HomeSort by relevance Sort by last modified time
    Searched full:signer (Results 26 - 50 of 333) sorted by null

12 3 4 5 6 7 8 91011>>

  /frameworks/base/media/lib/signer/
Android.mk 18 # the mediadrm signer library
22 LOCAL_MODULE:= com.android.mediadrm.signer
32 # ==== com.android.mediadrm.signer.xml lib def ========================
35 LOCAL_MODULE := com.android.mediadrm.signer.xml
  /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/
CertUtils.java 51 static X509CertificateHolder generateFullCert(ContentSigner signer, TBSCertificate tbsCert)
55 return new X509CertificateHolder(generateStructure(tbsCert, signer.getAlgorithmIdentifier(), generateSig(signer, tbsCert)));
63 static X509AttributeCertificateHolder generateFullAttrCert(ContentSigner signer, AttributeCertificateInfo attrInfo)
67 return new X509AttributeCertificateHolder(generateAttrStructure(attrInfo, signer.getAlgorithmIdentifier(), generateSig(signer, attrInfo)));
75 static X509CRLHolder generateFullCRL(ContentSigner signer, TBSCertList tbsCertList)
79 return new X509CRLHolder(generateCRLStructure(tbsCertList, signer.getAlgorithmIdentifier(), generateSig(signer, tbsCertList)));
87 private static byte[] generateSig(ContentSigner signer, ASN1Encodable tbsObj
    [all...]
  /libcore/support/src/test/java/org/apache/harmony/security/tests/support/
SignerStub.java 27 import java.security.Signer;
30 * Stub for abstract class Signer, necessary for testing purposes
34 public class SignerStub extends Signer {
  /tools/apksig/src/main/java/com/android/apksig/
ApkVerifier.java 224 // Check whether v1 and v2 scheme signer identifies match, provided both v1 and v2
233 for (Result.V1SchemeSignerInfo signer : v1Signers) {
235 v1SignerCerts.add(new ByteArray(signer.getCertificate().getEncoded()));
238 "Failed to encode JAR signer " + signer.getName() + " certs", e);
241 for (Result.V2SchemeSignerInfo signer : v2Signers) {
243 v2SignerCerts.add(new ByteArray(signer.getCertificate().getEncoded()));
246 "Failed to encode APK Signature Scheme v2 signer (index: "
247 + signer.getIndex() + ") certs",
410 * Returns the verified signers' certificates, one per signer
    [all...]
  /frameworks/base/services/tests/servicestests/src/com/android/server/updates/
CertPinInstallReceiverTest.java 164 Signature signer = Signature.getInstance("SHA512withRSA"); local
165 signer.initSign(createKey());
166 signer.update(content.trim().getBytes());
167 signer.update(version.trim().getBytes());
168 signer.update(requiredHash.getBytes());
169 String sig = new String(Base64.encode(signer.sign(), Base64.DEFAULT));
177 Signature signer = Signature.getInstance("SHA512withRSA"); local
178 signer.initVerify(cert);
179 signer.update(content.trim().getBytes());
180 signer.update(version.trim().getBytes())
    [all...]
  /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/jcajce/
JcaContentSignerBuilder.java 102 throw new OperatorCreationException("cannot create signer: " + e.getMessage(), e);
125 throw new OperatorStreamException("exception in content signer: " + e.getMessage(), e);
138 throw new OperatorStreamException("exception in content signer: " + e.getMessage(), e);
151 throw new OperatorStreamException("exception in content signer: " + e.getMessage(), e);
  /tools/apksig/src/apksigner/java/com/android/apksigner/
help_sign.txt 6 signer. For each signer, you need to provide the signer's private key and
44 PER-SIGNER OPTIONS
45 These options specify the configuration of a particular signer. To delimit
46 options of different signers, use --next-signer.
48 --next-signer Delimits options of two different signers. There is no
49 need to use this option when only one signer is used.
51 --v1-signer-name Basename for files comprising the JAR signature scheme
52 (aka v1 scheme) signature of this signer. By default
    [all...]
ApkSignerTool.java 150 } else if ("next-signer".equals(optionName)) {
175 } else if ("v1-signer-name".equals(optionName)) {
226 throw new ParameterException("At least one signer must be specified");
262 for (SignerParams signer : signers) {
264 signer.name = "signer #" + signerNumber;
266 signer.loadPrivateKeyAndCerts(passwordRetriever);
269 "Failed to load signer \"" + signer.name + "\": "
274 System.err.println("Failed to load signer \"" + signer.name + "\"")
    [all...]
  /tools/apksig/src/test/java/com/android/apksig/
ApkVerifierTest.java 69 // APK signed with v1 scheme only, one signer
78 // APK signed with v1 scheme only, one signer
87 // APK signed with v1 scheme only, one signer
96 // APK signed with v1 scheme only, one signer
105 // APK signed with v1 scheme only, one signer
114 // APK signed with v1 scheme only, one signer
123 // APK signed with v1 scheme only, one signer
132 // APK signed with v1 scheme only, one signer
141 // APK signed with v1 scheme only, one signer
150 // APK signed with v1 scheme only, one signer
504 ApkVerifier.Result.V1SchemeSignerInfo signer = signers.get(0); local
    [all...]
  /docs/source.android.com/zh-cn/security/apksigning/
v2.html 82 <li>?????? <code>signer</code>??????????<ul>
193 <li>??APK ???? v2 ??????? <code>signer</code> ???????<ol>
203 <li>????????? <code>signer</code>?????????? <code>signer</code>?? 3 ????????APK ???????</li>
213 <li>??????????? META-INF/&lt;signer&gt;.SF ? META-INF/&lt;signer&gt;.(RSA|DSA|EC) ? JAR ??????</li>
214 <li>&lt;signer&gt;.(RSA|DSA|EC) ?<a href="https://tools.ietf.org/html/rfc5652">?? SignedData ??? PKCS #7 CMS ContentInfo</a>?????? &lt;signer&gt;.SF ???????</li>
215 <li>&lt;signer&gt;.SF ???? META-INF/MANIFEST.MF ??????? META-INF/MANIFEST.MF ???????????? MANIFEST.MF ???????????????????? MANIFEST.MF ????????</li>
220 <p>???????????????? JAR ??? &lt;signer&gt;.(RSA|DSA|EC) -&gt; &lt;signer&gt;.SF -&gt; MANIFEST.MF -&gt; ??
    [all...]
  /external/vboot_reference/host/lib/
host_signature.c 177 "Input to the signer will be provided on standard in.\n"
178 "Output of the signer will be read from standard out.\n",
195 /* We provide input to the child process (external signer). */
197 VBDEBUG(("write() error while providing input to external signer\n"));
200 close(p_to_c[STDOUT_FILENO]); /* Send EOF to child (signer process). */
208 VBDEBUG(("read() error while reading output from external signer\n"));
223 VBDEBUG(("stdin dup2() failed (external signer)\n"));
229 * signer output to the parent) */
232 VBDEBUG(("stdout dup2() failed (external signer)\n"));
237 /* External signer is invoked here. *
    [all...]
  /external/kmod/testsuite/rootfs-pristine/test-modinfo/
correct.txt 10 signer: Magrathea: Glacier signing key
22 signer: Magrathea: Glacier signing key
  /system/sepolicy/prebuilts/api/26.0/private/
untrusted_app.te 5 ### Apps are labeled based on mac_permissions.xml (maps signer and
14 ### a system app into a specific domain, add a signer entry for it to
untrusted_app_25.te 7 ### Apps are labeled based on mac_permissions.xml (maps signer and
16 ### a system app into a specific domain, add a signer entry for it to
  /system/sepolicy/private/
untrusted_app.te 5 ### Apps are labeled based on mac_permissions.xml (maps signer and
14 ### a system app into a specific domain, add a signer entry for it to
untrusted_app_25.te 7 ### Apps are labeled based on mac_permissions.xml (maps signer and
16 ### a system app into a specific domain, add a signer entry for it to
  /external/wpa_supplicant_8/src/crypto/
tls_openssl_ocsp.c 506 X509 *signer, *tmp_cert; local
616 signer = ocsp_find_signer(certs, rd->responderID);
617 if (!signer)
618 signer = ocsp_find_signer(untrusted, rd->responderID);
621 if (!signer) {
623 "OpenSSL: Could not find OCSP signer certificate");
627 skey = X509_get_pubkey(signer);
630 "OpenSSL: Could not get OCSP signer public key");
641 X509_NAME_oneline(X509_get_subject_name(signer), buf, sizeof(buf));
643 "OpenSSL: Found OCSP signer certificate %s and verified BasicOCSPResponse signature"
    [all...]
  /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/
CMSSignedDataGenerator.java 129 SignerInformation signer = (SignerInformation)it.next(); local
130 digestAlgs.add(CMSSignedHelper.INSTANCE.fixAlgID(signer.getDigestAlgorithmID()));
133 signerInfos.add(signer.toASN1Structure());
223 * @param signer the signer to be countersigned
226 public SignerInformationStore generateCounterSigners(SignerInformation signer)
229 return this.generate(new CMSProcessableByteArray(null, signer.getSignature()), false).getSignerInfos();
  /cts/hostsidetests/appsecurity/src/android/appsecurity/cts/
PkgInstallSignatureVerificationTest.java 80 // APK signed with v1 scheme only, one signer.
88 // APK signed with v1 scheme only, one signer.
96 // APK signed with v1 scheme only, one signer.
104 // APK signed with v1 scheme only, one signer.
112 // APK signed with v1 scheme only, one signer.
120 // APK signed with v1 scheme only, one signer.
128 // APK signed with v1 scheme only, one signer.
136 // APK signed with v1 scheme only, one signer.
144 // APK signed with v1 scheme only, one signer.
152 // APK signed with v1 scheme only, one signer
    [all...]
  /packages/apps/Nfc/src/com/android/nfc/
NfceeAccessControl.java 177 * except for obvious errors within a <signer> group since they might cause
179 * by mistake. Those errors invalidate the entire <signer> group.
198 if (event == XmlPullParser.START_TAG && "signer".equals(tag)) {
208 Log.w(TAG, "signer tag is missing android:signature attribute, igorning");
216 } else if (event == XmlPullParser.END_TAG && "signer".equals(tag)) {
218 Log.w(TAG, "mis-matched signer tag");
236 Log.w(TAG, "package missing android:name, ignoring signer group");
237 signature = null; // invalidate signer
242 Log.w(TAG, "duplicate package name in signer group, ignoring");
  /device/linaro/bootloader/edk2/MdePkg/Include/Protocol/
Pkcs7Verify.h 58 Function recognizes signer certificates of type
61 success if signer of the buffer is within this list
69 verification will always fail if the signer of the
96 content, the signer's certificate was not found in
97 RevokedDb, and was found in AllowedDb or if in signer
103 signer was in RevokedDb or not in AllowedDb. Also
155 Function recognizes signer certificates of type
158 success if signer of the buffer is within this list
165 verification will always fail if the signer of the
176 hash of content, the signer's certificate was not
    [all...]
  /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/ocsp/
OCSPReqBuilder.java 188 ContentSigner signer,
192 if (signer == null)
194 throw new IllegalArgumentException("no signer specified");
197 return generateRequest(signer, chain);
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/
DSA.java 11 * initialise the signer for signature generation or signature
  /external/libchrome/crypto/
signature_creator_unittest.cc 30 std::unique_ptr<crypto::SignatureCreator> signer(
33 ASSERT_TRUE(signer.get());
36 ASSERT_TRUE(signer->Update(reinterpret_cast<const uint8_t*>(data.c_str()),
40 ASSERT_TRUE(signer->Final(&signature));
  /external/vboot_reference/tests/futility/
test_sign_keyblocks.sh 15 SIGNER=${SRCDIR}/tests/external_rsa_signer.sh
82 # Try it with an external signer
90 --externalsigner ${SIGNER}
100 --pem_external ${SIGNER} \

Completed in 4794 milliseconds

12 3 4 5 6 7 8 91011>>