Questions tagged [signature]

In computer programming, especially object-oriented programming, a method is commonly identified by its unique method signature, which usually includes the method name, and the number, types and order of its parameters. A method signature is the smallest type of a method. The signature tag should not be used to tag questions about digital signatures, email signatures or written signatures.

Method signature

In computer programming, especially object-oriented programming, a method is commonly identified by its unique method signature, which usually includes the method name, and the number, types and order of its parameters. A method signature is the smallest type of a method.

Method overloading

Method signatures can be used by the compiler to distinguish between methods with the same name, but with different parameters. This is called method overloading. The precise characteristics of method overloading depends on the programming language. Overloading should not be used for methods that perform an different operation as that will make the source code hard to read.

Examples

Example of declarations of two overloaded methods with the same name, but with a different method signature:

void drawPoint(int x, int y);
void drawPoint(Point p);

in this case it is likely that drawPoint(x, y) internally converts x and y into a Point instance. This kind of function is therefore called a convenience method.

Disambiguation

For digital signatures such as RSA or DSA signatures please use and/or . Email may contain an email-signature, PDF documents may contain a digitized written signature. These signatures don't have specialized tags, please use more generic tags such as and instead.

2003 questions
13
votes
0 answers

Tampered Android App Has Original Signature

What I Have I have an Android app with some sensitive data. I want to make sure that the client app calls the server only if it has not been tampered with in any way. Basically, I want to check the integrity of the Android app. What I Have Done For…
Aritra Roy
  • 15,355
  • 10
  • 73
  • 107
13
votes
1 answer

Finding arguments that go with methods in C++ dll's

Ok, so I can use dumpbin.exe /exports library.dll to find all methods in the dll. ...but how do I find out which arguments to pass into them? Without a header file of course.
Presidenten
  • 6,327
  • 11
  • 45
  • 55
13
votes
3 answers

Extract certificate from a PKCS7 signature in php

I need to extract the user certificate from a pkcs7 signature file. I can do it via the command line using the following: openssl pkcs7 -in somesign.pks7 -inform PEM -print_certs This will give me the entire certificate chain and I can process the…
user2761778
  • 131
  • 1
  • 5
13
votes
2 answers

WCF SOAP 1.1 and WS-Security 1.0, client certificate transport auth, service cert for message body signature, UsernameToken, Password Digest, Nonce

Summary: I am working on a .NET 4.0 WCF client to consume a web service (DataPower, Java service on the other end) using SOAP 1.1 and WS-Security 1.0. The WCF client must implement a client certificate for mutual authentication at the transport…
Jawad
  • 356
  • 1
  • 2
  • 10
13
votes
1 answer

Why 55 AA is used as the boot signature on IBM PCs?

Why does the IBM PC architecture use 55 AA magic numbers in the last two bytes of a bootsector for the boot signature? I suspect that has something to do with the bit patterns they are: 01010101 10101010, but don't know what. My guesses are…
SasQ
  • 14,009
  • 7
  • 43
  • 43
12
votes
4 answers

Why does constraining a Perl 6 named parameter to a definite value make it a required value?

Consider these subroutines that all take a single named parameter. Named parameters should be optional and I haven't seen anything to say there are exceptions to that. With no type constraints there's no problem; the named parameter is not required.…
brian d foy
  • 129,424
  • 31
  • 207
  • 592
12
votes
5 answers

Type-signature vs. function equation in Haskell

I'm new to Haskell and to functional programming. I'm reading through Real World Haskell, and I've realized I'm confused by a few examples. Specifically this is in Chapter 9, in the section "A Domain specific language for predicates", the examples…
Or When
  • 149
  • 1
  • 6
12
votes
1 answer

Equivalent of the method RSACryptoServiceProvider signHash in Java

I'm trying to get the equivalent of the following C# method : public byte[] SignHash(byte[] btHash, string SN) { string strSignature = string.Empty; X509Store x509store = null; x509store = new X509Store(StoreLocation.CurrentUser); …
Thordax
  • 1,673
  • 4
  • 28
  • 54
12
votes
1 answer

Parsing signatures with regex, having "fun" with array return values

I have this [nasty] regex to capture a VBA procedure signature with all the parts in a bucket: public static string ProcedureSyntax { get { return …
Mathieu Guindon
  • 69,817
  • 8
  • 107
  • 235
12
votes
3 answers

Where do I get a list of all known viruses signatures?

I have written some antivirus software in Python, but am unable to find virus signatures. The software works by dumping each file on the hard disk to hex, thus getting the hex signature. Where do i get signatures for all the known viruses?
Zac Brown
  • 5,905
  • 19
  • 59
  • 107
12
votes
6 answers

How can I create a repeatable signature of a data structure?

I have a situation where I want to create a signature of a data structure: my $signature = ds_to_sig( { foo => 'bar', baz => 'bundy', boing => undef, number => 1_234_567, } ); The aim should be that if the data structure changes…
EvdB
  • 1,759
  • 2
  • 12
  • 19
12
votes
3 answers

TS Interface doesn't force functions signature on implementers

interface test{ foo(boo:string); } class coo implements test{ foo(){ } } In playGround this doesn't generate and error although the function signature is not as the interface says, the expected behavior of interface is to force the…
Bashar Ali Labadi
  • 1,014
  • 1
  • 11
  • 19
11
votes
1 answer

Get SSL certificate details

I want to examine the SSL certificate that -(void)connection:(NSURLConnection *)connection didReceiveAuthenticationChallenge:(NSURLAuthenticationChallenge *)challenge receives and I have the following snippet which gives me the Issuer Common Name,…
11
votes
1 answer

OCaml, meaning of `!+` in `type `!+'a t`

I'm currently learning about OCaml, and especially functors. I looked at map.mli from the standard library, and around line 70, there is : type key (** The type of the map keys. *) type !+'a t (** The type of maps from type [key] to type ['a].…
Felix Bertoni
  • 400
  • 2
  • 10
11
votes
2 answers

How can I access Amazon AWS S3 using GSOAP for C and C++?

I have searched everywhere for this and I could not find a single decent code. How can I access Amazon AWS S3 service using GSOAP?
david
  • 111
  • 4