/system/extras/libfec/ |
fec_verity.cpp | 508 /* signature is skipped, because for our purposes it won't matter from 510 for signature verification */ 582 if (memcmp(v->header.signature, v->ecc_header.signature, 583 sizeof(v->header.signature))) { 584 warn("corrected verity header signature"); 585 /* we have no way of knowing which signature is correct, if either
|
/system/keymaster/ |
android_keymaster_messages.cpp | 244 size += sizeof(op_handle) + signature.SerializedSize(); 256 buf = signature.Serialize(buf, end); 266 copy_uint64_from_buf(buf_ptr, end, &op_handle) && signature.Deserialize(buf_ptr, end);
|
/system/tpm/attestation/common/ |
crypto_utility_impl.cc | 295 const std::string& signature) { 305 std::string mutable_signature(signature); 308 signature_buffer, signature.size(), rsa.get()) == 1);
|
tpm_utility_v1.cc | 468 std::string* signature) { 469 CHECK(signature); 503 TPM_LOG(ERROR, result) << __func__ << ": Failed to generate signature."; 506 signature->assign(TSSBufferAsString(buffer.value(), length));
|
/system/update_engine/payload_generator/ |
generate_delta_main.cc | 67 << "Invalid signature size: " << str; 70 "Only signature sizes of 256 bytes are supported."; 136 brillo::Blob signature; local 137 CHECK(utils::ReadFile(signature_file, &signature)); 138 signatures->push_back(signature); 285 "Raw signature size used for hash calculation. " 290 "Raw signature file to sign payload with. To pass multiple " 293 "signature will be assigned a client version, starting from " 296 "Raw signature file with the signature of the metadata hash. [all...] |
/prebuilts/tools/common/m2/repository/com/google/code/findbugs/bcel-findbugs/6.0/ |
bcel-findbugs-6.0.jar | |
/art/runtime/ |
utils_test.cc | 33 std::string PrettyArguments(const char* signature); 34 std::string PrettyReturnType(const char* signature);
|
/dalvik/libdex/ |
DexFile.cpp | 385 if (memcmp(sha1Digest, pHeader->signature, kSHA1DigestLen) != 0) { 390 dexSHA1DigestToStr(pHeader->signature, tmpBuf2));
|
/external/autotest/client/cros/cellular/mbim_compliance/ |
mbim_data_transfer.py | 118 (instead of IPS) prefix in NDP signature if required. 236 signature=self._ndp_signature, 278 signature=self._nth_signature, 509 _FIELDS = (('I', 'signature'), 518 _FIELDS = (('I', 'signature'), 531 _FIELDS = (('I', 'signature'), 540 _FIELDS = (('I', 'signature'),
|
/external/boringssl/src/crypto/x509/ |
t_x509.c | 163 if (X509_signature_print(bp, ci->signature, NULL) <= 0) 236 if(X509_signature_print(bp, x->sig_alg, x->signature) <= 0) goto err; 299 if (BIO_puts(bp," Signature Algorithm: ") <= 0) return 0;
|
x_crl.c | 115 * Since we cache the original encoding the signature wont be affected by 379 ASN1_SIMPLE(X509_CRL, signature, ASN1_BIT_STRING) 437 crl->sig_alg, crl->signature,crl->crl,r));
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/fps/ |
connection.py | 220 signature = self._auth_handler.sign_string(canonical) 221 payload += [('signature', safequote(signature))] 300 Verify the signature that FPS sent in IPN or callback urls.
|
/external/dhcpcd-6.8.2/ |
dhcpcd-run-hooks.in | 17 signature="$signature_base $from $ifname"
|
/external/gptfdisk/ |
gpt.cc | 402 // 0 if neither is valid. Note that this function checks the GPT signature, 410 // Note: failed GPT signature checks produce no error message because 412 if ((mainHeader.signature != GPT_SIGNATURE) || (!CheckHeaderCRC(&mainHeader, 1))) { 423 if ((secondHeader.signature != GPT_SIGNATURE) || (!CheckHeaderCRC(&secondHeader))) { 434 // Check for an Apple disk signature 435 if (((mainHeader.signature << 32) == APM_SIGNATURE1) || 436 (mainHeader.signature << 32) == APM_SIGNATURE2) { 545 mainHeader.signature = GPT_SIGNATURE; 566 secondHeader.signature = GPT_SIGNATURE; [all...] |
/external/icu/icu4j/tools/build/src/com/ibm/icu/dev/tool/docs/ |
GatherAPIDataOld.java | 9 * Generate a list of ICU's public APIs, sorted by qualified name and signature 260 // ExecutableMemberDoc isSynchronized, signature 361 info.setSignature(trimBase(mdoc.returnType().toString() + emdoc.signature())); 364 info.setSignature(trimBase(emdoc.signature()));
|
/external/libweave/src/privet/ |
security_manager.cc | 330 std::string* signature, 363 *signature = Base64Encode(cert_hmac);
|
/external/mockito/cglib-and-asm/src/org/mockito/asm/util/ |
ASMifierMethodVisitor.java | 334 final String signature,
345 appendConstant(signature);
|
/external/opencv3/modules/imgcodecs/src/ |
grfmt_gdal.cpp | 149 // set a dummy signature 520 * Test the file signature 522 bool GdalDecoder::checkSignature( const String& signature )const{ 526 std::string str = signature.c_str();
|
/external/vboot_reference/cgpt/ |
cgpt_show.c | 71 PrintSignature(indent, header->signature, sizeof(header->signature), raw);
|
/frameworks/base/media/jni/ |
android_media_MediaDrm.cpp | 1366 Vector<uint8_t> signature; local 1426 Vector<uint8_t> signature; local [all...] |
/frameworks/base/services/core/java/com/android/server/webkit/ |
WebViewUpdateServiceImpl.java | 22 import android.content.pm.Signature; 633 Signature[] packageSignatures; 634 // If no signature is declared, instead check whether the package is included in the 644 // Return whether the package signature matches any of the valid signatures 645 for (String signature : provider.signatures) { 646 final byte[] validSignature = Base64.decode(signature, Base64.DEFAULT);
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
SignatureTest.java | 31 import java.security.Signature; 47 * Tests for <code>Signature</code> constructor and methods 53 * Class under test for Signature(String) 122 Signature sig = getTestSignature(); 142 Signature sig = getTestSignature(); 163 Signature signature = getTestSignature(); local 164 signature.initSign(null); 173 private Signature getTestSignature() throws NoSuchAlgorithmException { 174 Provider provider = new MyProvider("TestProvider", 1.0, "Test Provider", "Signature.ABC", MySignature.class.getName()) [all...] |
/libcore/ojluni/src/main/native/ |
UnixFileSystem_md.c | 61 #define NATIVE_METHOD(className, functionName, signature) \ 62 { #functionName, signature, (void*)(Java_java_io_ ## className ## _ ## functionName) }
|
java_util_zip_ZipFile.c | 50 #define NATIVE_METHOD(className, functionName, signature) \ 51 { #functionName, signature, (void*)(className ## _ ## functionName) }
|
/packages/apps/ManagedProvisioning/src/com/android/managedprovisioning/task/ |
DownloadPackageTask.java | 28 import android.content.pm.Signature; 173 * If the package hash is provided then that is used, otherwise a signature hash is used. 251 // Check whether a signature hash of downloaded apk matches the hash given in constructor. 269 ProvisionLogger.loge("Provided hash does not match any signature hash."); 355 Signature signatures[] = info.signatures; 357 for (Signature signature : signatures) { 358 byte[] hash = computeHashOfByteArray(signature.toByteArray());
|