Searched refs:signature (Results 26 - 50 of 55) sorted by relevance

123

/frameworks/native/opengl/tools/glgen/src/
H A DJniCodeEmitter.java75 String signature;
84 signature = jfunc.toString();
86 if (mFunctionsEmitted.contains(signature)) {
89 mFunctionsEmitted.add(signature);
110 signature = jfunc.toString();
112 if (mFunctionsEmitted.contains(signature)) {
115 mFunctionsEmitted.add(signature);
742 // Emit JNI signature (name)
776 String signature = "";
780 signature
[all...]
/frameworks/av/media/libmediaplayerservice/
H A DDrm.cpp621 Vector<uint8_t> &signature) {
632 return mPlugin->sign(sessionId, keyId, message, signature);
638 Vector<uint8_t> const &signature,
650 return mPlugin->verify(sessionId, keyId, message, signature, match);
657 Vector<uint8_t> &signature) {
672 return mPlugin->signRSA(sessionId, algorithm, message, wrappedKey, signature);
618 sign(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &message, Vector<uint8_t> &signature) argument
635 verify(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &message, Vector<uint8_t> const &signature, bool &match) argument
653 signRSA(Vector<uint8_t> const &sessionId, String8 const &algorithm, Vector<uint8_t> const &message, Vector<uint8_t> const &wrappedKey, Vector<uint8_t> &signature) argument
/frameworks/opt/telephony/src/java/com/android/internal/telephony/uicc/
H A DUiccCarrierPrivilegeRules.java236 * @param signature The signature of the certificate.
240 public int getCarrierPrivilegeStatus(Signature signature, String packageName) { argument
241 Rlog.d(LOG_TAG, "hasCarrierPrivileges: " + signature + " : " + packageName);
252 byte[] certHash = getCertHash(signature, "SHA-1");
253 byte[] certHash256 = getCertHash(signature, "SHA-256");
531 private static byte[] getCertHash(Signature signature, String algo) { argument
534 return md.digest(signature.toByteArray());
/frameworks/base/media/java/android/media/
H A DMediaDrm.java568 * secure stop message to the server which verifies the signature and notifies the
668 byte[] keyId, byte[] message, byte[] signature);
732 * @param message the data for which a signature is to be computed
739 * Verify a signature using the CryptoSessions's mac algorithm. Return true
744 * @param signature the reference signature which will be compared with the
745 * computed signature
747 public boolean verify(byte[] keyid, byte[] message, byte[] signature) { argument
748 return verifyNative(mDrm, mSessionId, keyid, message, signature);
882 * @param message the data for which a signature i
667 verifyNative(MediaDrm drm, byte[] sessionId, byte[] keyId, byte[] message, byte[] signature) argument
[all...]
/frameworks/base/services/core/java/com/android/server/pm/
H A DSELinuxMMAC.java162 String cert = parser.getAttributeValue(null, "signature");
164 Slog.w(TAG, "<signer> without signature at "
169 Signature signature;
171 signature = new Signature(cert);
173 Slog.w(TAG, "<signer> with bad signature at "
180 sigSeinfo.put(signature, policy);
/frameworks/base/tests/Camera2Tests/SmartCamera/SimpleCamera/src/androidx/media/filterfw/
H A DFilterGraph.java520 Signature signature = filter.getSignature();
521 signature.checkInputPortsConform(filter);
522 signature.checkOutputPortsConform(filter);
/frameworks/compile/libbcc/lib/Renderscript/
H A DRSInfoExtractor.cpp50 // Name of metadata node where exported ForEach signature information resides
137 // section for ForEach. We generate a full signature for a "root" function.
234 // signature of foreach-able function) and #rs_export_foreach_name (the name
238 // function and only one signature corresponded to that non-graphic root()
246 // #rs_export_foreach metadata (the signature) is one-to-one mapping among
276 uint32_t signature; local
277 if (signature_string.getAsInteger(10, signature)) {
278 ALOGE("Non-integer signature value '%s' for function %s found in %s!",
284 signature));
286 // One or both of the name and signature valu
[all...]
H A DRSInfoWriter.cpp104 pResult.signature = pItem->second;
H A DRSForEachExpand.cpp65 * signature for expanded kernels. These must be re-calculated for each
91 // For pre-ICS bitcode, we may not have signature information. In that
113 ALOGE("Non-integer signature value '%s'", SigString.str().c_str());
245 /// This creates a function with the following signature:
352 // function signature.
852 uint32_t signature = mExportForEachSignatureList[i]; local
855 if (bcinfo::MetadataExtractor::hasForEachSignatureKernel(signature)) {
856 Changed |= ExpandKernel(kernel, signature);
859 Changed |= ExpandFunction(kernel, signature);
/frameworks/opt/net/wifi/service/jni/
H A Djni_helper.h18 void reportEvent(JNIEnv *env, jclass cls, const char *method, const char *signature, ...);
H A Djni_helper.cpp383 void reportEvent(JNIEnv *env, jclass cls, const char *method, const char *signature, ...) argument
386 va_start(params, signature);
388 jmethodID methodID = env->GetStaticMethodID(cls, method, signature);
/frameworks/base/core/java/android/content/pm/
H A DSignature.java39 * This class name is slightly misleading, since it's not actually a signature.
51 public Signature(byte[] signature) { argument
52 mSignature = signature.clone();
57 * Create signature from a certificate chain. Used for backward
87 * @param text hex-encoded string representing the signature
88 * @throws IllegalArgumentException when signature is odd-length
158 * @return the contents of this signature as a byte array.
167 * Returns the public key for this signature.
/frameworks/base/services/core/java/com/android/server/updates/
H A DConfigUpdateInstallReceiver.java83 // get the signature from the extras
159 throw new IllegalStateException("Missing required signature, ignoring.");
220 String signature, X509Certificate cert) throws Exception {
226 return signer.verify(Base64.decode(signature.getBytes(), Base64.DEFAULT));
219 verifySignature(byte[] content, int version, String requiredPrevious, String signature, X509Certificate cert) argument
/frameworks/base/services/tests/servicestests/src/com/android/server/updates/
H A DCertPinInstallReceiverTest.java174 String signature, X509Certificate cert) throws Exception {
180 return signer.verify(Base64.decode(signature.getBytes(), Base64.DEFAULT));
173 verifySignature(String content, String version, String requiredPrevious, String signature, X509Certificate cert) argument
/frameworks/base/tools/layoutlib/create/src/com/android/tools/layoutlib/create/
H A DReplaceMethodCallsAdapter.java176 public MethodVisitor visitMethod(int access, String name, String desc, String signature, argument
178 return new MyMethodVisitor(super.visitMethod(access, name, desc, signature, exceptions));
H A DDelegateMethodAdapter.java419 public void visitLocalVariable(String name, String desc, String signature, argument
422 mOrgWriter.visitLocalVariable(name, desc, signature, start, end, index);
H A DStubMethodAdapter.java67 * OverrideMethod.invoke("signature", mIsNative ? true : false, null or this);
334 public void visitLocalVariable(String name, String desc, String signature, argument
337 mParentVisitor.visitLocalVariable(name, desc, signature, start, end, index);
/frameworks/compile/libbcc/include/bcc/Renderscript/
H A DRSInfo.h117 uint32_t signature; member in struct:bcc::rsinfo::ExportForeachFuncItem
/frameworks/base/keystore/java/android/security/
H A DKeyStore.java257 public boolean verify(String key, byte[] data, byte[] signature) { argument
259 return mBinder.verify(key, data, signature) == NO_ERROR;
/frameworks/base/keystore/tests/src/android/security/
H A DKeyStoreTest.java437 final byte[] signature = mKeyStore.sign(TEST_KEYNAME, TEST_DATA);
439 assertNotNull("Signature should not be null", signature);
448 final byte[] signature = mKeyStore.sign(TEST_KEYNAME, TEST_DATA);
450 assertNotNull("Signature should not be null", signature);
453 mKeyStore.verify(TEST_KEYNAME, TEST_DATA, signature));
/frameworks/base/tools/layoutlib/bridge/src/com/android/layoutlib/bridge/
H A DBridge.java215 // on static (native) methods which prints the signature on the console and
228 public void onInvokeV(String signature, boolean isNative, Object caller) {
229 sDefaultLog.error(null, "Missing Stub: " + signature +
237 throw new StaticMethodNotImplementedException(signature);
/frameworks/base/media/jni/
H A Dandroid_media_MediaDrm.cpp1304 Vector<uint8_t> signature; local
1306 status_t err = drm->sign(sessionId, keyId, message, signature);
1312 return VectorToJByteArray(env, signature);
1334 Vector<uint8_t> signature(JByteArrayToVector(env, jsignature));
1337 status_t err = drm->verify(sessionId, keyId, message, signature, match);
1364 Vector<uint8_t> signature; local
1366 status_t err = drm->signRSA(sessionId, algorithm, message, wrappedKey, signature);
1372 return VectorToJByteArray(env, signature);
/frameworks/av/media/ndk/
H A DNdkMediaDrm.cpp652 uint8_t *signature, size_t *signatureSize) {
683 memcpy(signature, signatureVec.array(), signatureVec.size());
691 const uint8_t *signature, size_t signatureSize) {
717 signatureVec.appendArray(signature, signatureSize);
650 AMediaDrm_sign(AMediaDrm *mObj, const AMediaDrmSessionId *sessionId, const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize, uint8_t *signature, size_t *signatureSize) argument
689 AMediaDrm_verify(AMediaDrm *mObj, const AMediaDrmSessionId *sessionId, const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize, const uint8_t *signature, size_t signatureSize) argument
/frameworks/base/media/mca/filterfw/jni/
H A Djni_util.cpp127 jobject CreateJObject(JNIEnv* env, const std::string& class_name, const std::string& signature, T value) { argument
/frameworks/base/services/tests/servicestests/src/com/android/server/
H A DNetworkPolicyManagerServiceTest.java163 final Signature signature;
165 signature = new Signature("F00D");
167 signature = new Signature("DEAD");
169 info.signatures = new Signature[] { signature };

Completed in 787 milliseconds

123