/external/conscrypt/common/src/main/java/org/conscrypt/ |
D | OpenSSLSignatureRawRSA.java | 157 protected boolean engineVerify(byte[] sigBytes) throws SignatureException { in engineVerify() argument 169 if (sigBytes.length > inputBuffer.length) { in engineVerify() 170 throw new SignatureException("Input signature length is too large: " + sigBytes.length in engineVerify() 178 resultSize = NativeCrypto.RSA_public_decrypt(sigBytes.length, sigBytes, in engineVerify()
|
D | OpenSSLSignatureRawECDSA.java | 115 protected boolean engineVerify(byte[] sigBytes) throws SignatureException { in engineVerify() argument 123 NativeCrypto.ECDSA_verify(buffer.toByteArray(), sigBytes, key.getNativeRef()); in engineVerify()
|
D | OpenSSLSignature.java | 244 protected boolean engineVerify(byte[] sigBytes) throws SignatureException { in engineVerify() argument 247 return NativeCrypto.EVP_DigestVerifyFinal(ctxLocal, sigBytes, 0, sigBytes.length); in engineVerify()
|
/external/conscrypt/repackaged/common/src/main/java/com/android/org/conscrypt/ |
D | OpenSSLSignatureRawRSA.java | 161 protected boolean engineVerify(byte[] sigBytes) throws SignatureException { in engineVerify() argument 173 if (sigBytes.length > inputBuffer.length) { in engineVerify() 174 throw new SignatureException("Input signature length is too large: " + sigBytes.length in engineVerify() 182 resultSize = NativeCrypto.RSA_public_decrypt(sigBytes.length, sigBytes, in engineVerify()
|
D | OpenSSLSignatureRawECDSA.java | 119 protected boolean engineVerify(byte[] sigBytes) throws SignatureException { in engineVerify() argument 127 NativeCrypto.ECDSA_verify(buffer.toByteArray(), sigBytes, key.getNativeRef()); in engineVerify()
|
D | OpenSSLSignature.java | 247 protected boolean engineVerify(byte[] sigBytes) throws SignatureException { in engineVerify() argument 250 return NativeCrypto.EVP_DigestVerifyFinal(ctxLocal, sigBytes, 0, sigBytes.length); in engineVerify()
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/util/ |
D | DSABase.java | 67 byte[] sigBytes) in engineVerify() argument 76 sig = encoding.decode(signer.getOrder(), sigBytes); in engineVerify()
|
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/jcajce/provider/asymmetric/util/ |
D | DSABase.java | 71 byte[] sigBytes) in engineVerify() argument 80 sig = encoding.decode(signer.getOrder(), sigBytes); in engineVerify()
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/rsa/ |
D | DigestSignatureSpi.java | 151 byte[] sigBytes) in engineVerify() argument 163 sig = cipher.processBlock(sigBytes, 0, sigBytes.length); in engineVerify()
|
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/jcajce/provider/asymmetric/rsa/ |
D | DigestSignatureSpi.java | 155 byte[] sigBytes) in engineVerify() argument 167 sig = cipher.processBlock(sigBytes, 0, sigBytes.length); in engineVerify()
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/ |
D | SignerInfoGenerator.java | 220 byte[] sigBytes = signer.getSignature(); in generate() 226 parameters.put(CMSAttributeTableGenerator.SIGNATURE, Arrays.clone(sigBytes)); in generate() 234 signedAttr, digestEncryptionAlgorithm, new DEROctetString(sigBytes), unsignedAttr); in generate()
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/dsa/ |
D | DSASigner.java | 122 byte[] sigBytes) in engineVerify() argument 133 sig = encoding.decode(signer.getOrder(), sigBytes); in engineVerify()
|
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/jcajce/provider/asymmetric/dsa/ |
D | DSASigner.java | 126 byte[] sigBytes) in engineVerify() argument 137 sig = encoding.decode(signer.getOrder(), sigBytes); in engineVerify()
|
/external/conscrypt/repackaged/openjdk-integ-tests/src/test/java/com/android/org/conscrypt/javax/net/ssl/ |
D | SSLSocketVersionCompatibilityTest.java | 856 protected boolean engineVerify(byte[] sigBytes) throws SignatureException { in engineVerify() argument 857 return delegate.verify(sigBytes); in engineVerify()
|
/external/conscrypt/openjdk-integ-tests/src/test/java/org/conscrypt/javax/net/ssl/ |
D | SSLSocketVersionCompatibilityTest.java | 848 protected boolean engineVerify(byte[] sigBytes) throws SignatureException { in engineVerify() argument 849 return delegate.verify(sigBytes); in engineVerify()
|
/external/conscrypt/common/src/jni/main/cpp/conscrypt/ |
D | native_crypto.cc | 2876 ScopedByteArrayRO sigBytes(env, signature); in NativeCrypto_EVP_DigestVerifyFinal() local 2877 if (sigBytes.get() == nullptr) { in NativeCrypto_EVP_DigestVerifyFinal() 2881 if (ARRAY_OFFSET_LENGTH_INVALID(sigBytes, offset, len)) { in NativeCrypto_EVP_DigestVerifyFinal() 2887 const unsigned char* sigBuf = reinterpret_cast<const unsigned char*>(sigBytes.get()); in NativeCrypto_EVP_DigestVerifyFinal()
|