/external/bouncycastle/src/main/java/org/bouncycastle/jce/netscape/ |
NetscapeCertRequest.java | 200 Signature sig = Signature.getInstance(sigAlg.getObjectId().getId(), local 202 sig.initVerify(pubkey); 203 sig.update(content.getBytes()); 205 return sig.verify(sigBits); 220 Signature sig = Signature.getInstance(sigAlg.getObjectId().getId(), local 225 sig.initSign(priv_key, rand); 229 sig.initSign(priv_key); 239 sig.update(new DERSequence(pkac).getEncoded(ASN1Encodable.DER)); 246 sigBits = sig.sign();
|
/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/ |
JDKDigestSignature.java | 164 byte[] sig; 169 sig = cipher.processBlock(sigBytes, 0, sigBytes.length); 178 if (sig.length == expected.length) 180 for (int i = 0; i < sig.length; i++) 182 if (sig[i] != expected[i]) 188 else if (sig.length == expected.length - 2) // NULL left out 190 int sigOffset = sig.length - hash.length - 2; 198 if (sig[sigOffset + i] != expected[expectedOffset + i]) // check hash 206 if (sig[i] != expected[i]) // check header less NULL
|
/external/chromium/chrome/browser/chromeos/login/ |
owner_manager_unittest.cc | 182 std::vector<uint8> sig(0, 2); 186 EXPECT_CALL(*mock_, Verify(Eq(data), Eq(sig), Eq(fake_public_key_))) 199 sig, 211 std::vector<uint8> sig(0, 2); 219 EXPECT_CALL(*mock_, Verify(Eq(data), Eq(sig), Eq(fake_public_key_))) 231 sig, 240 std::vector<uint8> sig(0, 2); 245 .WillOnce(DoAll(SetArgumentPointee<1>(sig), 250 MockSigner delegate(OwnerManager::SUCCESS, sig);
|
/external/chromium/crypto/ |
signature_verifier_mac.cc | 81 CSSM_DATA sig; local 82 sig.Data = const_cast<uint8*>(&signature_[0]); 83 sig.Length = signature_.size(); 84 CSSM_RETURN crtn = CSSM_VerifyDataFinal(sig_handle_, &sig);
|
/external/ipsec-tools/src/racoon/ |
rsalist.h | 59 RSA *rsa_try_check_rsasign(vchar_t *source, vchar_t *sig, struct genlist *list);
|
/external/valgrind/main/none/tests/linux/ |
blockfault.c | 6 static void handler(int sig, siginfo_t *info, void *v) 8 printf("info: sig=%d code=%d addr=%p\n",
|
/external/valgrind/main/none/tests/ |
sigstackgrowth.c | 31 static void handler(int sig)
|
/external/webkit/Tools/DumpRenderTree/chromium/ |
LayoutTestHelper.mm | 86 static void simpleSignalHandler(int sig) 90 exit(128 + sig);
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
SignatureTest.java | 122 Signature sig = getTestSignature(); local 123 sig.initVerify((PublicKey)null); 142 Signature sig = getTestSignature(); local 143 sig.initVerify(new MyCertificate()); 197 Signature sig = getTestSignature(); local 198 sig.initSign(null, null); 354 Signature sig = getTestSignature(); local 355 sig.update((byte) 42); 383 Signature sig = getTestSignature(); local 384 sig.update(b) 391 Signature sig = getTestSignature(); local 478 Signature sig = getTestSignature(); local 500 Signature sig = getTestSignature(); local [all...] |
/external/dbus/dbus/ |
dbus-message-util.c | 983 char sig[64]; local [all...] |
/external/bouncycastle/src/main/java/org/bouncycastle/jce/ |
PKCS10CertificationRequest.java | 399 Signature sig; local 402 sig = Signature.getInstance(signatureAlgorithm); 406 sig = Signature.getInstance(signatureAlgorithm, provider); 409 sig.initSign(signingKey); 413 sig.update(reqInfo.getEncoded(ASN1Encodable.DER)); 420 this.sigBits = new DERBitString(sig.sign()); 513 Signature sig; local 519 sig = Signature.getInstance(getSignatureName(sigAlgId)); 523 sig = Signature.getInstance(getSignatureName(sigAlgId), provider); 537 sig = Signature.getInstance(signatureAlgorithm) [all...] |
/external/valgrind/main/callgrind/ |
threads.c | 202 CLG_DEBUG(0, ">> pre_signal(TID %d, sig %d, alt_st %s)\n", 219 CLG_(current_state).sig = sigNum; 232 CLG_ASSERT(CLG_(current_state).sig >0); 235 CLG_(post_signal)( CLG_(current_tid), CLG_(current_state).sig ); 243 CLG_DEBUG(0, ">> post_signal(TID %d, sig %d)\n", 248 CLG_ASSERT(sigNum == CLG_(current_state).sig); 287 es->sig = -1; 290 CLG_(current_state).sig = es->sig; 313 /* not initialized: call_stack_bottom, sig */ [all...] |
/external/openssl/crypto/dsa/ |
dsa_ossl.c | 71 static int dsa_do_verify(const unsigned char *dgst, int dgst_len, DSA_SIG *sig, 307 static int dsa_do_verify(const unsigned char *dgst, int dgst_len, DSA_SIG *sig, 339 if (BN_is_zero(sig->r) || BN_is_negative(sig->r) || 340 BN_ucmp(sig->r, dsa->q) >= 0) 345 if (BN_is_zero(sig->s) || BN_is_negative(sig->s) || 346 BN_ucmp(sig->s, dsa->q) >= 0) 354 if ((BN_mod_inverse(&u2,sig->s,dsa->q,ctx)) == NULL) goto err; 368 if (!BN_mod_mul(&u2,sig->r,&u2,dsa->q,ctx)) goto err [all...] |
/development/ndk/platforms/android-3/include/ |
signal.h | 119 extern int sigwait(const sigset_t *set, int *sig); 120 extern int siginterrupt(int sig, int flag);
|
/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/asymmetric/ec/ |
Signature.java | 273 BigInteger[] sig = new BigInteger[2]; local 275 sig[0] = ((DERInteger)s.getObjectAt(0)).getValue(); 276 sig[1] = ((DERInteger)s.getObjectAt(1)).getValue(); 278 return sig; 330 BigInteger[] sig = new BigInteger[2]; local 338 sig[0] = new BigInteger(1, first); 339 sig[1] = new BigInteger(1, second); 341 return sig;
|
/external/grub/stage2/ |
smp-imps.h | 52 * This is the value that must be in the "sig" member of the MP 60 * This is the value that must be in the "sig" member of the MP 105 unsigned sig; member in struct:imps_fps 121 unsigned sig; member in struct:imps_cth
|
/external/mesa3d/src/glsl/ |
opt_dead_code.cpp | 133 ir_function_signature *sig = local 135 if (do_dead_code(&sig->body))
|
/external/openssh/ |
schnorr.h | 48 u_char **sig, u_int *siglen); 57 const u_char *sig, u_int siglen);
|
/external/openssl/crypto/ocsp/ |
ocsp_cl.c | 123 OCSP_SIGNATURE *sig; local 126 sig = req->optionalSignature; 127 if (!sig) return 0; 129 if (!sig->certs && !(sig->certs = sk_X509_new_null())) 132 if(!sk_X509_push(sig->certs, cert)) return 0; 151 OCSP_SIGNATURE *sig; local 157 if (!(req->optionalSignature = sig = OCSP_SIGNATURE_new())) goto err;
|
/external/valgrind/main/none/tests/x86-linux/ |
sigcontext.c | 12 static void handler1(int sig, siginfo_t *si, ucontext_t *uc) 27 static void handler2(int sig, struct sigcontext sc)
|
/external/wpa_supplicant_6/wpa_supplicant/src/utils/ |
eloop.h | 67 * @sig: Signal number 74 typedef void (*eloop_signal_handler)(int sig, void *eloop_ctx, 224 * @sig: Signal number (e.g., SIGHUP) 239 int eloop_register_signal(int sig, eloop_signal_handler handler,
|
/external/wpa_supplicant_8/src/utils/ |
eloop.h | 61 * @sig: Signal number 66 typedef void (*eloop_signal_handler)(int sig, void *signal_ctx); 212 * @sig: Signal number (e.g., SIGHUP) 223 int eloop_register_signal(int sig, eloop_signal_handler handler,
|
/libcore/luni/src/main/java/org/apache/harmony/security/utils/ |
JarUtils.java | 117 Signature sig = null; local 124 sig = Signature.getInstance(alg, OpenSSLProvider.PROVIDER_NAME); 127 if (sig == null) { 133 sig = Signature.getInstance(alg, OpenSSLProvider.PROVIDER_NAME); 138 sig.initVerify(certs[issuerSertIndex]); 149 sig.update(sfBytes); 151 sig.update(sigInfo.getEncodedAuthenticatedAttributes()); 170 if (!sig.verify(sigInfo.getEncryptedDigest())) {
|
/prebuilts/ndk/android-ndk-r4/platforms/android-3/arch-arm/usr/include/ |
signal.h | 116 extern int sigwait(const sigset_t *set, int *sig); 117 extern int siginterrupt(int sig, int flag);
|
/prebuilts/ndk/android-ndk-r4/platforms/android-4/arch-arm/usr/include/ |
signal.h | 116 extern int sigwait(const sigset_t *set, int *sig); 117 extern int siginterrupt(int sig, int flag);
|