/frameworks/base/media/lib/signer/ |
Android.mk | 18 # the mediadrm signer library 22 LOCAL_MODULE:= com.android.mediadrm.signer 32 # ==== com.android.mediadrm.signer.xml lib def ======================== 35 LOCAL_MODULE := com.android.mediadrm.signer.xml
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/ |
CertUtils.java | 51 static X509CertificateHolder generateFullCert(ContentSigner signer, TBSCertificate tbsCert) 55 return new X509CertificateHolder(generateStructure(tbsCert, signer.getAlgorithmIdentifier(), generateSig(signer, tbsCert))); 63 static X509AttributeCertificateHolder generateFullAttrCert(ContentSigner signer, AttributeCertificateInfo attrInfo) 67 return new X509AttributeCertificateHolder(generateAttrStructure(attrInfo, signer.getAlgorithmIdentifier(), generateSig(signer, attrInfo))); 75 static X509CRLHolder generateFullCRL(ContentSigner signer, TBSCertList tbsCertList) 79 return new X509CRLHolder(generateCRLStructure(tbsCertList, signer.getAlgorithmIdentifier(), generateSig(signer, tbsCertList))); 87 private static byte[] generateSig(ContentSigner signer, ASN1Encodable tbsObj [all...] |
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/ |
SignerStub.java | 27 import java.security.Signer; 30 * Stub for abstract class Signer, necessary for testing purposes 34 public class SignerStub extends Signer {
|
/tools/apksig/src/main/java/com/android/apksig/ |
ApkVerifier.java | 224 // Check whether v1 and v2 scheme signer identifies match, provided both v1 and v2 233 for (Result.V1SchemeSignerInfo signer : v1Signers) { 235 v1SignerCerts.add(new ByteArray(signer.getCertificate().getEncoded())); 238 "Failed to encode JAR signer " + signer.getName() + " certs", e); 241 for (Result.V2SchemeSignerInfo signer : v2Signers) { 243 v2SignerCerts.add(new ByteArray(signer.getCertificate().getEncoded())); 246 "Failed to encode APK Signature Scheme v2 signer (index: " 247 + signer.getIndex() + ") certs", 410 * Returns the verified signers' certificates, one per signer [all...] |
/frameworks/base/services/tests/servicestests/src/com/android/server/updates/ |
CertPinInstallReceiverTest.java | 164 Signature signer = Signature.getInstance("SHA512withRSA"); local 165 signer.initSign(createKey()); 166 signer.update(content.trim().getBytes()); 167 signer.update(version.trim().getBytes()); 168 signer.update(requiredHash.getBytes()); 169 String sig = new String(Base64.encode(signer.sign(), Base64.DEFAULT)); 177 Signature signer = Signature.getInstance("SHA512withRSA"); local 178 signer.initVerify(cert); 179 signer.update(content.trim().getBytes()); 180 signer.update(version.trim().getBytes()) [all...] |
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/jcajce/ |
JcaContentSignerBuilder.java | 102 throw new OperatorCreationException("cannot create signer: " + e.getMessage(), e); 125 throw new OperatorStreamException("exception in content signer: " + e.getMessage(), e); 138 throw new OperatorStreamException("exception in content signer: " + e.getMessage(), e); 151 throw new OperatorStreamException("exception in content signer: " + e.getMessage(), e);
|
/tools/apksig/src/apksigner/java/com/android/apksigner/ |
help_sign.txt | 6 signer. For each signer, you need to provide the signer's private key and 44 PER-SIGNER OPTIONS 45 These options specify the configuration of a particular signer. To delimit 46 options of different signers, use --next-signer. 48 --next-signer Delimits options of two different signers. There is no 49 need to use this option when only one signer is used. 51 --v1-signer-name Basename for files comprising the JAR signature scheme 52 (aka v1 scheme) signature of this signer. By default [all...] |
ApkSignerTool.java | 150 } else if ("next-signer".equals(optionName)) { 175 } else if ("v1-signer-name".equals(optionName)) { 226 throw new ParameterException("At least one signer must be specified"); 262 for (SignerParams signer : signers) { 264 signer.name = "signer #" + signerNumber; 266 signer.loadPrivateKeyAndCerts(passwordRetriever); 269 "Failed to load signer \"" + signer.name + "\": " 274 System.err.println("Failed to load signer \"" + signer.name + "\"") [all...] |
/tools/apksig/src/test/java/com/android/apksig/ |
ApkVerifierTest.java | 69 // APK signed with v1 scheme only, one signer 78 // APK signed with v1 scheme only, one signer 87 // APK signed with v1 scheme only, one signer 96 // APK signed with v1 scheme only, one signer 105 // APK signed with v1 scheme only, one signer 114 // APK signed with v1 scheme only, one signer 123 // APK signed with v1 scheme only, one signer 132 // APK signed with v1 scheme only, one signer 141 // APK signed with v1 scheme only, one signer 150 // APK signed with v1 scheme only, one signer 504 ApkVerifier.Result.V1SchemeSignerInfo signer = signers.get(0); local [all...] |
/docs/source.android.com/zh-cn/security/apksigning/ |
v2.html | 82 <li>?????? <code>signer</code>??????????<ul> 193 <li>??APK ???? v2 ??????? <code>signer</code> ???????<ol> 203 <li>????????? <code>signer</code>?????????? <code>signer</code>?? 3 ????????APK ???????</li> 213 <li>??????????? META-INF/<signer>.SF ? META-INF/<signer>.(RSA|DSA|EC) ? JAR ??????</li> 214 <li><signer>.(RSA|DSA|EC) ?<a href="https://tools.ietf.org/html/rfc5652">?? SignedData ??? PKCS #7 CMS ContentInfo</a>?????? <signer>.SF ???????</li> 215 <li><signer>.SF ???? META-INF/MANIFEST.MF ??????? META-INF/MANIFEST.MF ???????????? MANIFEST.MF ???????????????????? MANIFEST.MF ????????</li> 220 <p>???????????????? JAR ??? <signer>.(RSA|DSA|EC) -> <signer>.SF -> MANIFEST.MF -> ?? [all...] |
/external/vboot_reference/host/lib/ |
host_signature.c | 177 "Input to the signer will be provided on standard in.\n" 178 "Output of the signer will be read from standard out.\n", 195 /* We provide input to the child process (external signer). */ 197 VBDEBUG(("write() error while providing input to external signer\n")); 200 close(p_to_c[STDOUT_FILENO]); /* Send EOF to child (signer process). */ 208 VBDEBUG(("read() error while reading output from external signer\n")); 223 VBDEBUG(("stdin dup2() failed (external signer)\n")); 229 * signer output to the parent) */ 232 VBDEBUG(("stdout dup2() failed (external signer)\n")); 237 /* External signer is invoked here. * [all...] |
/external/kmod/testsuite/rootfs-pristine/test-modinfo/ |
correct.txt | 10 signer: Magrathea: Glacier signing key 22 signer: Magrathea: Glacier signing key
|
/system/sepolicy/prebuilts/api/26.0/private/ |
untrusted_app.te | 5 ### Apps are labeled based on mac_permissions.xml (maps signer and 14 ### a system app into a specific domain, add a signer entry for it to
|
untrusted_app_25.te | 7 ### Apps are labeled based on mac_permissions.xml (maps signer and 16 ### a system app into a specific domain, add a signer entry for it to
|
/system/sepolicy/private/ |
untrusted_app.te | 5 ### Apps are labeled based on mac_permissions.xml (maps signer and 14 ### a system app into a specific domain, add a signer entry for it to
|
untrusted_app_25.te | 7 ### Apps are labeled based on mac_permissions.xml (maps signer and 16 ### a system app into a specific domain, add a signer entry for it to
|
/external/wpa_supplicant_8/src/crypto/ |
tls_openssl_ocsp.c | 506 X509 *signer, *tmp_cert; local 616 signer = ocsp_find_signer(certs, rd->responderID); 617 if (!signer) 618 signer = ocsp_find_signer(untrusted, rd->responderID); 621 if (!signer) { 623 "OpenSSL: Could not find OCSP signer certificate"); 627 skey = X509_get_pubkey(signer); 630 "OpenSSL: Could not get OCSP signer public key"); 641 X509_NAME_oneline(X509_get_subject_name(signer), buf, sizeof(buf)); 643 "OpenSSL: Found OCSP signer certificate %s and verified BasicOCSPResponse signature" [all...] |
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/ |
CMSSignedDataGenerator.java | 129 SignerInformation signer = (SignerInformation)it.next(); local 130 digestAlgs.add(CMSSignedHelper.INSTANCE.fixAlgID(signer.getDigestAlgorithmID())); 133 signerInfos.add(signer.toASN1Structure()); 223 * @param signer the signer to be countersigned 226 public SignerInformationStore generateCounterSigners(SignerInformation signer) 229 return this.generate(new CMSProcessableByteArray(null, signer.getSignature()), false).getSignerInfos();
|
/cts/hostsidetests/appsecurity/src/android/appsecurity/cts/ |
PkgInstallSignatureVerificationTest.java | 80 // APK signed with v1 scheme only, one signer. 88 // APK signed with v1 scheme only, one signer. 96 // APK signed with v1 scheme only, one signer. 104 // APK signed with v1 scheme only, one signer. 112 // APK signed with v1 scheme only, one signer. 120 // APK signed with v1 scheme only, one signer. 128 // APK signed with v1 scheme only, one signer. 136 // APK signed with v1 scheme only, one signer. 144 // APK signed with v1 scheme only, one signer. 152 // APK signed with v1 scheme only, one signer [all...] |
/packages/apps/Nfc/src/com/android/nfc/ |
NfceeAccessControl.java | 177 * except for obvious errors within a <signer> group since they might cause 179 * by mistake. Those errors invalidate the entire <signer> group. 198 if (event == XmlPullParser.START_TAG && "signer".equals(tag)) { 208 Log.w(TAG, "signer tag is missing android:signature attribute, igorning"); 216 } else if (event == XmlPullParser.END_TAG && "signer".equals(tag)) { 218 Log.w(TAG, "mis-matched signer tag"); 236 Log.w(TAG, "package missing android:name, ignoring signer group"); 237 signature = null; // invalidate signer 242 Log.w(TAG, "duplicate package name in signer group, ignoring");
|
/device/linaro/bootloader/edk2/MdePkg/Include/Protocol/ |
Pkcs7Verify.h | 58 Function recognizes signer certificates of type
61 success if signer of the buffer is within this list
69 verification will always fail if the signer of the
96 content, the signer's certificate was not found in
97 RevokedDb, and was found in AllowedDb or if in signer
103 signer was in RevokedDb or not in AllowedDb. Also
155 Function recognizes signer certificates of type
158 success if signer of the buffer is within this list
165 verification will always fail if the signer of the
176 hash of content, the signer's certificate was not [all...] |
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/ocsp/ |
OCSPReqBuilder.java | 188 ContentSigner signer, 192 if (signer == null) 194 throw new IllegalArgumentException("no signer specified"); 197 return generateRequest(signer, chain);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/ |
DSA.java | 11 * initialise the signer for signature generation or signature
|
/external/libchrome/crypto/ |
signature_creator_unittest.cc | 30 std::unique_ptr<crypto::SignatureCreator> signer( 33 ASSERT_TRUE(signer.get()); 36 ASSERT_TRUE(signer->Update(reinterpret_cast<const uint8_t*>(data.c_str()), 40 ASSERT_TRUE(signer->Final(&signature));
|
/external/vboot_reference/tests/futility/ |
test_sign_keyblocks.sh | 15 SIGNER=${SRCDIR}/tests/external_rsa_signer.sh 82 # Try it with an external signer 90 --externalsigner ${SIGNER} 100 --pem_external ${SIGNER} \
|