/external/chromium/crypto/ |
H A D | signature_creator_unittest.cc | 32 std::vector<uint8> signature; local 33 ASSERT_TRUE(signer->Final(&signature)); 47 &signature.front(), signature.size(),
|
H A D | signature_verifier_unittest.cc | 114 // The signature algorithm is specified as the following ASN.1 structure: 127 // RSA signature, a big integer in the big-endian byte order. 128 const uint8 signature[256] = { local 201 // We use the signature verifier to perform four signature verification 210 signature, sizeof(signature), 221 signature, sizeof(signature), 230 // Test 3: verify the signature wit [all...] |
H A D | signature_creator_mac.cc | 61 bool SignatureCreator::Final(std::vector<uint8>* signature) { argument 70 signature->assign(sig->Data, sig->Data + sig->Length);
|
H A D | signature_creator_nss.cc | 59 bool SignatureCreator::Final(std::vector<uint8>* signature) { argument 66 signature->assign(signature_item.data,
|
H A D | signature_creator_openssl.cc | 39 bool SignatureCreator::Final(std::vector<uint8>* signature) { argument 42 signature->resize(EVP_PKEY_size(key)); 45 int rv = EVP_SignFinal(sign_context_, vector_as_array(signature), &len, key); 47 signature->clear(); 50 signature->resize(len);
|
H A D | signature_creator_win.cc | 39 bool SignatureCreator::Final(std::vector<uint8>* signature) { argument 55 signature->push_back(temp[i - 1]);
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/signature/ |
H A D | RSASignature.java | 5 package ch.ethz.ssh2.signature;
|
H A D | DSASignature.java | 5 package ch.ethz.ssh2.signature;
|
H A D | RSAPublicKey.java | 5 package ch.ethz.ssh2.signature;
|
H A D | DSAPrivateKey.java | 5 package ch.ethz.ssh2.signature;
|
H A D | DSAPublicKey.java | 5 package ch.ethz.ssh2.signature;
|
H A D | RSAPrivateKey.java | 5 package ch.ethz.ssh2.signature;
|
/external/kernel-headers/original/asm-x86/ |
H A D | ist.h | 23 __u32 signature; member in struct:ist_info
|
/external/oauth/core/src/main/java/net/oauth/signature/ |
H A D | HMAC_SHA1.java | 17 package net.oauth.signature; 39 String signature = base64Encode(computeSignature(baseString)); 40 return signature; 49 protected boolean isValid(String signature, String baseString) argument 53 byte[] actual = decodeBase64(signature);
|
H A D | PLAINTEXT.java | 17 package net.oauth.signature; 34 protected boolean isValid(String signature, String baseString) argument 36 return signature.equals(getSignature()); 40 if (signature == null) { 41 signature = OAuth.percentEncode(getConsumerSecret()) + '&' 44 return signature; 47 private String signature = null; field in class:PLAINTEXT 52 signature = null; 60 signature = null;
|
H A D | RSA_SHA1.java | 17 package net.oauth.signature; 193 byte[] signature = sign(baseString.getBytes(OAuth.ENCODING)); 194 return base64Encode(signature); 203 protected boolean isValid(String signature, String baseString) argument 206 return verify(decodeBase64(signature), 227 private boolean verify(byte[] signature, byte[] message) argument 237 return verifier.verify(signature);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/ |
H A D | SignerWithRecovery.java | 11 * part of signature verification. 29 * @param signature the signature that we are in the process of verifying. 32 public void updateWithRecoveredMessage(byte[] signature) argument
|
H A D | Signer.java | 27 * generate a signature for the message we've been loaded with using 34 * return true if the internal state represents the signature described 37 public boolean verifySignature(byte[] signature); argument
|
/external/dbus/dbus/ |
H A D | dbus-marshal-byteswap-util.c | 35 DBusString signature; local 39 if (!_dbus_string_init (&signature) || !_dbus_string_init (&body)) 47 &signature, &body)) 59 _dbus_marshal_byteswap (&signature, 0, 64 _dbus_type_reader_init (&body_reader, byte_order, &signature, 0, 66 _dbus_type_reader_init (©_reader, opposite_order, &signature, 0, 71 _dbus_verbose_bytes_of_string (&signature, 0, 72 _dbus_string_get_length (&signature)); 84 _dbus_string_set_length (&signature, 0); 89 _dbus_string_free (&signature); [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
H A D | X509SignatureUtil.java | 35 Signature signature, 41 AlgorithmParameters sigParams = AlgorithmParameters.getInstance(signature.getAlgorithm(), signature.getProvider()); 52 if (signature.getAlgorithm().endsWith("MGF1")) 56 signature.setParameter(sigParams.getParameterSpec(PSSParameterSpec.class)); 34 setSignatureParameters( Signature signature, ASN1Encodable params) argument
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/packets/ |
H A D | PacketKexDHReply.java | 23 byte[] signature; field in class:PacketKexDHReply 40 signature = tr.readByteString(); 57 return signature;
|
H A D | PacketKexDhGexReply.java | 23 byte[] signature; field in class:PacketKexDhGexReply 39 signature = tr.readByteString(); 57 return signature;
|
/external/openssh/ |
H A D | kexdhc.c | 53 u_char *server_host_key_blob = NULL, *signature = NULL; local 110 signature = packet_get_string(&slen); 146 if (key_verify(server_host_key, signature, slen, hash, hashlen) != 1) 149 xfree(signature);
|
H A D | kexdhs.c | 56 u_char *kbuf, *hash, *signature = NULL, *server_host_key_blob = NULL; local 147 if (PRIVSEP(key_sign(server_host_private, &signature, &slen, hash, 157 packet_put_string(signature, slen); 160 xfree(signature);
|
H A D | kexecdhc.c | 57 u_char *server_host_key_blob = NULL, *signature = NULL; local 109 signature = packet_get_string(&slen); 146 if (key_verify(server_host_key, signature, slen, hash, hashlen) != 1) 149 xfree(signature);
|