/system/update_engine/payload_consumer/ |
payload_verifier.h | 40 static bool VerifySignature(const brillo::Blob& signature_blob,
|
payload_verifier.cc | 87 bool PayloadVerifier::VerifySignature(const brillo::Blob& signature_blob,
|
delta_performer.cc | [all...] |
/device/linaro/bootloader/edk2/MdePkg/Include/Protocol/ |
Pkcs7Verify.h | 216 EFI_PKCS7_VERIFY_SIGNATURE VerifySignature;
|
/external/v8/tools/testrunner/server/ |
signatures.py | 50 def VerifySignature(filename, file_contents, signature, pubkeyfile):
|
work_handler.py | 98 if not signatures.VerifySignature(target, binary["blob"],
|
main.py | 227 if not signatures.VerifySignature(filename, pubkey, signature,
|
/system/tpm/attestation/common/ |
crypto_utility.h | 91 virtual bool VerifySignature(const std::string& public_key,
|
mock_crypto_utility.h | 63 MOCK_METHOD3(VerifySignature,
|
crypto_utility_impl.h | 62 bool VerifySignature(const std::string& public_key,
|
crypto_utility_impl_test.cc | 229 crypto_utility_->VerifySignature(public_key_info, "input", "signature")); 233 EXPECT_FALSE(crypto_utility_->VerifySignature("bad_key", "input", ""));
|
crypto_utility_impl.cc | 292 bool CryptoUtilityImpl::VerifySignature(const std::string& public_key,
|
/system/update_engine/payload_generator/ |
payload_signer_unittest.cc | 191 EXPECT_TRUE(PayloadVerifier::VerifySignature( 195 EXPECT_TRUE(PayloadVerifier::VerifySignature( 206 EXPECT_TRUE(PayloadVerifier::VerifySignature( 211 EXPECT_FALSE(PayloadVerifier::VerifySignature(
|
payload_signer.cc | 332 TEST_AND_RETURN_FALSE(PayloadVerifier::VerifySignature( 340 TEST_AND_RETURN_FALSE(PayloadVerifier::VerifySignature(
|
/external/libbrillo/policy/ |
device_policy_impl.cc | 40 bool VerifySignature(const std::string& signed_data, 455 if (!VerifySignature(policy_data, policy_data_signature, public_key)) {
|
/system/tpm/attestation/client/ |
main.cc | 244 &ClientLoop::VerifySignature, weak_factory_.GetWeakPtr(), 433 void VerifySignature(const std::string& label, 449 if (crypto.VerifySignature(key_info.public_key(), input, signature)) {
|
/device/linaro/bootloader/edk2/SecurityPkg/Pkcs7Verify/Pkcs7VerifyDxe/ |
Pkcs7VerifyDxe.c | [all...] |
/prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/ |
schannel.h | 361 typedef WINBOOL (WINAPI *SSL_CRACK_CERTIFICATE_FN)(PUCHAR pbCertificate,DWORD cbCertificate,WINBOOL VerifySignature,PX509Certificate *ppCertificate);
|
sspi.h | 714 KSECDDDECLSPEC SECURITY_STATUS WINAPI VerifySignature(PCtxtHandle phContext,PSecBufferDesc pMessage,unsigned __LONG32 MessageSeqNo,unsigned __LONG32 *pfQOP); [all...] |
ntsecpkg.h | [all...] |
/system/core/trusty/keymaster/ |
trusty_keymaster_device_test.cpp | 492 static void VerifySignature(const uint8_t* key, size_t key_len, const uint8_t* signature, 530 VerifySignature(exported, exported_size, signature, siglen, message.get(), message_len); 558 VerifySignature(exported, exported_size, signature, siglen, message, array_size(message) - 1);
|
/external/tpm2/ |
Makefile | 283 SOURCES += VerifySignature.c
|
/system/tpm/trunks/ |
mock_tpm.h | [all...] |
tpm_generated.h | [all...] |
tpm_generated.cc | [all...] |