_size, signature_length); in sign_hash() 90 signature, signature_size, signature_length); in sign_hash() 103 (void) signature; in sign_hash() 116 const uint8_t *signature, in verify_hash() 129 signature, signature_lengt in verify_hash() 41 sign_hash( const psa_key_attributes_t *attributes, const uint8_t *key_buffer, size_t key_buffer_size, psa_algorithm_t alg, const uint8_t *hash, size_t hash_length, uint8_t *signature, size_t signature_size, size_t *signature_length) sign_hash() argument 109 verify_hash( const psa_key_attributes_t *attributes, const uint8_t *key_buffer, size_t key_buffer_size, psa_algorithm_t alg, const uint8_t *hash, size_t hash_length, const uint8_t *signature, size_t signature_length) verify_hash() argument 175 mbedtls_test_transparent_signature_sign_message( const psa_key_attributes_t *attributes, const uint8_t *key_buffer, size_t key_buffer_size, psa_algorithm_t alg, const uint8_t *input, size_t input_length, uint8_t *signature, size_t signature_size, size_t *signature_length) mbedtls_test_transparent_signature_sign_message() argument 231 mbedtls_test_opaque_signature_sign_message( const psa_key_attributes_t *attributes, const uint8_t *key, size_t key_length, psa_algorithm_t alg, const uint8_t *input, size_t input_length, uint8_t *signature, size_t signature_size, size_t *signature_length) mbedtls_test_opaque_signature_sign_message() argument 255 mbedtls_test_transparent_signature_verify_message( const psa_key_attributes_t *attributes, const uint8_t *key_buffer, size_t key_buffer_size, psa_algorithm_t alg, const uint8_t *input, size_t input_length, const uint8_t *signature, size_t signature_length) mbedtls_test_transparent_signature_verify_message() argument 298 mbedtls_test_opaque_signature_verify_message( const psa_key_attributes_t *attributes, const uint8_t *key, size_t key_length, psa_algorithm_t alg, const uint8_t *input, size_t input_length, const uint8_t *signature, size_t signature_length) mbedtls_test_opaque_signature_verify_message() argument 320 mbedtls_test_transparent_signature_sign_hash( const psa_key_attributes_t *attributes, const uint8_t *key_buffer, size_t key_buffer_size, psa_algorithm_t alg, const uint8_t *hash, size_t hash_length, uint8_t *signature, size_t signature_size, size_t *signature_length) mbedtls_test_transparent_signature_sign_hash() argument 348 mbedtls_test_opaque_signature_sign_hash( const psa_key_attributes_t *attributes, const uint8_t *key, size_t key_length, psa_algorithm_t alg, const uint8_t *hash, size_t hash_length, uint8_t *signature, size_t signature_size, size_t *signature_length) mbedtls_test_opaque_signature_sign_hash() argument 368 mbedtls_test_transparent_signature_verify_hash( const psa_key_attributes_t *attributes, const uint8_t *key_buffer, size_t key_buffer_size, psa_algorithm_t alg, const uint8_t *hash, size_t hash_length, const uint8_t *signature, size_t signature_length) mbedtls_test_transparent_signature_verify_hash() argument 386 mbedtls_test_opaque_signature_verify_hash( const psa_key_attributes_t *attributes, const uint8_t *key, size_t key_length, psa_algorithm_t alg, const uint8_t *hash, size_t hash_length, const uint8_t *signature, size_t signature_length) mbedtls_test_opaque_signature_verify_hash() argument [all...] |
/third_party/node/test/fixtures/wpt/WebCryptoAPI/sign_verify/ |
H A D | ecdsa_vectors.js | 21 // signature - the expected signature 75 signature: signatures[curveName][hashName] 92 vector.name = `${vector.name} - The signature was truncated by 1 byte`; 93 vector.signature = vector.signature.subarray(0, vector.signature.byteLength - 1); 97 // The signature was made with a different algorithm 101 vector.name = `${vector.name} - The signature was made using ${vector.hashName}, however verification is being done using ${hashName}`; 111 const r = vector.signature [all...] |
H A D | hmac.js | 19 var operation = subtle.verify({name: "HMAC", hash: vector.hash}, vector.key, vector.signature, vector.plaintext) 45 var signature = copyBuffer(vector.signature); 46 var operation = subtle.verify({name: "HMAC", hash: vector.hash}, vector.key, signature, vector.plaintext) 53 signature[0] = 255 - signature[0]; 55 }, vector.name + " verification with altered signature after call"); 59 }, "importVectorKeys step: " + vector.name + " verification with altered signature after call"); 71 var operation = subtle.verify({name: "HMAC", hash: vector.hash}, vector.key, vector.signature, plaintext) 97 return subtle.verify({name: "HMAC", hash: vector.hash}, vector.key, vector.signature, vecto [all...] |
H A D | ecdsa.js | 21 var operation = subtle.verify(algorithm, vector.publicKey, vector.signature, vector.plaintext) 48 var signature = copyBuffer(vector.signature); 49 var operation = subtle.verify(algorithm, vector.publicKey, signature, vector.plaintext) 56 signature[0] = 255 - signature[0]; 58 }, vector.name + " verification with altered signature after call"); 62 }, "importVectorKeys step: " + vector.name + " verification with altered signature after call"); 75 var operation = subtle.verify(algorithm, vector.publicKey, vector.signature, plaintext) 100 return subtle.verify(algorithm, vector.privateKey, vector.signature, vecto [all...] |
H A D | rsa.js | 19 var operation = subtle.verify(vector.algorithm, vector.publicKey, vector.signature, vector.plaintext) 45 var signature = copyBuffer(vector.signature); 46 var operation = subtle.verify(vector.algorithm, vector.publicKey, signature, vector.plaintext) 53 signature[0] = 255 - signature[0]; 55 }, vector.name + " verification with altered signature after call"); 59 }, "importVectorKeys step: " + vector.name + " verification with altered signature after call"); 71 var operation = subtle.verify(vector.algorithm, vector.publicKey, vector.signature, plaintext) 95 return subtle.verify(vector.algorithm, vector.privateKey, vector.signature, vecto [all...] |
H A D | eddsa.js | 20 var operation = subtle.verify(algorithm, vector.publicKey, vector.signature, vector.data) 47 var signature = copyBuffer(vector.signature); 48 var operation = subtle.verify(algorithm, vector.publicKey, signature, vector.data) 55 signature[0] = 255 - signature[0]; 57 }, vector.name + " verification with altered signature after call"); 61 }, "importVectorKeys step: " + vector.name + " verification with altered signature after call"); 74 var operation = subtle.verify(algorithm, vector.publicKey, vector.signature, data) 99 return subtle.verify(algorithm, vector.privateKey, vector.signature, vecto [all...] |
/third_party/node/deps/npm/node_modules/@sigstore/sign/dist/bundler/ |
H A D | bundle.js | 45 // Message signature bundle - $case: 'messageSignature' 46 function toMessageSignatureBundle(artifact, signature) { 50 signature: signature.signature, 51 certificate: signature.key.$case === 'x509Certificate' 52 ? util_1.pem.toDER(signature.key.certificate) 54 keyHint: signature.key.$case === 'publicKey' ? signature.key.hint : undefined, 59 function toDSSEBundle(artifact, signature) { [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant_lib/ |
H A D | wpa_evp_key.c | 26 static int cm_sign(const struct CmBlob *keyUri, const struct CmBlob *message, struct CmBlob *signature,
in cm_sign() argument 46 ret = CmFinish(&handle, &inDataFinish, signature);
in cm_sign() 66 struct CmBlob signature = { DEFAULT_SIGNATURE_LEN, (uint8_t *)signData };
in rsa_sign() local 70 ret = cm_sign(&keyUri, &message, &signature, &spec);
in rsa_sign() 71 if (ret && signature.size > 0) {
in rsa_sign() 72 *siglen = signature.size;
in rsa_sign() 73 os_memcpy(sigret, signature.data, signature.size);
in rsa_sign() 74 wpa_printf(MSG_INFO, "%s sign len:%u", __func__, signature.size);
in rsa_sign() 86 struct CmBlob signature in rsa_priv_enc() local 109 struct CmBlob signature = { DEFAULT_SIGNATURE_LEN, (uint8_t *)signData }; ec_sign() local [all...] |
/third_party/icu/icu4c/source/common/ |
H A D | utrie_swap.cpp | 49 trie.signature=ds->readUInt32(inTrie->signature); in utrie_swap() 54 if( trie.signature!=0x54726965 || in utrie_swap() 120 trie.signature=ds->readUInt32(inTrie->signature); in utrie2_swap() 128 if( trie.signature!=UTRIE2_SIG || in utrie2_swap() 161 ds->swapArray32(ds, &inTrie->signature, 4, &outTrie->signature, pErrorCode); in utrie2_swap() 207 trie.signature=ds->readUInt32(inTrie->signature); in ucptrie_swap() 304 uint32_t signature; getVersion() local [all...] |
/third_party/node/deps/icu-small/source/common/ |
H A D | utrie_swap.cpp | 49 trie.signature=ds->readUInt32(inTrie->signature); in utrie_swap() 54 if( trie.signature!=0x54726965 || in utrie_swap() 120 trie.signature=ds->readUInt32(inTrie->signature); in utrie2_swap() 128 if( trie.signature!=UTRIE2_SIG || in utrie2_swap() 161 ds->swapArray32(ds, &inTrie->signature, 4, &outTrie->signature, pErrorCode); in utrie2_swap() 207 trie.signature=ds->readUInt32(inTrie->signature); in ucptrie_swap() 304 uint32_t signature; getVersion() local [all...] |
/third_party/skia/third_party/externals/icu/source/common/ |
H A D | utrie_swap.cpp | 49 trie.signature=ds->readUInt32(inTrie->signature); in utrie_swap() 54 if( trie.signature!=0x54726965 || in utrie_swap() 120 trie.signature=ds->readUInt32(inTrie->signature); in utrie2_swap() 128 if( trie.signature!=UTRIE2_SIG || in utrie2_swap() 161 ds->swapArray32(ds, &inTrie->signature, 4, &outTrie->signature, pErrorCode); in utrie2_swap() 207 trie.signature=ds->readUInt32(inTrie->signature); in ucptrie_swap() 304 uint32_t signature; getVersion() local [all...] |
/third_party/python/Lib/xml/etree/ |
H A D | ElementPath.py | 230 signature = [] 244 signature.append(token[0] or "-") 246 signature = "".join(signature) 247 # use signature to determine predicate type 248 if signature == "@-": 256 if signature == "@-='" or signature == "@-!='": 268 return select_negated if '!=' in signature else select 269 if signature [all...] |
/third_party/node/deps/openssl/openssl/crypto/asn1/ |
H A D | a_verify.c | 27 int ASN1_verify(i2d_of_void *i2d, X509_ALGOR *a, ASN1_BIT_STRING *signature, in ASN1_verify() argument 46 if (signature->type == V_ASN1_BIT_STRING && signature->flags & 0x7) { in ASN1_verify() 75 if (EVP_VerifyFinal(ctx, (unsigned char *)signature->data, in ASN1_verify() 76 (unsigned int)signature->length, pkey) <= 0) { in ASN1_verify() 90 const ASN1_BIT_STRING *signature, const void *data, in ASN1_item_verify() 93 return ASN1_item_verify_ex(it, alg, signature, data, NULL, pkey, NULL, NULL); in ASN1_item_verify() 97 const ASN1_BIT_STRING *signature, const void *data, in ASN1_item_verify_ex() 105 rv = ASN1_item_verify_ctx(it, alg, signature, data, ctx); in ASN1_item_verify_ex() 113 const ASN1_BIT_STRING *signature, cons in ASN1_item_verify_ctx() 89 ASN1_item_verify(const ASN1_ITEM *it, const X509_ALGOR *alg, const ASN1_BIT_STRING *signature, const void *data, EVP_PKEY *pkey) ASN1_item_verify() argument 96 ASN1_item_verify_ex(const ASN1_ITEM *it, const X509_ALGOR *alg, const ASN1_BIT_STRING *signature, const void *data, const ASN1_OCTET_STRING *id, EVP_PKEY *pkey, OSSL_LIB_CTX *libctx, const char *propq) ASN1_item_verify_ex() argument 112 ASN1_item_verify_ctx(const ASN1_ITEM *it, const X509_ALGOR *alg, const ASN1_BIT_STRING *signature, const void *data, EVP_MD_CTX *ctx) ASN1_item_verify_ctx() argument [all...] |
H A D | a_sign.c | 28 ASN1_BIT_STRING *signature, char *data, EVP_PKEY *pkey, in ASN1_sign() 99 OPENSSL_free(signature->data); in ASN1_sign() 100 signature->data = buf_out; in ASN1_sign() 102 signature->length = outl; in ASN1_sign() 107 signature->flags &= ~(ASN1_STRING_FLAG_BITS_LEFT | 0x07); in ASN1_sign() 108 signature->flags |= ASN1_STRING_FLAG_BITS_LEFT; in ASN1_sign() 119 ASN1_BIT_STRING *signature, const void *data, in ASN1_item_sign() 122 return ASN1_item_sign_ex(it, algor1, algor2, signature, data, NULL, pkey, in ASN1_item_sign() 127 X509_ALGOR *algor2, ASN1_BIT_STRING *signature, in ASN1_item_sign_ex() 143 rv = ASN1_item_sign_ctx(it, algor1, algor2, signature, dat in ASN1_item_sign_ex() 27 ASN1_sign(i2d_of_void *i2d, X509_ALGOR *algor1, X509_ALGOR *algor2, ASN1_BIT_STRING *signature, char *data, EVP_PKEY *pkey, const EVP_MD *type) ASN1_sign() argument 118 ASN1_item_sign(const ASN1_ITEM *it, X509_ALGOR *algor1, X509_ALGOR *algor2, ASN1_BIT_STRING *signature, const void *data, EVP_PKEY *pkey, const EVP_MD *md) ASN1_item_sign() argument 126 ASN1_item_sign_ex(const ASN1_ITEM *it, X509_ALGOR *algor1, X509_ALGOR *algor2, ASN1_BIT_STRING *signature, const void *data, const ASN1_OCTET_STRING *id, EVP_PKEY *pkey, const EVP_MD *md, OSSL_LIB_CTX *libctx, const char *propq) ASN1_item_sign_ex() argument 151 ASN1_item_sign_ctx(const ASN1_ITEM *it, X509_ALGOR *algor1, X509_ALGOR *algor2, ASN1_BIT_STRING *signature, const void *data, EVP_MD_CTX *ctx) ASN1_item_sign_ctx() argument [all...] |
/third_party/openssl/crypto/asn1/ |
H A D | a_verify.c | 27 int ASN1_verify(i2d_of_void *i2d, X509_ALGOR *a, ASN1_BIT_STRING *signature, in ASN1_verify() argument 46 if (signature->type == V_ASN1_BIT_STRING && signature->flags & 0x7) { in ASN1_verify() 75 if (EVP_VerifyFinal(ctx, (unsigned char *)signature->data, in ASN1_verify() 76 (unsigned int)signature->length, pkey) <= 0) { in ASN1_verify() 90 const ASN1_BIT_STRING *signature, const void *data, in ASN1_item_verify() 93 return ASN1_item_verify_ex(it, alg, signature, data, NULL, pkey, NULL, NULL); in ASN1_item_verify() 97 const ASN1_BIT_STRING *signature, const void *data, in ASN1_item_verify_ex() 105 rv = ASN1_item_verify_ctx(it, alg, signature, data, ctx); in ASN1_item_verify_ex() 113 const ASN1_BIT_STRING *signature, cons in ASN1_item_verify_ctx() 89 ASN1_item_verify(const ASN1_ITEM *it, const X509_ALGOR *alg, const ASN1_BIT_STRING *signature, const void *data, EVP_PKEY *pkey) ASN1_item_verify() argument 96 ASN1_item_verify_ex(const ASN1_ITEM *it, const X509_ALGOR *alg, const ASN1_BIT_STRING *signature, const void *data, const ASN1_OCTET_STRING *id, EVP_PKEY *pkey, OSSL_LIB_CTX *libctx, const char *propq) ASN1_item_verify_ex() argument 112 ASN1_item_verify_ctx(const ASN1_ITEM *it, const X509_ALGOR *alg, const ASN1_BIT_STRING *signature, const void *data, EVP_MD_CTX *ctx) ASN1_item_verify_ctx() argument [all...] |
H A D | a_sign.c | 28 ASN1_BIT_STRING *signature, char *data, EVP_PKEY *pkey, in ASN1_sign() 99 OPENSSL_free(signature->data); in ASN1_sign() 100 signature->data = buf_out; in ASN1_sign() 102 signature->length = outl; in ASN1_sign() 107 signature->flags &= ~(ASN1_STRING_FLAG_BITS_LEFT | 0x07); in ASN1_sign() 108 signature->flags |= ASN1_STRING_FLAG_BITS_LEFT; in ASN1_sign() 119 ASN1_BIT_STRING *signature, const void *data, in ASN1_item_sign() 122 return ASN1_item_sign_ex(it, algor1, algor2, signature, data, NULL, pkey, in ASN1_item_sign() 127 X509_ALGOR *algor2, ASN1_BIT_STRING *signature, in ASN1_item_sign_ex() 143 rv = ASN1_item_sign_ctx(it, algor1, algor2, signature, dat in ASN1_item_sign_ex() 27 ASN1_sign(i2d_of_void *i2d, X509_ALGOR *algor1, X509_ALGOR *algor2, ASN1_BIT_STRING *signature, char *data, EVP_PKEY *pkey, const EVP_MD *type) ASN1_sign() argument 118 ASN1_item_sign(const ASN1_ITEM *it, X509_ALGOR *algor1, X509_ALGOR *algor2, ASN1_BIT_STRING *signature, const void *data, EVP_PKEY *pkey, const EVP_MD *md) ASN1_item_sign() argument 126 ASN1_item_sign_ex(const ASN1_ITEM *it, X509_ALGOR *algor1, X509_ALGOR *algor2, ASN1_BIT_STRING *signature, const void *data, const ASN1_OCTET_STRING *id, EVP_PKEY *pkey, const EVP_MD *md, OSSL_LIB_CTX *libctx, const char *propq) ASN1_item_sign_ex() argument 151 ASN1_item_sign_ctx(const ASN1_ITEM *it, X509_ALGOR *algor1, X509_ALGOR *algor2, ASN1_BIT_STRING *signature, const void *data, EVP_MD_CTX *ctx) ASN1_item_sign_ctx() argument [all...] |
/third_party/node/deps/v8/src/torque/ |
H A D | declarations.cc | 97 builtin->signature().return_type == type->return_type() && in FindSomeInternalBuiltinWithType() 98 builtin->signature().parameter_types.types == in FindSomeInternalBuiltinWithType() 115 auto signature_types = m->signature().GetExplicitTypes(); in TryLookupMacro() 116 if (signature_types == types && !m->signature().parameter_types.var_args) { in TryLookupMacro() 183 Signature signature, in CreateTorqueMacro() 188 std::move(external_name), std::move(readable_name), std::move(signature), in CreateTorqueMacro() 194 Signature signature) { in CreateExternMacro() 197 std::move(signature)))); in CreateExternMacro() 203 const Signature& signature, base::Optional<Statement*> body, in DeclareMacro() 206 TryLookupMacro(name, signature in DeclareMacro() 180 CreateTorqueMacro(std::string external_name, std::string readable_name, bool exported_to_csa, Signature signature, base::Optional<Statement*> body, bool is_user_defined) CreateTorqueMacro() argument 192 CreateExternMacro( std::string name, std::string external_assembler_name, Signature signature) CreateExternMacro() argument 200 DeclareMacro( const std::string& name, bool accessible_from_csa, base::Optional<std::string> external_assembler_name, const Signature& signature, base::Optional<Statement*> body, base::Optional<std::string> op, bool is_user_defined) DeclareMacro() argument 232 CreateMethod(AggregateType* container_type, const std::string& name, Signature signature, Statement* body) CreateMethod() argument 243 CreateIntrinsic(const std::string& name, const Signature& signature) CreateIntrinsic() argument 250 DeclareIntrinsic(const std::string& name, const Signature& signature) DeclareIntrinsic() argument 257 CreateBuiltin(std::string external_name, std::string readable_name, Builtin::Kind kind, Signature signature, base::Optional<Statement*> body) CreateBuiltin() argument 267 DeclareBuiltin(const std::string& name, Builtin::Kind kind, const Signature& signature, base::Optional<Statement*> body) DeclareBuiltin() argument 276 DeclareRuntimeFunction( const std::string& name, const Signature& signature) DeclareRuntimeFunction() argument [all...] |
H A D | declaration-visitor.cc | 64 Signature signature, in CreateBuiltin() 78 if (!signature.return_type->IsSubtypeOf(TypeOracle::GetJSAnyType())) { in CreateBuiltin() 82 for (size_t i = signature.implicit_count; in CreateBuiltin() 83 i < signature.parameter_types.types.size(); ++i) { in CreateBuiltin() 84 const Type* parameter_type = signature.parameter_types.types[i]; in CreateBuiltin() 94 for (size_t i = 0; i < signature.types().size(); ++i) { in CreateBuiltin() 95 if (signature.types()[i]->StructSupertype()) { in CreateBuiltin() 97 signature.parameter_names[i], " has type ", *signature.types()[i], in CreateBuiltin() 102 if (signature in CreateBuiltin() 61 CreateBuiltin(BuiltinDeclaration* decl, std::string external_name, std::string readable_name, Signature signature, base::Optional<Statement*> body) CreateBuiltin() argument 130 Signature signature = TypeVisitor::MakeSignature(decl); Visit() local [all...] |
/third_party/node/deps/v8/src/execution/ |
H A D | encoded-c-signature.cc | 5 #include "src/execution/encoded-c-signature.h" 19 EncodedCSignature::EncodedCSignature(const CFunctionInfo* signature) { in EncodedCSignature() argument 20 parameter_count_ = static_cast<int>(signature->ArgumentCount()); in EncodedCSignature() 22 if (signature->ArgumentInfo(i).GetSequenceType() == in EncodedCSignature() 24 CTypeInfo::IsFloatingPointType(signature->ArgumentInfo(i).GetType())) { in EncodedCSignature() 30 if (signature->HasOptions()) { in EncodedCSignature() 33 if (signature->ReturnInfo().GetSequenceType() == in EncodedCSignature() 35 CTypeInfo::IsFloatingPointType(signature->ReturnInfo().GetType())) { in EncodedCSignature()
|
/third_party/mesa3d/src/compiler/glsl/ |
H A D | lower_jumps.cpp | 163 ir_function_signature* signature; member 176 this->signature = p_signature; in loop_record() 188 exec_list& list = this->loop ? this->loop->body_instructions : signature->body; in get_execute_flag() 189 this->execute_flag = new(this->signature) ir_variable(glsl_type::bool_type, "execute_flag", ir_var_temporary); in get_execute_flag() 190 list.push_head(new(this->signature) ir_assignment(new(this->signature) ir_dereference_variable(execute_flag), new(this->signature) ir_constant(true))); in get_execute_flag() 199 ir_function_signature* signature; member 208 this->signature = p_signature; in function_record() 218 this->return_flag = new(this->signature) ir_variabl in get_return_flag() [all...] |
/third_party/node/benchmark/crypto/ |
H A D | oneshot-verify.js | 45 function measureSync(n, digest, signature, publicKey, keys) { 52 signature); 57 function measureAsync(n, digest, signature, publicKey, keys) { 71 signature, 78 function measureAsyncParallel(n, digest, signature, publicKey, keys) { 90 signature, 136 const signature = crypto.sign(digest, data, privateKey); 140 measureSync(n, digest, signature, publicKey, keys); 143 measureAsync(n, digest, signature, publicKey, keys); 146 measureAsyncParallel(n, digest, signature, publicKe [all...] |