Searched refs:signature (Results 51 - 61 of 61) sorted by relevance
123
/frameworks/base/keystore/java/android/security/keystore/ |
H A D | AndroidKeyStoreKeyPairGeneratorSpi.java | 242 // Authorized to be used with any encryption and signature padding 560 // Failed to generate the self-signed certificate with valid signature. Fall back 561 // to generating a self-signed certificate with a fake signature. This is done for 563 // producing a self-signed certificate with an invalid signature to key pair 590 byte[] signature; 598 signature = new DERSequence().getEncoded(); 603 signature = new byte[1]; 626 result.add(new DERBitString(signature)); 674 // of RSA PKCS#1 signature padding scheme (about 30 bytes). 741 // Check whether this key is authorized for PKCS#1 signature paddin [all...] |
/frameworks/base/media/mca/filterfw/jni/ |
H A D | jni_util.cpp | 127 jobject CreateJObject(JNIEnv* env, const std::string& class_name, const std::string& signature, T value) { argument
|
/frameworks/base/services/tests/servicestests/src/com/android/server/ |
H A D | NetworkPolicyManagerServiceTest.java | 163 final Signature signature; 165 signature = new Signature("F00D"); 167 signature = new Signature("DEAD"); 169 info.signatures = new Signature[] { signature };
|
/frameworks/compile/libbcc/lib/Renderscript/ |
H A D | RSForEachExpand.cpp | 94 * Pointer to LLVM type information for the the function signature 120 // For pre-ICS bitcode, we may not have signature information. In that 141 ALOGE("Non-integer signature value '%s'", SigString.str().c_str()); 305 /// This creates a function with the following signature: 446 // Signature - metadata bits for the signature of the ForEach-able function 512 // function signature. 1002 uint32_t signature = mExportForEachSignatureList[i]; local 1005 if (bcinfo::MetadataExtractor::hasForEachSignatureKernel(signature)) { 1006 Changed |= ExpandKernel(kernel, signature); 1009 Changed |= ExpandFunction(kernel, signature); [all...] |
/frameworks/base/keystore/tests/src/android/security/ |
H A D | KeyStoreTest.java | 447 final byte[] signature = mKeyStore.sign(TEST_KEYNAME, TEST_DATA); 449 assertNotNull("Signature should not be null", signature); 458 final byte[] signature = mKeyStore.sign(TEST_KEYNAME, TEST_DATA); 460 assertNotNull("Signature should not be null", signature); 463 mKeyStore.verify(TEST_KEYNAME, TEST_DATA, signature));
|
/frameworks/base/core/java/android/hardware/fingerprint/ |
H A D | FingerprintManager.java | 205 public CryptoObject(@NonNull Signature signature) { argument 206 mCrypto = signature;
|
/frameworks/data-binding/compiler/src/main/kotlin/android/databinding/tool/writer/ |
H A D | LayoutBinderWriter.kt | 922 val signature = "public ${returnType} ${listener.getName()}(${ 927 if (!signatures.contains(signature)) { 928 signatures.add(signature) 930 tab(signature) {
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/uicc/ |
H A D | UiccCard.java | 565 public int getCarrierPrivilegeStatus(Signature signature, String packageName) { argument 568 mCarrierPrivilegeRules.getCarrierPrivilegeStatus(signature, packageName);
|
/frameworks/av/media/libstagefright/ |
H A D | OggExtractor.cpp | 329 char signature[4]; local 330 ssize_t n = mSource->readAt(*pageOffset, &signature, 4); 338 if (!memcmp(signature, "OggS", 4)) {
|
/frameworks/base/tools/aapt2/ |
H A D | Png.cpp | 1197 png_byte signature[kPngSignatureSize]; local 1199 // Read the PNG signature first. 1200 if (!input.read(reinterpret_cast<char*>(signature), kPngSignatureSize)) { 1205 // If the PNG signature doesn't match, bail early. 1206 if (png_sig_cmp(signature, 0, kPngSignatureSize) != 0) {
|
/frameworks/support/v8/renderscript/java/src/android/support/v8/renderscript/ |
H A D | RenderScript.java | 150 Class[] signature = {String.class, Integer.TYPE}; 151 Method getint = sysprop.getDeclaredMethod("getInt", signature);
|
Completed in 521 milliseconds
123