/external/boringssl/src/crypto/x509/ |
pkcs7.c | 40 CBS in, content_info, content_type, wrapped_signed_data, signed_data; local 68 !CBS_get_asn1(&wrapped_signed_data, &signed_data, CBS_ASN1_SEQUENCE) || 69 !CBS_get_asn1_uint64(&signed_data, &version) || 70 !CBS_get_asn1(&signed_data, NULL /* digests */, CBS_ASN1_SET) || 71 !CBS_get_asn1(&signed_data, NULL /* content */, CBS_ASN1_SEQUENCE)) { 80 CBS_init(out, CBS_data(&signed_data), CBS_len(&signed_data)); 93 CBS signed_data, certificates; local 98 if (!pkcs7_parse_header(&der_bytes, &signed_data, cbs)) { 103 if (!CBS_get_asn1(&signed_data, &certificates 153 CBS signed_data, crls; local [all...] |
/hardware/libhardware/include/hardware/ |
keymaster0.h | 114 uint8_t** signed_data, size_t* signed_data_length); 125 const uint8_t* signed_data, const size_t signed_data_length,
|
keymaster1.h | 110 const size_t data_length, uint8_t** signed_data, size_t* signed_data_length); 120 const uint8_t* signed_data, const size_t signed_data_length,
|
/system/connectivity/shill/ |
mock_crypto_util_proxy.cc | 50 const std::string& signed_data, 57 nonce, signed_data,
|
mock_crypto_util_proxy.h | 44 const std::string& signed_data, 58 const std::string& signed_data,
|
crypto_util_proxy.h | 60 // |signed_data| is the base64 encoded signed string given by the device. 67 const std::string& signed_data,
|
crypto_util_proxy.cc | 80 const string& signed_data, 95 if (!brillo::data_encoding::Base64Decode(signed_data, &decoded_signed_data)) {
|
manager.h | 459 // |signed_data| is a base64 encoded string as described in 464 const std::string& signed_data, 479 const std::string& signed_data, 494 const std::string& signed_data, [all...] |
manager.cc | [all...] |
/hardware/qcom/keymaster/ |
keymaster_qcom.h | 172 * signed_data : signature 178 uint8_t signed_data[KM_KEY_SIZE_MAX]; member in struct:keymaster_sign_data_resp 193 * signed_data : Pointer to signed data buffer 202 uint32_t signed_data; member in struct:keymaster_verify_data_cmd
|
keymaster_qcom.cpp | 561 memcpy(p, (unsigned char *)(&resp->signed_data), resp->sig_len); 629 send_cmd->signed_data = (uint32_t)ihandle.ion_sbuffer;
|
/system/connectivity/shill/shims/ |
crypto_util.cc | 152 // 3) |signed_data| matches the hashed |unsigned_data| encrypted with 159 const string& signed_data, 252 // We're going to verify that hash(unsigned_data) == public(signed_data) 266 reinterpret_cast<const unsigned char*>(signed_data.data()); 267 const size_t signature_len = signed_data.length(); 321 message.signed_data(), message.unsigned_data(), connected_mac,
|
/system/connectivity/shill/dbus/ |
chromeos_manager_dbus_adaptor.cc | 422 const string& signed_data, 431 signed_data, destination_udn, 450 const string& signed_data, 461 signed_data, destination_udn, 482 const string& signed_data, 493 signed_data, destination_udn,
|
chromeos_manager_dbus_adaptor.h | 136 const std::string& signed_data, 144 const std::string& signed_data, 153 const std::string& signed_data,
|
/external/autotest/client/site_tests/network_DestinationVerification/ |
network_DestinationVerification.py | 40 "signed_data":"vwMBgANrp5XpCswLyk/OTXT56ORPeIWjH7xAdCk3qgjkwI6+8o56zJS02+tC5hhIHWh7oppTmWYF4tKvBQ3GeCz7IW9f7HWDMtO7x7yRWxzJyehaJbCfXvLdfs0/WKllzvGVBgNpcIAwU2NSFUG/jpXclntFzds0EUJG9wHxS6PXXSYRu+PlIFdCDcQJsUlnwO9AGFOJRV/aARGh8YUTWCFIQPOtPEqT5eegt+TLf01Gq0YcrRwSTKy1I3twOnWiMfIdkJdQKPtBwwbvuAyGuqYFocfjKABbnH9Tvl04yyO3euKbYlSqaF/l8CXmzDJTyO7tDOFK59bV9auE4KljrQ==" 66 "signed_data": "WIvN6Ujo4CoxUNcsm1YaLRUe1KJVEG+oXorUBJae/fKQrLfnH9ChDfxzW+EDZlLBLPk9u5EAptr8LKK6AunbBTDIeBkjzXv3nS+xlmV9ZdA71imitva88HPzC+a2H61dJL8puNbZu9j1Zs3sCybw2F+qZbDBhbG0sJTEXytPjewqAl8iBZSAS0BoNJZYA7Q/bCPI07pg404pI392cKP8FYJR08Y4xoV94Em+jnZ2nZabSsmsScYGvpWVNeS2z+f0to6ureOxaqgT+AAckqtCRcHd66QtLGwKXWviaevKte1z185f4r55U4P5pkQi+xd6lZRsMQydwUzLxgk7UY5U3Q==" 93 "signed_data": "aaT56/P7KiMxVbWCedpSNIikpxh0EzdjgEuP153pCNfYys2KmlVtvEnXeFGYKJP2ypsX0qx/9Bx2C18T8HZ4PvNW0fUEheScvkzbDTn/gBpwUJv3XT+55XneUdjIAQu83qNR/AjxYa9cDGzxbnZJL91Fd1Grw/fNaKEMiedWRiESABQREiS2OW+iZ3Z/JRs99o4M6m+6f/mvNkgZ3GrFxNnPEXe7g1sYjspPhnDLvASNzd9j24YIxu+PTWZCNL6clps+/ghNA/0fB3PBDILrcGnER36Vc8gNhjD1r1f/ACU1qk06yMNC/Kgt2pMQkpjaXby+B75Z9yrogNHs4f5tIA==" 234 message.signed_data = base64.b64decode(sign_bundle['signed_data'])
|
/external/libbrillo/policy/ |
device_policy_impl.cc | 39 // Verifies that the |signed_data| has correct |signature| with |public_key|. 40 bool VerifySignature(const std::string& signed_data, 66 EVP_VerifyUpdate(&ctx, signed_data.data(), signed_data.length());
|
/external/wpa_supplicant_8/src/tls/ |
x509v3.h | 141 const u8 *signed_data, size_t signed_data_len);
|
x509v3.c | [all...] |
/system/keymaster/ |
keymaster0_engine.cpp | 282 uint8_t* signed_data; local 284 blob.key_material_size, data, data_length, &signed_data, 291 signature->reset(signed_data);
|
android_keymaster_test_utils.h | 438 uint8_t** signed_data, size_t* signed_data_length) { 442 data, data_length, signed_data, signed_data_length); 447 const uint8_t* signed_data, const size_t signed_data_length, 452 key_blob_length, signed_data, signed_data_length, signature,
|
/system/tpm/trunks/ |
tpm_generated_test.cc | 389 std::string signed_data("\x00\x0E" "ct_signed_data", 16); 408 command_response += signed_data + signature + auth_out;
|
/build/tools/releasetools/ |
sign_target_files_apks | 223 signed_data = SignApk(data, key, key_passwords[key], platform_api_level, 225 common.ZipWriteStr(output_tf_zip, out_info, signed_data)
|
sign_target_files_apks.py | 223 signed_data = SignApk(data, key, key_passwords[key], platform_api_level, 225 common.ZipWriteStr(output_tf_zip, out_info, signed_data)
|
/external/ImageMagick/coders/ |
dcm.c | 2836 signed_data, local [all...] |
/external/v8/test/cctest/ |
test-api.cc | 16227 const char* signed_data = local [all...] |