/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/ |
H A D | CMSSignedDataGenerator.java | 129 SignerInformation signer = (SignerInformation)it.next(); 130 digestAlgs.add(CMSSignedHelper.INSTANCE.fixAlgID(signer.getDigestAlgorithmID())); 133 signerInfos.add(signer.toASN1Structure()); 223 * @param signer the signer to be countersigned 226 public SignerInformationStore generateCounterSigners(SignerInformation signer) argument 229 return this.generate(new CMSProcessableByteArray(null, signer.getSignature()), false).getSignerInfos();
|
H A D | SignerInfoGenerator.java | 33 private final ContentSigner signer; field in class:SignerInfoGenerator 43 ContentSigner signer, 48 this(signerIdentifier, signer, digesterProvider, sigEncAlgFinder, false); 53 ContentSigner signer, 60 this.signer = signer; 64 this.digester = digesterProvider.get(digAlgFinder.find(signer.getAlgorithmIdentifier())); 91 this.signer = original.signer; 100 ContentSigner signer, 41 SignerInfoGenerator( SignerIdentifier signerIdentifier, ContentSigner signer, DigestCalculatorProvider digesterProvider, CMSSignatureEncryptionAlgorithmFinder sigEncAlgFinder) argument 51 SignerInfoGenerator( SignerIdentifier signerIdentifier, ContentSigner signer, DigestCalculatorProvider digesterProvider, CMSSignatureEncryptionAlgorithmFinder sigEncAlgFinder, boolean isDirectSignature) argument 98 SignerInfoGenerator( SignerIdentifier signerIdentifier, ContentSigner signer, DigestCalculatorProvider digesterProvider, CMSSignatureEncryptionAlgorithmFinder sigEncAlgFinder, CMSAttributeTableGenerator sAttrGen, CMSAttributeTableGenerator unsAttrGen) argument [all...] |
/external/smack/src/org/xbill/DNS/ |
H A D | RRSIGRecord.java | 38 * @param signer The owner of the signing key 43 Date expire, Date timeSigned, int footprint, Name signer, 47 timeSigned, footprint, signer, signature); 42 RRSIGRecord(Name name, int dclass, long ttl, int covered, int alg, long origttl, Date expire, Date timeSigned, int footprint, Name signer, byte [] signature) argument
|
H A D | SIGRecord.java | 38 * @param signer The owner of the signing key 43 Date expire, Date timeSigned, int footprint, Name signer, 47 timeSigned, footprint, signer, signature); 42 SIGRecord(Name name, int dclass, long ttl, int covered, int alg, long origttl, Date expire, Date timeSigned, int footprint, Name signer, byte [] signature) argument
|
H A D | SIGBase.java | 24 protected Name signer; field in class:SIGBase 32 long origttl, Date expire, Date timeSigned, int footprint, Name signer, 47 this.signer = checkName("signer", signer); 60 signer = new Name(in); 79 signer = st.getName(origin); 103 sb.append (signer); 166 return signer; 189 signer 31 SIGBase(Name name, int type, int dclass, long ttl, int covered, int alg, long origttl, Date expire, Date timeSigned, int footprint, Name signer, byte [] signature) argument [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/util/ |
H A D | DSABase.java | 18 protected DSA signer; field in class:DSABase 23 DSA signer, 27 this.signer = signer; 56 BigInteger[] sig = signer.generateSignature(hash); 85 return signer.verifySignature(hash, sig[0], sig[1]); 21 DSABase( Digest digest, DSA signer, DSAEncoder encoder) argument
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/ |
H A D | CertUtils.java | 38 static X509CertificateHolder generateFullCert(ContentSigner signer, TBSCertificate tbsCert) argument 42 return new X509CertificateHolder(generateStructure(tbsCert, signer.getAlgorithmIdentifier(), generateSig(signer, tbsCert))); 50 static X509AttributeCertificateHolder generateFullAttrCert(ContentSigner signer, AttributeCertificateInfo attrInfo) argument 54 return new X509AttributeCertificateHolder(generateAttrStructure(attrInfo, signer.getAlgorithmIdentifier(), generateSig(signer, attrInfo))); 62 static X509CRLHolder generateFullCRL(ContentSigner signer, TBSCertList tbsCertList) argument 66 return new X509CRLHolder(generateCRLStructure(tbsCertList, signer.getAlgorithmIdentifier(), generateSig(signer, tbsCertList))); 74 private static byte[] generateSig(ContentSigner signer, ASN1Encodabl argument [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/dsa/ |
H A D | DSASigner.java | 46 private DSA signer; field in class:DSASigner 51 DSA signer) 54 this.signer = signer; 81 throw new InvalidKeyException("can't recognise key type in DSA based signer"); 86 throw new InvalidKeyException("can't recognise key type in DSA based signer"); 91 signer.init(false, param); 117 signer.init(true, param); 145 BigInteger[] sig = signer.generateSignature(hash); 174 return signer 49 DSASigner( Digest digest, DSA signer) argument [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/ec/ |
H A D | SignatureSpi.java | 43 SignatureSpi(Digest digest, DSA signer, DSAEncoder encoder) argument 45 super(digest, signer, encoder); 54 signer.init(false, param); 67 signer.init(true, new ParametersWithRandom(param, appRandom)); 71 signer.init(true, param);
|
/external/openssl/crypto/ocsp/ |
H A D | ocsp_srv.c | 209 X509 *signer, EVP_PKEY *key, const EVP_MD *dgst, 215 if (!X509_check_private_key(signer, key)) 223 if(!OCSP_basic_add1_cert(brsp, signer)) 237 X509_pubkey_digest(signer, EVP_sha1(), md, NULL); 247 X509_get_subject_name(signer))) 208 OCSP_basic_sign(OCSP_BASICRESP *brsp, X509 *signer, EVP_PKEY *key, const EVP_MD *dgst, STACK_OF(X509) *certs, unsigned long flags) argument
|
H A D | ocsp_vfy.c | 78 X509 *signer, *x; local 82 ret = ocsp_find_signer(&signer, bs, certs, st, flags); 93 skey = X509_get_pubkey(signer); 109 init_res = X509_STORE_CTX_init(&ctx, st, signer, NULL); 111 init_res = X509_STORE_CTX_init(&ctx, st, signer, bs->certs); 169 X509 *signer; local 171 if ((signer = ocsp_find_signer_sk(certs, rid))) 173 *psigner = signer; 177 (signer = ocsp_find_signer_sk(bs->certs, rid))) 179 *psigner = signer; 219 X509 *signer, *sca; local 365 X509 *signer; local 435 X509 *signer; local [all...] |
H A D | ocsp_cl.c | 144 X509 *signer, 154 if (!OCSP_request_set1_name(req, X509_get_subject_name(signer))) 160 if (!X509_check_private_key(signer, key)) 170 if(!OCSP_request_add1_cert(req, signer)) goto err; 143 OCSP_request_sign(OCSP_REQUEST *req, X509 *signer, EVP_PKEY *key, const EVP_MD *dgst, STACK_OF(X509) *certs, unsigned long flags) argument
|
/external/openssl/crypto/pkcs7/ |
H A D | pk7_smime.c | 270 X509 *signer; local 321 signer = sk_X509_value (signers, k); 323 if(!X509_STORE_CTX_init(&cert_ctx, store, signer, 331 } else if(!X509_STORE_CTX_init (&cert_ctx, store, signer, NULL)) { 407 signer = sk_X509_value (signers, i); 408 j=PKCS7_signatureVerify(p7bio,p7,si, signer); 436 X509 *signer; local 467 signer = NULL; 469 if (certs) signer = X509_find_by_issuer_and_serial (certs, 471 if (!signer [all...] |
/external/chromium_org/chrome/browser/resources/cryptotoken/ |
H A D | multiplesigner.js | 6 * @fileoverview A multiple gnubby signer wraps the process of opening a number 26 * @param {boolean} forEnroll Whether this signer is signing for an attempted 28 * @param {function(boolean)} allCompleteCb Called when this signer completes 34 * whether this signer expects to produce more results. The boolean is a 35 * hint rather than a promise: it's possible for this signer to produce 39 * signer will not attempt any new operations, assuming the caller is no 76 * signer: SingleGnubbySigner, 84 * Closes this signer's gnubbies, if any are open. 88 this.gnubbies_[k].signer.close(); 128 * Signals this signer t [all...] |
/external/openssl/apps/ |
H A D | smime.c | 101 X509 *cert = NULL, *recip = NULL, *signer = NULL; local 254 else if (!strcmp (*args, "-signer")) 258 /* If previous -signer argument add signer to list */ 296 /* If previous -inkey arument add signer to list */ 301 BIO_puts(bio_err, "Illegal -inkey without -signer\n"); 383 /* Check to see if any final signer needs to be appended */ 386 BIO_puts(bio_err, "Illegal -inkey without -signer\n"); 402 BIO_printf(bio_err, "No signer certificate specified\n"); 459 BIO_printf (bio_err, "-nointern don't search certificates in message for signer\ [all...] |
H A D | cms.c | 117 X509 *cert = NULL, *recip = NULL, *signer = NULL; local 391 else if (!strcmp (*args, "-signer")) 395 /* If previous -signer argument add signer to list */ 439 /* If previous -inkey arument add signer to list */ 444 BIO_puts(bio_err, "Illegal -inkey without -signer\n"); 545 BIO_puts(bio_err, "Illegal -inkey without -signer\n"); 548 /* Check to see if any final signer needs to be appended */ 562 BIO_printf(bio_err, "No signer certificate specified\n"); 620 BIO_printf (bio_err, "-nointern don't search certificates in message for signer\ [all...] |
H A D | ocsp.c | 142 X509 *signer = NULL, *rsigner = NULL; local 311 else if (!strcmp(*args, "-signer")) 590 BIO_printf (bio_err, "-signer file certificate to sign OCSP request with\n"); 612 BIO_printf (bio_err, "-verify_other file additional certificates to search for signer\n"); 614 BIO_printf (bio_err, "-no_intern don't search certificates contained in response for signer\n"); 720 signer = load_cert(bio_err, signfile, FORMAT_PEM, 721 NULL, e, "signer certificate"); 722 if (!signer) 724 BIO_printf(bio_err, "Error loading signer certificate\n"); 730 NULL, e, "signer certificate [all...] |
/external/openssl/crypto/cms/ |
H A D | cms_sd.c | 301 X509 *signer, EVP_PKEY *pk, const EVP_MD *md, 308 if(!X509_check_private_key(signer, pk)) 320 X509_check_purpose(signer, -1, -1); 323 CRYPTO_add(&signer->references, 1, CRYPTO_LOCK_X509); 326 si->signer = signer; 341 if (!cms_set1_SignerIdentifier(si->sid, signer, type)) 441 if (!CMS_add1_cert(cms, signer)) 511 if (si->signer) 519 if (!sk_X509_push(signers, si->signer)) 300 CMS_add1_signer(CMS_ContentInfo *cms, X509 *signer, EVP_PKEY *pk, const EVP_MD *md, unsigned int flags) argument 529 CMS_SignerInfo_set1_signer_cert(CMS_SignerInfo *si, X509 *signer) argument 606 CMS_SignerInfo_get0_algs(CMS_SignerInfo *si, EVP_PKEY **pk, X509 **signer, X509_ALGOR **pdig, X509_ALGOR **psig) argument [all...] |
H A D | cms_smime.c | 286 X509 *signer; local 288 CMS_SignerInfo_get0_algs(si, NULL, &signer, NULL, NULL); 289 if (!X509_STORE_CTX_init(&ctx, store, signer, certs)) 323 X509 *signer; local 330 /* Attempt to find all signer certificates */ 343 CMS_SignerInfo_get0_algs(si, NULL, &signer, NULL, NULL); 344 if (signer)
|
H A D | cms_lcl.h | 141 X509 *signer; member in struct:CMS_SignerInfo_st
|
/external/chromium_org/chrome/browser/ |
H A D | enumerate_modules_model_win.cc | 741 // Determine the size of the signer info data. 751 // Allocate enough space to hold the signer info. 756 // Obtain the signer info. 765 // Search for the signer certificate. 1034 std::string filename, location, description, signer; 1038 GenerateHash(base::WideToUTF8(module.digital_signer), &signer); local 1043 base::ASCIIToUTF16(description), base::ASCIIToUTF16(signer));
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
H A D | org.eclipse.osgi_3.6.1.R36x_v20100806.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
H A D | org.eclipse.osgi_3.6.2.R36x_v20101103.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
/external/google-tv-pairing-protocol/java/jar/ |
H A D | bcprov-jdk15-143.jar | META-INF/MANIFEST.MF META-INF/BCKEY.SF META-INF/BCKEY.DSA META ... |