/external/okhttp/mockwebserver/src/main/java/com/squareup/okhttp/internal/ |
HeldCertificate.java | 105 // Subject, public & private keys for this certificate's signer. It may be self signed!
|
/external/wycheproof/java/com/google/security/wycheproof/testcases/ |
RsaSignatureTest.java | 1090 Signature signer = Signature.getInstance(algorithm); local [all...] |
/libcore/ojluni/src/main/java/java/security/ |
Key.java | 97 * @see Signer
|
IdentityScope.java | 54 * @see Signer
|
/libcore/ojluni/src/main/java/java/util/jar/ |
JarVerifier.java | 573 * Match CodeSource to a CodeSigner[] in the signer cache. 632 * singleton signerCache or signerCacheCert entries for each unique signer. 644 * Only compare against other per-signer singletons constructed 682 * Snapshot signer state so it doesn't change on us. We care
|
/device/linaro/bootloader/edk2/SecurityPkg/Library/AuthVariableLib/ |
AuthService.c | [all...] |
/frameworks/base/core/java/android/util/apk/ |
ApkSignatureSchemeV2Verifier.java | 98 * associated with each signer. 113 * associated with each signer. 223 ByteBuffer signer = getLengthPrefixedSlice(signers); local 224 X509Certificate[] certs = verifySigner(signer, contentDigests, certFactory); 228 "Failed to parse/verify signer #" + signerCount + " block", 355 + " contents digest does not match the digest specified by a preceding signer"); [all...] |
/device/linaro/bootloader/edk2/CryptoPkg/Library/BaseCryptLib/Pk/ |
CryptTs.c | 306 // -- Check if the TSA name and signer certificate is matched.
578 // Check if there is one and only one signer.
|
/external/bouncycastle/patches/ |
bcpkix.patch | 71 - SignerInformation signer = (SignerInformation)it.next(); 75 - SignerInformationVerifier verifier = verifierProvider.get(signer.getSID()); 77 - if (!signer.verify(verifier)) 84 - Collection counterSigners = signer.getCounterSignatures().getSigners(); 156 + // SignerInformation signer = (SignerInformation)it.next(); 160 + // SignerInformationVerifier verifier = verifierProvider.get(signer.getSID()); 162 + // if (!signer.verify(verifier)) 169 + // Collection counterSigners = signer.getCounterSignatures().getSigners(); [all...] |
/prebuilts/go/darwin-x86/src/crypto/tls/ |
key_agreement.go | 257 priv, ok := cert.PrivateKey.(crypto.Signer) 259 return nil, errors.New("tls: certificate private key does not implement crypto.Signer")
|
/prebuilts/go/linux-x86/src/crypto/tls/ |
key_agreement.go | 257 priv, ok := cert.PrivateKey.(crypto.Signer) 259 return nil, errors.New("tls: certificate private key does not implement crypto.Signer")
|
/build/make/tools/releasetools/ |
sign_target_files_apks | 191 # By default, APK signer chooses SHA-256 signatures if the APK's minSdkVersion 194 # For N+ builds, we let APK signer rely on the APK's minSdkVersion to 198 # Let APK signer choose whether to use SHA-1 or SHA-256, based on the APK's 202 # Force APK signer to use SHA-1
|
sign_target_files_apks.py | 191 # By default, APK signer chooses SHA-256 signatures if the APK's minSdkVersion 194 # For N+ builds, we let APK signer rely on the APK's minSdkVersion to 198 # Let APK signer choose whether to use SHA-1 or SHA-256, based on the APK's 202 # Force APK signer to use SHA-1
|
ota_from_target_files | 123 --payload_signer <signer> 124 Specify the signer when signing the payload and metadata for A/B OTAs. 127 directly, a payload signer that knows how to do that should be specified. 128 The signer will be supplied with "-inkey <path_to_key>", 132 Specify the arguments needed for payload signer. 242 infeasible, because we don't have the desired boot signer and keys when [all...] |
ota_from_target_files.py | 123 --payload_signer <signer> 124 Specify the signer when signing the payload and metadata for A/B OTAs. 127 directly, a payload signer that knows how to do that should be specified. 128 The signer will be supplied with "-inkey <path_to_key>", 132 Specify the arguments needed for payload signer. 242 infeasible, because we don't have the desired boot signer and keys when [all...] |
/external/conscrypt/openjdk-integ-tests/src/test/java/libcore/javax/net/ssl/ |
TrustManagerFactoryTest.java | 310 .signer(intermediateCa.getPrivateKey("RSA", "RSA"))
|
/external/kmod/libkmod/ |
libkmod-internal.h | 184 const char *signer; member in struct:kmod_signature_info
|
/external/wycheproof/doc/ |
rsa.md | 87 not used by the signer.
|
/libcore/luni/src/test/java/libcore/javax/net/ssl/ |
TrustManagerFactoryTest.java | 289 .signer(intermediateCa.getPrivateKey("RSA", "RSA"))
|
/prebuilts/go/darwin-x86/api/ |
go1.4.txt | 23 # CL 114680043 crypto: add Signer, Adam Langley <agl@golang.org> 25 pkg crypto, type Signer interface { Public, Sign } 26 pkg crypto, type Signer interface, Public() PublicKey 27 pkg crypto, type Signer interface, Sign(io.Reader, []uint8, SignerOpts) ([]uint8, error) [all...] |
/prebuilts/go/linux-x86/api/ |
go1.4.txt | 23 # CL 114680043 crypto: add Signer, Adam Langley <agl@golang.org> 25 pkg crypto, type Signer interface { Public, Sign } 26 pkg crypto, type Signer interface, Public() PublicKey 27 pkg crypto, type Signer interface, Sign(io.Reader, []uint8, SignerOpts) ([]uint8, error) [all...] |
/external/vboot_reference/scripts/image_signing/ |
sign_official_build.sh | 196 # Hack around the fact that the signer needs to use the old version of 341 # in partition 4. However, the signer needs to be able to sign new & old images 520 local signer_notes="${shellball_dir}/VERSION.signer"
|
/prebuilts/tools/common/m2/repository/com/amazonaws/aws-java-sdk-core/1.11.18/ |
aws-java-sdk-core-1.11.18.jar | |
/prebuilts/go/darwin-x86/src/crypto/x509/ |
x509.go | [all...] |
/prebuilts/go/linux-x86/src/crypto/x509/ |
x509.go | [all...] |