/external/chromium_org/net/quic/crypto/ |
channel_id.h | 21 // Sign signs |signed_data| using the ChannelID key for |hostname| and puts 25 base::StringPiece signed_data, 46 // Verify returns true iff |signature| is a valid signature of |signed_data| 49 base::StringPiece signed_data, 53 // signature of |signed_data| by |key|. |is_channel_id_signature| indicates 57 base::StringPiece signed_data,
|
channel_id_nss.cc | 17 StringPiece signed_data, 19 return VerifyRaw(key, signed_data, signature, true); 24 StringPiece signed_data, 74 reinterpret_cast<const unsigned char*>(signed_data.data()), 75 signed_data.size());
|
channel_id_openssl.cc | 21 StringPiece signed_data, 23 return VerifyRaw(key, signed_data, signature, true); 28 StringPiece signed_data, 81 SHA256_Update(&sha256, signed_data.data(), signed_data.size());
|
channel_id_test.cc | 274 const string signed_data = "signed data"; local 277 ASSERT_TRUE(signer->Sign(hostname, signed_data, &key, &signature)); 281 EXPECT_TRUE(ChannelIDVerifier::Verify(key, signed_data, signature)); 283 EXPECT_FALSE(ChannelIDVerifier::Verify("a" + key, signed_data, signature)); 284 EXPECT_FALSE(ChannelIDVerifier::Verify(key, "a" + signed_data, signature)); 290 string(bad_key.get(), key.size()), signed_data, signature)); 296 key, signed_data, string(bad_signature.get(), signature.size())));
|
proof_verifier_chromium.h | 64 const std::string& signed_data,
|
proof_verifier_chromium.cc | 181 const string& signed_data, 247 verifier.VerifyUpdate(reinterpret_cast<const uint8*>(signed_data.data()), 248 signed_data.size());
|
/external/chromium/net/base/ |
dnssec_keyset.cc | 106 scoped_array<unsigned char> signed_data(new unsigned char[signed_data_len]); 109 signed_data[j++] = static_cast<uint8>(rrtype >> 8); 110 signed_data[j++] = static_cast<uint8>(rrtype); 111 memcpy(&signed_data[j], sigdata, 16); 113 memcpy(&signed_data[j], zone.data(), zone.size()); 118 memcpy(&signed_data[j], name.data(), name.size()); 120 signed_data[j++] = static_cast<uint8>(rrtype >> 8); 121 signed_data[j++] = static_cast<uint8>(rrtype); 122 signed_data[j++] = 0; // CLASS (always IN = 1) 123 signed_data[j++] = 1 [all...] |
dnssec_keyset.h | 51 base::StringPiece signed_data);
|
/external/chromium_org/net/quic/test_tools/ |
crypto_test_utils_nss.cc | 35 StringPiece signed_data, 65 reinterpret_cast<const unsigned char*>(signed_data.data()), 66 signed_data.size());
|
crypto_test_utils_openssl.cc | 40 StringPiece signed_data, 65 EVP_DigestUpdate(&md_ctx, signed_data.data(), signed_data.size());
|
/hardware/qcom/keymaster/ |
keymaster_qcom.h | 166 * signed_data : signature 172 uint8_t signed_data[KM_KEY_SIZE_MAX]; member in struct:keymaster_sign_data_resp 187 * signed_data : Pointer to signed data buffer 196 uint32_t signed_data; member in struct:keymaster_verify_data_cmd
|
keymaster_qcom.cpp | 560 memcpy(p, (unsigned char *)(&resp->signed_data), resp->sig_len); 628 send_cmd->signed_data = (uint32_t)ihandle.ion_sbuffer;
|
/external/chromium_org/chromeos/dbus/ |
shill_manager_client.cc | 162 writer.AppendString(properties.signed_data); 181 writer.AppendString(properties.signed_data); 201 writer.AppendString(properties.signed_data);
|
shill_manager_client_unittest.cc | 329 arguments.push_back("signed_data"); 343 properties.signed_data = arguments[3]; 368 arguments.push_back("signed_data"); 386 properties.signed_data = arguments[3]; 412 arguments.push_back("signed_data"); 427 properties.signed_data = arguments[3];
|
shill_manager_client.h | 94 std::string signed_data; member in struct:chromeos::ShillManagerClient::VerificationProperties
|
/libcore/luni/src/main/java/org/apache/harmony/security/pkcs7/ |
ContentInfo.java | 47 public static final int[] SIGNED_DATA = new int[] {1, 2, 840, 113549, 1, 7, 2}; 64 if (Arrays.equals(oid, SIGNED_DATA)) { 145 if (Arrays.equals(oid, SIGNED_DATA)) {
|
/external/chromium/chrome/common/net/ |
x509_certificate_model_nss.cc | 341 ScopedNSSCMSSignedData signed_data(NSS_CMSSignedData_CreateCertsOnly( 343 if (!signed_data.get()) { 349 if (NSS_CMSSignedData_AddCertificate(signed_data.get(), cert_chain[i]) != 358 message.get(), cinfo, signed_data.get()) == SECSuccess) { 359 ignore_result(signed_data.release());
|
/external/chromium_org/chrome/common/net/ |
x509_certificate_model_nss.cc | 345 ScopedNSSCMSSignedData signed_data(NSS_CMSSignedData_CreateCertsOnly( 347 if (!signed_data.get()) { 353 if (NSS_CMSSignedData_AddCertificate(signed_data.get(), cert_chain[i]) != 362 message.get(), cinfo, signed_data.get()) == SECSuccess) { 363 ignore_result(signed_data.release());
|
/hardware/libhardware/include/hardware/ |
keymaster.h | 222 uint8_t** signed_data, size_t* signed_data_length); 233 const uint8_t* signed_data, const size_t signed_data_length,
|
/external/chromium_org/chrome/browser/extensions/api/networking_private/ |
networking_private_api_chromeos.cc | 51 output.signed_data = input.signed_data;
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/x509/tsp/ |
TimeStampRespTest.java | 94 ContentInfo timeStampToken = new ContentInfo(ContentInfo.SIGNED_DATA,
|
/external/chromium_org/net/third_party/nss/patches/ |
channelid.patch | 112 + unsigned char signed_data[sizeof(CHANNEL_ID_MAGIC) + sizeof(SSL3Hashes)]; 162 + memcpy(signed_data, CHANNEL_ID_MAGIC, sizeof(CHANNEL_ID_MAGIC)); 163 + memcpy(signed_data + sizeof(CHANNEL_ID_MAGIC), hashes.u.raw, hashes.len); 165 + rv = PK11_HashBuf(SEC_OID_SHA256, digest, signed_data,
|
/build/tools/releasetools/ |
sign_target_files_apks | 155 signed_data = SignApk(data, key, key_passwords[key]) 156 output_tf_zip.writestr(out_info, signed_data)
|
/external/chromium/net/tools/testserver/ |
device_management.py | 485 signed_data = policy_data.SerializeToString() 489 fetch_response.policy_data = signed_data 492 signing_key['private_key'].hashAndSign(signed_data).tostring())
|
/external/chromium_org/chrome/browser/policy/test/ |
policy_testserver.py | 610 signed_data = policy_data.SerializeToString() 612 response.policy_data = signed_data 615 signing_key['private_key'].hashAndSign(signed_data).tostring()) [all...] |