/external/tcpdump/ |
signature.c | 126 u_int8_t sig[16]; local 140 strlen(sigsecret), sig); 142 if (memcmp(rcvsig, sig, sizeof(sig)) == 0) { 147 for (i = 0; i < sizeof(sig); ++i) { 148 (void)printf("%02x", sig[i]);
|
/external/valgrind/coregrind/m_gdbserver/ |
signals.c | 208 const char *target_signal_to_name (enum target_signal sig) 210 if ((sig >= TARGET_SIGNAL_FIRST) && (sig <= TARGET_SIGNAL_LAST) 211 && signals[sig].name != NULL) 212 return signals[sig].name; 222 enum target_signal sig; local 230 for (sig = TARGET_SIGNAL_HUP; 231 sig < TARGET_SIGNAL_LAST; 232 sig = (enum target_signal) ((int) sig + 1) [all...] |
/external/vboot_reference/firmware/lib21/ |
api.c | 46 const struct vb2_signature *sig = NULL; local 63 sig = (const struct vb2_signature *) 66 if (!memcmp(guid, &sig->guid, sizeof(*guid))) 69 hash_offset += sig->c.total_size; 90 sd->hash_tag = vb2_offset_of(ctx->workbuf, sig); 91 sd->hash_remaining_size = sig->data_size; 94 *size = sig->data_size; 97 rv = vb2ex_hwcrypto_digest_init(sig->hash_alg, sig->data_size); 100 sig->hash_alg) 126 const struct vb2_signature *sig; local [all...] |
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
SignedObjectTest.java | 38 Signature sig = Signature.getInstance("SHA1withDSA"); local 49 SignedObject so = new SignedObject(prop, tkp.getPrivate(), sig); 54 assertTrue("verify() failed", so.verify(tkp.getPublic(), sig));
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/jcajce/ |
JcaContentVerifierProviderBuilder.java | 89 Signature sig = helper.createSignature(algorithm); local 91 sig.initVerify(certificate.getPublicKey()); 93 stream = new SignatureOutputStream(sig); 159 Signature sig = helper.createSignature(algorithm); 161 sig.initVerify(publicKey); 163 return new SignatureOutputStream(sig); 295 private Signature sig; 297 SignatureOutputStream(Signature sig) 299 this.sig = sig; [all...] |
/external/libpng/contrib/gregbook/ |
readpng.c | 86 /* return value = 0 for success, 1 for bad sig, 2 for bad IHDR, 4 for no mem */ 90 uch sig[8]; local 96 fread(sig, 1, 8, infile); 97 if (png_sig_cmp(sig, 0, 8))
|
/external/mesa3d/src/glsl/ |
ir_function.cpp | 143 ir_function_signature *const sig = local 146 switch (parameter_lists_match(& sig->parameters, actual_parameters)) { 149 return sig; 152 match = sig; 209 ir_function_signature *const sig = local 212 if (parameter_lists_match_exact(&sig->parameters, actual_parameters)) 213 return sig;
|
lower_output_reads.cpp | 131 ir_function_signature *sig = (ir_function_signature *) closure; local 132 sig->body.push_tail(copy(sig, (ir_variable *) key, (ir_variable *) data)); 143 output_read_remover::visit_leave(ir_function_signature *sig) 145 if (strcmp(sig->function_name(), "main") != 0) 148 hash_table_call_foreach(replacements, emit_main_copy, sig);
|
ir_print_visitor.cpp | 211 ir_function_signature *const sig = (ir_function_signature *) iter.get(); local 213 sig->accept(this);
|
/external/valgrind/none/tests/mips32/ |
SignalException.c | 13 int sig; member in struct:test 21 static int testsig(int sig, int want) 23 if (sig != want) { 24 fprintf(stderr, " FAIL: expected signal %d, not %d\n", want, sig); 39 static void handler(int sig, siginfo_t *si, void *uc) 43 ok = ok && testsig(sig, curr_test->sig); 88 #define T(n, sig, code) { test##n, sig, code }
|
/external/vboot_reference/firmware/lib20/ |
common.c | 14 uint8_t *vb2_signature_data(struct vb2_signature *sig) 16 return (uint8_t *)sig + sig->sig_offset; 60 const struct vb2_signature *sig) 63 sig, sizeof(*sig), 64 sig->sig_offset, sig->sig_size); 68 struct vb2_signature *sig, 72 uint8_t *sig_data = vb2_signature_data(sig); 138 struct vb2_signature *sig; local 207 struct vb2_signature *sig = &preamble->preamble_signature; local [all...] |
/external/vboot_reference/tests/ |
vb20_rsa_padding_tests.c | 47 uint8_t sig[RSA1024NUMBYTES]; local 55 Memcpy(sig, signatures[0], sizeof(sig)); 56 TEST_SUCC(vb2_rsa_verify_digest(key, sig, test_message_sha1_hash, &wb), 57 "RSA Padding Test valid sig"); 62 Memcpy(sig, signatures[i], sizeof(sig)); 63 if (!vb2_rsa_verify_digest(key, sig, 80 uint8_t sig[RSA1024NUMBYTES]; local 86 Memcpy(sig, signatures[0], sizeof(sig)) [all...] |
vb2_rsa_utility_tests.c | 31 int vb2_check_padding(const uint8_t *sig, const struct vb2_public_key *key); 38 uint8_t sig[RSA1024NUMBYTES]; local 45 /* Crypto algorithm to sig algorithm mapping */ 57 /* Sig size */ 59 "Sig size RSA1024"); 61 "Sig size RSA2048"); 63 "Sig size RSA4096"); 65 "Sig size RSA8192"); 67 "Sig size invalid algorithm"); 69 "Sig size no signing algorithm") [all...] |
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
SignedObjectTest.java | 51 Signature sig = Signature.getInstance("SHA1withDSA"); local 62 SignedObject so = new SignedObject(prop, tkp.getPrivate(), sig); 67 assertTrue("verify() failed", so.verify(tkp.getPublic(), sig));
|
Signature2Test.java | 191 Signature sig = Signature.getInstance("DSA"); local 193 sig.getParameters(); 214 Signature sig = Signature.getInstance("DSA"); local 217 sig.getParameter("r"); 218 sig.getParameter("s"); 246 Signature sig = Signature.getInstance("DSA"); local 247 sig.initSign(getDsaKeys().getPrivate(), new SecureRandom()); 253 Signature sig = Signature.getInstance("DSA"); local 254 sig.initSign(getRsaKeys().getPrivate(), new SecureRandom()); 306 Signature sig = Signature.getInstance("DSA") local 323 Signature sig = Signature.getInstance("DSA"); local 340 Signature sig = Signature.getInstance("DSA"); local 358 Signature sig = Signature.getInstance("DSA"); local 376 Signature sig = Signature.getInstance("DSA"); local 409 Signature sig = Signature.getInstance("DSA"); local 420 Signature sig = Signature.getInstance("DSA"); local 438 Signature sig = Signature.getInstance("DSA"); local 459 Signature sig = Signature.getInstance("DSA"); local [all...] |
SignatureTest.java | 122 Signature sig = getTestSignature(); local 123 sig.initVerify((PublicKey)null); 142 Signature sig = getTestSignature(); local 143 sig.initVerify(new MyCertificate()); 197 Signature sig = getTestSignature(); local 198 sig.initSign(null, null); 354 Signature sig = getTestSignature(); local 355 sig.update((byte) 42); 383 Signature sig = getTestSignature(); local 384 sig.update(b) 391 Signature sig = getTestSignature(); local 478 Signature sig = getTestSignature(); local 500 Signature sig = getTestSignature(); local [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/netscape/ |
NetscapeCertRequest.java | 208 Signature sig = Signature.getInstance(sigAlg.getObjectId().getId(), local 210 sig.initVerify(pubkey); 211 sig.update(content.getBytes()); 213 return sig.verify(sigBits); 228 Signature sig = Signature.getInstance(sigAlg.getAlgorithm().getId(), local 233 sig.initSign(priv_key, rand); 237 sig.initSign(priv_key); 247 sig.update(new DERSequence(pkac).getEncoded(ASN1Encoding.DER)); 254 sigBits = sig.sign();
|
/external/mockito/cglib-and-asm/src/org/mockito/cglib/proxy/ |
MethodInterceptorGenerator.java | 88 Signature sig = method.getSignature(); local 94 sigMap.put(sig.toString(), methodProxyField); 118 if (sig.getArgumentTypes().length == 0) { 126 e.unbox_or_zero(sig.getReturnType()); 180 Signature sig = method.getSignature(); local 183 e.push(sig.getName()); 187 e.push(sig.getDescriptor()); 199 Signature sig = method.getSignature(); local 208 e.push(sig.getDescriptor()); 209 e.push(sig.getName()) [all...] |
/build/tools/signtos/ |
SignTos.java | 225 Signature sig = Signature.getInstance(getSignatureAlgorithm(signingKey)); local 226 sig.initSign(signingKey); 245 sig.update(buffer, 0, bytesRead); 251 sig.sign(sigBlock, 1, sigBlock.length - 1);
|
/cts/tools/signature-tools/src/signature/io/impl/ |
BinaryApi.java | 52 return api.getName().replaceAll(" ", "_").concat(".sig");
70 IApi sig = null;
local 72 sig = (IApi) ois.readObject();
77 sig.setName(name);
81 return sig;
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/ |
SignedObjectTest.java | 44 private Signature sig; field in class:SignedObjectTest 50 sig = Signature.getInstance("SHA1withDSA"); 63 o = new SignedObject(prop, tkp.getPrivate(), sig); 90 if (!test.verify(tkp.getPublic(), sig)) {
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/ |
Certificate.java | 27 DERBitString sig; field in class:Certificate 64 sig = DERBitString.getInstance(seq.getObjectAt(2)); 124 return sig;
|
CertificateList.java | 33 DERBitString sig; field in class:CertificateList 70 sig = DERBitString.getInstance(seq.getObjectAt(2)); 100 return sig; 129 v.add(sig);
|
X509CertificateStructure.java | 30 DERBitString sig; field in class:X509CertificateStructure 67 sig = DERBitString.getInstance(seq.getObjectAt(2)); 122 return sig;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/util/ |
DSABase.java | 56 BigInteger[] sig = signer.generateSignature(hash); local 58 return encoder.encode(sig[0], sig[1]); 74 BigInteger[] sig; local 78 sig = encoder.decode(sigBytes); 85 return signer.verifySignature(hash, sig[0], sig[1]);
|