Searched defs:signature (Results 76 - 100 of 181) sorted by relevance

12345678

/external/opencv/otherlibs/highgui/
H A Dgrfmt_base.cpp96 char signature[4096]; local
102 assert( cur_sign_len <= (int)sizeof( signature ) );
107 sign_len = (int)fread( signature, 1, cur_sign_len, f );
110 if( cur_sign_len <= sign_len && CheckSignature( signature ) )
118 bool GrFmtFilterFactory::CheckSignature( const char* signature )
120 return m_sign_len > 0 && signature != 0 &&
121 memcmp( signature, m_signature, m_sign_len ) == 0;
/external/openssh/
H A Dssh-keysign.c157 u_char *signature, *data; local
249 if (key_sign(keys[i], &signature, &slen, data, dlen) != 0)
255 buffer_put_string(&b, signature, slen);
H A Dssh-pkcs11-client.c108 u_char *blob, *signature = NULL; local
128 signature = buffer_get_string(&msg, &slen);
130 memcpy(to, signature, slen);
133 xfree(signature);
H A Dssh-pkcs11-helper.c169 u_char *blob, *data, *signature = NULL; local
182 signature = xmalloc(slen);
183 if ((ret = RSA_private_encrypt(dlen, data, signature,
194 buffer_put_string(&msg, signature, slen);
200 if (signature != NULL)
201 xfree(signature);
H A Dssh-rsa.c38 /* RSASSA-PKCS1-v1_5 (PKCS #1 v2.0 signature) with SHA1 */
88 /* encode signature */
107 ssh_rsa_verify(const Key *key, const u_char *signature, u_int signaturelen, argument
129 buffer_append(&b, signature, signaturelen);
142 error("ssh_rsa_verify: remaining bytes in signature %d", rlen);
146 /* RSA_verify expects a signature of RSA_size */
175 debug("ssh_rsa_verify: signature %scorrect", (ret==0) ? "in" : "");
/external/smack/src/org/xbill/DNS/
H A DSIGBase.java25 protected byte [] signature; field in class:SIGBase
33 byte [] signature)
48 this.signature = signature;
61 signature = in.readByteArray();
80 signature = st.getBase64();
106 sb.append(base64.formatString(signature, 64, "\t",
110 sb.append(base64.toString(signature));
115 /** Returns the RRset type covered by this signature */
122 * Returns the cryptographic algorithm of the key that generated the signature
31 SIGBase(Name name, int type, int dclass, long ttl, int covered, int alg, long origttl, Date expire, Date timeSigned, int footprint, Name signer, byte [] signature) argument
176 setSignature(byte [] signature) argument
[all...]
H A DTSIGRecord.java26 private byte [] signature; field in class:TSIGRecord
44 * received is not in the range [now - fudge, now + fudge], the signature
46 * @param signature The signature
55 int fudge, byte [] signature, int originalID, int error,
62 this.signature = signature;
79 signature = in.readByteArray(sigLen);
109 sb.append (signature.length);
112 sb.append (base64.formatString(signature, 6
54 TSIGRecord(Name name, int dclass, long ttl, Name alg, Date timeSigned, int fudge, byte [] signature, int originalID, int error, byte other[]) argument
[all...]
/external/webkit/Source/WebCore/bridge/qt/
H A Dqt_class.cpp103 const char* signature = m.signature(); local
104 while (signature[iter] && signature[iter] != '(')
107 if (normal == QByteArray::fromRawData(signature, iter)) {
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/provider/cert/
H A DX509CRLImplTest.java79 private static AlgorithmIdentifier signature; field in class:X509CRLImplTest
82 signature = new AlgorithmIdentifier(algOID, algParams);
174 // keys are using to make signature and to verify it
202 new TBSCertList(2, signature, issuer, thisUpdate,
228 // make incorrect signature value:
236 new CertificateList(tbscertlist, signature, signatureValue);
347 new TBSCertificate(2, certSerialNumber1, signature,
351 new SubjectPublicKeyInfo(signature, new byte[10]),
353 signature, new byte[10]));
356 new TBSCertificate(2, certSerialNumber2, signature,
[all...]
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/
H A DSignerInformation.java58 private byte[] signature; field in class:SignerInformation
96 this.signature = info.getEncryptedDigest().getOctets();
143 * return the object identifier for the signature.
151 * return the signature parameters, or null if there aren't any.
179 * return the object identifier for the signature.
187 * return the signature/encryption algorithm parameters, or null if
231 * return the encoded signature
235 return (byte[])signature.clone();
414 throw new CMSException("data not encapsulated in signature - use detached constructor.");
438 throw new CMSException("can't process mime object to create signature
[all...]
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/
H A DX509CertificateObject.java241 * return a more "meaningful" representation for the signature algorithm used in
276 * return the object identifier for the signature.
284 * return the signature parameters, or null if there aren't any.
765 Signature signature;
770 signature = Signature.getInstance(sigName, BouncyCastleProvider.PROVIDER_NAME);
774 signature = Signature.getInstance(sigName);
777 checkSignature(key, signature);
787 Signature signature = Signature.getInstance(sigName, sigProvider);
789 checkSignature(key, signature);
794 Signature signature)
792 checkSignature( PublicKey key, Signature signature) argument
[all...]
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/
H A DX509V3CertificateGenerator.java162 * Set the signature algorithm. This can be either a name or an OID, names
178 throw new IllegalArgumentException("Unknown signature type requested: " + signatureAlgorithm);
430 byte[] signature;
434 signature = X509Util.calculateSignature(sigOID, signatureAlgorithm, key, random, tbsCert);
443 return generateJcaObject(tbsCert, signature);
475 byte[] signature;
479 signature = X509Util.calculateSignature(sigOID, signatureAlgorithm, provider, key, random, tbsCert);
488 return generateJcaObject(tbsCert, signature);
506 private X509Certificate generateJcaObject(TBSCertificate tbsCert, byte[] signature) argument
513 v.add(new DERBitString(signature));
[all...]
/external/chromium/chrome/browser/autofill/
H A Dautofill_download.cc253 std::string signature = GetCombinedSignature(forms_in_query); local
256 if (it->first == signature) {
265 data.first = signature;
275 std::string signature = GetCombinedSignature(forms_in_query); local
278 if (it->first == signature) {
292 std::string signature; local
294 signature.reserve(total_size);
298 signature.append(",");
299 signature.append(forms_in_query[i]);
301 return signature;
[all...]
H A Dautofill_download_unittest.cc87 response.signature = form_signature;
105 std::string signature; member in struct:AutofillDownloadTestHelper::ResponseData
266 EXPECT_EQ(std::string(), helper.responses_.front().signature);
275 helper.responses_.front().signature);
283 EXPECT_EQ(std::string(), helper.responses_.front().signature);
/external/chromium/chrome/browser/extensions/
H A Dsandboxed_extension_unpacker.cc316 // Excessively large key or signature
356 std::vector<uint8> signature; local
357 signature.resize(header.signature_size);
358 len = fread(&signature.front(), sizeof(uint8), header.signature_size,
361 // Invalid signature
373 &signature.front(),
374 signature.size(),
/external/chromium/chrome/browser/sessions/
H A Dsession_backend.cc20 // The signature at the beginning of the file = SSNS (Sessions).
28 int32 signature; member in struct:__anon2404::FileHeader
97 if (read_count != sizeof(header) || header.signature != kFileSignature ||
375 header.signature = kFileSignature;
/external/chromium/net/base/
H A Ddnssec_keyset.cc19 // These are encoded AlgorithmIdentifiers for the given signature algorithm.
53 const base::StringPiece& signature,
56 // signature has this format:
64 // followed by the actual signature.
65 if (signature.size() < 16)
68 reinterpret_cast<const unsigned char*>(signature.data());
88 base::StringPiece sig(signature.data() + 16, signature.size() - 16);
93 signed_data_len += 16; // (see signature format, above)
124 // Copy the TTL from |signature|
50 CheckSignature( const base::StringPiece& name, const base::StringPiece& zone, const base::StringPiece& signature, uint16 rrtype, const std::vector<base::StringPiece>& rrdatas) argument
190 VerifySignature( base::StringPiece signature_algorithm, base::StringPiece signature, base::StringPiece public_key, base::StringPiece signed_data) argument
[all...]
/external/chromium/net/disk_cache/
H A Dstats.cc18 int32 signature; member in struct:__anon3020::OnDiskStats
83 if (stats->signature != kDiskSignature)
113 stats->signature = kDiskSignature;
237 stats.signature = kDiskSignature;
/external/doclava/src/com/google/doclava/
H A DMemberInfo.java22 public MemberInfo(String rawCommentText, String name, String signature, argument
29 mSignature = signature;
77 public String signature() { method in class:MemberInfo
/external/grub/netboot/
H A Dpci.c299 unsigned long signature; local
320 : "=d" (signature),
330 if (present_status || (signature != PCI_SIGNATURE)) {
360 if (check->fields.signature != BIOS32_SIGNATURE)
/external/grub/stage2/
H A Dsmp-imps.h148 unsigned signature; member in struct:imps_processor
/external/icu4c/common/
H A Dutrie.h754 uint32_t signature; member in struct:UTrieHeader
/external/jhead/
H A Diptc.c74 ErrNonfatal("IPTC type signature mismatch\n",0,0);
99 short signature; local
106 signature = (*pos << 8) + (*(pos+1));
109 if (signature != 0x1C02){
/external/libppp/src/
H A Dlqr.c68 u_int32_t signature; member in struct:echolqr
81 echo.signature = htonl(SIGNATURE);
98 lqr.signature = ntohl(lqr.signature);
111 if (lqr.signature == SIGNATURE) {
119 (u_long)lqr.signature, (u_long)SIGNATURE);
/external/openssl/crypto/ecdsa/
H A Decdsatest.c189 ECDSA_SIG *signature = NULL; local
206 /* create the signature */
207 signature = ECDSA_do_sign(digest, 20, key);
208 if (signature == NULL)
212 /* compare the created signature with the expected signature */
218 if (BN_cmp(signature->r ,r) || BN_cmp(signature->s, s))
222 /* verify the signature */
223 if (ECDSA_do_verify(digest, 20, signature, ke
292 unsigned char *signature = NULL; local
[all...]

Completed in 2944 milliseconds

12345678