/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/ |
X509CertificateObject.java | 15 import java.security.Signature; 243 * return a more "meaningful" representation for the signature algorithm used in 252 String algName = prov.getProperty("Alg.Alias.Signature." + this.getSigAlgOID()); 267 String algName = provs[i].getProperty("Alg.Alias.Signature." + this.getSigAlgOID()); 278 * return the object identifier for the signature. 286 * return the signature parameters, or null if there aren't any. 678 buf.append(" Signature Algorithm: ").append(this.getSigAlgName()).append(nl); 682 buf.append(" Signature: ").append(new String(Hex.encode(sig, 0, 20))).append(nl); 767 Signature signature; local 789 Signature signature = Signature.getInstance(sigName, sigProvider); local [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
X509CertificateObject.java | 15 import java.security.Signature; 241 * return a more "meaningful" representation for the signature algorithm used in 250 String algName = prov.getProperty("Alg.Alias.Signature." + this.getSigAlgOID()); 265 String algName = provs[i].getProperty("Alg.Alias.Signature." + this.getSigAlgOID()); 276 * return the object identifier for the signature. 284 * return the signature parameters, or null if there aren't any. 676 buf.append(" Signature Algorithm: ").append(this.getSigAlgName()).append(nl); 680 buf.append(" Signature: ").append(new String(Hex.encode(sig, 0, 20))).append(nl); 765 Signature signature; local 787 Signature signature = Signature.getInstance(sigName, sigProvider); local [all...] |
/external/chromium_org/chromeos/network/onc/ |
onc_signature.cc | 413 const OncFieldSignature* GetFieldSignature(const OncValueSignature& signature, 415 if (!signature.fields) 417 for (const OncFieldSignature* field_signature = signature.fields; 422 if (signature.base_signature) 423 return GetFieldSignature(*signature.base_signature, onc_field_name); 447 bool FieldIsCredential(const OncValueSignature& signature, 451 if (&signature == entry->value_signature &&
|
/dalvik/dexdump/ |
DexDump.cpp | 80 const char* signature; member in struct:FieldMethodInfo 423 printf("signature : %02x%02x...%02x%02x\n", 424 pHeader->signature[0], pHeader->signature[1], 425 pHeader->signature[kSHA1DigestLen-2], 426 pHeader->signature[kSHA1DigestLen-1]); 632 const char *signature) 636 signature); 668 pMethInfo->signature = dexCopyDescriptorFromMethodId(pDexFile, pMethodId); 687 pFieldInfo->signature = dexStringByTypeIdx(pDexFile, pFieldId->typeIdx) [all...] |
/external/chromium_org/net/spdy/ |
spdy_test_util_common.cc | 309 std::vector<uint8>* signature) { 315 signature->clear(); 316 signature->insert(signature->end(), head.begin(), head.end()); 317 signature->insert(signature->end(), private_key_value.begin(), 319 signature->insert(signature->end(), '-'); 320 signature->insert(signature->end(), data, data + data_len) [all...] |
/frameworks/native/opengl/tools/glgen/src/ |
JniCodeEmitter.java | 75 String signature; local 84 signature = jfunc.toString(); 86 if (mFunctionsEmitted.contains(signature)) { 89 mFunctionsEmitted.add(signature); 110 signature = jfunc.toString(); 112 if (mFunctionsEmitted.contains(signature)) { 115 mFunctionsEmitted.add(signature); 742 // Emit JNI signature (name) 776 String signature = ""; local 780 signature += getJniName(argType) [all...] |
/system/keymaster/ |
google_keymaster_test.cpp | 446 Buffer* signature() { function in class:keymaster::test::SigningOperationsTest 671 ASSERT_TRUE(signature() != NULL); 694 finish_request.signature.Reinitialize(*signature()); 707 ASSERT_TRUE(signature() != NULL); 730 finish_request.signature.Reinitialize(*signature()); 743 ASSERT_TRUE(signature() != NULL); 766 finish_request.signature.Reinitialize(*signature()); [all...] |
/external/chromium_org/content/child/webcrypto/ |
shared_crypto.cc | 163 const CryptoData& signature, 173 result.size() == signature.byte_length() && 175 Uint8VectorStart(result), signature.bytes(), signature.byte_length()); 195 const CryptoData& signature, 206 signature, 812 const CryptoData& signature, 820 if (!signature.byte_length()) { 823 // implementations from dealing with a NULL signature pointer. 830 return VerifyHmac(algorithm, key, signature, data, signature_match) [all...] |
/art/compiler/sea_ir/code_gen/ |
code_gen.cc | 89 DCHECK(parameters->size() > param_id) << "Insufficient parameters for function signature"; 202 // TODO: Add proper checking of the matching between formal and actual signature. 278 void CodeGenVisitor::Visit(SignatureNode* signature) { 279 DCHECK_EQ(signature->GetDefinitions().size(), 1u) << 280 "Signature nodes must correspond to a single parameter register."; 282 void CodeGenPrepassVisitor::Visit(SignatureNode* signature) { 283 DCHECK_EQ(signature->GetDefinitions().size(), 1u) << 284 "Signature nodes must correspond to a single parameter register."; 286 void CodeGenPostpassVisitor::Visit(SignatureNode* signature) { 287 DCHECK_EQ(signature->GetDefinitions().size(), 1u) < [all...] |
/external/chromium_org/chrome/browser/supervised_user/ |
supervised_user_sync_service.cc | 95 std::string signature; local 96 dict->GetString(SupervisedUserSyncService::kPasswordSignatureKey, &signature); 107 signature, 333 std::string signature; local 335 &signature); 373 signature, encryption)));
|
/external/chromium_org/third_party/WebKit/Source/core/html/forms/ |
FormController.cpp | 359 String signature = formSignature(*form); 360 ASSERT(!signature.isNull()); 361 FormSignatureToNextIndexMap::AddResult result = m_formSignatureToNextIndexMap.add(signature, 0); 365 formKeyBuilder.append(signature); 409 DEFINE_STATIC_LOCAL(String, signature, ("\n\r?% WebKit serialized form state version 8 \n\r=&")); 410 return signature;
|
/external/chromium_org/third_party/WebKit/Source/modules/crypto/ |
SubtleCrypto.cpp | 89 static ScriptPromise startCryptoOperation(ScriptState* scriptState, const Dictionary& rawAlgorithm, Key* key, blink::WebCryptoOperation operationType, const ArrayPiece& signature, const ArrayPiece& dataBuffer) 101 if (operationType == blink::WebCryptoOperationVerify && !ensureNotNull(signature, "signature", result.get())) 127 blink::Platform::current()->crypto()->verifySignature(algorithm, key->key(), signature.bytes(), signature.byteLength(), data, dataSize, result->result()); 211 ScriptPromise SubtleCrypto::verifySignature(ScriptState* scriptState, const Dictionary& rawAlgorithm, Key* key, const ArrayPiece& signature, const ArrayPiece& data) 213 return startCryptoOperation(scriptState, rawAlgorithm, key, blink::WebCryptoOperationVerify, signature, data);
|
/external/chromium_org/third_party/openssl/openssl/crypto/ocsp/ |
ocsp.h | 137 /* Signature ::= SEQUENCE { 139 * signature BIT STRING, 145 ASN1_BIT_STRING *signature; member in struct:ocsp_signature_st 151 * optionalSignature [0] EXPLICIT Signature OPTIONAL } 284 * signature BIT STRING, 288 The value for "signature" is specified in the OCSP rfc2560 as follows: 289 "The value for the signature SHALL be computed on the hash of the DER 295 hash. So, we look at the signature-specification algorithm, and try to do 307 ASN1_BIT_STRING *signature; member in struct:ocsp_basic_response_st 382 o->optionalSignature->signature,o->tbsRequest,pkey,md [all...] |
/external/chromium_org/third_party/openssl/openssl/include/openssl/ |
ocsp.h | 137 /* Signature ::= SEQUENCE { 139 * signature BIT STRING, 145 ASN1_BIT_STRING *signature; member in struct:ocsp_signature_st 151 * optionalSignature [0] EXPLICIT Signature OPTIONAL } 284 * signature BIT STRING, 288 The value for "signature" is specified in the OCSP rfc2560 as follows: 289 "The value for the signature SHALL be computed on the hash of the DER 295 hash. So, we look at the signature-specification algorithm, and try to do 307 ASN1_BIT_STRING *signature; member in struct:ocsp_basic_response_st 382 o->optionalSignature->signature,o->tbsRequest,pkey,md [all...] |
/external/libunwind/src/dwarf/ |
Gexpr.c | 35 #define NUM_OPERANDS(signature) (((signature) >> 6) & 0x3) 36 #define OPND1_TYPE(signature) (((signature) >> 3) & 0x7) 37 #define OPND2_TYPE(signature) (((signature) >> 0) & 0x7)
|
/external/mockito/cglib-and-asm/src/org/mockito/asm/util/ |
TraceMethodVisitor.java | 38 import org.mockito.asm.signature.SignatureReader;
440 final String signature,
454 if (signature != null) {
456 appendDescriptor(FIELD_SIGNATURE, signature);
459 SignatureReader r = new SignatureReader(signature);
469 mv.visitLocalVariable(name, desc, signature, start, end, index);
|
/external/openssl/crypto/ocsp/ |
ocsp.h | 144 /* Signature ::= SEQUENCE { 146 * signature BIT STRING, 152 ASN1_BIT_STRING *signature; member in struct:ocsp_signature_st 158 * optionalSignature [0] EXPLICIT Signature OPTIONAL } 291 * signature BIT STRING, 295 The value for "signature" is specified in the OCSP rfc2560 as follows: 296 "The value for the signature SHALL be computed on the hash of the DER 302 hash. So, we look at the signature-specification algorithm, and try to do 314 ASN1_BIT_STRING *signature; member in struct:ocsp_basic_response_st 389 o->optionalSignature->signature,o->tbsRequest,pkey,md [all...] |
/external/openssl/include/openssl/ |
ocsp.h | 144 /* Signature ::= SEQUENCE { 146 * signature BIT STRING, 152 ASN1_BIT_STRING *signature; member in struct:ocsp_signature_st 158 * optionalSignature [0] EXPLICIT Signature OPTIONAL } 291 * signature BIT STRING, 295 The value for "signature" is specified in the OCSP rfc2560 as follows: 296 "The value for the signature SHALL be computed on the hash of the DER 302 hash. So, we look at the signature-specification algorithm, and try to do 314 ASN1_BIT_STRING *signature; member in struct:ocsp_basic_response_st 389 o->optionalSignature->signature,o->tbsRequest,pkey,md [all...] |
/frameworks/av/media/libmediaplayerservice/ |
Drm.cpp | 593 Vector<uint8_t> &signature) { 604 return mPlugin->sign(sessionId, keyId, message, signature); 610 Vector<uint8_t> const &signature, 622 return mPlugin->verify(sessionId, keyId, message, signature, match); 629 Vector<uint8_t> &signature) { 644 return mPlugin->signRSA(sessionId, algorithm, message, wrappedKey, signature);
|
/external/chromium_org/chrome/browser/sessions/ |
session_backend.cc | 20 // The signature at the beginning of the file = SSNS (Sessions). 28 int32 signature; member in struct:__anon9227::FileHeader 97 if (read_count != sizeof(header) || header.signature != kFileSignature || 379 header.signature = kFileSignature;
|
/external/chromium_org/chrome/common/extensions/api/networking_private/ |
networking_private_crypto.cc | 78 const std::string& signature, 138 // Verify that the |signature| matches |data|. 147 reinterpret_cast<unsigned char*>(const_cast<char*>(signature.c_str())); 148 signature_item.len = static_cast<unsigned int>(signature.size());
|
/external/chromium_org/chrome/common/net/ |
x509_certificate_model_nss.cc | 303 return ProcessSecAlgorithmInternal(&cert_handle->signature); 323 return ProcessRawBits(cert_handle->signatureWrap.signature.data, 324 cert_handle->signatureWrap.signature.len);
|
/external/chromium_org/content/child/ |
site_isolation_policy.cc | 65 const StringPiece& signature = signatures[sig_index]; local 66 size_t signature_length = signature.length(); 71 data.begin(), data.begin() + signature_length, signature.data())) 447 // this signature. However, XML is case-sensitive. Don't we have to
|
/external/chromium_org/net/quic/ |
quic_crypto_client_stream.cc | 109 if (!cached->IsEmpty() && !cached->signature().empty() && 252 } else if (!cached->signature().empty()) { 274 cached->signature(),
|
/external/chromium_org/remoting/host/ |
heartbeat_sender_unittest.cc | 247 QName signature_tag(kChromotingXmlNamespace, "signature"); 248 XmlElement* signature = heartbeat_stanza->FirstNamed(signature_tag); local 249 ASSERT_TRUE(signature != NULL); 256 EXPECT_EQ(expected_signature, signature->BodyText());
|