/frameworks/base/core/java/android/content/pm/ |
H A D | Signature.java | 39 * This class name is slightly misleading, since it's not actually a signature. 51 public Signature(byte[] signature) { argument 52 mSignature = signature.clone(); 57 * Create signature from a certificate chain. Used for backward 87 * @param text hex-encoded string representing the signature 88 * @throws IllegalArgumentException when signature is odd-length 158 * @return the contents of this signature as a byte array. 167 * Returns the public key for this signature.
|
/frameworks/base/core/java/android/hardware/biometrics/ |
H A D | BiometricPrompt.java | 246 public CryptoObject(@NonNull Signature signature) { argument 247 super(signature);
|
/frameworks/base/tools/aapt2/java/ |
H A D | ClassDefinition.h | 180 // Expected method signature example: 'public static void onResourcesLoaded(int p)'. 181 explicit MethodDefinition(const android::StringPiece& signature) argument 182 : signature_(signature.to_string()) {} 193 // Even if the method is empty, we always want to write the method signature.
|
/frameworks/support/compat/src/main/java/androidx/core/hardware/fingerprint/ |
H A D | FingerprintManagerCompat.java | 197 public CryptoObject(@NonNull Signature signature) { argument 198 mSignature = signature;
|
/frameworks/native/opengl/tools/glgen/src/ |
H A D | JniCodeEmitter.java | 75 String signature; 84 signature = jfunc.toString(); 86 if (mFunctionsEmitted.contains(signature)) { 89 mFunctionsEmitted.add(signature); 110 signature = jfunc.toString(); 112 if (mFunctionsEmitted.contains(signature)) { 115 mFunctionsEmitted.add(signature); 790 // Emit JNI signature (name) 824 String signature = ""; 828 signature [all...] |
/frameworks/base/core/tests/coretests/src/android/graphics/ |
H A D | PaintTest.java | 148 final String signature = 157 assertTrue(signature + " is expected to be true", p.hasGlyph(testString)); 159 assertFalse(signature + " is expected to be false", p.hasGlyph(testString));
|
/frameworks/base/services/core/java/com/android/server/locksettings/recoverablekeystore/certificate/ |
H A D | CertUtils.java | 230 * Verifies a public-key signature that is computed by RSA with SHA256. 233 * @param signature the public-key signature 235 * @throws CertValidationException if the signature verification fails 238 PublicKey signerPublicKey, byte[] signature, byte[] signedBytes) 250 if (!verifier.verify(signature)) { 251 throw new CertValidationException("The signature is invalid"); 269 * invalid signature) 302 * or does not have a valid signature 237 verifyRsaSha256Signature( PublicKey signerPublicKey, byte[] signature, byte[] signedBytes) argument
|
/frameworks/base/services/core/java/com/android/server/webkit/ |
H A D | SystemImpl.java | 63 private static final String TAG_SIGNATURE = "signature"; 174 // Parse the value within the signature tag 175 String signature = parser.nextText(); 176 signatures.add(signature); 178 Log.e(TAG, "Found an element in a webview provider that is not a signature");
|
H A D | WebViewUpdater.java | 510 // If no signature is declared, instead check whether the package is included in the 517 // Return whether the package signature matches any of the valid signatures 518 for (Signature signature : provider.signatures) { 519 if (signature.equals(packageInfo.signatures[0])) return true; 600 return "Incorrect signature";
|
/frameworks/base/services/tests/servicestests/src/com/android/server/updates/ |
H A D | CertPinInstallReceiverTest.java | 176 String signature, X509Certificate cert) throws Exception { 182 return signer.verify(Base64.decode(signature.getBytes(), Base64.DEFAULT)); 175 verifySignature(String content, String version, String requiredPrevious, String signature, X509Certificate cert) argument
|
/frameworks/layoutlib/create/src/com/android/tools/layoutlib/create/ |
H A D | DelegateMethodAdapter.java | 424 public void visitLocalVariable(String name, String desc, String signature, argument 427 mOrgWriter.visitLocalVariable(name, desc, signature, start, end, index);
|
H A D | ReplaceMethodCallsAdapter.java | 240 public MethodVisitor visitMethod(int access, String name, String desc, String signature, argument 242 return new MyMethodVisitor(super.visitMethod(access, name, desc, signature, exceptions));
|
H A D | StubMethodAdapter.java | 67 * OverrideMethod.invoke("signature", mIsNative ? true : false, null or this); 341 public void visitLocalVariable(String name, String desc, String signature, argument 344 mParentVisitor.visitLocalVariable(name, desc, signature, start, end, index);
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/uicc/ |
H A D | UiccCard.java | 388 public int getCarrierPrivilegeStatus(Signature signature, String packageName) { argument 390 return mUiccProfile.getCarrierPrivilegeStatus(signature, packageName);
|
/frameworks/base/media/java/android/media/ |
H A D | MediaDrm.java | 1324 @NonNull byte[] keyId, @NonNull byte[] message, @NonNull byte[] signature); 1408 * @param message the data for which a signature is to be computed 1416 * Verify a signature using the CryptoSessions's mac algorithm. Return true 1421 * @param signature the reference signature which will be compared with the 1422 * computed signature 1425 @NonNull byte[] keyid, @NonNull byte[] message, @NonNull byte[] signature) { 1426 return verifyNative(MediaDrm.this, mSessionId, keyid, message, signature); 1585 * @param message the data for which a signature is to be computed 1322 verifyNative( @onNull MediaDrm drm, @NonNull byte[] sessionId, @NonNull byte[] keyId, @NonNull byte[] message, @NonNull byte[] signature) argument 1424 verify( @onNull byte[] keyid, @NonNull byte[] message, @NonNull byte[] signature) argument
|
/frameworks/base/tools/aapt2/compile/ |
H A D | PngCrunch.cpp | 148 // Read the first 8 bytes of the file looking for the PNG signature. 150 const png_byte* signature; local 152 if (!in->Next((const void**)&signature, &buffer_size)) { 154 source_diag.Error(DiagMessage() << "failed to read PNG signature: " << in->GetError()); 156 source_diag.Error(DiagMessage() << "not enough data for PNG signature"); 161 if (buffer_size < kPngSignatureSize || png_sig_cmp(signature, 0, kPngSignatureSize) != 0) { 162 source_diag.Error(DiagMessage() << "file signature does not match PNG signature"); 202 // Skip the signature that we already read.
|
/frameworks/layoutlib/bridge/src/com/android/layoutlib/bridge/ |
H A D | Bridge.java | 176 // on static (native) methods which prints the signature on the console and 189 public void onInvokeV(String signature, boolean isNative, Object caller) { 190 sDefaultLog.error(null, "Missing Stub: " + signature + 198 throw new StaticMethodNotImplementedException(signature);
|
/frameworks/av/drm/mediadrm/plugins/clearkey/hidl/include/ |
H A D | DrmPlugin.h | 222 const hidl_vec<uint8_t>& signature, 226 message.size() == 0 || signature.size() == 0) { 218 verify( const hidl_vec<uint8_t>& sessionId, const hidl_vec<uint8_t>& keyId, const hidl_vec<uint8_t>& message, const hidl_vec<uint8_t>& signature, verify_cb _hidl_cb) argument
|
/frameworks/base/media/jni/ |
H A D | android_media_MediaDrm.cpp | 1678 Vector<uint8_t> signature; local 1680 status_t err = drm->sign(sessionId, keyId, message, signature); 1686 return VectorToJByteArray(env, signature); 1708 Vector<uint8_t> signature(JByteArrayToVector(env, jsignature)); 1711 status_t err = drm->verify(sessionId, keyId, message, signature, match); 1758 Vector<uint8_t> signature; local 1760 status_t err = drm->signRSA(sessionId, algorithm, message, wrappedKey, signature); 1766 return VectorToJByteArray(env, signature);
|
/frameworks/av/media/ndk/ |
H A D | NdkMediaDrm.cpp | 650 uint8_t *signature, size_t *signatureSize) { 681 memcpy(signature, signatureVec.array(), signatureVec.size()); 689 const uint8_t *signature, size_t signatureSize) { 715 signatureVec.appendArray(signature, signatureSize); 648 AMediaDrm_sign(AMediaDrm *mObj, const AMediaDrmSessionId *sessionId, const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize, uint8_t *signature, size_t *signatureSize) argument 687 AMediaDrm_verify(AMediaDrm *mObj, const AMediaDrmSessionId *sessionId, const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize, const uint8_t *signature, size_t signatureSize) argument
|
/frameworks/base/keystore/java/android/security/keystore/ |
H A D | AndroidKeyStoreKeyPairGeneratorSpi.java | 253 // Authorized to be used with any encryption and signature padding 646 // Failed to generate the self-signed certificate with valid signature. Fall back 647 // to generating a self-signed certificate with a fake signature. This is done for 649 // producing a self-signed certificate with an invalid signature to key pair 676 byte[] signature; 684 signature = new DERSequence().getEncoded(); 689 signature = new byte[1]; 712 result.add(new DERBitString(signature)); 760 // of RSA PKCS#1 signature padding scheme (about 30 bytes). 827 // Check whether this key is authorized for PKCS#1 signature paddin [all...] |
/frameworks/base/media/mca/filterfw/jni/ |
H A D | jni_util.cpp | 127 jobject CreateJObject(JNIEnv* env, const std::string& class_name, const std::string& signature, T value) { argument
|
/frameworks/base/services/tests/servicestests/src/com/android/server/webkit/ |
H A D | WebViewUpdateServiceTest.java | 664 installed /* installed */, null /* signature */, 0 /* updateTime */, 1124 // Each package needs a valid signature since we set isDebuggable to false 1125 Signature signature = new Signature("11"); 1127 Base64.encodeToString(signature.toByteArray(), Base64.DEFAULT); 1154 true /* installed */, new Signature[]{signature}, 0 /* updateTime */, 1159 true /* installed */, new Signature[]{signature}, 0 /* updateTime */, 1165 true /* installed */, new Signature[]{signature}, 0 /* updateTime */,
|
/frameworks/support/emoji/core/src/androidTest/java/androidx/emoji/text/ |
H A D | EmojiCompatTest.java | 789 final String signature = EmojiCompat.get().getAssetSignature(); 790 assertTrue(signature.isEmpty()); 796 final String signature = EmojiCompat.get().getAssetSignature(); 797 assertNotNull(signature); 798 assertFalse(signature.isEmpty());
|
/frameworks/av/drm/libmediadrm/ |
H A D | DrmHal.cpp | 1256 Vector<uint8_t> &signature) { 1268 signature = toVector(hSignature); 1279 Vector<uint8_t> const &signature, bool &match) { 1288 toHidlVec(message), toHidlVec(signature), 1304 Vector<uint8_t> const &wrappedKey, Vector<uint8_t> &signature) { 1320 signature = toVector(hSignature); 1254 sign(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &message, Vector<uint8_t> &signature) argument 1277 verify(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &message, Vector<uint8_t> const &signature, bool &match) argument 1302 signRSA(Vector<uint8_t> const &sessionId, String8 const &algorithm, Vector<uint8_t> const &message, Vector<uint8_t> const &wrappedKey, Vector<uint8_t> &signature) argument
|