/external/opencv/otherlibs/highgui/ |
H A D | grfmt_base.cpp | 96 char signature[4096]; local 102 assert( cur_sign_len <= (int)sizeof( signature ) ); 107 sign_len = (int)fread( signature, 1, cur_sign_len, f ); 110 if( cur_sign_len <= sign_len && CheckSignature( signature ) ) 118 bool GrFmtFilterFactory::CheckSignature( const char* signature ) 120 return m_sign_len > 0 && signature != 0 && 121 memcmp( signature, m_signature, m_sign_len ) == 0;
|
/external/openssh/ |
H A D | ssh-keysign.c | 157 u_char *signature, *data; local 249 if (key_sign(keys[i], &signature, &slen, data, dlen) != 0) 255 buffer_put_string(&b, signature, slen);
|
H A D | ssh-pkcs11-client.c | 108 u_char *blob, *signature = NULL; local 128 signature = buffer_get_string(&msg, &slen); 130 memcpy(to, signature, slen); 133 xfree(signature);
|
H A D | ssh-pkcs11-helper.c | 169 u_char *blob, *data, *signature = NULL; local 182 signature = xmalloc(slen); 183 if ((ret = RSA_private_encrypt(dlen, data, signature, 194 buffer_put_string(&msg, signature, slen); 200 if (signature != NULL) 201 xfree(signature);
|
H A D | ssh-rsa.c | 38 /* RSASSA-PKCS1-v1_5 (PKCS #1 v2.0 signature) with SHA1 */ 88 /* encode signature */ 107 ssh_rsa_verify(const Key *key, const u_char *signature, u_int signaturelen, argument 129 buffer_append(&b, signature, signaturelen); 142 error("ssh_rsa_verify: remaining bytes in signature %d", rlen); 146 /* RSA_verify expects a signature of RSA_size */ 175 debug("ssh_rsa_verify: signature %scorrect", (ret==0) ? "in" : "");
|
/external/smack/src/org/xbill/DNS/ |
H A D | SIGBase.java | 25 protected byte [] signature; field in class:SIGBase 33 byte [] signature) 48 this.signature = signature; 61 signature = in.readByteArray(); 80 signature = st.getBase64(); 106 sb.append(base64.formatString(signature, 64, "\t", 110 sb.append(base64.toString(signature)); 115 /** Returns the RRset type covered by this signature */ 122 * Returns the cryptographic algorithm of the key that generated the signature 31 SIGBase(Name name, int type, int dclass, long ttl, int covered, int alg, long origttl, Date expire, Date timeSigned, int footprint, Name signer, byte [] signature) argument 176 setSignature(byte [] signature) argument [all...] |
H A D | TSIGRecord.java | 26 private byte [] signature; field in class:TSIGRecord 44 * received is not in the range [now - fudge, now + fudge], the signature 46 * @param signature The signature 55 int fudge, byte [] signature, int originalID, int error, 62 this.signature = signature; 79 signature = in.readByteArray(sigLen); 109 sb.append (signature.length); 112 sb.append (base64.formatString(signature, 6 54 TSIGRecord(Name name, int dclass, long ttl, Name alg, Date timeSigned, int fudge, byte [] signature, int originalID, int error, byte other[]) argument [all...] |
/external/webkit/Source/WebCore/bridge/qt/ |
H A D | qt_class.cpp | 103 const char* signature = m.signature(); local 104 while (signature[iter] && signature[iter] != '(') 107 if (normal == QByteArray::fromRawData(signature, iter)) {
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/provider/cert/ |
H A D | X509CRLImplTest.java | 79 private static AlgorithmIdentifier signature; field in class:X509CRLImplTest 82 signature = new AlgorithmIdentifier(algOID, algParams); 174 // keys are using to make signature and to verify it 202 new TBSCertList(2, signature, issuer, thisUpdate, 228 // make incorrect signature value: 236 new CertificateList(tbscertlist, signature, signatureValue); 347 new TBSCertificate(2, certSerialNumber1, signature, 351 new SubjectPublicKeyInfo(signature, new byte[10]), 353 signature, new byte[10])); 356 new TBSCertificate(2, certSerialNumber2, signature, [all...] |
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/ |
H A D | SignerInformation.java | 58 private byte[] signature; field in class:SignerInformation 96 this.signature = info.getEncryptedDigest().getOctets(); 143 * return the object identifier for the signature. 151 * return the signature parameters, or null if there aren't any. 179 * return the object identifier for the signature. 187 * return the signature/encryption algorithm parameters, or null if 231 * return the encoded signature 235 return (byte[])signature.clone(); 414 throw new CMSException("data not encapsulated in signature - use detached constructor."); 438 throw new CMSException("can't process mime object to create signature [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
H A D | X509CertificateObject.java | 241 * return a more "meaningful" representation for the signature algorithm used in 276 * return the object identifier for the signature. 284 * return the signature parameters, or null if there aren't any. 765 Signature signature; 770 signature = Signature.getInstance(sigName, BouncyCastleProvider.PROVIDER_NAME); 774 signature = Signature.getInstance(sigName); 777 checkSignature(key, signature); 787 Signature signature = Signature.getInstance(sigName, sigProvider); 789 checkSignature(key, signature); 794 Signature signature) 792 checkSignature( PublicKey key, Signature signature) argument [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/ |
H A D | X509V3CertificateGenerator.java | 162 * Set the signature algorithm. This can be either a name or an OID, names 178 throw new IllegalArgumentException("Unknown signature type requested: " + signatureAlgorithm); 430 byte[] signature; 434 signature = X509Util.calculateSignature(sigOID, signatureAlgorithm, key, random, tbsCert); 443 return generateJcaObject(tbsCert, signature); 475 byte[] signature; 479 signature = X509Util.calculateSignature(sigOID, signatureAlgorithm, provider, key, random, tbsCert); 488 return generateJcaObject(tbsCert, signature); 506 private X509Certificate generateJcaObject(TBSCertificate tbsCert, byte[] signature) argument 513 v.add(new DERBitString(signature)); [all...] |
/external/chromium/chrome/browser/autofill/ |
H A D | autofill_download.cc | 253 std::string signature = GetCombinedSignature(forms_in_query); local 256 if (it->first == signature) { 265 data.first = signature; 275 std::string signature = GetCombinedSignature(forms_in_query); local 278 if (it->first == signature) { 292 std::string signature; local 294 signature.reserve(total_size); 298 signature.append(","); 299 signature.append(forms_in_query[i]); 301 return signature; [all...] |
H A D | autofill_download_unittest.cc | 87 response.signature = form_signature; 105 std::string signature; member in struct:AutofillDownloadTestHelper::ResponseData 266 EXPECT_EQ(std::string(), helper.responses_.front().signature); 275 helper.responses_.front().signature); 283 EXPECT_EQ(std::string(), helper.responses_.front().signature);
|
/external/chromium/chrome/browser/extensions/ |
H A D | sandboxed_extension_unpacker.cc | 316 // Excessively large key or signature 356 std::vector<uint8> signature; local 357 signature.resize(header.signature_size); 358 len = fread(&signature.front(), sizeof(uint8), header.signature_size, 361 // Invalid signature 373 &signature.front(), 374 signature.size(),
|
/external/chromium/chrome/browser/sessions/ |
H A D | session_backend.cc | 20 // The signature at the beginning of the file = SSNS (Sessions). 28 int32 signature; member in struct:__anon2404::FileHeader 97 if (read_count != sizeof(header) || header.signature != kFileSignature || 375 header.signature = kFileSignature;
|
/external/chromium/net/base/ |
H A D | dnssec_keyset.cc | 19 // These are encoded AlgorithmIdentifiers for the given signature algorithm. 53 const base::StringPiece& signature, 56 // signature has this format: 64 // followed by the actual signature. 65 if (signature.size() < 16) 68 reinterpret_cast<const unsigned char*>(signature.data()); 88 base::StringPiece sig(signature.data() + 16, signature.size() - 16); 93 signed_data_len += 16; // (see signature format, above) 124 // Copy the TTL from |signature| 50 CheckSignature( const base::StringPiece& name, const base::StringPiece& zone, const base::StringPiece& signature, uint16 rrtype, const std::vector<base::StringPiece>& rrdatas) argument 190 VerifySignature( base::StringPiece signature_algorithm, base::StringPiece signature, base::StringPiece public_key, base::StringPiece signed_data) argument [all...] |
/external/chromium/net/disk_cache/ |
H A D | stats.cc | 18 int32 signature; member in struct:__anon3020::OnDiskStats 83 if (stats->signature != kDiskSignature) 113 stats->signature = kDiskSignature; 237 stats.signature = kDiskSignature;
|
/external/doclava/src/com/google/doclava/ |
H A D | MemberInfo.java | 22 public MemberInfo(String rawCommentText, String name, String signature, argument 29 mSignature = signature; 77 public String signature() { method in class:MemberInfo
|
/external/grub/netboot/ |
H A D | pci.c | 299 unsigned long signature; local 320 : "=d" (signature), 330 if (present_status || (signature != PCI_SIGNATURE)) { 360 if (check->fields.signature != BIOS32_SIGNATURE)
|
/external/grub/stage2/ |
H A D | smp-imps.h | 148 unsigned signature; member in struct:imps_processor
|
/external/icu4c/common/ |
H A D | utrie.h | 754 uint32_t signature; member in struct:UTrieHeader
|
/external/jhead/ |
H A D | iptc.c | 74 ErrNonfatal("IPTC type signature mismatch\n",0,0); 99 short signature; local 106 signature = (*pos << 8) + (*(pos+1)); 109 if (signature != 0x1C02){
|
/external/libppp/src/ |
H A D | lqr.c | 68 u_int32_t signature; member in struct:echolqr 81 echo.signature = htonl(SIGNATURE); 98 lqr.signature = ntohl(lqr.signature); 111 if (lqr.signature == SIGNATURE) { 119 (u_long)lqr.signature, (u_long)SIGNATURE);
|
/external/openssl/crypto/ecdsa/ |
H A D | ecdsatest.c | 189 ECDSA_SIG *signature = NULL; local 206 /* create the signature */ 207 signature = ECDSA_do_sign(digest, 20, key); 208 if (signature == NULL) 212 /* compare the created signature with the expected signature */ 218 if (BN_cmp(signature->r ,r) || BN_cmp(signature->s, s)) 222 /* verify the signature */ 223 if (ECDSA_do_verify(digest, 20, signature, ke 292 unsigned char *signature = NULL; local [all...] |