/external/ipsec-tools/src/racoon/ |
isakmp_base.c | 98 * sig: HDR, SA, Idii, Ni_b 287 * sig: HDR, SA, Idir, Nr_b, [ CR ] 434 * sig: HDR, KE, [ CR, ] [CERT,] SIG_I 532 /* add SIG payload */ 534 iph1->sig, ISAKMP_NPTYPE_SIG); 606 * sig: HDR, KE, [CERT,] SIG_R 810 * sig: HDR, SA, Idii, Ni_b 958 * sig: HDR, SA, Idir, Nr_b, [ CR ] 1122 * sig: HDR, KE, [ CR, ] [CERT,] SIG_I 1274 * sig: HDR, KE, [CERT,] SIG_ [all...] |
rsalist.h | 59 RSA *rsa_try_check_rsasign(vchar_t *source, vchar_t *sig, struct genlist *list);
|
crypto_openssl.c | 940 eay_check_x509sign(source, sig, cert) 942 vchar_t *sig; 965 res = eay_rsa_verify(source, sig, evp->pkey.rsa); 979 eay_check_rsasign(source, sig, rsa) 981 vchar_t *sig; 984 return eay_rsa_verify(source, sig, rsa); 1106 vchar_t *sig = NULL; local 1115 sig = eay_rsa_sign(src, evp->pkey.rsa); 1119 return sig; 1134 vchar_t *sig = NULL local [all...] |
rsalist.c | 201 rsa_try_check_rsasign(vchar_t *source, vchar_t *sig, struct genlist *list) 209 if (eay_check_rsasign(source, sig, key->rsa) == 0) {
|
/external/webkit/WebCore/bridge/jni/ |
JNIUtility.cpp | 100 jmethodID getMethodID(jobject obj, const char* name, const char* sig) 108 mid = env->GetMethodID(cls, name, sig); 111 mid = env->GetStaticMethodID(cls, name, sig);
|
JNIUtility.h | 73 jmethodID getMethodID(jobject, const char* name, const char* sig); 201 static T callJNIMethodV(jobject obj, const char* name, const char* sig, va_list args) 209 jmethodID mid = env->GetMethodID(cls, name, sig);
|
/build/target/product/security/ |
README | 27 % openssl dgst -binary -sha1 -sign testkey.pem FILE > FILE.sig
|
/external/bluetooth/bluez/compat/ |
msdun.c | 51 static void sig_alarm(int sig)
|
/external/dbus/dbus/ |
dbus-marshal-validate.c | 484 /* 1 byte sig len, sig typecodes, align to 492 DBusString sig; local 506 _dbus_string_init_const_len (&sig, p, claimed_len); 507 reason = _dbus_validate_signature_with_reason (&sig, 0, 508 _dbus_string_get_length (&sig)); 523 contained_type = _dbus_first_type_in_signature (&sig, 0); 539 _dbus_type_reader_init_types_only (&sub, &sig, 0); 646 _dbus_verbose ("validating body from pos %d len %d sig '%s'\n",
|
dbus-marshal-recursive.c | 269 /* Variant is 1 byte sig length (without nul), signature with nul, 730 _dbus_verbose (" type reader %p init type_pos = %d value_pos = %d remaining sig '%s'\n", 755 _dbus_verbose (" type reader %p init types only type_pos = %d remaining sig '%s'\n", 871 _dbus_verbose (" type reader %p read basic type_pos = %d value_pos = %d remaining sig '%s'\n", 954 _dbus_verbose (" type reader %p read fixed array type_pos = %d value_pos = %d remaining sig '%s'\n", 1021 _dbus_verbose (" type reader %p RECURSED type_pos = %d value_pos = %d remaining sig '%s'\n", 1043 _dbus_verbose (" type reader %p START next() { type_pos = %d value_pos = %d remaining sig '%s' current_type = %s\n", 1055 _dbus_verbose (" type reader %p END next() type_pos = %d value_pos = %d remaining sig '%s' current_type = %s\n", [all...] |
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_pkcs.h | 64 const unsigned char *sig, unsigned long siglen,
|
/external/libpng/contrib/gregbook/ |
readpng.c | 85 /* return value = 0 for success, 1 for bad sig, 2 for bad IHDR, 4 for no mem */ 89 uch sig[8]; local 95 fread(sig, 1, 8, infile); 96 if (png_sig_cmp(sig, 0, 8))
|
/external/openssl/crypto/asn1/ |
asn1_err.c | 192 {ERR_REASON(ASN1_R_ASN1_SIG_PARSE_ERROR) ,"asn1 sig parse error"}, 253 {ERR_REASON(ASN1_R_MIME_SIG_PARSE_ERROR) ,"mime sig parse error"}, 267 {ERR_REASON(ASN1_R_NO_SIG_CONTENT_TYPE) ,"no sig content type"}, 277 {ERR_REASON(ASN1_R_SIG_INVALID_MIME_TYPE),"sig invalid mime type"},
|
/external/openssl/crypto/des/ |
speed.c | 129 SIGRETTYPE sig_done(int sig); 130 SIGRETTYPE sig_done(int sig) 135 sig=sig;
|
/external/openssl/crypto/rc2/ |
rc2speed.c | 124 SIGRETTYPE sig_done(int sig); 125 SIGRETTYPE sig_done(int sig) 130 sig=sig;
|
/external/webkit/WebCore/bridge/jni/jsc/ |
JNIBridgeJSC.cpp | 79 jvalue JavaField::dispatchValueFromInstance(ExecState* exec, const JavaInstance* instance, const char* name, const char* sig, JNIType returnType) const 89 jmethodID mid = env->GetMethodID(cls, name, sig); 163 void JavaField::dispatchSetValueToInstance(ExecState* exec, const JavaInstance* instance, jvalue javaValue, const char* name, const char* sig) const 171 jmethodID mid = env->GetMethodID(cls, name, sig);
|
/hardware/broadcom/wlan/bcm4329/src/include/ |
linuxver.h | 429 #define KILL_PROC(pid, sig) \ 433 if (tsk) send_sig(sig, tsk, 1); \ 436 #define KILL_PROC(pid, sig) \ 438 kill_proc(pid, sig, 1); \
|
/external/bluetooth/bluez/src/ |
dbus-common.c | 198 char sig[2] = { type, '\0' }; local 200 dbus_message_iter_open_container(iter, DBUS_TYPE_VARIANT, sig, &value);
|
/external/bluetooth/bluez/tools/ |
ppporc.c | 57 static void sig_hup(int sig) 62 static void sig_term(int sig)
|
/external/e2fsprogs/lib/ss/ |
listen.c | 31 static sigret_t print_prompt(int sig __SS_ATTR((unused))) 41 static sigret_t listen_int_handler(int sig __SS_ATTR((unused)))
|
/external/openssl/crypto/ecdsa/ |
ecs_vrf.c | 70 const ECDSA_SIG *sig, EC_KEY *eckey) 75 return ecdsa->meth->ecdsa_do_verify(dgst, dgst_len, sig, eckey);
|
/external/openssl/crypto/pem/ |
pem_seal.c | 145 int PEM_SealFinal(PEM_ENCODE_SEAL_CTX *ctx, unsigned char *sig, int *sigl, 174 *sigl=EVP_EncodeBlock(sig,s,i);
|
/system/core/debuggerd/ |
debuggerd.c | 308 const char *get_signame(int sig) 310 switch(sig) { 321 void dump_fault_addr(int tfd, int pid, int sig) 330 sig, get_signame(sig), si.si_addr); 334 void dump_crash_banner(int tfd, unsigned pid, unsigned tid, int sig) 353 if(sig) dump_fault_addr(tfd, tid, sig);
|
/external/bluetooth/bluez/gdbus/ |
object.c | 55 static void print_arguments(GString *gstr, const char *sig, 60 for (i = 0; sig[i]; i++) { 71 for (len = 0; len < (sizeof(type) - 1) && sig[i]; len++, i++) { 72 switch (sig[i]){ 97 type[len] = sig[i];
|
/external/qemu/hw/ |
usb-msd.c | 54 uint32_t sig; member in struct:usb_msd_cbw 64 uint32_t sig; member in struct:usb_msd_csw 164 csw.sig = cpu_to_le32(0x53425355); 372 if (le32_to_cpu(cbw.sig) != 0x43425355) { 374 le32_to_cpu(cbw.sig));
|