/dalvik/vm/arch/arm/ |
HintsEABI.cpp | 59 const char* sig = dexProtoGetShorty(proto); local 68 sig++; 71 sigByte = *(sig++);
|
/external/openssh/ |
ssh-dss.c | 49 DSA_SIG *sig; local 65 sig = DSA_do_sign(digest, dlen, key->dsa); 68 if (sig == NULL) { 73 rlen = BN_num_bytes(sig->r); 74 slen = BN_num_bytes(sig->s); 76 error("bad sig size %u %u", rlen, slen); 77 DSA_SIG_free(sig); 81 BN_bn2bin(sig->r, sigblob+ SIGBLOB_LEN - INTBLOB_LEN - rlen); 82 BN_bn2bin(sig->s, sigblob+ SIGBLOB_LEN - slen); 83 DSA_SIG_free(sig); 112 DSA_SIG *sig; local [all...] |
ssh-ecdsa.c | 50 ECDSA_SIG *sig; local 67 sig = ECDSA_do_sign(digest, dlen, key->ecdsa); 70 if (sig == NULL) { 76 buffer_put_bignum2(&bb, sig->r); 77 buffer_put_bignum2(&bb, sig->s); 78 ECDSA_SIG_free(sig); 99 ECDSA_SIG *sig; local 136 if ((sig = ECDSA_SIG_new()) == NULL) 138 if ((sig->r = BN_new()) == NULL || 139 (sig->s = BN_new()) == NULL [all...] |
/external/openssl/crypto/rsa/ |
rsa_sign.c | 73 X509_SIG sig; local 102 sig.algor= &algor; 103 sig.algor->algorithm=OBJ_nid2obj(type); 104 if (sig.algor->algorithm == NULL) 109 if (sig.algor->algorithm->length == 0) 116 sig.algor->parameter= ¶meter; 118 sig.digest= &digest; 119 sig.digest->data=(unsigned char *)m; /* TMP UGLY CAST */ 120 sig.digest->length=m_len; 122 i=i2d_X509_SIG(&sig,NULL) 162 X509_SIG *sig=NULL; local [all...] |
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/pulse/ |
mainloop-signal.h | 52 pa_signal_event* pa_signal_new(int sig, void (*callback) (pa_mainloop_api *api, pa_signal_event*e, int sig, void *userdata), void *userdata);
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/pulse/ |
mainloop-signal.h | 52 pa_signal_event* pa_signal_new(int sig, void (*callback) (pa_mainloop_api *api, pa_signal_event*e, int sig, void *userdata), void *userdata);
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/pulse/ |
mainloop-signal.h | 52 pa_signal_event* pa_signal_new(int sig, void (*callback) (pa_mainloop_api *api, pa_signal_event*e, int sig, void *userdata), void *userdata);
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/packets/ |
PacketUserauthRequestPublicKey.java | 24 byte[] sig; field in class:PacketUserauthRequestPublicKey 27 String pkAlgorithmName, byte[] pk, byte[] sig) 33 this.sig = sig; 64 tw.writeString(sig, 0, sig.length);
|
/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/ |
DSABase.java | 65 BigInteger[] sig = signer.generateSignature(hash); local 67 return encoder.encode(sig[0], sig[1]); 83 BigInteger[] sig; local 87 sig = encoder.decode(sigBytes); 94 return signer.verifySignature(hash, sig[0], sig[1]);
|
/external/openssl/crypto/ecdsa/ |
ecdsa.h | 90 * \param sig pointer to the ECDSA_SIG structure 92 void ECDSA_SIG_free(ECDSA_SIG *sig); 96 * \param sig pointer to the ECDSA_SIG object 100 int i2d_ECDSA_SIG(const ECDSA_SIG *sig, unsigned char **pp); 104 * \param sig pointer to ECDSA_SIG pointer (may be NULL) 109 ECDSA_SIG *d2i_ECDSA_SIG(ECDSA_SIG **sig, const unsigned char **pp, long len); 121 * private key (note: sig must point to ECDSA_size(eckey) bytes of memory). 137 * \param sig ECDSA_SIG structure 143 const ECDSA_SIG *sig, EC_KEY* eckey); 181 * private key (note: sig must point to ECDSA_size(eckey) bytes of memory) [all...] |
ecs_vrf.c | 70 const ECDSA_SIG *sig, EC_KEY *eckey) 75 return ecdsa->meth->ecdsa_do_verify(dgst, dgst_len, sig, eckey);
|
/external/openssl/include/openssl/ |
ecdsa.h | 90 * \param sig pointer to the ECDSA_SIG structure 92 void ECDSA_SIG_free(ECDSA_SIG *sig); 96 * \param sig pointer to the ECDSA_SIG object 100 int i2d_ECDSA_SIG(const ECDSA_SIG *sig, unsigned char **pp); 104 * \param sig pointer to ECDSA_SIG pointer (may be NULL) 109 ECDSA_SIG *d2i_ECDSA_SIG(ECDSA_SIG **sig, const unsigned char **pp, long len); 121 * private key (note: sig must point to ECDSA_size(eckey) bytes of memory). 137 * \param sig ECDSA_SIG structure 143 const ECDSA_SIG *sig, EC_KEY* eckey); 181 * private key (note: sig must point to ECDSA_size(eckey) bytes of memory) [all...] |
/external/valgrind/main/none/tests/amd64/ |
faultstatus.c | 14 int sig; member in struct:test 30 static int testsig(int sig, int want) 32 if (sig != want) { 33 fprintf(stderr, " FAIL: expected signal %d, not %d\n", want, sig); 58 static void handler(int sig, siginfo_t *si, void *uc) 62 ok = ok && testsig(sig, cur_test->sig); 116 #define T(n, sig, code, addr) { test##n, sig, code, addr }
|
/external/valgrind/main/none/tests/ |
faultstatus.c | 35 int sig; member in struct:test 53 static int testsig(int sig, int want) 55 if (sig != want) { 56 fprintf(stderr, " FAIL: expected signal %d, not %d\n", want, sig); 87 static void handler(int sig, siginfo_t *si, void *uc) 91 ok = ok && testsig(sig, cur_test->sig); 155 #define T(n, sig, code, addr) { test##n, sig, code, addr }
|
/external/valgrind/main/none/tests/x86/ |
faultstatus.c | 15 int sig; member in struct:test 33 static int testsig(int sig, int want) 35 if (sig != want) { 36 fprintf(stderr, " FAIL: expected signal %d, not %d\n", want, sig); 61 static void handler(int sig, siginfo_t *si, void *uc) 65 ok = ok && testsig(sig, cur_test->sig); 134 #define T(n, sig, code, addr) { test##n, sig, code, addr }
|
/external/chromium/crypto/ |
signature_creator_mac.cc | 62 ScopedCSSMData sig; local 63 CSSM_RETURN crtn = CSSM_SignDataFinal(sig_handle_, sig); 70 signature->assign(sig->Data, sig->Data + sig->Length);
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
SignedObjectTest.java | 38 Signature sig = Signature.getInstance("SHA1withDSA"); local 49 SignedObject so = new SignedObject(prop, tkp.getPrivate(), sig); 54 assertTrue("verify() failed", so.verify(tkp.getPublic(), sig));
|
/external/apache-harmony/security/src/test/impl/java.injected/java/security/ |
Signature_Impl2Test.java | 61 Signature sig = Signature.getInstance("ABC"); local 62 checkSig1(sig, p); 69 Signature sig = Signature.getInstance("CBA"); local 70 checkSig2(sig, p); 77 Signature sig = Signature.getInstance("ABC", "MyProvider"); local 78 checkSig1(sig, p); 85 Signature sig = Signature.getInstance("CBA", "MyProvider"); local 86 checkSig2(sig, p); 95 Signature sig = Signature.getInstance("ABC", p1); local 96 checkSig1(sig, p1) 104 Signature sig = Signature.getInstance("CBA", p2); local [all...] |
/external/openssh/openbsd-compat/ |
sigact.h | 81 int sigaction(int sig, struct sigaction *sigact, struct sigaction *osigact); 85 int sigdelset (sigset_t *mask, int sig); 86 int sigaddset (sigset_t *mask, int sig);
|
/external/qemu/android/config/ |
check-esd.c | 33 #define ESD_FUNCTION(ret,name,sig) \ 34 static ret (*func_ ## name)sig; 55 #define ESD_FUNCTION(ret,name,sig) \
|
/external/qemu/ |
dynlink.h | 32 * macro which must contain a sequence of DYNLINK_FUNC(ret,name,sig) 36 * the function's name as provided by the library, and 'sig' is 65 #define DYNLINK_FUNC(ret,name,sig) \ 66 static ret (*_dynlink_##name) sig ; 85 #define DYNLINK_FUNC(ret,name,sig) \
|
/bionic/libc/unistd/ |
sigwait.c | 47 int sigwait(const sigset_t *set, int *sig) 71 *sig = ret;
|
/dalvik/hit/src/com/android/hit/ |
StackFrame.java | 32 public StackFrame(long id, String method, String sig, String file, 36 mSignature = sig;
|
/external/webkit/Source/WebCore/bridge/jni/jsc/ |
JavaFieldJSC.h | 54 void dispatchSetValueToInstance(ExecState*, const JavaInstance*, jvalue, const char* name, const char* sig) const; 55 jvalue dispatchValueFromInstance(ExecState*, const JavaInstance*, const char* name, const char* sig, JavaType returnType) const;
|
/external/webkit/Tools/Scripts/ |
detect-mismatched-virtual-const | 131 my $sig; 132 for $sig (keys %signature_map) { 133 #print "\n$sig\n"; 135 my @entries = @{$signature_map{$sig}}; 155 print "Both const and non-const versions of $sig:\n";
|