/frameworks/native/opengl/tools/glgen/src/ |
H A D | JniCodeEmitter.java | 75 String signature; 84 signature = jfunc.toString(); 86 if (mFunctionsEmitted.contains(signature)) { 89 mFunctionsEmitted.add(signature); 110 signature = jfunc.toString(); 112 if (mFunctionsEmitted.contains(signature)) { 115 mFunctionsEmitted.add(signature); 742 // Emit JNI signature (name) 776 String signature = ""; 780 signature [all...] |
/frameworks/av/media/libmediaplayerservice/ |
H A D | Drm.cpp | 621 Vector<uint8_t> &signature) { 632 return mPlugin->sign(sessionId, keyId, message, signature); 638 Vector<uint8_t> const &signature, 650 return mPlugin->verify(sessionId, keyId, message, signature, match); 657 Vector<uint8_t> &signature) { 672 return mPlugin->signRSA(sessionId, algorithm, message, wrappedKey, signature); 618 sign(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &message, Vector<uint8_t> &signature) argument 635 verify(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &message, Vector<uint8_t> const &signature, bool &match) argument 653 signRSA(Vector<uint8_t> const &sessionId, String8 const &algorithm, Vector<uint8_t> const &message, Vector<uint8_t> const &wrappedKey, Vector<uint8_t> &signature) argument
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/uicc/ |
H A D | UiccCarrierPrivilegeRules.java | 236 * @param signature The signature of the certificate. 240 public int getCarrierPrivilegeStatus(Signature signature, String packageName) { argument 241 Rlog.d(LOG_TAG, "hasCarrierPrivileges: " + signature + " : " + packageName); 252 byte[] certHash = getCertHash(signature, "SHA-1"); 253 byte[] certHash256 = getCertHash(signature, "SHA-256"); 531 private static byte[] getCertHash(Signature signature, String algo) { argument 534 return md.digest(signature.toByteArray());
|
/frameworks/base/media/java/android/media/ |
H A D | MediaDrm.java | 568 * secure stop message to the server which verifies the signature and notifies the 668 byte[] keyId, byte[] message, byte[] signature); 732 * @param message the data for which a signature is to be computed 739 * Verify a signature using the CryptoSessions's mac algorithm. Return true 744 * @param signature the reference signature which will be compared with the 745 * computed signature 747 public boolean verify(byte[] keyid, byte[] message, byte[] signature) { argument 748 return verifyNative(mDrm, mSessionId, keyid, message, signature); 882 * @param message the data for which a signature i 667 verifyNative(MediaDrm drm, byte[] sessionId, byte[] keyId, byte[] message, byte[] signature) argument [all...] |
/frameworks/base/services/core/java/com/android/server/pm/ |
H A D | SELinuxMMAC.java | 162 String cert = parser.getAttributeValue(null, "signature"); 164 Slog.w(TAG, "<signer> without signature at " 169 Signature signature; 171 signature = new Signature(cert); 173 Slog.w(TAG, "<signer> with bad signature at " 180 sigSeinfo.put(signature, policy);
|
/frameworks/base/tests/Camera2Tests/SmartCamera/SimpleCamera/src/androidx/media/filterfw/ |
H A D | FilterGraph.java | 520 Signature signature = filter.getSignature(); 521 signature.checkInputPortsConform(filter); 522 signature.checkOutputPortsConform(filter);
|
/frameworks/compile/libbcc/lib/Renderscript/ |
H A D | RSInfoExtractor.cpp | 50 // Name of metadata node where exported ForEach signature information resides 137 // section for ForEach. We generate a full signature for a "root" function. 234 // signature of foreach-able function) and #rs_export_foreach_name (the name 238 // function and only one signature corresponded to that non-graphic root() 246 // #rs_export_foreach metadata (the signature) is one-to-one mapping among 276 uint32_t signature; local 277 if (signature_string.getAsInteger(10, signature)) { 278 ALOGE("Non-integer signature value '%s' for function %s found in %s!", 284 signature)); 286 // One or both of the name and signature valu [all...] |
H A D | RSInfoWriter.cpp | 104 pResult.signature = pItem->second;
|
H A D | RSForEachExpand.cpp | 65 * signature for expanded kernels. These must be re-calculated for each 91 // For pre-ICS bitcode, we may not have signature information. In that 113 ALOGE("Non-integer signature value '%s'", SigString.str().c_str()); 245 /// This creates a function with the following signature: 352 // function signature. 852 uint32_t signature = mExportForEachSignatureList[i]; local 855 if (bcinfo::MetadataExtractor::hasForEachSignatureKernel(signature)) { 856 Changed |= ExpandKernel(kernel, signature); 859 Changed |= ExpandFunction(kernel, signature);
|
/frameworks/opt/net/wifi/service/jni/ |
H A D | jni_helper.h | 18 void reportEvent(JNIEnv *env, jclass cls, const char *method, const char *signature, ...);
|
H A D | jni_helper.cpp | 383 void reportEvent(JNIEnv *env, jclass cls, const char *method, const char *signature, ...) argument 386 va_start(params, signature); 388 jmethodID methodID = env->GetStaticMethodID(cls, method, signature);
|
/frameworks/base/core/java/android/content/pm/ |
H A D | Signature.java | 39 * This class name is slightly misleading, since it's not actually a signature. 51 public Signature(byte[] signature) { argument 52 mSignature = signature.clone(); 57 * Create signature from a certificate chain. Used for backward 87 * @param text hex-encoded string representing the signature 88 * @throws IllegalArgumentException when signature is odd-length 158 * @return the contents of this signature as a byte array. 167 * Returns the public key for this signature.
|
/frameworks/base/services/core/java/com/android/server/updates/ |
H A D | ConfigUpdateInstallReceiver.java | 83 // get the signature from the extras 159 throw new IllegalStateException("Missing required signature, ignoring."); 220 String signature, X509Certificate cert) throws Exception { 226 return signer.verify(Base64.decode(signature.getBytes(), Base64.DEFAULT)); 219 verifySignature(byte[] content, int version, String requiredPrevious, String signature, X509Certificate cert) argument
|
/frameworks/base/services/tests/servicestests/src/com/android/server/updates/ |
H A D | CertPinInstallReceiverTest.java | 174 String signature, X509Certificate cert) throws Exception { 180 return signer.verify(Base64.decode(signature.getBytes(), Base64.DEFAULT)); 173 verifySignature(String content, String version, String requiredPrevious, String signature, X509Certificate cert) argument
|
/frameworks/base/tools/layoutlib/create/src/com/android/tools/layoutlib/create/ |
H A D | ReplaceMethodCallsAdapter.java | 176 public MethodVisitor visitMethod(int access, String name, String desc, String signature, argument 178 return new MyMethodVisitor(super.visitMethod(access, name, desc, signature, exceptions));
|
H A D | DelegateMethodAdapter.java | 419 public void visitLocalVariable(String name, String desc, String signature, argument 422 mOrgWriter.visitLocalVariable(name, desc, signature, start, end, index);
|
H A D | StubMethodAdapter.java | 67 * OverrideMethod.invoke("signature", mIsNative ? true : false, null or this); 334 public void visitLocalVariable(String name, String desc, String signature, argument 337 mParentVisitor.visitLocalVariable(name, desc, signature, start, end, index);
|
/frameworks/compile/libbcc/include/bcc/Renderscript/ |
H A D | RSInfo.h | 117 uint32_t signature; member in struct:bcc::rsinfo::ExportForeachFuncItem
|
/frameworks/base/keystore/java/android/security/ |
H A D | KeyStore.java | 257 public boolean verify(String key, byte[] data, byte[] signature) { argument 259 return mBinder.verify(key, data, signature) == NO_ERROR;
|
/frameworks/base/keystore/tests/src/android/security/ |
H A D | KeyStoreTest.java | 437 final byte[] signature = mKeyStore.sign(TEST_KEYNAME, TEST_DATA); 439 assertNotNull("Signature should not be null", signature); 448 final byte[] signature = mKeyStore.sign(TEST_KEYNAME, TEST_DATA); 450 assertNotNull("Signature should not be null", signature); 453 mKeyStore.verify(TEST_KEYNAME, TEST_DATA, signature));
|
/frameworks/base/tools/layoutlib/bridge/src/com/android/layoutlib/bridge/ |
H A D | Bridge.java | 215 // on static (native) methods which prints the signature on the console and 228 public void onInvokeV(String signature, boolean isNative, Object caller) { 229 sDefaultLog.error(null, "Missing Stub: " + signature + 237 throw new StaticMethodNotImplementedException(signature);
|
/frameworks/base/media/jni/ |
H A D | android_media_MediaDrm.cpp | 1304 Vector<uint8_t> signature; local 1306 status_t err = drm->sign(sessionId, keyId, message, signature); 1312 return VectorToJByteArray(env, signature); 1334 Vector<uint8_t> signature(JByteArrayToVector(env, jsignature)); 1337 status_t err = drm->verify(sessionId, keyId, message, signature, match); 1364 Vector<uint8_t> signature; local 1366 status_t err = drm->signRSA(sessionId, algorithm, message, wrappedKey, signature); 1372 return VectorToJByteArray(env, signature);
|
/frameworks/av/media/ndk/ |
H A D | NdkMediaDrm.cpp | 652 uint8_t *signature, size_t *signatureSize) { 683 memcpy(signature, signatureVec.array(), signatureVec.size()); 691 const uint8_t *signature, size_t signatureSize) { 717 signatureVec.appendArray(signature, signatureSize); 650 AMediaDrm_sign(AMediaDrm *mObj, const AMediaDrmSessionId *sessionId, const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize, uint8_t *signature, size_t *signatureSize) argument 689 AMediaDrm_verify(AMediaDrm *mObj, const AMediaDrmSessionId *sessionId, const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize, const uint8_t *signature, size_t signatureSize) argument
|
/frameworks/base/media/mca/filterfw/jni/ |
H A D | jni_util.cpp | 127 jobject CreateJObject(JNIEnv* env, const std::string& class_name, const std::string& signature, T value) { argument
|
/frameworks/base/services/tests/servicestests/src/com/android/server/ |
H A D | NetworkPolicyManagerServiceTest.java | 163 final Signature signature; 165 signature = new Signature("F00D"); 167 signature = new Signature("DEAD"); 169 info.signatures = new Signature[] { signature };
|