/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/ |
CMSSignedDataGenerator.java | 158 * add a signer - no attributes other than the default ones will be 176 * add a signer, specifying the digest encryption algorithm to use - no attributes other than the default ones will be 197 * add a signer - no attributes other than the default ones will be 211 * add a signer, specifying the digest encryption algorithm to use - no attributes other than the default ones will be 227 * add a signer with extra signed/unsigned attributes. 248 * add a signer, specifying the digest encryption algorithm, with extra signed/unsigned attributes. 273 * add a signer with extra signed/unsigned attributes. 295 * add a signer, specifying the digest encryption algorithm, with extra signed/unsigned attributes. 320 * add a signer with extra signed/unsigned attributes based on generators. 335 * add a signer, specifying the digest encryption algorithm, with extra signed/unsigned attributes based on genera (…) 501 SignerInf signer = (SignerInf)it.next(); local [all...] |
SignerInformationStore.java | 22 SignerInformation signer = (SignerInformation)it.next(); local 23 SignerId sid = signer.getSID(); 32 list.add(signer); 42 * @param selector to identify a signer 76 * @param selector a signer id to select against.
|
CMSSignedData.java | 43 * matches the given signer... 53 * SignerInformation signer = (SignerInformation)it.next(); 54 * Collection certCollection = certStore.getMatches(signer.getSID()); 59 * if (signer.verify(new JcaSimpleSignerInfoVerifierBuilder().setProvider("BC").build(cert))) 576 // SignerInformation signer = (SignerInformation)it.next(); 580 // SignerInformationVerifier verifier = verifierProvider.get(signer.getSID()); 582 // if (!signer.verify(verifier)) 589 // Collection counterSigners = signer.getCounterSignatures().getSigners(); 594 // SignerInformationVerifier counterVerifier = verifierProvider.get(signer.getSID()); 617 * attributes associated with a signer, or perhaps delete one 646 SignerInformation signer = (SignerInformation)it.next(); local [all...] |
SignerInfoGenerator.java | 33 private final ContentSigner signer; field in class:SignerInfoGenerator 43 ContentSigner signer, 48 this(signerIdentifier, signer, digesterProvider, sigEncAlgFinder, false); 53 ContentSigner signer, 60 this.signer = signer; 64 this.digester = digesterProvider.get(digAlgFinder.find(signer.getAlgorithmIdentifier())); 91 this.signer = original.signer; 100 ContentSigner signer, [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/util/ |
DSABase.java | 18 protected DSA signer; field in class:DSABase 23 DSA signer, 27 this.signer = signer; 56 BigInteger[] sig = signer.generateSignature(hash); 85 return signer.verifySignature(hash, sig[0], sig[1]);
|
/external/chromium_org/third_party/openssl/openssl/crypto/pkcs7/ |
pk7_smime.c | 270 X509 *signer; local 321 signer = sk_X509_value (signers, k); 323 if(!X509_STORE_CTX_init(&cert_ctx, store, signer, 331 } else if(!X509_STORE_CTX_init (&cert_ctx, store, signer, NULL)) { 407 signer = sk_X509_value (signers, i); 408 j=PKCS7_signatureVerify(p7bio,p7,si, signer); 436 X509 *signer; local 467 signer = NULL; 469 if (certs) signer = X509_find_by_issuer_and_serial (certs, 471 if (!signer && !(flags & PKCS7_NOINTERN [all...] |
/external/openssl/crypto/pkcs7/ |
pk7_smime.c | 270 X509 *signer; local 321 signer = sk_X509_value (signers, k); 323 if(!X509_STORE_CTX_init(&cert_ctx, store, signer, 331 } else if(!X509_STORE_CTX_init (&cert_ctx, store, signer, NULL)) { 407 signer = sk_X509_value (signers, i); 408 j=PKCS7_signatureVerify(p7bio,p7,si, signer); 436 X509 *signer; local 467 signer = NULL; 469 if (certs) signer = X509_find_by_issuer_and_serial (certs, 471 if (!signer && !(flags & PKCS7_NOINTERN [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/dsa/ |
DSASigner.java | 43 private DSA signer; field in class:DSASigner 48 DSA signer) 51 this.signer = signer; 78 throw new InvalidKeyException("can't recognise key type in DSA based signer"); 83 throw new InvalidKeyException("can't recognise key type in DSA based signer"); 88 signer.init(false, param); 114 signer.init(true, param); 142 BigInteger[] sig = signer.generateSignature(hash); 171 return signer.verifySignature(hash, sig[0], sig[1]) [all...] |
/external/smack/src/org/xbill/DNS/ |
SIGBase.java | 24 protected Name signer; field in class:SIGBase 32 long origttl, Date expire, Date timeSigned, int footprint, Name signer, 47 this.signer = checkName("signer", signer); 60 signer = new Name(in); 79 signer = st.getName(origin); 103 sb.append (signer); 166 return signer; 189 signer.toWire(out, null, canonical) [all...] |
/libcore/benchmarks/src/benchmarks/regression/ |
SignatureBenchmark.java | 83 Signature signer = Signature.getInstance(signatureAlgorithm); local 84 signer.initSign(keyPair.getPrivate()); 85 signer.update(DATA); 86 this.signature = signer.sign(); 93 Signature signer; local 96 signer = Signature.getInstance(signatureAlgorithm, "AndroidOpenSSL"); 99 signer = Signature.getInstance(signatureAlgorithm, "BC"); 104 signer.initSign(privateKey); 105 signer.update(DATA); 106 signer.sign() [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/ocsp/ |
ocsp_vfy.c | 78 X509 *signer, *x; local 82 ret = ocsp_find_signer(&signer, bs, certs, st, flags); 93 skey = X509_get_pubkey(signer); 109 init_res = X509_STORE_CTX_init(&ctx, st, signer, NULL); 111 init_res = X509_STORE_CTX_init(&ctx, st, signer, bs->certs); 169 X509 *signer; local 171 if ((signer = ocsp_find_signer_sk(certs, rid))) 173 *psigner = signer; 177 (signer = ocsp_find_signer_sk(bs->certs, rid))) 179 *psigner = signer; 219 X509 *signer, *sca; local 365 X509 *signer; local 435 X509 *signer; local [all...] |
/external/oauth/core/src/main/java/net/oauth/signature/ |
RSA_SHA1.java | 221 Signature signer = Signature.getInstance("SHA1withRSA"); local 222 signer.initSign(privateKey); 223 signer.update(message); 224 return signer.sign();
|
OAuthSignatureMethod.java | 209 OAuthSignatureMethod signer = newMethod(message.getSignatureMethod(), local 211 signer.setTokenSecret(accessor.tokenSecret); 212 return signer;
|
/external/openssl/crypto/ocsp/ |
ocsp_vfy.c | 78 X509 *signer, *x; local 82 ret = ocsp_find_signer(&signer, bs, certs, st, flags); 93 skey = X509_get_pubkey(signer); 109 init_res = X509_STORE_CTX_init(&ctx, st, signer, NULL); 111 init_res = X509_STORE_CTX_init(&ctx, st, signer, bs->certs); 169 X509 *signer; local 171 if ((signer = ocsp_find_signer_sk(certs, rid))) 173 *psigner = signer; 177 (signer = ocsp_find_signer_sk(bs->certs, rid))) 179 *psigner = signer; 219 X509 *signer, *sca; local 365 X509 *signer; local 435 X509 *signer; local [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/ec/ |
SignatureSpi.java | 42 SignatureSpi(Digest digest, DSA signer, DSAEncoder encoder) 44 super(digest, signer, encoder); 53 signer.init(false, param); 66 signer.init(true, new ParametersWithRandom(param, appRandom)); 70 signer.init(true, param);
|
/external/chromium_org/third_party/openssl/openssl/apps/ |
smime.c | 101 X509 *cert = NULL, *recip = NULL, *signer = NULL; local 254 else if (!strcmp (*args, "-signer")) 258 /* If previous -signer argument add signer to list */ 296 /* If previous -inkey arument add signer to list */ 301 BIO_puts(bio_err, "Illegal -inkey without -signer\n"); 383 /* Check to see if any final signer needs to be appended */ 386 BIO_puts(bio_err, "Illegal -inkey without -signer\n"); 402 BIO_printf(bio_err, "No signer certificate specified\n"); 459 BIO_printf (bio_err, "-nointern don't search certificates in message for signer\n") [all...] |
cms.c | 117 X509 *cert = NULL, *recip = NULL, *signer = NULL; local 391 else if (!strcmp (*args, "-signer")) 395 /* If previous -signer argument add signer to list */ 439 /* If previous -inkey arument add signer to list */ 444 BIO_puts(bio_err, "Illegal -inkey without -signer\n"); 545 BIO_puts(bio_err, "Illegal -inkey without -signer\n"); 548 /* Check to see if any final signer needs to be appended */ 562 BIO_printf(bio_err, "No signer certificate specified\n"); 620 BIO_printf (bio_err, "-nointern don't search certificates in message for signer\n") [all...] |
ocsp.c | 141 X509 *signer = NULL, *rsigner = NULL; local 301 else if (!strcmp(*args, "-signer")) 580 BIO_printf (bio_err, "-signer file certificate to sign OCSP request with\n"); 602 BIO_printf (bio_err, "-verify_other file additional certificates to search for signer\n"); 604 BIO_printf (bio_err, "-no_intern don't search certificates contained in response for signer\n"); 710 signer = load_cert(bio_err, signfile, FORMAT_PEM, 711 NULL, e, "signer certificate"); 712 if (!signer) 714 BIO_printf(bio_err, "Error loading signer certificate\n"); 720 NULL, e, "signer certificates") [all...] |
/external/openssl/apps/ |
smime.c | 101 X509 *cert = NULL, *recip = NULL, *signer = NULL; local 254 else if (!strcmp (*args, "-signer")) 258 /* If previous -signer argument add signer to list */ 296 /* If previous -inkey arument add signer to list */ 301 BIO_puts(bio_err, "Illegal -inkey without -signer\n"); 383 /* Check to see if any final signer needs to be appended */ 386 BIO_puts(bio_err, "Illegal -inkey without -signer\n"); 402 BIO_printf(bio_err, "No signer certificate specified\n"); 459 BIO_printf (bio_err, "-nointern don't search certificates in message for signer\n") [all...] |
cms.c | 117 X509 *cert = NULL, *recip = NULL, *signer = NULL; local 391 else if (!strcmp (*args, "-signer")) 395 /* If previous -signer argument add signer to list */ 439 /* If previous -inkey arument add signer to list */ 444 BIO_puts(bio_err, "Illegal -inkey without -signer\n"); 545 BIO_puts(bio_err, "Illegal -inkey without -signer\n"); 548 /* Check to see if any final signer needs to be appended */ 562 BIO_printf(bio_err, "No signer certificate specified\n"); 620 BIO_printf (bio_err, "-nointern don't search certificates in message for signer\n") [all...] |
/frameworks/base/services/java/com/android/server/updates/ |
ConfigUpdateInstallReceiver.java | 217 Signature signer = Signature.getInstance("SHA512withRSA"); local 218 signer.initVerify(cert); 219 signer.update(content); 220 signer.update(Long.toString(version).getBytes()); 221 signer.update(requiredPrevious.getBytes()); 222 return signer.verify(Base64.decode(signature.getBytes(), Base64.DEFAULT));
|
/frameworks/base/services/tests/servicestests/src/com/android/server/updates/ |
CertPinInstallReceiverTest.java | 162 Signature signer = Signature.getInstance("SHA512withRSA"); local 163 signer.initSign(createKey()); 164 signer.update(content.trim().getBytes()); 165 signer.update(version.trim().getBytes()); 166 signer.update(requiredHash.getBytes()); 167 String sig = new String(Base64.encode(signer.sign(), Base64.DEFAULT)); 175 Signature signer = Signature.getInstance("SHA512withRSA"); local 176 signer.initVerify(cert); 177 signer.update(content.trim().getBytes()); 178 signer.update(version.trim().getBytes()) [all...] |
/build/tools/signapk/ |
SignApk.java | 416 ContentSigner signer = new JcaContentSignerBuilder( local 426 .build(signer, publicKey)); 509 // write to both output streams. out is the CMSTypedData signer and tee is the file. 522 // write to both output streams. out is the CMSTypedData signer and tee is the file. 537 private WholeFileSignerOutputStream signer; field in class:SignApk.CMSSigner 560 signer = new WholeFileSignerOutputStream(out, outputStream); 561 JarOutputStream outputJar = new JarOutputStream(signer); 577 signer.notifyClosing(); 579 signer.finish(); 595 return signer; [all...] |
/external/chromium/chrome/browser/ |
enumerate_modules_model_win.cc | 105 // update the list in PreparePathMappings. Filename, Description/Signer, and 107 // Entries without any Description, Signer info, or Location will never be 683 // Determine the size of the signer info data. 693 // Allocate enough space to hold the signer info. 698 // Obtain the signer info. 707 // Search for the signer certificate. 954 GenerateHash(WideToUTF8(module.digital_signer), &signer); local [all...] |
/external/chromium_org/chrome/browser/ |
enumerate_modules_model_win.cc | 114 // update the list in PreparePathMappings. Filename, Description/Signer, and 116 // Entries without any Description, Signer info, or Location will never be 743 // Determine the size of the signer info data. 753 // Allocate enough space to hold the signer info. 758 // Obtain the signer info. 767 // Search for the signer certificate. 1062 GenerateHash(WideToUTF8(module.digital_signer), &signer); local [all...] |