/dalvik/libcore/security/src/main/java/org/bouncycastle/jce/provider/ |
JDKISOSignature.java | 77 byte[] sig = signer.generateSignature(); 79 return sig;
|
X509CertificateObject.java | 241 throw new RuntimeException("exception getting sig parameters " + e); 636 byte[] sig = this.getSignature(); 638 buf.append(" Signature: ").append(new String(Hex.encode(sig, 0, 20))).append(nl); 639 for (int i = 20; i < sig.length; i += 20) 641 if (i < sig.length - 20) 643 buf.append(" ").append(new String(Hex.encode(sig, i, 20))).append(nl); 647 buf.append(" ").append(new String(Hex.encode(sig, i, sig.length - i))).append(nl);
|
/dalvik/vm/arch/x86/ |
Hints386ABI.c | 63 const char* sig = dexProtoGetShorty(proto); local 69 sigByte = *(sig++);
|
/dalvik/vm/arch/x86-atom/ |
Hints386ABI.c | 53 const char* sig = dexProtoGetShorty(proto); local 63 sigByte = *(++sig);
|
/external/openssl/crypto/ocsp/ |
ocsp_cl.c | 123 OCSP_SIGNATURE *sig; local 126 sig = req->optionalSignature; 127 if (!sig) return 0; 129 if (!sig->certs && !(sig->certs = sk_X509_new_null())) 132 if(!sk_X509_push(sig->certs, cert)) return 0; 151 OCSP_SIGNATURE *sig; local 157 if (!(req->optionalSignature = sig = OCSP_SIGNATURE_new())) goto err;
|
ocsp_prn.c | 142 OCSP_SIGNATURE *sig = o->optionalSignature; local 167 if (sig) 169 X509_signature_print(bp, sig->signatureAlgorithm, sig->signature); 170 for (i=0; i<sk_X509_num(sig->certs); i++) 172 X509_print(bp, sk_X509_value(sig->certs,i)); 173 PEM_write_bio_X509(bp,sk_X509_value(sig->certs,i));
|
/external/qemu/ |
qemu-thread.c | 145 void qemu_thread_signal(QemuThread *thread, int sig) 149 err = pthread_kill(thread->thread, sig);
|
/external/webkit/WebCore/bridge/jni/jsc/ |
JNIBridgeJSC.h | 53 void dispatchSetValueToInstance(ExecState*, const JavaInstance*, jvalue, const char* name, const char* sig) const; 54 jvalue dispatchValueFromInstance(ExecState*, const JavaInstance*, const char* name, const char* sig, JNIType returnType) const;
|
/system/netd/ |
main.cpp | 37 static void sigchld_handler(int sig); 124 static void sigchld_handler(int sig) {
|
/dalvik/libcore/security/src/main/java/org/bouncycastle/jce/ |
PKCS7SignedData.java | 69 private Signature sig; field in class:PKCS7SignedData 212 sig = Signature.getInstance(getDigestAlgorithm(), provider); 214 sig.initVerify(signCert.getPublicKey()); 334 sig = Signature.getInstance(getDigestAlgorithm(), provider); 336 sig.initSign(privKey); 382 sig.initVerify(signCert.getPublicKey()); 386 sig.initSign(privKey); 441 sig.update(buf); 450 sig.update(buf, off, len); 459 return sig.verify(digest) [all...] |
/external/openssl/crypto/dsa/ |
dsa_ossl.c | 72 static int dsa_do_verify(const unsigned char *dgst, int dgst_len, DSA_SIG *sig, 296 static int dsa_do_verify(const unsigned char *dgst, int dgst_len, DSA_SIG *sig, 327 if (BN_is_zero(sig->r) || BN_is_negative(sig->r) || 328 BN_ucmp(sig->r, dsa->q) >= 0) 333 if (BN_is_zero(sig->s) || BN_is_negative(sig->s) || 334 BN_ucmp(sig->s, dsa->q) >= 0) 342 if ((BN_mod_inverse(&u2,sig->s,dsa->q,ctx)) == NULL) goto err; 351 if (!BN_mod_mul(&u2,sig->r,&u2,dsa->q,ctx)) goto err [all...] |
/bionic/libc/unistd/ |
siglist.c | 31 #define __BIONIC_SIGDEF(x,y,z) [ SIG##x ] = z,
|
signame.c | 31 #define __BIONIC_SIGDEF(x,y,z) [ SIG##x ] = #x,
|
/external/dropbear/libtomcrypt/src/pk/ecc/ |
ecc_verify_hash.c | 38 @param sig The signature to verify 46 int ecc_verify_hash(const unsigned char *sig, unsigned long siglen, 55 LTC_ARGCHK(sig != NULL); 83 if ((err = der_decode_sequence_multi(sig, siglen,
|
/external/grub/stage2/ |
smp-imps.h | 52 * This is the value that must be in the "sig" member of the MP 60 * This is the value that must be in the "sig" member of the MP 105 unsigned sig; member in struct:imps_fps 121 unsigned sig; member in struct:imps_cth
|
/external/openssl/crypto/ecdsa/ |
ecs_sign.c | 77 *sig, unsigned int *siglen, EC_KEY *eckey) 79 return ECDSA_sign_ex(type, dgst, dlen, sig, siglen, NULL, NULL, eckey); 83 *sig, unsigned int *siglen, const BIGNUM *kinv, const BIGNUM *r, 94 *siglen = i2d_ECDSA_SIG(s, &sig);
|
/external/openssl/crypto/pkcs7/ |
pkcs7err.c | 120 {ERR_REASON(PKCS7_R_MIME_SIG_PARSE_ERROR),"mime sig parse error"}, 130 {ERR_REASON(PKCS7_R_NO_SIG_CONTENT_TYPE) ,"no sig content type"}, 137 {ERR_REASON(PKCS7_R_PKCS7_SIG_PARSE_ERROR),"pkcs7 sig parse error"}, 141 {ERR_REASON(PKCS7_R_SIG_INVALID_MIME_TYPE),"sig invalid mime type"},
|
/external/svox/pico/lib/ |
picosig.h | 33 * Pico Sig is the PU that makes the parametric representation produce a speech signal.
|
/sdk/emulator/qtools/ |
dmtrace.h | 26 const char *sig);
|
/cts/tools/test-progress-new/src/testprogress2/ |
TestTargetNew.java | 157 private ExecutableMemberDoc findMethodSignatureIn(String sig, 162 if (equalsSignature(mdoc, sig)) { 168 if (equalsSignature(mdoc, sig)) { 175 private ExecutableMemberDoc findTargetMethodInSelfAndSupers(String sig, 177 ExecutableMemberDoc mem = findMethodSignatureIn(sig, targetClass); 186 mem = findTargetMethodInSelfAndSupers(sig, iface); 194 mem = findTargetMethodInSelfAndSupers(sig, superclass);
|
/frameworks/base/tools/layoutlib/create/src/com/android/tools/layoutlib/create/ |
RenameClassAdapter.java | 199 String renameTypeSignature(String sig) { 200 if (sig == null) { 203 SignatureReader reader = new SignatureReader(sig); 206 sig = writer.toString(); 207 return sig; 215 String renameFieldSignature(String sig) { 216 if (sig == null) { 219 SignatureReader reader = new SignatureReader(sig); 222 sig = writer.toString(); 223 return sig; [all...] |
/external/strace/ |
strace.c | 93 static void interrupt P((int sig)); 109 static void reaper P((int sig)); 1210 /* detach traced process; continue with sig */ 1213 detach(tcp, sig) 1215 int sig; 1223 sig = SIGKILL; 1235 if ((error = ptrace(PTRACE_DETACH, tcp->pid, (char *) 1, sig)) == 0) { 1286 tcp->pid, (char *) 1, sig)) < 0) { 1305 /* PTRACE_DETACH won't respect `sig' argument, so we post it here. */ 1306 if (sig && kill(tcp->pid, sig) < 0 [all...] |
/external/wpa_supplicant/ |
eloop_win.c | 46 int sig; member in struct:eloop_signal 344 static void eloop_handle_signal(int sig) 350 if (eloop.signals[i].sig == sig) { 374 eloop.signals[i].handler(eloop.signals[i].sig, 382 eloop.term_signal.handler(eloop.term_signal.sig, 389 int eloop_register_signal(int sig, eloop_signal_handler handler, 400 tmp[eloop.signal_count].sig = sig;
|
/external/wpa_supplicant_6/wpa_supplicant/src/utils/ |
eloop_win.c | 46 int sig; member in struct:eloop_signal 344 static void eloop_handle_signal(int sig) 350 if (eloop.signals[i].sig == sig) { 374 eloop.signals[i].handler(eloop.signals[i].sig, 382 eloop.term_signal.handler(eloop.term_signal.sig, 389 int eloop_register_signal(int sig, eloop_signal_handler handler, 400 tmp[eloop.signal_count].sig = sig;
|
/cts/tools/signature-tools/ |
sig-check | 56 sig --compare \ 57 --from sig ${ANDROID_BUILD_TOP}/cts/tools/signature-tools/spec/android.spec \
|