HomeSort by relevance Sort by last modified time
    Searched refs:signed_data (Results 1 - 24 of 24) sorted by null

  /external/boringssl/src/crypto/x509/
pkcs7.c 40 CBS in, content_info, content_type, wrapped_signed_data, signed_data; local
68 !CBS_get_asn1(&wrapped_signed_data, &signed_data, CBS_ASN1_SEQUENCE) ||
69 !CBS_get_asn1_uint64(&signed_data, &version) ||
70 !CBS_get_asn1(&signed_data, NULL /* digests */, CBS_ASN1_SET) ||
71 !CBS_get_asn1(&signed_data, NULL /* content */, CBS_ASN1_SEQUENCE)) {
80 CBS_init(out, CBS_data(&signed_data), CBS_len(&signed_data));
93 CBS signed_data, certificates; local
98 if (!pkcs7_parse_header(&der_bytes, &signed_data, cbs)) {
103 if (!CBS_get_asn1(&signed_data, &certificates
153 CBS signed_data, crls; local
    [all...]
  /hardware/libhardware/include/hardware/
keymaster0.h 114 uint8_t** signed_data, size_t* signed_data_length);
125 const uint8_t* signed_data, const size_t signed_data_length,
keymaster1.h 110 const size_t data_length, uint8_t** signed_data, size_t* signed_data_length);
120 const uint8_t* signed_data, const size_t signed_data_length,
  /system/connectivity/shill/
mock_crypto_util_proxy.cc 50 const std::string& signed_data,
57 nonce, signed_data,
mock_crypto_util_proxy.h 44 const std::string& signed_data,
58 const std::string& signed_data,
crypto_util_proxy.h 60 // |signed_data| is the base64 encoded signed string given by the device.
67 const std::string& signed_data,
crypto_util_proxy.cc 80 const string& signed_data,
95 if (!brillo::data_encoding::Base64Decode(signed_data, &decoded_signed_data)) {
manager.h 459 // |signed_data| is a base64 encoded string as described in
464 const std::string& signed_data,
479 const std::string& signed_data,
494 const std::string& signed_data,
    [all...]
manager.cc     [all...]
  /hardware/qcom/keymaster/
keymaster_qcom.h 172 * signed_data : signature
178 uint8_t signed_data[KM_KEY_SIZE_MAX]; member in struct:keymaster_sign_data_resp
193 * signed_data : Pointer to signed data buffer
202 uint32_t signed_data; member in struct:keymaster_verify_data_cmd
keymaster_qcom.cpp 561 memcpy(p, (unsigned char *)(&resp->signed_data), resp->sig_len);
629 send_cmd->signed_data = (uint32_t)ihandle.ion_sbuffer;
  /system/connectivity/shill/shims/
crypto_util.cc 152 // 3) |signed_data| matches the hashed |unsigned_data| encrypted with
159 const string& signed_data,
252 // We're going to verify that hash(unsigned_data) == public(signed_data)
266 reinterpret_cast<const unsigned char*>(signed_data.data());
267 const size_t signature_len = signed_data.length();
321 message.signed_data(), message.unsigned_data(), connected_mac,
  /system/connectivity/shill/dbus/
chromeos_manager_dbus_adaptor.cc 422 const string& signed_data,
431 signed_data, destination_udn,
450 const string& signed_data,
461 signed_data, destination_udn,
482 const string& signed_data,
493 signed_data, destination_udn,
chromeos_manager_dbus_adaptor.h 136 const std::string& signed_data,
144 const std::string& signed_data,
153 const std::string& signed_data,
  /external/autotest/client/site_tests/network_DestinationVerification/
network_DestinationVerification.py 40 "signed_data":"vwMBgANrp5XpCswLyk/OTXT56ORPeIWjH7xAdCk3qgjkwI6+8o56zJS02+tC5hhIHWh7oppTmWYF4tKvBQ3GeCz7IW9f7HWDMtO7x7yRWxzJyehaJbCfXvLdfs0/WKllzvGVBgNpcIAwU2NSFUG/jpXclntFzds0EUJG9wHxS6PXXSYRu+PlIFdCDcQJsUlnwO9AGFOJRV/aARGh8YUTWCFIQPOtPEqT5eegt+TLf01Gq0YcrRwSTKy1I3twOnWiMfIdkJdQKPtBwwbvuAyGuqYFocfjKABbnH9Tvl04yyO3euKbYlSqaF/l8CXmzDJTyO7tDOFK59bV9auE4KljrQ=="
66 "signed_data": "WIvN6Ujo4CoxUNcsm1YaLRUe1KJVEG+oXorUBJae/fKQrLfnH9ChDfxzW+EDZlLBLPk9u5EAptr8LKK6AunbBTDIeBkjzXv3nS+xlmV9ZdA71imitva88HPzC+a2H61dJL8puNbZu9j1Zs3sCybw2F+qZbDBhbG0sJTEXytPjewqAl8iBZSAS0BoNJZYA7Q/bCPI07pg404pI392cKP8FYJR08Y4xoV94Em+jnZ2nZabSsmsScYGvpWVNeS2z+f0to6ureOxaqgT+AAckqtCRcHd66QtLGwKXWviaevKte1z185f4r55U4P5pkQi+xd6lZRsMQydwUzLxgk7UY5U3Q=="
93 "signed_data": "aaT56/P7KiMxVbWCedpSNIikpxh0EzdjgEuP153pCNfYys2KmlVtvEnXeFGYKJP2ypsX0qx/9Bx2C18T8HZ4PvNW0fUEheScvkzbDTn/gBpwUJv3XT+55XneUdjIAQu83qNR/AjxYa9cDGzxbnZJL91Fd1Grw/fNaKEMiedWRiESABQREiS2OW+iZ3Z/JRs99o4M6m+6f/mvNkgZ3GrFxNnPEXe7g1sYjspPhnDLvASNzd9j24YIxu+PTWZCNL6clps+/ghNA/0fB3PBDILrcGnER36Vc8gNhjD1r1f/ACU1qk06yMNC/Kgt2pMQkpjaXby+B75Z9yrogNHs4f5tIA=="
234 message.signed_data = base64.b64decode(sign_bundle['signed_data'])
  /external/libbrillo/policy/
device_policy_impl.cc 39 // Verifies that the |signed_data| has correct |signature| with |public_key|.
40 bool VerifySignature(const std::string& signed_data,
66 EVP_VerifyUpdate(&ctx, signed_data.data(), signed_data.length());
  /external/wpa_supplicant_8/src/tls/
x509v3.h 141 const u8 *signed_data, size_t signed_data_len);
x509v3.c     [all...]
  /system/keymaster/
keymaster0_engine.cpp 282 uint8_t* signed_data; local
284 blob.key_material_size, data, data_length, &signed_data,
291 signature->reset(signed_data);
android_keymaster_test_utils.h 438 uint8_t** signed_data, size_t* signed_data_length) {
442 data, data_length, signed_data, signed_data_length);
447 const uint8_t* signed_data, const size_t signed_data_length,
452 key_blob_length, signed_data, signed_data_length, signature,
  /system/tpm/trunks/
tpm_generated_test.cc 389 std::string signed_data("\x00\x0E" "ct_signed_data", 16);
408 command_response += signed_data + signature + auth_out;
  /build/tools/releasetools/
sign_target_files_apks 224 signed_data = SignApk(data, key, key_passwords[key], platform_api_level,
226 common.ZipWriteStr(output_tf_zip, out_info, signed_data)
sign_target_files_apks.py 224 signed_data = SignApk(data, key, key_passwords[key], platform_api_level,
226 common.ZipWriteStr(output_tf_zip, out_info, signed_data)
  /external/v8/test/cctest/
test-api.cc 15608 const char* signed_data = local
    [all...]

Completed in 568 milliseconds