/external/chromium/chrome/browser/chromeos/login/ |
H A D | owner_manager.cc | 100 std::vector<uint8> signature; local 101 if (!utils_->Sign(data, &signature, private_key_.get())) { 109 d, return_code, signature)); 115 const std::vector<uint8>& signature, 132 if (!utils_->Verify(data, signature, public_key_)) { 113 Verify(const BrowserThread::ID thread_id, const std::string& data, const std::vector<uint8>& signature, Delegate* d) argument
|
/external/chromium/chrome/browser/extensions/ |
H A D | extension_rlz_module.cc | 148 std::string signature; local 149 EXTENSION_FUNCTION_VALIDATE(args_->GetString(2, &signature)); 170 signature.c_str(), brand.c_str(),
|
H A D | extension_creator.cc | 167 std::vector<uint8>* signature) { 184 signature_creator->Final(signature); 190 const std::vector<uint8>& signature, 208 header.signature_size = signature.size(); 218 if (fwrite(&signature.front(), sizeof(uint8), signature.size(), 219 crx_handle.get()) != signature.size()) { 220 PLOG(ERROR) << "fwrite failed to write signature.front"; 263 std::vector<uint8> signature; local 266 SignZip(zip_path, key_pair.get(), &signature) 165 SignZip(const FilePath& zip_path, crypto::RSAPrivateKey* private_key, std::vector<uint8>* signature) argument 188 WriteCRX(const FilePath& zip_path, crypto::RSAPrivateKey* private_key, const std::vector<uint8>& signature, const FilePath& crx_path) argument [all...] |
/external/dexmaker/src/dx/java/com/android/dx/rop/code/ |
H A D | LocalItem.java | 22 * A local variable item: either a name or a signature or both. 28 /** {@code null-ok;} local variable signature */ 29 private final CstString signature; field in class:LocalItem 32 * Make a new item. If both name and signature are null, null is returned. 37 * @param signature {@code null-ok;} local variable signature 40 public static LocalItem make(CstString name, CstString signature) { argument 41 if (name == null && signature == null) { 45 return new LocalItem (name, signature); 52 * @param signature { 54 LocalItem(CstString name, CstString signature) argument [all...] |
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/signature/ |
H A D | DSASHA1Verify.java | 5 package ch.ethz.ssh2.signature; 98 throw new IOException("Peer sent wrong signature format"); 103 throw new IOException("Peer sent corrupt signature"); 106 throw new IOException("Padding in DSA signature!"); 121 log.debug("decoded ssh-dss signature: first bytes r(" + ((rsArray[0]) & 0xff) + "), s(" 151 log.debug("ssh-dss signature: m: " + m.toString(16)); 152 log.debug("ssh-dss signature: r: " + r.toString(16)); 153 log.debug("ssh-dss signature: s: " + s.toString(16)); 154 log.debug("ssh-dss signature: g: " + g.toString(16)); 155 log.debug("ssh-dss signature [all...] |
H A D | RSASHA1Verify.java | 5 package ch.ethz.ssh2.signature; 62 throw new IOException("Peer sent wrong signature format"); 72 throw new IOException("Error in RSA signature, S is empty."); 76 log.debug("Decoding ssh-rsa signature string (length: " + s.length + ")"); 80 throw new IOException("Padding in RSA signature!"); 159 log.warning("ssh-rsa signature: n.compareTo(s) <= 0"); 169 log.warning("ssh-rsa signature: rsa_block_len < 1"); 182 log.warning("ssh-rsa signature: (v.length - startpos) != (rsa_block_len - 1)"); 188 log.warning("ssh-rsa signature: v[startpos] != 0x01"); 198 log.warning("ssh-rsa signature [all...] |
/external/openssh/ |
H A D | kexecdhs.c | 59 u_char *server_host_key_blob = NULL, *signature = NULL; local 145 if (PRIVSEP(key_sign(server_host_private, &signature, &slen, 155 packet_put_string(signature, slen); 158 xfree(signature);
|
H A D | kexgexc.c | 55 u_char *kbuf, *hash, *signature = NULL, *server_host_key_blob = NULL; local 148 signature = packet_get_string(&slen); 192 if (key_verify(server_host_key, signature, slen, hash, hashlen) != 1) 195 xfree(signature);
|
H A D | kexgexs.c | 59 u_char *kbuf, *hash, *signature = NULL, *server_host_key_blob = NULL; local 190 if (PRIVSEP(key_sign(server_host_private, &signature, &slen, hash, 201 packet_put_string(signature, slen); 204 xfree(signature);
|
H A D | ssh-dss.c | 109 ssh_dss_verify(const Key *key, const u_char *signature, u_int signaturelen, argument 126 /* fetch signature */ 129 memcpy(sigblob, signature, signaturelen); 135 buffer_append(&b, signature, signaturelen); 149 "remaining bytes in signature %d", rlen); 159 /* parse signature */ 184 debug("ssh_dss_verify: signature %s",
|
H A D | ssh-ecdsa.c | 96 ssh_ecdsa_verify(const Key *key, const u_char *signature, u_int signaturelen, argument 115 /* fetch signature */ 117 buffer_append(&b, signature, signaturelen); 130 error("%s: remaining bytes in signature %d", __func__, rlen); 135 /* parse signature */ 163 debug("%s: signature %s", __func__,
|
/external/openssl/crypto/asn1/ |
H A D | a_verify.c | 77 int ASN1_verify(i2d_of_void *i2d, X509_ALGOR *a, ASN1_BIT_STRING *signature, argument 115 if (EVP_VerifyFinal(&ctx,(unsigned char *)signature->data, 116 (unsigned int)signature->length,pkey) <= 0) 135 ASN1_BIT_STRING *signature, void *asn, EVP_PKEY *pkey) 151 /* Convert signature OID into digest and public key OIDs */ 165 signature, pkey); 218 if (EVP_DigestVerifyFinal(&ctx,signature->data, 219 (size_t)signature->length) <= 0) 134 ASN1_item_verify(const ASN1_ITEM *it, X509_ALGOR *a, ASN1_BIT_STRING *signature, void *asn, EVP_PKEY *pkey) argument
|
/external/smack/src/org/xbill/DNS/ |
H A D | RRSIGRecord.java | 8 * Recource Record Signature - An RRSIG provides the digital signature of an 10 * The signature is generated by a key contained in a DNSKEY Record. 31 * @param covered The RRset type covered by this signature 33 * signature 35 * @param expire The time at which the signature expires 36 * @param timeSigned The time at which this signature was generated 39 * @param signature Binary data representing the signature 44 byte [] signature) 47 timeSigned, footprint, signer, signature); 42 RRSIGRecord(Name name, int dclass, long ttl, int covered, int alg, long origttl, Date expire, Date timeSigned, int footprint, Name signer, byte [] signature) argument [all...] |
H A D | SIGRecord.java | 8 * Signature - A SIG provides the digital signature of an RRset, so that 10 * signature is usually generated by a key contained in a KEYRecord 31 * @param covered The RRset type covered by this signature 33 * signature 35 * @param expire The time at which the signature expires 36 * @param timeSigned The time at which this signature was generated 39 * @param signature Binary data representing the signature 44 byte [] signature) 47 timeSigned, footprint, signer, signature); 42 SIGRecord(Name name, int dclass, long ttl, int covered, int alg, long origttl, Date expire, Date timeSigned, int footprint, Name signer, byte [] signature) argument [all...] |
/external/webkit/Source/WebCore/rendering/ |
H A D | RenderArena.cpp | 49 const int signature = 0xDBA00AEA; member in namespace:WebCore 55 int signature; member in struct:WebCore::__anon15939 85 header->signature = signature; 120 ASSERT(header->signature == signature); 123 header->signature = signatureDead;
|
/external/webkit/Source/WebKit/chromium/src/ |
H A D | BoundObject.cpp | 57 v8::Local<v8::Signature> signature = v8::Signature::New(m_hostTemplate); local 65 signature),
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/ |
H A D | AttributeCertificateInfo.java | 19 private AlgorithmIdentifier signature; field in class:AttributeCertificateInfo 59 this.signature = AlgorithmIdentifier.getInstance(seq.getObjectAt(3)); 96 return signature; 131 * signature AlgorithmIdentifier, 149 v.add(signature);
|
H A D | V1TBSCertificateGenerator.java | 16 * signature AlgorithmIdentifier, 30 AlgorithmIdentifier signature; field in class:V1TBSCertificateGenerator 47 AlgorithmIdentifier signature) 49 this.signature = signature; 114 if ((serialNumber == null) || (signature == null) 125 seq.add(signature); 46 setSignature( AlgorithmIdentifier signature) argument
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/signers/ |
H A D | RSADigestSigner.java | 139 * Generate a signature for the message we've been loaded with using the key 147 throw new IllegalStateException("RSADigestSigner not initialised for signature generation."); 160 throw new CryptoException("unable to encode signature: " + e.getMessage(), e); 165 * return true if the internal state represents the signature described in 169 byte[] signature) 185 sig = rsaEngine.processBlock(signature, 0, signature.length); 168 verifySignature( byte[] signature) argument
|
/external/chromium/crypto/ |
H A D | signature_verifier_mac.cc | 24 const uint8* signature, 28 signature_.assign(signature, signature + signature_len); 87 // crtn is CSSMERR_CSP_VERIFY_FAILED if signature verification fails. 22 VerifyInit(const uint8* signature_algorithm, int signature_algorithm_len, const uint8* signature, int signature_len, const uint8* public_key_info, int public_key_info_len) argument
|
H A D | signature_verifier_nss.cc | 26 const uint8* signature, 30 signature_.assign(signature, signature + signature_len); 67 sig.data = const_cast<uint8*>(signature); 76 // A corrupted RSA signature could be detected without the data, so 100 // If signature verification fails, the error code is 24 VerifyInit(const uint8* signature_algorithm, int signature_algorithm_len, const uint8* signature, int signature_len, const uint8* public_key_info, int public_key_info_len) argument
|
H A D | signature_verifier_openssl.cc | 34 const uint8* signature, 50 signature_.assign(signature, signature + signature_len); 32 VerifyInit(const uint8* signature_algorithm, int signature_algorithm_len, const uint8* signature, int signature_len, const uint8* public_key_info, int public_key_info_len) argument
|
H A D | signature_verifier_win.cc | 38 const uint8* signature, 44 // to first swap the order of signature bytes. 46 signature_.push_back(signature[i]); 36 VerifyInit(const uint8* signature_algorithm, int signature_algorithm_len, const uint8* signature, int signature_len, const uint8* public_key_info, int public_key_info_len) argument
|
/external/javassist/src/main/javassist/convert/ |
H A D | TransformAccessArrayField.java | 126 int opcode, String signature) throws BadBytecode { 149 int methodref = cp.addMethodrefInfo(mi, methodName, signature); 125 replace(ConstPool cp, CodeIterator iterator, int pos, int opcode, String signature) argument
|
/external/nist-sip/java/gov/nist/javax/sip/ |
H A D | Utils.java | 55 private static String signature ; field in class:Utils 73 signature = toHexString(Integer.toString(Math.abs( rand.nextInt() % 1000 )).getBytes()); 177 return SIPConstants.BRANCH_MAGIC_COOKIE + Utils.toHexString(bid) + this.signature; 185 return branch != null && branch.endsWith(this.signature); 189 return signature;
|