HomeSort by relevance Sort by last modified time
    Searched refs:signature (Results 701 - 725 of 1427) sorted by null

<<21222324252627282930>>

  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/
X509CertificateObject.java 15 import java.security.Signature;
243 * return a more "meaningful" representation for the signature algorithm used in
252 String algName = prov.getProperty("Alg.Alias.Signature." + this.getSigAlgOID());
267 String algName = provs[i].getProperty("Alg.Alias.Signature." + this.getSigAlgOID());
278 * return the object identifier for the signature.
286 * return the signature parameters, or null if there aren't any.
678 buf.append(" Signature Algorithm: ").append(this.getSigAlgName()).append(nl);
682 buf.append(" Signature: ").append(new String(Hex.encode(sig, 0, 20))).append(nl);
767 Signature signature; local
789 Signature signature = Signature.getInstance(sigName, sigProvider); local
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/
X509CertificateObject.java 15 import java.security.Signature;
241 * return a more "meaningful" representation for the signature algorithm used in
250 String algName = prov.getProperty("Alg.Alias.Signature." + this.getSigAlgOID());
265 String algName = provs[i].getProperty("Alg.Alias.Signature." + this.getSigAlgOID());
276 * return the object identifier for the signature.
284 * return the signature parameters, or null if there aren't any.
676 buf.append(" Signature Algorithm: ").append(this.getSigAlgName()).append(nl);
680 buf.append(" Signature: ").append(new String(Hex.encode(sig, 0, 20))).append(nl);
765 Signature signature; local
787 Signature signature = Signature.getInstance(sigName, sigProvider); local
    [all...]
  /external/chromium_org/chromeos/network/onc/
onc_signature.cc 413 const OncFieldSignature* GetFieldSignature(const OncValueSignature& signature,
415 if (!signature.fields)
417 for (const OncFieldSignature* field_signature = signature.fields;
422 if (signature.base_signature)
423 return GetFieldSignature(*signature.base_signature, onc_field_name);
447 bool FieldIsCredential(const OncValueSignature& signature,
451 if (&signature == entry->value_signature &&
  /dalvik/dexdump/
DexDump.cpp 80 const char* signature; member in struct:FieldMethodInfo
423 printf("signature : %02x%02x...%02x%02x\n",
424 pHeader->signature[0], pHeader->signature[1],
425 pHeader->signature[kSHA1DigestLen-2],
426 pHeader->signature[kSHA1DigestLen-1]);
632 const char *signature)
636 signature);
668 pMethInfo->signature = dexCopyDescriptorFromMethodId(pDexFile, pMethodId);
687 pFieldInfo->signature = dexStringByTypeIdx(pDexFile, pFieldId->typeIdx)
    [all...]
  /external/chromium_org/net/spdy/
spdy_test_util_common.cc 309 std::vector<uint8>* signature) {
315 signature->clear();
316 signature->insert(signature->end(), head.begin(), head.end());
317 signature->insert(signature->end(), private_key_value.begin(),
319 signature->insert(signature->end(), '-');
320 signature->insert(signature->end(), data, data + data_len)
    [all...]
  /frameworks/native/opengl/tools/glgen/src/
JniCodeEmitter.java 75 String signature; local
84 signature = jfunc.toString();
86 if (mFunctionsEmitted.contains(signature)) {
89 mFunctionsEmitted.add(signature);
110 signature = jfunc.toString();
112 if (mFunctionsEmitted.contains(signature)) {
115 mFunctionsEmitted.add(signature);
742 // Emit JNI signature (name)
776 String signature = ""; local
780 signature += getJniName(argType)
    [all...]
  /system/keymaster/
google_keymaster_test.cpp 446 Buffer* signature() { function in class:keymaster::test::SigningOperationsTest
671 ASSERT_TRUE(signature() != NULL);
694 finish_request.signature.Reinitialize(*signature());
707 ASSERT_TRUE(signature() != NULL);
730 finish_request.signature.Reinitialize(*signature());
743 ASSERT_TRUE(signature() != NULL);
766 finish_request.signature.Reinitialize(*signature());
    [all...]
  /external/chromium_org/content/child/webcrypto/
shared_crypto.cc 163 const CryptoData& signature,
173 result.size() == signature.byte_length() &&
175 Uint8VectorStart(result), signature.bytes(), signature.byte_length());
195 const CryptoData& signature,
206 signature,
812 const CryptoData& signature,
820 if (!signature.byte_length()) {
823 // implementations from dealing with a NULL signature pointer.
830 return VerifyHmac(algorithm, key, signature, data, signature_match)
    [all...]
  /art/compiler/sea_ir/code_gen/
code_gen.cc 89 DCHECK(parameters->size() > param_id) << "Insufficient parameters for function signature";
202 // TODO: Add proper checking of the matching between formal and actual signature.
278 void CodeGenVisitor::Visit(SignatureNode* signature) {
279 DCHECK_EQ(signature->GetDefinitions().size(), 1u) <<
280 "Signature nodes must correspond to a single parameter register.";
282 void CodeGenPrepassVisitor::Visit(SignatureNode* signature) {
283 DCHECK_EQ(signature->GetDefinitions().size(), 1u) <<
284 "Signature nodes must correspond to a single parameter register.";
286 void CodeGenPostpassVisitor::Visit(SignatureNode* signature) {
287 DCHECK_EQ(signature->GetDefinitions().size(), 1u) <
    [all...]
  /external/chromium_org/chrome/browser/supervised_user/
supervised_user_sync_service.cc 95 std::string signature; local
96 dict->GetString(SupervisedUserSyncService::kPasswordSignatureKey, &signature);
107 signature,
333 std::string signature; local
335 &signature);
373 signature, encryption)));
  /external/chromium_org/third_party/WebKit/Source/core/html/forms/
FormController.cpp 359 String signature = formSignature(*form);
360 ASSERT(!signature.isNull());
361 FormSignatureToNextIndexMap::AddResult result = m_formSignatureToNextIndexMap.add(signature, 0);
365 formKeyBuilder.append(signature);
409 DEFINE_STATIC_LOCAL(String, signature, ("\n\r?% WebKit serialized form state version 8 \n\r=&"));
410 return signature;
  /external/chromium_org/third_party/WebKit/Source/modules/crypto/
SubtleCrypto.cpp 89 static ScriptPromise startCryptoOperation(ScriptState* scriptState, const Dictionary& rawAlgorithm, Key* key, blink::WebCryptoOperation operationType, const ArrayPiece& signature, const ArrayPiece& dataBuffer)
101 if (operationType == blink::WebCryptoOperationVerify && !ensureNotNull(signature, "signature", result.get()))
127 blink::Platform::current()->crypto()->verifySignature(algorithm, key->key(), signature.bytes(), signature.byteLength(), data, dataSize, result->result());
211 ScriptPromise SubtleCrypto::verifySignature(ScriptState* scriptState, const Dictionary& rawAlgorithm, Key* key, const ArrayPiece& signature, const ArrayPiece& data)
213 return startCryptoOperation(scriptState, rawAlgorithm, key, blink::WebCryptoOperationVerify, signature, data);
  /external/chromium_org/third_party/openssl/openssl/crypto/ocsp/
ocsp.h 137 /* Signature ::= SEQUENCE {
139 * signature BIT STRING,
145 ASN1_BIT_STRING *signature; member in struct:ocsp_signature_st
151 * optionalSignature [0] EXPLICIT Signature OPTIONAL }
284 * signature BIT STRING,
288 The value for "signature" is specified in the OCSP rfc2560 as follows:
289 "The value for the signature SHALL be computed on the hash of the DER
295 hash. So, we look at the signature-specification algorithm, and try to do
307 ASN1_BIT_STRING *signature; member in struct:ocsp_basic_response_st
382 o->optionalSignature->signature,o->tbsRequest,pkey,md
    [all...]
  /external/chromium_org/third_party/openssl/openssl/include/openssl/
ocsp.h 137 /* Signature ::= SEQUENCE {
139 * signature BIT STRING,
145 ASN1_BIT_STRING *signature; member in struct:ocsp_signature_st
151 * optionalSignature [0] EXPLICIT Signature OPTIONAL }
284 * signature BIT STRING,
288 The value for "signature" is specified in the OCSP rfc2560 as follows:
289 "The value for the signature SHALL be computed on the hash of the DER
295 hash. So, we look at the signature-specification algorithm, and try to do
307 ASN1_BIT_STRING *signature; member in struct:ocsp_basic_response_st
382 o->optionalSignature->signature,o->tbsRequest,pkey,md
    [all...]
  /external/libunwind/src/dwarf/
Gexpr.c 35 #define NUM_OPERANDS(signature) (((signature) >> 6) & 0x3)
36 #define OPND1_TYPE(signature) (((signature) >> 3) & 0x7)
37 #define OPND2_TYPE(signature) (((signature) >> 0) & 0x7)
  /external/mockito/cglib-and-asm/src/org/mockito/asm/util/
TraceMethodVisitor.java 38 import org.mockito.asm.signature.SignatureReader;
440 final String signature,
454 if (signature != null) {
456 appendDescriptor(FIELD_SIGNATURE, signature);
459 SignatureReader r = new SignatureReader(signature);
469 mv.visitLocalVariable(name, desc, signature, start, end, index);
  /external/openssl/crypto/ocsp/
ocsp.h 144 /* Signature ::= SEQUENCE {
146 * signature BIT STRING,
152 ASN1_BIT_STRING *signature; member in struct:ocsp_signature_st
158 * optionalSignature [0] EXPLICIT Signature OPTIONAL }
291 * signature BIT STRING,
295 The value for "signature" is specified in the OCSP rfc2560 as follows:
296 "The value for the signature SHALL be computed on the hash of the DER
302 hash. So, we look at the signature-specification algorithm, and try to do
314 ASN1_BIT_STRING *signature; member in struct:ocsp_basic_response_st
389 o->optionalSignature->signature,o->tbsRequest,pkey,md
    [all...]
  /external/openssl/include/openssl/
ocsp.h 144 /* Signature ::= SEQUENCE {
146 * signature BIT STRING,
152 ASN1_BIT_STRING *signature; member in struct:ocsp_signature_st
158 * optionalSignature [0] EXPLICIT Signature OPTIONAL }
291 * signature BIT STRING,
295 The value for "signature" is specified in the OCSP rfc2560 as follows:
296 "The value for the signature SHALL be computed on the hash of the DER
302 hash. So, we look at the signature-specification algorithm, and try to do
314 ASN1_BIT_STRING *signature; member in struct:ocsp_basic_response_st
389 o->optionalSignature->signature,o->tbsRequest,pkey,md
    [all...]
  /frameworks/av/media/libmediaplayerservice/
Drm.cpp 593 Vector<uint8_t> &signature) {
604 return mPlugin->sign(sessionId, keyId, message, signature);
610 Vector<uint8_t> const &signature,
622 return mPlugin->verify(sessionId, keyId, message, signature, match);
629 Vector<uint8_t> &signature) {
644 return mPlugin->signRSA(sessionId, algorithm, message, wrappedKey, signature);
  /external/chromium_org/chrome/browser/sessions/
session_backend.cc 20 // The signature at the beginning of the file = SSNS (Sessions).
28 int32 signature; member in struct:__anon9227::FileHeader
97 if (read_count != sizeof(header) || header.signature != kFileSignature ||
379 header.signature = kFileSignature;
  /external/chromium_org/chrome/common/extensions/api/networking_private/
networking_private_crypto.cc 78 const std::string& signature,
138 // Verify that the |signature| matches |data|.
147 reinterpret_cast<unsigned char*>(const_cast<char*>(signature.c_str()));
148 signature_item.len = static_cast<unsigned int>(signature.size());
  /external/chromium_org/chrome/common/net/
x509_certificate_model_nss.cc 303 return ProcessSecAlgorithmInternal(&cert_handle->signature);
323 return ProcessRawBits(cert_handle->signatureWrap.signature.data,
324 cert_handle->signatureWrap.signature.len);
  /external/chromium_org/content/child/
site_isolation_policy.cc 65 const StringPiece& signature = signatures[sig_index]; local
66 size_t signature_length = signature.length();
71 data.begin(), data.begin() + signature_length, signature.data()))
447 // this signature. However, XML is case-sensitive. Don't we have to
  /external/chromium_org/net/quic/
quic_crypto_client_stream.cc 109 if (!cached->IsEmpty() && !cached->signature().empty() &&
252 } else if (!cached->signature().empty()) {
274 cached->signature(),
  /external/chromium_org/remoting/host/
heartbeat_sender_unittest.cc 247 QName signature_tag(kChromotingXmlNamespace, "signature");
248 XmlElement* signature = heartbeat_stanza->FirstNamed(signature_tag); local
249 ASSERT_TRUE(signature != NULL);
256 EXPECT_EQ(expected_signature, signature->BodyText());

Completed in 491 milliseconds

<<21222324252627282930>>