/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/ |
H A D | SignerInfoGenerator.java | 33 private final ContentSigner signer; field in class:SignerInfoGenerator 43 ContentSigner signer, 48 this(signerIdentifier, signer, digesterProvider, sigEncAlgFinder, false); 53 ContentSigner signer, 60 this.signer = signer; 64 this.digester = digesterProvider.get(digAlgFinder.find(signer.getAlgorithmIdentifier())); 91 this.signer = original.signer; 100 ContentSigner signer, 41 SignerInfoGenerator( SignerIdentifier signerIdentifier, ContentSigner signer, DigestCalculatorProvider digesterProvider, CMSSignatureEncryptionAlgorithmFinder sigEncAlgFinder) argument 51 SignerInfoGenerator( SignerIdentifier signerIdentifier, ContentSigner signer, DigestCalculatorProvider digesterProvider, CMSSignatureEncryptionAlgorithmFinder sigEncAlgFinder, boolean isDirectSignature) argument 98 SignerInfoGenerator( SignerIdentifier signerIdentifier, ContentSigner signer, DigestCalculatorProvider digesterProvider, CMSSignatureEncryptionAlgorithmFinder sigEncAlgFinder, CMSAttributeTableGenerator sAttrGen, CMSAttributeTableGenerator unsAttrGen) argument [all...] |
H A D | SignerInformationStore.java | 22 SignerInformation signer = (SignerInformation)it.next(); 23 SignerId sid = signer.getSID(); 32 list.add(signer); 42 * @param selector to identify a signer 76 * @param selector a signer id to select against.
|
H A D | CMSSignedDataGenerator.java | 129 SignerInformation signer = (SignerInformation)it.next(); 130 digestAlgs.add(CMSSignedHelper.INSTANCE.fixAlgID(signer.getDigestAlgorithmID())); 133 signerInfos.add(signer.toASN1Structure()); 223 * @param signer the signer to be countersigned 226 public SignerInformationStore generateCounterSigners(SignerInformation signer) argument 229 return this.generate(new CMSProcessableByteArray(null, signer.getSignature()), false).getSignerInfos();
|
/external/chromium_org/third_party/openssl/openssl/crypto/ocsp/ |
H A D | ocsp_vfy.c | 78 X509 *signer, *x; local 82 ret = ocsp_find_signer(&signer, bs, certs, st, flags); 93 skey = X509_get_pubkey(signer); 109 init_res = X509_STORE_CTX_init(&ctx, st, signer, NULL); 111 init_res = X509_STORE_CTX_init(&ctx, st, signer, bs->certs); 169 X509 *signer; local 171 if ((signer = ocsp_find_signer_sk(certs, rid))) 173 *psigner = signer; 177 (signer = ocsp_find_signer_sk(bs->certs, rid))) 179 *psigner = signer; 219 X509 *signer, *sca; local 365 X509 *signer; local 435 X509 *signer; local [all...] |
H A D | ocsp_srv.c | 209 X509 *signer, EVP_PKEY *key, const EVP_MD *dgst, 215 if (!X509_check_private_key(signer, key)) 223 if(!OCSP_basic_add1_cert(brsp, signer)) 237 X509_pubkey_digest(signer, EVP_sha1(), md, NULL); 247 X509_get_subject_name(signer))) 208 OCSP_basic_sign(OCSP_BASICRESP *brsp, X509 *signer, EVP_PKEY *key, const EVP_MD *dgst, STACK_OF(X509) *certs, unsigned long flags) argument
|
H A D | ocsp_cl.c | 144 X509 *signer, 154 if (!OCSP_request_set1_name(req, X509_get_subject_name(signer))) 160 if (!X509_check_private_key(signer, key)) 170 if(!OCSP_request_add1_cert(req, signer)) goto err; 143 OCSP_request_sign(OCSP_REQUEST *req, X509 *signer, EVP_PKEY *key, const EVP_MD *dgst, STACK_OF(X509) *certs, unsigned long flags) argument
|
/external/openssl/crypto/ocsp/ |
H A D | ocsp_vfy.c | 78 X509 *signer, *x; local 82 ret = ocsp_find_signer(&signer, bs, certs, st, flags); 93 skey = X509_get_pubkey(signer); 109 init_res = X509_STORE_CTX_init(&ctx, st, signer, NULL); 111 init_res = X509_STORE_CTX_init(&ctx, st, signer, bs->certs); 169 X509 *signer; local 171 if ((signer = ocsp_find_signer_sk(certs, rid))) 173 *psigner = signer; 177 (signer = ocsp_find_signer_sk(bs->certs, rid))) 179 *psigner = signer; 219 X509 *signer, *sca; local 365 X509 *signer; local 435 X509 *signer; local [all...] |
H A D | ocsp_srv.c | 209 X509 *signer, EVP_PKEY *key, const EVP_MD *dgst, 215 if (!X509_check_private_key(signer, key)) 223 if(!OCSP_basic_add1_cert(brsp, signer)) 237 X509_pubkey_digest(signer, EVP_sha1(), md, NULL); 247 X509_get_subject_name(signer))) 208 OCSP_basic_sign(OCSP_BASICRESP *brsp, X509 *signer, EVP_PKEY *key, const EVP_MD *dgst, STACK_OF(X509) *certs, unsigned long flags) argument
|
H A D | ocsp_cl.c | 144 X509 *signer, 154 if (!OCSP_request_set1_name(req, X509_get_subject_name(signer))) 160 if (!X509_check_private_key(signer, key)) 170 if(!OCSP_request_add1_cert(req, signer)) goto err; 143 OCSP_request_sign(OCSP_REQUEST *req, X509 *signer, EVP_PKEY *key, const EVP_MD *dgst, STACK_OF(X509) *certs, unsigned long flags) argument
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/util/ |
H A D | DSABase.java | 18 protected DSA signer; field in class:DSABase 23 DSA signer, 27 this.signer = signer; 56 BigInteger[] sig = signer.generateSignature(hash); 85 return signer.verifySignature(hash, sig[0], sig[1]); 21 DSABase( Digest digest, DSA signer, DSAEncoder encoder) argument
|
/external/smack/src/org/xbill/DNS/ |
H A D | RRSIGRecord.java | 38 * @param signer The owner of the signing key 43 Date expire, Date timeSigned, int footprint, Name signer, 47 timeSigned, footprint, signer, signature); 42 RRSIGRecord(Name name, int dclass, long ttl, int covered, int alg, long origttl, Date expire, Date timeSigned, int footprint, Name signer, byte [] signature) argument
|
H A D | SIGRecord.java | 38 * @param signer The owner of the signing key 43 Date expire, Date timeSigned, int footprint, Name signer, 47 timeSigned, footprint, signer, signature); 42 SIGRecord(Name name, int dclass, long ttl, int covered, int alg, long origttl, Date expire, Date timeSigned, int footprint, Name signer, byte [] signature) argument
|
H A D | SIGBase.java | 24 protected Name signer; field in class:SIGBase 32 long origttl, Date expire, Date timeSigned, int footprint, Name signer, 47 this.signer = checkName("signer", signer); 60 signer = new Name(in); 79 signer = st.getName(origin); 103 sb.append (signer); 166 return signer; 189 signer 31 SIGBase(Name name, int type, int dclass, long ttl, int covered, int alg, long origttl, Date expire, Date timeSigned, int footprint, Name signer, byte [] signature) argument [all...] |
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/ |
H A D | CertUtils.java | 38 static X509CertificateHolder generateFullCert(ContentSigner signer, TBSCertificate tbsCert) argument 42 return new X509CertificateHolder(generateStructure(tbsCert, signer.getAlgorithmIdentifier(), generateSig(signer, tbsCert))); 50 static X509AttributeCertificateHolder generateFullAttrCert(ContentSigner signer, AttributeCertificateInfo attrInfo) argument 54 return new X509AttributeCertificateHolder(generateAttrStructure(attrInfo, signer.getAlgorithmIdentifier(), generateSig(signer, attrInfo))); 62 static X509CRLHolder generateFullCRL(ContentSigner signer, TBSCertList tbsCertList) argument 66 return new X509CRLHolder(generateCRLStructure(tbsCertList, signer.getAlgorithmIdentifier(), generateSig(signer, tbsCertList))); 74 private static byte[] generateSig(ContentSigner signer, ASN1Encodabl argument [all...] |
/external/chromium_org/crypto/ |
H A D | ec_signature_creator_unittest.cc | 36 scoped_ptr<crypto::ECSignatureCreator> signer( 38 ASSERT_TRUE(signer.get()); 42 ASSERT_TRUE(signer->Sign(reinterpret_cast<const uint8*>(data.c_str()),
|
H A D | signature_creator_unittest.cc | 36 scoped_ptr<crypto::SignatureCreator> signer( 38 ASSERT_TRUE(signer.get()); 41 ASSERT_TRUE(signer->Update(reinterpret_cast<const uint8*>(data.c_str()), 45 ASSERT_TRUE(signer->Final(&signature));
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/dsa/ |
H A D | DSASigner.java | 46 private DSA signer; field in class:DSASigner 51 DSA signer) 54 this.signer = signer; 81 throw new InvalidKeyException("can't recognise key type in DSA based signer"); 86 throw new InvalidKeyException("can't recognise key type in DSA based signer"); 91 signer.init(false, param); 117 signer.init(true, param); 145 BigInteger[] sig = signer.generateSignature(hash); 174 return signer 49 DSASigner( Digest digest, DSA signer) argument [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/pkcs7/ |
H A D | pk7_smime.c | 270 X509 *signer; local 321 signer = sk_X509_value (signers, k); 323 if(!X509_STORE_CTX_init(&cert_ctx, store, signer, 331 } else if(!X509_STORE_CTX_init (&cert_ctx, store, signer, NULL)) { 407 signer = sk_X509_value (signers, i); 408 j=PKCS7_signatureVerify(p7bio,p7,si, signer); 436 X509 *signer; local 467 signer = NULL; 469 if (certs) signer = X509_find_by_issuer_and_serial (certs, 471 if (!signer [all...] |
/external/openssl/crypto/pkcs7/ |
H A D | pk7_smime.c | 270 X509 *signer; local 321 signer = sk_X509_value (signers, k); 323 if(!X509_STORE_CTX_init(&cert_ctx, store, signer, 331 } else if(!X509_STORE_CTX_init (&cert_ctx, store, signer, NULL)) { 407 signer = sk_X509_value (signers, i); 408 j=PKCS7_signatureVerify(p7bio,p7,si, signer); 436 X509 *signer; local 467 signer = NULL; 469 if (certs) signer = X509_find_by_issuer_and_serial (certs, 471 if (!signer [all...] |
/external/openssl/crypto/cms/ |
H A D | cms_sd.c | 301 X509 *signer, EVP_PKEY *pk, const EVP_MD *md, 308 if(!X509_check_private_key(signer, pk)) 320 X509_check_purpose(signer, -1, -1); 323 CRYPTO_add(&signer->references, 1, CRYPTO_LOCK_X509); 326 si->signer = signer; 341 if (!cms_set1_SignerIdentifier(si->sid, signer, type)) 441 if (!CMS_add1_cert(cms, signer)) 511 if (si->signer) 519 if (!sk_X509_push(signers, si->signer)) 300 CMS_add1_signer(CMS_ContentInfo *cms, X509 *signer, EVP_PKEY *pk, const EVP_MD *md, unsigned int flags) argument 529 CMS_SignerInfo_set1_signer_cert(CMS_SignerInfo *si, X509 *signer) argument 606 CMS_SignerInfo_get0_algs(CMS_SignerInfo *si, EVP_PKEY **pk, X509 **signer, X509_ALGOR **pdig, X509_ALGOR **psig) argument [all...] |
H A D | cms_smime.c | 286 X509 *signer; local 288 CMS_SignerInfo_get0_algs(si, NULL, &signer, NULL, NULL); 289 if (!X509_STORE_CTX_init(&ctx, store, signer, certs)) 323 X509 *signer; local 330 /* Attempt to find all signer certificates */ 343 CMS_SignerInfo_get0_algs(si, NULL, &signer, NULL, NULL); 344 if (signer)
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/ec/ |
H A D | SignatureSpi.java | 43 SignatureSpi(Digest digest, DSA signer, DSAEncoder encoder) argument 45 super(digest, signer, encoder); 54 signer.init(false, param); 67 signer.init(true, new ParametersWithRandom(param, appRandom)); 71 signer.init(true, param);
|
/external/oauth/core/src/main/java/net/oauth/signature/ |
H A D | RSA_SHA1.java | 221 Signature signer = Signature.getInstance("SHA1withRSA"); 222 signer.initSign(privateKey); 223 signer.update(message); 224 return signer.sign();
|
/external/chromium_org/third_party/openssl/openssl/apps/ |
H A D | smime.c | 101 X509 *cert = NULL, *recip = NULL, *signer = NULL; local 254 else if (!strcmp (*args, "-signer")) 258 /* If previous -signer argument add signer to list */ 296 /* If previous -inkey arument add signer to list */ 301 BIO_puts(bio_err, "Illegal -inkey without -signer\n"); 383 /* Check to see if any final signer needs to be appended */ 386 BIO_puts(bio_err, "Illegal -inkey without -signer\n"); 402 BIO_printf(bio_err, "No signer certificate specified\n"); 459 BIO_printf (bio_err, "-nointern don't search certificates in message for signer\ [all...] |
/external/openssl/apps/ |
H A D | smime.c | 101 X509 *cert = NULL, *recip = NULL, *signer = NULL; local 254 else if (!strcmp (*args, "-signer")) 258 /* If previous -signer argument add signer to list */ 296 /* If previous -inkey arument add signer to list */ 301 BIO_puts(bio_err, "Illegal -inkey without -signer\n"); 383 /* Check to see if any final signer needs to be appended */ 386 BIO_puts(bio_err, "Illegal -inkey without -signer\n"); 402 BIO_printf(bio_err, "No signer certificate specified\n"); 459 BIO_printf (bio_err, "-nointern don't search certificates in message for signer\ [all...] |