/frameworks/base/core/jni/ |
H A D | android_animation_PropertyValuesHolder.cpp | 54 char *signature = new char[parameterCount + 4]; local 55 signature[0] = '('; 56 memset(&(signature[1]), parameterType, parameterCount); 57 strcpy(&(signature[parameterCount + 1]), ")V"); 58 jmethodID mid = env->GetMethodID(targetClass, nativeString, signature); 59 delete[] signature;
|
H A D | android_ddm_DdmHandleNativeHeap.cpp | 43 uint32_t signature; member in struct:Header 89 header.signature = DDMS_HEADER_SIGNATURE;
|
/frameworks/layoutlib/create/src/com/android/tools/layoutlib/create/ |
H A D | AsmAnalyzer.java | 27 import org.objectweb.asm.signature.SignatureReader; 28 import org.objectweb.asm.signature.SignatureVisitor; 472 * Considers this signature or type signature by invoking the {@link SignatureVisitor} 475 public void considerSignature(String signature) { argument 476 if (signature != null) { 477 SignatureReader sr = new SignatureReader(signature); 479 // to differentiate where the signature comes from. 521 String signature, String superName, String[] interfaces) { 522 // signature i 520 visit(int version, int access, String name, String signature, String superName, String[] interfaces) argument 583 visitField(int access, String name, String desc, String signature, Object value) argument 602 visitMethod(int access, String name, String desc, String signature, String[] exceptions) argument 701 visitLocalVariable(String name, String desc, String signature, Label start, Label end, int index) argument [all...] |
H A D | DependencyFinder.java | 30 import org.objectweb.asm.signature.SignatureReader; 31 import org.objectweb.asm.signature.SignatureVisitor; 335 * Considers this signature or type signature by invoking the {@link SignatureVisitor} 338 public void considerSignature(String signature) { argument 339 if (signature != null) { 340 SignatureReader sr = new SignatureReader(signature); 342 // to differentiate where the signature comes from. 398 String signature, String superName, String[] interfaces) { 399 // signature i 397 visit(int version, int access, String name, String signature, String superName, String[] interfaces) argument 460 visitField(int access, String name, String desc, String signature, Object value) argument 483 visitMethod(int access, String name, String desc, String signature, String[] exceptions) argument 579 visitLocalVariable(String name, String desc, String signature, Label start, Label end, int index) argument [all...] |
/frameworks/base/keystore/java/android/security/keystore/ |
H A D | AndroidKeyStoreSignatureSpiBase.java | 136 * Configures this signature instance to use the provided key. 321 byte[] signature; 328 signature = mMessageStreamer.doFinal( 330 null, // no signature provided -- it'll be generated by this invocation 337 return signature; 341 protected final boolean engineVerify(byte[] signature) throws SignatureException { argument 356 signature, 403 * Returns {@code true} if this signature is initialized for signing, {@code false} if this 404 * signature is initialized for verification. 414 * {@code finish} operation when generating a signature [all...] |
H A D | KeyStoreCryptoOperationChunkedStreamer.java | 209 byte[] signature, byte[] additionalEntropy) throws KeyStoreException { 220 OperationResult opResult = mKeyStoreStream.finish(signature, additionalEntropy); 337 public OperationResult finish(byte[] signature, byte[] additionalEntropy) { argument 338 return mKeyStore.finish(mOperationToken, null, signature, additionalEntropy); 208 doFinal(byte[] input, int inputOffset, int inputLength, byte[] signature, byte[] additionalEntropy) argument
|
H A D | AndroidKeyStoreECDSASignatureSpi.java | 83 public byte[] doFinal(byte[] input, int inputOffset, int inputLength, byte[] signature, argument 96 signature, additionalEntropy);
|
/frameworks/base/telephony/java/android/telephony/ |
H A D | UiccAccessRule.java | 186 * @param signature The signature of the certificate. 191 public int getCarrierPrivilegeStatus(Signature signature, String packageName) { argument 193 byte[] certHash = getCertHash(signature, "SHA-1"); 194 byte[] certHash256 = getCertHash(signature, "SHA-256"); 221 private static byte[] getCertHash(Signature signature, String algo) { argument 224 return md.digest(signature.toByteArray());
|
/frameworks/layoutlib/create/tests/com/android/tools/layoutlib/create/ |
H A D | PromoteClassClassAdapterTest.java | 99 public void visit(int version, int access, String name, String signature, String superName, argument 103 "version=%d, access=%s, name=%s, signature=%s, superName=%s, interfaces=%s", 104 version, formatAccess(access), name, signature, superName, Arrays.toString(interfaces) 107 super.visit(version, access, name, signature, superName, interfaces); 166 "name=com/android/tools/layoutlib/create/PackageProtectedClass, signature=null, " +
|
/frameworks/base/packages/StatementService/src/com/android/statementservice/retriever/ |
H A D | Utils.java | 114 public static String computeNormalizedSha256Fingerprint(byte[] signature) { argument 121 digester.update(signature);
|
/frameworks/base/services/core/java/com/android/server/oemlock/ |
H A D | VendorLock.java | 58 void setOemUnlockAllowedByCarrier(boolean allowed, @Nullable byte[] signature) { argument 60 switch (mOemLock.setOemUnlockAllowedByCarrier(allowed, toByteArrayList(signature))) { 67 "Invalid signature used in attempt to carrier unlock");
|
H A D | OemLockService.java | 116 public void setOemUnlockAllowedByCarrier(boolean allowed, @Nullable byte[] signature) { 122 mOemLock.setOemUnlockAllowedByCarrier(allowed, signature);
|
/frameworks/base/core/java/android/security/ |
H A D | IKeystoreService.aidl | 49 int verify(String name, in byte[] data, in byte[] signature); 71 OperationResult finish(IBinder token, in KeymasterArguments params, in byte[] signature,
|
/frameworks/compile/mclinker/lib/LD/ |
H A D | ELFObjectReader.cpp | 121 ResolveInfo* signature = m_pELFReader->readSignature( local 125 if (signature->nameSize() == 0 && 126 ResolveInfo::Section == signature->type()) { 127 // if the signature is a section symbol in input object, we use the 128 // section name as group signature. 131 signatures().insert(signature->name(), exist); 135 // if this is not the first time we see this group signature, then 150 ResolveInfo::Destroy(signature);
|
/frameworks/av/drm/libmediadrm/ |
H A D | IDrm.cpp | 472 Vector<uint8_t> &signature) { 484 readVector(reply, signature); 492 Vector<uint8_t> const &signature, 500 writeVector(data, signature); 514 Vector<uint8_t> &signature) { 527 readVector(reply, signature); 883 Vector<uint8_t> sessionId, keyId, message, signature; local 887 uint32_t result = sign(sessionId, keyId, message, signature); 888 writeVector(reply, signature); 896 Vector<uint8_t> sessionId, keyId, message, signature; local 469 sign(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &message, Vector<uint8_t> &signature) argument 489 verify(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &message, Vector<uint8_t> const &signature, bool &match) argument 510 signRSA(Vector<uint8_t> const &sessionId, String8 const &algorithm, Vector<uint8_t> const &message, Vector<uint8_t> const &wrappedKey, Vector<uint8_t> &signature) argument 911 Vector<uint8_t> sessionId, message, wrappedKey, signature; local [all...] |
/frameworks/av/drm/libdrmframework/plugins/forward-lock/internal-format/decoder/ |
H A D | FwdLockFile.c | 376 unsigned char signature[SHA1_HASH_SIZE]; member in struct:FwdLockFile_CheckDataIntegrity_Data 396 HMAC_Final(&pSession->signingContext, pData->signature, &signatureSize); 398 result = memcmp(pData->signature, pSession->dataSignature, SHA1_HASH_SIZE) == 0; 417 unsigned char signature[SHA1_HASH_SIZE]; local 425 HMAC_Final(&pSession->signingContext, signature, &signatureSize); 427 result = memcmp(signature, pSession->headerSignature, SHA1_HASH_SIZE) == 0;
|
/frameworks/av/media/ndk/include/media/ |
H A D | NdkMediaDrm.h | 306 * secure stop message to the server which verifies the signature and notifies the 430 * Generate a signature using the specified macAlgorithm over the message data 431 * referenced by message of size messageSize and store the signature in the 432 * buffer referenced signature of max size *signatureSize. If the buffer is not 433 * large enough to hold the signature, MEDIADRM_SHORT_BUFFER is returned and 440 uint8_t *signature, size_t *signatureSize); 443 * Perform a signature verification using the specified macAlgorithm over the message 445 * if the signature matches, otherwise MEDAIDRM_VERIFY_FAILED is returned. The key to 451 const uint8_t *signature, size_t signatureSize);
|
/frameworks/av/drm/mediadrm/plugins/mock/ |
H A D | MockDrmCryptoPlugin.h | 125 Vector<uint8_t> &signature); 130 Vector<uint8_t> const &signature, 137 Vector<uint8_t> &signature);
|
/frameworks/av/include/media/ |
H A D | Drm.h | 114 Vector<uint8_t> &signature); 119 Vector<uint8_t> const &signature, 126 Vector<uint8_t> &signature);
|
H A D | DrmHal.h | 129 Vector<uint8_t> &signature); 134 Vector<uint8_t> const &signature, 141 Vector<uint8_t> &signature);
|
H A D | IDrm.h | 110 Vector<uint8_t> &signature) = 0; 115 Vector<uint8_t> const &signature, 122 Vector<uint8_t> &signature) = 0;
|
/frameworks/av/media/libmedia/include/media/ |
H A D | Drm.h | 114 Vector<uint8_t> &signature); 119 Vector<uint8_t> const &signature, 126 Vector<uint8_t> &signature);
|
H A D | DrmHal.h | 129 Vector<uint8_t> &signature); 134 Vector<uint8_t> const &signature, 141 Vector<uint8_t> &signature);
|
H A D | IDrm.h | 110 Vector<uint8_t> &signature) = 0; 115 Vector<uint8_t> const &signature, 122 Vector<uint8_t> &signature) = 0;
|
/frameworks/native/headers/media_plugin/media/drm/ |
H A D | DrmAPI.h | 235 // the secure stop message to the server which verifies the signature and 311 // Compute a signature on the provided message using the mac algorithm 313 // and return the signature. 317 Vector<uint8_t> &signature) = 0; 319 // Compute a signature on the provided message using the mac algorithm 326 Vector<uint8_t> const &signature, 330 // Compute an RSA signature on the provided message using the algorithm 336 Vector<uint8_t> &signature) = 0;
|