HomeSort by relevance Sort by last modified time
    Searched refs:sig (Results 26 - 50 of 695) sorted by null

12 3 4 5 6 7 8 91011>>

  /dalvik/vm/arch/arm/
HintsEABI.cpp 59 const char* sig = dexProtoGetShorty(proto); local
68 sig++;
71 sigByte = *(sig++);
  /external/openssh/
ssh-dss.c 49 DSA_SIG *sig; local
65 sig = DSA_do_sign(digest, dlen, key->dsa);
68 if (sig == NULL) {
73 rlen = BN_num_bytes(sig->r);
74 slen = BN_num_bytes(sig->s);
76 error("bad sig size %u %u", rlen, slen);
77 DSA_SIG_free(sig);
81 BN_bn2bin(sig->r, sigblob+ SIGBLOB_LEN - INTBLOB_LEN - rlen);
82 BN_bn2bin(sig->s, sigblob+ SIGBLOB_LEN - slen);
83 DSA_SIG_free(sig);
112 DSA_SIG *sig; local
    [all...]
ssh-ecdsa.c 50 ECDSA_SIG *sig; local
67 sig = ECDSA_do_sign(digest, dlen, key->ecdsa);
70 if (sig == NULL) {
76 buffer_put_bignum2(&bb, sig->r);
77 buffer_put_bignum2(&bb, sig->s);
78 ECDSA_SIG_free(sig);
99 ECDSA_SIG *sig; local
136 if ((sig = ECDSA_SIG_new()) == NULL)
138 if ((sig->r = BN_new()) == NULL ||
139 (sig->s = BN_new()) == NULL
    [all...]
  /external/openssl/crypto/rsa/
rsa_sign.c 73 X509_SIG sig; local
102 sig.algor= &algor;
103 sig.algor->algorithm=OBJ_nid2obj(type);
104 if (sig.algor->algorithm == NULL)
109 if (sig.algor->algorithm->length == 0)
116 sig.algor->parameter= &parameter;
118 sig.digest= &digest;
119 sig.digest->data=(unsigned char *)m; /* TMP UGLY CAST */
120 sig.digest->length=m_len;
122 i=i2d_X509_SIG(&sig,NULL)
162 X509_SIG *sig=NULL; local
    [all...]
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/pulse/
mainloop-signal.h 52 pa_signal_event* pa_signal_new(int sig, void (*callback) (pa_mainloop_api *api, pa_signal_event*e, int sig, void *userdata), void *userdata);
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/pulse/
mainloop-signal.h 52 pa_signal_event* pa_signal_new(int sig, void (*callback) (pa_mainloop_api *api, pa_signal_event*e, int sig, void *userdata), void *userdata);
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/pulse/
mainloop-signal.h 52 pa_signal_event* pa_signal_new(int sig, void (*callback) (pa_mainloop_api *api, pa_signal_event*e, int sig, void *userdata), void *userdata);
  /external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/packets/
PacketUserauthRequestPublicKey.java 24 byte[] sig; field in class:PacketUserauthRequestPublicKey
27 String pkAlgorithmName, byte[] pk, byte[] sig)
33 this.sig = sig;
64 tw.writeString(sig, 0, sig.length);
  /external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/
DSABase.java 65 BigInteger[] sig = signer.generateSignature(hash); local
67 return encoder.encode(sig[0], sig[1]);
83 BigInteger[] sig; local
87 sig = encoder.decode(sigBytes);
94 return signer.verifySignature(hash, sig[0], sig[1]);
  /external/openssl/crypto/ecdsa/
ecdsa.h 90 * \param sig pointer to the ECDSA_SIG structure
92 void ECDSA_SIG_free(ECDSA_SIG *sig);
96 * \param sig pointer to the ECDSA_SIG object
100 int i2d_ECDSA_SIG(const ECDSA_SIG *sig, unsigned char **pp);
104 * \param sig pointer to ECDSA_SIG pointer (may be NULL)
109 ECDSA_SIG *d2i_ECDSA_SIG(ECDSA_SIG **sig, const unsigned char **pp, long len);
121 * private key (note: sig must point to ECDSA_size(eckey) bytes of memory).
137 * \param sig ECDSA_SIG structure
143 const ECDSA_SIG *sig, EC_KEY* eckey);
181 * private key (note: sig must point to ECDSA_size(eckey) bytes of memory)
    [all...]
ecs_vrf.c 70 const ECDSA_SIG *sig, EC_KEY *eckey)
75 return ecdsa->meth->ecdsa_do_verify(dgst, dgst_len, sig, eckey);
  /external/openssl/include/openssl/
ecdsa.h 90 * \param sig pointer to the ECDSA_SIG structure
92 void ECDSA_SIG_free(ECDSA_SIG *sig);
96 * \param sig pointer to the ECDSA_SIG object
100 int i2d_ECDSA_SIG(const ECDSA_SIG *sig, unsigned char **pp);
104 * \param sig pointer to ECDSA_SIG pointer (may be NULL)
109 ECDSA_SIG *d2i_ECDSA_SIG(ECDSA_SIG **sig, const unsigned char **pp, long len);
121 * private key (note: sig must point to ECDSA_size(eckey) bytes of memory).
137 * \param sig ECDSA_SIG structure
143 const ECDSA_SIG *sig, EC_KEY* eckey);
181 * private key (note: sig must point to ECDSA_size(eckey) bytes of memory)
    [all...]
  /external/valgrind/main/none/tests/amd64/
faultstatus.c 14 int sig; member in struct:test
30 static int testsig(int sig, int want)
32 if (sig != want) {
33 fprintf(stderr, " FAIL: expected signal %d, not %d\n", want, sig);
58 static void handler(int sig, siginfo_t *si, void *uc)
62 ok = ok && testsig(sig, cur_test->sig);
116 #define T(n, sig, code, addr) { test##n, sig, code, addr }
  /external/valgrind/main/none/tests/
faultstatus.c 35 int sig; member in struct:test
53 static int testsig(int sig, int want)
55 if (sig != want) {
56 fprintf(stderr, " FAIL: expected signal %d, not %d\n", want, sig);
87 static void handler(int sig, siginfo_t *si, void *uc)
91 ok = ok && testsig(sig, cur_test->sig);
155 #define T(n, sig, code, addr) { test##n, sig, code, addr }
  /external/valgrind/main/none/tests/x86/
faultstatus.c 15 int sig; member in struct:test
33 static int testsig(int sig, int want)
35 if (sig != want) {
36 fprintf(stderr, " FAIL: expected signal %d, not %d\n", want, sig);
61 static void handler(int sig, siginfo_t *si, void *uc)
65 ok = ok && testsig(sig, cur_test->sig);
134 #define T(n, sig, code, addr) { test##n, sig, code, addr }
  /external/chromium/crypto/
signature_creator_mac.cc 62 ScopedCSSMData sig; local
63 CSSM_RETURN crtn = CSSM_SignDataFinal(sig_handle_, sig);
70 signature->assign(sig->Data, sig->Data + sig->Length);
  /external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/
SignedObjectTest.java 38 Signature sig = Signature.getInstance("SHA1withDSA"); local
49 SignedObject so = new SignedObject(prop, tkp.getPrivate(), sig);
54 assertTrue("verify() failed", so.verify(tkp.getPublic(), sig));
  /external/apache-harmony/security/src/test/impl/java.injected/java/security/
Signature_Impl2Test.java 61 Signature sig = Signature.getInstance("ABC"); local
62 checkSig1(sig, p);
69 Signature sig = Signature.getInstance("CBA"); local
70 checkSig2(sig, p);
77 Signature sig = Signature.getInstance("ABC", "MyProvider"); local
78 checkSig1(sig, p);
85 Signature sig = Signature.getInstance("CBA", "MyProvider"); local
86 checkSig2(sig, p);
95 Signature sig = Signature.getInstance("ABC", p1); local
96 checkSig1(sig, p1)
104 Signature sig = Signature.getInstance("CBA", p2); local
    [all...]
  /external/openssh/openbsd-compat/
sigact.h 81 int sigaction(int sig, struct sigaction *sigact, struct sigaction *osigact);
85 int sigdelset (sigset_t *mask, int sig);
86 int sigaddset (sigset_t *mask, int sig);
  /external/qemu/android/config/
check-esd.c 33 #define ESD_FUNCTION(ret,name,sig) \
34 static ret (*func_ ## name)sig;
55 #define ESD_FUNCTION(ret,name,sig) \
  /external/qemu/
dynlink.h 32 * macro which must contain a sequence of DYNLINK_FUNC(ret,name,sig)
36 * the function's name as provided by the library, and 'sig' is
65 #define DYNLINK_FUNC(ret,name,sig) \
66 static ret (*_dynlink_##name) sig ;
85 #define DYNLINK_FUNC(ret,name,sig) \
  /bionic/libc/unistd/
sigwait.c 47 int sigwait(const sigset_t *set, int *sig)
71 *sig = ret;
  /dalvik/hit/src/com/android/hit/
StackFrame.java 32 public StackFrame(long id, String method, String sig, String file,
36 mSignature = sig;
  /external/webkit/Source/WebCore/bridge/jni/jsc/
JavaFieldJSC.h 54 void dispatchSetValueToInstance(ExecState*, const JavaInstance*, jvalue, const char* name, const char* sig) const;
55 jvalue dispatchValueFromInstance(ExecState*, const JavaInstance*, const char* name, const char* sig, JavaType returnType) const;
  /external/webkit/Tools/Scripts/
detect-mismatched-virtual-const 131 my $sig;
132 for $sig (keys %signature_map) {
133 #print "\n$sig\n";
135 my @entries = @{$signature_map{$sig}};
155 print "Both const and non-const versions of $sig:\n";

Completed in 429 milliseconds

12 3 4 5 6 7 8 91011>>