Searched refs:signature (Results 51 - 61 of 61) sorted by relevance

123

/frameworks/base/keystore/java/android/security/keystore/
H A DAndroidKeyStoreKeyPairGeneratorSpi.java242 // Authorized to be used with any encryption and signature padding
560 // Failed to generate the self-signed certificate with valid signature. Fall back
561 // to generating a self-signed certificate with a fake signature. This is done for
563 // producing a self-signed certificate with an invalid signature to key pair
590 byte[] signature;
598 signature = new DERSequence().getEncoded();
603 signature = new byte[1];
626 result.add(new DERBitString(signature));
674 // of RSA PKCS#1 signature padding scheme (about 30 bytes).
741 // Check whether this key is authorized for PKCS#1 signature paddin
[all...]
/frameworks/base/media/mca/filterfw/jni/
H A Djni_util.cpp127 jobject CreateJObject(JNIEnv* env, const std::string& class_name, const std::string& signature, T value) { argument
/frameworks/base/services/tests/servicestests/src/com/android/server/
H A DNetworkPolicyManagerServiceTest.java163 final Signature signature;
165 signature = new Signature("F00D");
167 signature = new Signature("DEAD");
169 info.signatures = new Signature[] { signature };
/frameworks/compile/libbcc/lib/Renderscript/
H A DRSForEachExpand.cpp94 * Pointer to LLVM type information for the the function signature
120 // For pre-ICS bitcode, we may not have signature information. In that
141 ALOGE("Non-integer signature value '%s'", SigString.str().c_str());
305 /// This creates a function with the following signature:
446 // Signature - metadata bits for the signature of the ForEach-able function
512 // function signature.
1002 uint32_t signature = mExportForEachSignatureList[i]; local
1005 if (bcinfo::MetadataExtractor::hasForEachSignatureKernel(signature)) {
1006 Changed |= ExpandKernel(kernel, signature);
1009 Changed |= ExpandFunction(kernel, signature);
[all...]
/frameworks/base/keystore/tests/src/android/security/
H A DKeyStoreTest.java447 final byte[] signature = mKeyStore.sign(TEST_KEYNAME, TEST_DATA);
449 assertNotNull("Signature should not be null", signature);
458 final byte[] signature = mKeyStore.sign(TEST_KEYNAME, TEST_DATA);
460 assertNotNull("Signature should not be null", signature);
463 mKeyStore.verify(TEST_KEYNAME, TEST_DATA, signature));
/frameworks/base/core/java/android/hardware/fingerprint/
H A DFingerprintManager.java205 public CryptoObject(@NonNull Signature signature) { argument
206 mCrypto = signature;
/frameworks/data-binding/compiler/src/main/kotlin/android/databinding/tool/writer/
H A DLayoutBinderWriter.kt922 val signature = "public ${returnType} ${listener.getName()}(${
927 if (!signatures.contains(signature)) {
928 signatures.add(signature)
930 tab(signature) {
/frameworks/opt/telephony/src/java/com/android/internal/telephony/uicc/
H A DUiccCard.java565 public int getCarrierPrivilegeStatus(Signature signature, String packageName) { argument
568 mCarrierPrivilegeRules.getCarrierPrivilegeStatus(signature, packageName);
/frameworks/av/media/libstagefright/
H A DOggExtractor.cpp329 char signature[4]; local
330 ssize_t n = mSource->readAt(*pageOffset, &signature, 4);
338 if (!memcmp(signature, "OggS", 4)) {
/frameworks/base/tools/aapt2/
H A DPng.cpp1197 png_byte signature[kPngSignatureSize]; local
1199 // Read the PNG signature first.
1200 if (!input.read(reinterpret_cast<char*>(signature), kPngSignatureSize)) {
1205 // If the PNG signature doesn't match, bail early.
1206 if (png_sig_cmp(signature, 0, kPngSignatureSize) != 0) {
/frameworks/support/v8/renderscript/java/src/android/support/v8/renderscript/
H A DRenderScript.java150 Class[] signature = {String.class, Integer.TYPE};
151 Method getint = sysprop.getDeclaredMethod("getInt", signature);

Completed in 521 milliseconds

123