/aosp_15_r20/external/rust/android-crates-io/crates/acpi/src/ |
D | sdt.rs | 24 /// All SDTs share the same header, and are `length` bytes long. The signature tells us which SDT 101 pub signature: Signature, field 114 fn validate_header_fields(&self, signature: Signature) -> AcpiResult<()> { in validate_header_fields() 115 // Check the signature in validate_header_fields() 116 if self.signature != signature || str::from_utf8(&self.signature.0).is_err() { in validate_header_fields() 117 return Err(AcpiError::SdtInvalidSignature(signature)); in validate_header_fields() 122 return Err(AcpiError::SdtInvalidOemId(signature)); in validate_header_fields() 127 return Err(AcpiError::SdtInvalidTableId(signature)); in validate_header_fields() 134 fn validate_checksum(&self, signature: Signature) -> AcpiResult<()> { in validate_checksum() 143 Err(AcpiError::SdtInvalidChecksum(signature)) in validate_checksum() [all …]
|
/aosp_15_r20/packages/services/Car/service/ |
D | AndroidManifest.xml | 30 <p>Protection level: signature|privileged 33 android:protectionLevel="signature|privileged" 37 <p>Protection level: signature|privileged 40 android:protectionLevel="signature|privileged" 44 <p>Protection level: signature|privileged 47 android:protectionLevel="signature|privileged" 66 <p>Protection level: signature|privileged 70 android:protectionLevel="signature|privileged" 75 <p>Protection level: signature|privileged 78 android:protectionLevel="signature|privileged" [all …]
|
/aosp_15_r20/frameworks/libs/native_bridge_support/android_api/libc/proxy/ |
D | custom_trampolines_arm_to_x86.json | 10 "signature": "i" string 24 "signature": "vpi" string 29 "signature": "vppp" string 35 "signature": "i" string 41 "signature": "ipupu" string 47 "signature": "i" string 53 "signature": "u" string 59 "signature": "pp" string 65 "signature": "pu" string 70 "signature": "ipp" string [all …]
|
D | custom_trampolines_riscv64_to_x86_64.json | 10 "signature": "i" string 24 "signature": "vpi" string 29 "signature": "vppp" string 35 "signature": "i" string 41 "signature": "ipupu" string 47 "signature": "i" string 53 "signature": "u" string 59 "signature": "pp" string 65 "signature": "pu" string 70 "signature": "ipp" string [all …]
|
D | custom_trampolines_arm64_to_x86_64.json | 10 "signature": "i" string 24 "signature": "vpi" string 29 "signature": "vppp" string 35 "signature": "i" string 41 "signature": "ipupu" string 47 "signature": "i" string 53 "signature": "u" string 59 "signature": "pp" string 65 "signature": "pu" string 70 "signature": "ipp" string [all …]
|
/aosp_15_r20/external/google-auth-library-java/oauth2_http/javatests/com/google/auth/oauth2/ |
H A D | AwsRequestSignerTest.java | 87 AwsRequestSignature signature = signer.sign(); in sign_getHost() local 92 + "aws4_request, SignedHeaders=date;host, Signature=" in sign_getHost() 95 assertEquals(expectedSignature, signature.getSignature()); in sign_getHost() 96 assertEquals(expectedAuthHeader, signature.getAuthorizationHeader()); in sign_getHost() 97 assertEquals(BOTOCORE_CREDENTIALS, signature.getSecurityCredentials()); in sign_getHost() 98 assertEquals(DATE, signature.getDate()); in sign_getHost() 99 assertEquals("GET", signature.getHttpMethod()); in sign_getHost() 100 assertEquals("us-east-1", signature.getRegion()); in sign_getHost() 101 assertEquals(URI.create(url).normalize().toString(), signature.getUrl()); in sign_getHost() 118 AwsRequestSignature signature = signer.sign(); in sign_getHostRelativePath() local [all …]
|
/aosp_15_r20/tools/apksig/src/main/java/com/android/apksig/ |
H A D | ApkVerifier.java | 83 * APK signature verifier which mimics the behavior of the Android platform. 105 ApkSigningBlockUtils.VERSION_APK_SIGNATURE_SCHEME_V2, "APK Signature Scheme v2"); in loadSupportedApkSigSchemeNames() 107 ApkSigningBlockUtils.VERSION_APK_SIGNATURE_SCHEME_V3, "APK Signature Scheme v3"); in loadSupportedApkSigSchemeNames() 137 * <p>Verification succeeds iff the APK's signature is expected to verify on all Android 138 * platform versions specified via the {@link Builder}. If the APK's signature is expected to 204 // range. Since the code below skips signature verification based on max SDK the mapping of in verify() 206 // signature for an SDK range that does not support that signature version. For instance an in verify() 207 // APK with V1, V2, and V3 signatures and a max SDK of O would skip the V3 signature in verify() 210 // is in the list of supported signatures, and report a stripped signature. in verify() 214 // include v2 and/or v3 signatures. If none is found, it falls back to JAR signature in verify() [all …]
|
/aosp_15_r20/cts/tests/tests/keystore/src/android/keystore/cts/ |
H A D | SignatureTest.java | 52 import java.security.Signature; 64 * Tests for algorithm-agnostic functionality of {@code Signature} implementations backed by Android 356 // Assert that Android Keystore Provider exposes exactly the expected signature algorithms. in testAlgorithmList() 372 if ("Signature".equalsIgnoreCase(service.getType())) { in testAlgorithmList() 399 Signature signature = Signature.getInstance(sigAlgorithm); in testAndroidKeyStoreKeysHandledByAndroidKeyStoreProviderWhenSigning() local 400 signature.initSign(keyPair.getPrivate()); in testAndroidKeyStoreKeysHandledByAndroidKeyStoreProviderWhenSigning() 401 assertSame(provider, signature.getProvider()); in testAndroidKeyStoreKeysHandledByAndroidKeyStoreProviderWhenSigning() 416 Signature signature = Signature.getInstance(sigAlgorithm); in testAndroidKeyStorePublicKeysAcceptedByHighestPriorityProviderWhenVerifying() local 417 signature.initVerify(keyPair.getPublic()); in testAndroidKeyStorePublicKeysAcceptedByHighestPriorityProviderWhenVerifying() 438 // Generate a signature in testValidSignatureGeneratedForEmptyMessage() [all …]
|
/aosp_15_r20/external/libchrome/base/android/jni_generator/ |
H A D | testMotionEvent.javap7 | 166 #152 = Utf8 Signature 322 Signature: I 328 Signature: I 334 Signature: I 340 Signature: I 346 Signature: I 352 Signature: I 358 Signature: I 364 Signature: I 370 Signature: I [all …]
|
H A D | testMotionEvent.javap | 162 const #152 = Asciz Signature; 319 Signature: I 323 Signature: I 327 Signature: I 331 Signature: I 335 Signature: I 339 Signature: I 343 Signature: I 347 Signature: I 351 Signature: I [all …]
|
/aosp_15_r20/packages/modules/Permission/tests/cts/permissionpolicy/res/raw/ |
D | automotive_android_manifest.xml | 36 android:protectionLevel="signature|privileged" 40 android:protectionLevel="signature|privileged" 44 android:protectionLevel="signature|privileged" 48 android:protectionLevel="signature|privileged" 52 android:protectionLevel="signature|privileged" 56 android:protectionLevel="signature|privileged" 60 android:protectionLevel="signature|privileged" 64 android:protectionLevel="signature|privileged" 68 android:protectionLevel="signature|privileged" 72 android:protectionLevel="signature|privileged" [all …]
|
D | android_manifest.xml | 888 <p>Protection level: signature|privileged 897 android:protectionLevel="signature|privileged" 960 android:protectionLevel="signature" /> 1043 <p>Protection level: signature 1049 android:protectionLevel="signature" /> 1078 android:protectionLevel="role|signature|privileged" /> 1275 android:protectionLevel="signature|privileged" /> 1279 <p>Protection level: signature|appop|preinstalled --> 1282 android:protectionLevel="signature|appop|preinstalled" /> 1297 <p>Protection level: signature|appop|preinstalled --> [all …]
|
/aosp_15_r20/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
H A D | Signature2Test.java | 34 import java.security.Signature; 67 * java.security.Signature#clone() 71 Signature s = Signature.getInstance("DSA", new MySignatureProvider()); in test_clone() 72 Signature clone = (Signature) s.clone(); in test_clone() 78 s = Signature.getInstance("DSA"); in test_clone() 87 * java.security.Signature#getAlgorithm() 90 String alg = Signature.getInstance("DSA").getAlgorithm(); in test_getAlgorithm() 96 * java.security.Signature#getInstance(java.lang.String) 99 Signature.getInstance("DSA"); in test_getInstanceLjava_lang_String() 102 Signature.getInstance("bogus"); in test_getInstanceLjava_lang_String() [all …]
|
/aosp_15_r20/external/mbedtls/tests/suites/ |
H A D | test_suite_pkcs1_v21.data | 513 RSASSA-PSS Signature RSA-1016, SHA-512: minimum salt size not met 517 RSASSA-PSS Signature RSA-520, SHA-512: no possible salt size 521 RSASSA-PSS Signature RSA-528, SHA-512: zero salt size 525 RSASSA-PSS Signature Example 1_1 529 RSASSA-PSS Signature Example 1_1 (verify) 533 RSASSA-PSS Signature Example 1_2 537 RSASSA-PSS Signature Example 1_2 (verify) 541 RSASSA-PSS Signature Example 1_3 545 RSASSA-PSS Signature Example 1_3 (verify) 549 RSASSA-PSS Signature Example 1_4 [all …]
|
/aosp_15_r20/external/openthread/third_party/mbedtls/repo/tests/suites/ |
H A D | test_suite_pkcs1_v21.data | 513 RSASSA-PSS Signature RSA-1016, SHA-512: minimum salt size not met 517 RSASSA-PSS Signature RSA-520, SHA-512: no possible salt size 521 RSASSA-PSS Signature RSA-528, SHA-512: zero salt size 525 RSASSA-PSS Signature Example 1_1 529 RSASSA-PSS Signature Example 1_1 (verify) 533 RSASSA-PSS Signature Example 1_2 537 RSASSA-PSS Signature Example 1_2 (verify) 541 RSASSA-PSS Signature Example 1_3 545 RSASSA-PSS Signature Example 1_3 (verify) 549 RSASSA-PSS Signature Example 1_4 [all …]
|
/aosp_15_r20/out/soong/.intermediates/libcore/core_oj_api_files/gen/gensrcs/libcore/ojluni/src/main/java/java/security/ |
D | Signature.java | 49 * The Signature class is used to provide applications the functionality 50 * of a digital signature algorithm. Digital signatures are used for 53 * <p> The signature algorithm can be, among others, the NIST standard 61 * <p> A Signature object can be used to generate and verify digital 64 * <p> There are three phases to the use of a Signature object for 65 * either signing data or verifying a signature:<ol> 71 * <li>a public key, which initializes the signature for 75 * which initializes the signature for signing 87 * <li>Signing or Verifying a signature on all updated bytes. See the 96 * this {@code Signature} class; all the methods in [all …]
|
/aosp_15_r20/out/soong/.intermediates/libcore/core_oj_api_files/gen/13/libcore/ojluni/src/main/java/java/security/ |
D | Signature.java | 49 * The Signature class is used to provide applications the functionality 50 * of a digital signature algorithm. Digital signatures are used for 53 * <p> The signature algorithm can be, among others, the NIST standard 61 * <p> A Signature object can be used to generate and verify digital 64 * <p> There are three phases to the use of a Signature object for 65 * either signing data or verifying a signature:<ol> 71 * <li>a public key, which initializes the signature for 75 * which initializes the signature for signing 87 * <li>Signing or Verifying a signature on all updated bytes. See the 96 * this {@code Signature} class; all the methods in [all …]
|
/aosp_15_r20/libcore/ojluni/src/main/java/java/security/ |
H A D | Signature.java | 49 * The Signature class is used to provide applications the functionality 50 * of a digital signature algorithm. Digital signatures are used for 53 * <p> The signature algorithm can be, among others, the NIST standard 61 * <p> A Signature object can be used to generate and verify digital 64 * <p> There are three phases to the use of a Signature object for 65 * either signing data or verifying a signature:<ol> 71 * <li>a public key, which initializes the signature for 75 * which initializes the signature for signing 87 * <li>Signing or Verifying a signature on all updated bytes. See the 96 * this {@code Signature} class; all the methods in [all …]
|
/aosp_15_r20/libcore/luni/src/test/java/tests/targets/security/ |
H A D | SignatureTestMD2withRSA.java | 25 import java.security.Signature; 36 Signature signature = Signature.getInstance("MD2withRSA"); in testSignature() local 37 fail("MD2withRSA for signature verification must not be supported"); in testSignature() 43 Signature signature = Signature.getInstance("MD2WithRSA"); in testSignature() local 44 fail("MD2withRSA for signature verification must not be supported"); in testSignature() 50 Signature signature = Signature.getInstance("MD2WITHRSA"); in testSignature() local 51 fail("MD2withRSA for signature verification must not be supported"); in testSignature() 57 Signature signature = Signature.getInstance("MD2withRSAEncryption"); in testSignature() local 58 fail("MD2withRSA for signature verification must not be supported"); in testSignature() 64 Signature signature = Signature.getInstance("MD2WithRSAEncryption"); in testSignature() local [all …]
|
/aosp_15_r20/external/javasqlite/src/main/native/ |
H A D | sqlite_jni.h | 13 * Signature: (Ljava/lang/String;I)V 21 * Signature: (Ljava/lang/String;)V 29 * Signature: ()V 37 * Signature: ()V 45 * Signature: (Ljava/lang/String;LSQLite/Callback;)V 53 * Signature: (Ljava/lang/String;LSQLite/Callback;[Ljava/lang/String;)V 61 * Signature: ()J 69 * Signature: ()V 77 * Signature: ()J 85 * Signature: (LSQLite/BusyHandler;)V [all …]
|
/aosp_15_r20/external/tink/cc/signature/ |
H A D | CMakeLists.txt | 1 tink_module(signature) 32 tink::signature::public_key_verify_wrapper 68 tink::signature::public_key_sign_wrapper 105 tink::signature::ecdsa_verify_key_manager 155 tink::signature::ed25519_verify_key_manager 213 tink::signature::rsa_ssa_pkcs1_verify_key_manager 214 tink::signature::sig_util 267 tink::signature::rsa_ssa_pss_verify_key_manager 268 tink::signature::sig_util 325 tink::signature::ecdsa_verify_key_manager [all …]
|
/aosp_15_r20/external/boringssl/src/util/fipstools/acvp/acvptool/test/vectors/ |
HD | RSA.bz2 | ... : [
26 {
27 "message": "CFCE9895A3633594F902CEF8189A46F06302BAB44E7055831C7493253A8082C3B01B27D08C994036B09EC2631211A1383B7FC06C36AE75F79E242EE499E633BB",
28 "signature": "2DD571DC242EC2C6E2FDE4898985F88218CAFE10830FF8BD2BD8A0742480E098A0DD72B6AB73E7EF2F1188888BF13DFE1FCADFD90F7F5E7D6ABA1912795117EDAF9351E2BCB4EEACC81B484E04B946F091FCF10492B5F61A62B4B43872EC75AF667C14F2322D06099A682AD63CF818366EC94200FD70476111B1EAFB56B3C0FE",
29 "tcId": 6
30 } ... |
/aosp_15_r20/external/cronet/third_party/boringssl/src/util/fipstools/acvp/acvptool/test/vectors/ |
HD | RSA.bz2 | ... : [
26 {
27 "message": "CFCE9895A3633594F902CEF8189A46F06302BAB44E7055831C7493253A8082C3B01B27D08C994036B09EC2631211A1383B7FC06C36AE75F79E242EE499E633BB",
28 "signature": "2DD571DC242EC2C6E2FDE4898985F88218CAFE10830FF8BD2BD8A0742480E098A0DD72B6AB73E7EF2F1188888BF13DFE1FCADFD90F7F5E7D6ABA1912795117EDAF9351E2BCB4EEACC81B484E04B946F091FCF10492B5F61A62B4B43872EC75AF667C14F2322D06099A682AD63CF818366EC94200FD70476111B1EAFB56B3C0FE",
29 "tcId": 6
30 } ... |
/aosp_15_r20/external/ow2-asm/asm-util/src/main/java/org/objectweb/asm/util/ |
H A D | CheckClassAdapter.java | 208 final String signature, in visit() argument 248 if (signature != null) { in visit() 249 checkClassSignature(signature); in visit() 262 super.visit(version, access, name, signature, superName, interfaces); in visit() 380 final String name, final String descriptor, final String signature) { in visitRecordComponent() argument 384 if (signature != null) { in visitRecordComponent() 385 checkFieldSignature(signature); in visitRecordComponent() 388 api, super.visitRecordComponent(name, descriptor, signature)); in visitRecordComponent() 396 final String signature, in visitField() argument 414 if (signature != null) { in visitField() [all …]
|
/aosp_15_r20/out/soong/.intermediates/frameworks/base/core/res/framework-res/android_common/manifest_fixer/ |
D | AndroidManifest.xml | 849 <p>Protection level: signature|privileged 854 …ermdesc_writeVerificationStateE2eeContactKeys" android:protectionLevel="signature|privileged" andr… 898 …sion android:name="android.permission.ACCESS_MESSAGES_ON_ICC" android:protectionLevel="signature"/> 952 <p>Protection level: signature 955 …droid:description="@string/permdesc_bindCellBroadcastService" android:protectionLevel="signature"/> 978 …="android.permission.SATELLITE_COMMUNICATION" android:protectionLevel="role|signature|privileged"/> 998 …="android.permission.OBSERVE_PICTURE_PROFILES" android:protectionLevel="signature|privileged" andr… 1004 <p> Protection level: signature|privileged|vendor privileged 1007 …mission.MANAGE_GLOBAL_PICTURE_QUALITY_SERVICE" android:protectionLevel="signature|privileged|vendo… 1013 <p> Protection level: signature|privileged|vendor privileged [all …]
|