HomeSort by relevance Sort by last modified time
    Searched full:signer (Results 151 - 175 of 333) sorted by null

1 2 3 4 5 67 8 91011>>

  /external/okhttp/mockwebserver/src/main/java/com/squareup/okhttp/internal/
HeldCertificate.java 105 // Subject, public & private keys for this certificate's signer. It may be self signed!
  /external/wycheproof/java/com/google/security/wycheproof/testcases/
RsaSignatureTest.java 1090 Signature signer = Signature.getInstance(algorithm); local
    [all...]
  /libcore/ojluni/src/main/java/java/security/
Key.java 97 * @see Signer
IdentityScope.java 54 * @see Signer
  /libcore/ojluni/src/main/java/java/util/jar/
JarVerifier.java 573 * Match CodeSource to a CodeSigner[] in the signer cache.
632 * singleton signerCache or signerCacheCert entries for each unique signer.
644 * Only compare against other per-signer singletons constructed
682 * Snapshot signer state so it doesn't change on us. We care
  /device/linaro/bootloader/edk2/SecurityPkg/Library/AuthVariableLib/
AuthService.c     [all...]
  /frameworks/base/core/java/android/util/apk/
ApkSignatureSchemeV2Verifier.java 98 * associated with each signer.
113 * associated with each signer.
223 ByteBuffer signer = getLengthPrefixedSlice(signers); local
224 X509Certificate[] certs = verifySigner(signer, contentDigests, certFactory);
228 "Failed to parse/verify signer #" + signerCount + " block",
355 + " contents digest does not match the digest specified by a preceding signer");
    [all...]
  /device/linaro/bootloader/edk2/CryptoPkg/Library/BaseCryptLib/Pk/
CryptTs.c 306 // -- Check if the TSA name and signer certificate is matched.
578 // Check if there is one and only one signer.
  /external/bouncycastle/patches/
bcpkix.patch 71 - SignerInformation signer = (SignerInformation)it.next();
75 - SignerInformationVerifier verifier = verifierProvider.get(signer.getSID());
77 - if (!signer.verify(verifier))
84 - Collection counterSigners = signer.getCounterSignatures().getSigners();
156 + // SignerInformation signer = (SignerInformation)it.next();
160 + // SignerInformationVerifier verifier = verifierProvider.get(signer.getSID());
162 + // if (!signer.verify(verifier))
169 + // Collection counterSigners = signer.getCounterSignatures().getSigners();
    [all...]
  /prebuilts/go/darwin-x86/src/crypto/tls/
key_agreement.go 257 priv, ok := cert.PrivateKey.(crypto.Signer)
259 return nil, errors.New("tls: certificate private key does not implement crypto.Signer")
  /prebuilts/go/linux-x86/src/crypto/tls/
key_agreement.go 257 priv, ok := cert.PrivateKey.(crypto.Signer)
259 return nil, errors.New("tls: certificate private key does not implement crypto.Signer")
  /build/make/tools/releasetools/
sign_target_files_apks 191 # By default, APK signer chooses SHA-256 signatures if the APK's minSdkVersion
194 # For N+ builds, we let APK signer rely on the APK's minSdkVersion to
198 # Let APK signer choose whether to use SHA-1 or SHA-256, based on the APK's
202 # Force APK signer to use SHA-1
sign_target_files_apks.py 191 # By default, APK signer chooses SHA-256 signatures if the APK's minSdkVersion
194 # For N+ builds, we let APK signer rely on the APK's minSdkVersion to
198 # Let APK signer choose whether to use SHA-1 or SHA-256, based on the APK's
202 # Force APK signer to use SHA-1
ota_from_target_files 123 --payload_signer <signer>
124 Specify the signer when signing the payload and metadata for A/B OTAs.
127 directly, a payload signer that knows how to do that should be specified.
128 The signer will be supplied with "-inkey <path_to_key>",
132 Specify the arguments needed for payload signer.
242 infeasible, because we don't have the desired boot signer and keys when
    [all...]
ota_from_target_files.py 123 --payload_signer <signer>
124 Specify the signer when signing the payload and metadata for A/B OTAs.
127 directly, a payload signer that knows how to do that should be specified.
128 The signer will be supplied with "-inkey <path_to_key>",
132 Specify the arguments needed for payload signer.
242 infeasible, because we don't have the desired boot signer and keys when
    [all...]
  /external/conscrypt/openjdk-integ-tests/src/test/java/libcore/javax/net/ssl/
TrustManagerFactoryTest.java 310 .signer(intermediateCa.getPrivateKey("RSA", "RSA"))
  /external/kmod/libkmod/
libkmod-internal.h 184 const char *signer; member in struct:kmod_signature_info
  /external/wycheproof/doc/
rsa.md 87 not used by the signer.
  /libcore/luni/src/test/java/libcore/javax/net/ssl/
TrustManagerFactoryTest.java 289 .signer(intermediateCa.getPrivateKey("RSA", "RSA"))
  /prebuilts/go/darwin-x86/api/
go1.4.txt 23 # CL 114680043 crypto: add Signer, Adam Langley <agl@golang.org>
25 pkg crypto, type Signer interface { Public, Sign }
26 pkg crypto, type Signer interface, Public() PublicKey
27 pkg crypto, type Signer interface, Sign(io.Reader, []uint8, SignerOpts) ([]uint8, error)
    [all...]
  /prebuilts/go/linux-x86/api/
go1.4.txt 23 # CL 114680043 crypto: add Signer, Adam Langley <agl@golang.org>
25 pkg crypto, type Signer interface { Public, Sign }
26 pkg crypto, type Signer interface, Public() PublicKey
27 pkg crypto, type Signer interface, Sign(io.Reader, []uint8, SignerOpts) ([]uint8, error)
    [all...]
  /external/vboot_reference/scripts/image_signing/
sign_official_build.sh 196 # Hack around the fact that the signer needs to use the old version of
341 # in partition 4. However, the signer needs to be able to sign new & old images
520 local signer_notes="${shellball_dir}/VERSION.signer"
  /prebuilts/tools/common/m2/repository/com/amazonaws/aws-java-sdk-core/1.11.18/
aws-java-sdk-core-1.11.18.jar 
  /prebuilts/go/darwin-x86/src/crypto/x509/
x509.go     [all...]
  /prebuilts/go/linux-x86/src/crypto/x509/
x509.go     [all...]

Completed in 1117 milliseconds

1 2 3 4 5 67 8 91011>>