Searched refs:signature (Results 26 - 50 of 92) sorted by relevance

1234

/frameworks/base/core/jni/
H A Dandroid_animation_PropertyValuesHolder.cpp54 char *signature = new char[parameterCount + 4]; local
55 signature[0] = '(';
56 memset(&(signature[1]), parameterType, parameterCount);
57 strcpy(&(signature[parameterCount + 1]), ")V");
58 jmethodID mid = env->GetMethodID(targetClass, nativeString, signature);
59 delete[] signature;
H A Dandroid_ddm_DdmHandleNativeHeap.cpp43 uint32_t signature; member in struct:Header
89 header.signature = DDMS_HEADER_SIGNATURE;
/frameworks/layoutlib/create/src/com/android/tools/layoutlib/create/
H A DAsmAnalyzer.java27 import org.objectweb.asm.signature.SignatureReader;
28 import org.objectweb.asm.signature.SignatureVisitor;
472 * Considers this signature or type signature by invoking the {@link SignatureVisitor}
475 public void considerSignature(String signature) { argument
476 if (signature != null) {
477 SignatureReader sr = new SignatureReader(signature);
479 // to differentiate where the signature comes from.
521 String signature, String superName, String[] interfaces) {
522 // signature i
520 visit(int version, int access, String name, String signature, String superName, String[] interfaces) argument
583 visitField(int access, String name, String desc, String signature, Object value) argument
602 visitMethod(int access, String name, String desc, String signature, String[] exceptions) argument
701 visitLocalVariable(String name, String desc, String signature, Label start, Label end, int index) argument
[all...]
H A DDependencyFinder.java30 import org.objectweb.asm.signature.SignatureReader;
31 import org.objectweb.asm.signature.SignatureVisitor;
335 * Considers this signature or type signature by invoking the {@link SignatureVisitor}
338 public void considerSignature(String signature) { argument
339 if (signature != null) {
340 SignatureReader sr = new SignatureReader(signature);
342 // to differentiate where the signature comes from.
398 String signature, String superName, String[] interfaces) {
399 // signature i
397 visit(int version, int access, String name, String signature, String superName, String[] interfaces) argument
460 visitField(int access, String name, String desc, String signature, Object value) argument
483 visitMethod(int access, String name, String desc, String signature, String[] exceptions) argument
579 visitLocalVariable(String name, String desc, String signature, Label start, Label end, int index) argument
[all...]
/frameworks/base/keystore/java/android/security/keystore/
H A DAndroidKeyStoreSignatureSpiBase.java136 * Configures this signature instance to use the provided key.
321 byte[] signature;
328 signature = mMessageStreamer.doFinal(
330 null, // no signature provided -- it'll be generated by this invocation
337 return signature;
341 protected final boolean engineVerify(byte[] signature) throws SignatureException { argument
356 signature,
403 * Returns {@code true} if this signature is initialized for signing, {@code false} if this
404 * signature is initialized for verification.
414 * {@code finish} operation when generating a signature
[all...]
H A DKeyStoreCryptoOperationChunkedStreamer.java209 byte[] signature, byte[] additionalEntropy) throws KeyStoreException {
220 OperationResult opResult = mKeyStoreStream.finish(signature, additionalEntropy);
337 public OperationResult finish(byte[] signature, byte[] additionalEntropy) { argument
338 return mKeyStore.finish(mOperationToken, null, signature, additionalEntropy);
208 doFinal(byte[] input, int inputOffset, int inputLength, byte[] signature, byte[] additionalEntropy) argument
H A DAndroidKeyStoreECDSASignatureSpi.java83 public byte[] doFinal(byte[] input, int inputOffset, int inputLength, byte[] signature, argument
96 signature, additionalEntropy);
/frameworks/base/telephony/java/android/telephony/
H A DUiccAccessRule.java186 * @param signature The signature of the certificate.
191 public int getCarrierPrivilegeStatus(Signature signature, String packageName) { argument
193 byte[] certHash = getCertHash(signature, "SHA-1");
194 byte[] certHash256 = getCertHash(signature, "SHA-256");
221 private static byte[] getCertHash(Signature signature, String algo) { argument
224 return md.digest(signature.toByteArray());
/frameworks/layoutlib/create/tests/com/android/tools/layoutlib/create/
H A DPromoteClassClassAdapterTest.java99 public void visit(int version, int access, String name, String signature, String superName, argument
103 "version=%d, access=%s, name=%s, signature=%s, superName=%s, interfaces=%s",
104 version, formatAccess(access), name, signature, superName, Arrays.toString(interfaces)
107 super.visit(version, access, name, signature, superName, interfaces);
166 "name=com/android/tools/layoutlib/create/PackageProtectedClass, signature=null, " +
/frameworks/base/packages/StatementService/src/com/android/statementservice/retriever/
H A DUtils.java114 public static String computeNormalizedSha256Fingerprint(byte[] signature) { argument
121 digester.update(signature);
/frameworks/base/services/core/java/com/android/server/oemlock/
H A DVendorLock.java58 void setOemUnlockAllowedByCarrier(boolean allowed, @Nullable byte[] signature) { argument
60 switch (mOemLock.setOemUnlockAllowedByCarrier(allowed, toByteArrayList(signature))) {
67 "Invalid signature used in attempt to carrier unlock");
H A DOemLockService.java116 public void setOemUnlockAllowedByCarrier(boolean allowed, @Nullable byte[] signature) {
122 mOemLock.setOemUnlockAllowedByCarrier(allowed, signature);
/frameworks/base/core/java/android/security/
H A DIKeystoreService.aidl49 int verify(String name, in byte[] data, in byte[] signature);
71 OperationResult finish(IBinder token, in KeymasterArguments params, in byte[] signature,
/frameworks/compile/mclinker/lib/LD/
H A DELFObjectReader.cpp121 ResolveInfo* signature = m_pELFReader->readSignature( local
125 if (signature->nameSize() == 0 &&
126 ResolveInfo::Section == signature->type()) {
127 // if the signature is a section symbol in input object, we use the
128 // section name as group signature.
131 signatures().insert(signature->name(), exist);
135 // if this is not the first time we see this group signature, then
150 ResolveInfo::Destroy(signature);
/frameworks/av/drm/libmediadrm/
H A DIDrm.cpp472 Vector<uint8_t> &signature) {
484 readVector(reply, signature);
492 Vector<uint8_t> const &signature,
500 writeVector(data, signature);
514 Vector<uint8_t> &signature) {
527 readVector(reply, signature);
883 Vector<uint8_t> sessionId, keyId, message, signature; local
887 uint32_t result = sign(sessionId, keyId, message, signature);
888 writeVector(reply, signature);
896 Vector<uint8_t> sessionId, keyId, message, signature; local
469 sign(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &message, Vector<uint8_t> &signature) argument
489 verify(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &message, Vector<uint8_t> const &signature, bool &match) argument
510 signRSA(Vector<uint8_t> const &sessionId, String8 const &algorithm, Vector<uint8_t> const &message, Vector<uint8_t> const &wrappedKey, Vector<uint8_t> &signature) argument
911 Vector<uint8_t> sessionId, message, wrappedKey, signature; local
[all...]
/frameworks/av/drm/libdrmframework/plugins/forward-lock/internal-format/decoder/
H A DFwdLockFile.c376 unsigned char signature[SHA1_HASH_SIZE]; member in struct:FwdLockFile_CheckDataIntegrity_Data
396 HMAC_Final(&pSession->signingContext, pData->signature, &signatureSize);
398 result = memcmp(pData->signature, pSession->dataSignature, SHA1_HASH_SIZE) == 0;
417 unsigned char signature[SHA1_HASH_SIZE]; local
425 HMAC_Final(&pSession->signingContext, signature, &signatureSize);
427 result = memcmp(signature, pSession->headerSignature, SHA1_HASH_SIZE) == 0;
/frameworks/av/media/ndk/include/media/
H A DNdkMediaDrm.h306 * secure stop message to the server which verifies the signature and notifies the
430 * Generate a signature using the specified macAlgorithm over the message data
431 * referenced by message of size messageSize and store the signature in the
432 * buffer referenced signature of max size *signatureSize. If the buffer is not
433 * large enough to hold the signature, MEDIADRM_SHORT_BUFFER is returned and
440 uint8_t *signature, size_t *signatureSize);
443 * Perform a signature verification using the specified macAlgorithm over the message
445 * if the signature matches, otherwise MEDAIDRM_VERIFY_FAILED is returned. The key to
451 const uint8_t *signature, size_t signatureSize);
/frameworks/av/drm/mediadrm/plugins/mock/
H A DMockDrmCryptoPlugin.h125 Vector<uint8_t> &signature);
130 Vector<uint8_t> const &signature,
137 Vector<uint8_t> &signature);
/frameworks/av/include/media/
H A DDrm.h114 Vector<uint8_t> &signature);
119 Vector<uint8_t> const &signature,
126 Vector<uint8_t> &signature);
H A DDrmHal.h129 Vector<uint8_t> &signature);
134 Vector<uint8_t> const &signature,
141 Vector<uint8_t> &signature);
H A DIDrm.h110 Vector<uint8_t> &signature) = 0;
115 Vector<uint8_t> const &signature,
122 Vector<uint8_t> &signature) = 0;
/frameworks/av/media/libmedia/include/media/
H A DDrm.h114 Vector<uint8_t> &signature);
119 Vector<uint8_t> const &signature,
126 Vector<uint8_t> &signature);
H A DDrmHal.h129 Vector<uint8_t> &signature);
134 Vector<uint8_t> const &signature,
141 Vector<uint8_t> &signature);
H A DIDrm.h110 Vector<uint8_t> &signature) = 0;
115 Vector<uint8_t> const &signature,
122 Vector<uint8_t> &signature) = 0;
/frameworks/native/headers/media_plugin/media/drm/
H A DDrmAPI.h235 // the secure stop message to the server which verifies the signature and
311 // Compute a signature on the provided message using the mac algorithm
313 // and return the signature.
317 Vector<uint8_t> &signature) = 0;
319 // Compute a signature on the provided message using the mac algorithm
326 Vector<uint8_t> const &signature,
330 // Compute an RSA signature on the provided message using the algorithm
336 Vector<uint8_t> &signature) = 0;

Completed in 1481 milliseconds

1234