/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | x509v3.c | 1306 /* signature AlgorithmIdentifier */ 1307 if (x509_parse_algorithm_identifier(pos, end - pos, &cert->signature, 1552 * It is an error if the length in bits of the signature S is 1568 wpa_hexdump(MSG_MSGDUMP, "X509: signature", 1576 * x509_certificate_check_signature - Verify certificate signature 1579 * Returns: 0 if cert has a valid signature that was signed by the issuer, 1594 if (!x509_pkcs_oid(&cert->signature.oid) || 1595 cert->signature.oid.len != 7 || 1596 cert->signature.oid.oid[5] != 1 /* pkcs-1 */) { 1597 wpa_printf(MSG_DEBUG, "X509: Unrecognized signature " [all...] |
H A D | x509v3.h | 52 struct x509_algorithm_identifier signature; member in struct:x509_certificate
|
/external/wpa_supplicant_8/src/tls/ |
H A D | x509v3.c | 1306 /* signature AlgorithmIdentifier */ 1307 if (x509_parse_algorithm_identifier(pos, end - pos, &cert->signature, 1552 * It is an error if the length in bits of the signature S is 1568 wpa_hexdump(MSG_MSGDUMP, "X509: signature", 1576 * x509_certificate_check_signature - Verify certificate signature 1579 * Returns: 0 if cert has a valid signature that was signed by the issuer, 1594 if (!x509_pkcs_oid(&cert->signature.oid) || 1595 cert->signature.oid.len != 7 || 1596 cert->signature.oid.oid[5] != 1 /* pkcs-1 */) { 1597 wpa_printf(MSG_DEBUG, "X509: Unrecognized signature " [all...] |
H A D | x509v3.h | 52 struct x509_algorithm_identifier signature; member in struct:x509_certificate
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | x509v3.c | 1306 /* signature AlgorithmIdentifier */ 1307 if (x509_parse_algorithm_identifier(pos, end - pos, &cert->signature, 1552 * It is an error if the length in bits of the signature S is 1568 wpa_hexdump(MSG_MSGDUMP, "X509: signature", 1576 * x509_certificate_check_signature - Verify certificate signature 1579 * Returns: 0 if cert has a valid signature that was signed by the issuer, 1594 if (!x509_pkcs_oid(&cert->signature.oid) || 1595 cert->signature.oid.len != 7 || 1596 cert->signature.oid.oid[5] != 1 /* pkcs-1 */) { 1597 wpa_printf(MSG_DEBUG, "X509: Unrecognized signature " [all...] |
H A D | x509v3.h | 52 struct x509_algorithm_identifier signature; member in struct:x509_certificate
|
/external/valgrind/main/coregrind/m_debuginfo/ |
H A D | readdwarf3.c | 442 signature and the uncooked DIE offset of the TU's signatured 1027 /* This represents a single signatured type. It maps a type signature 1029 in the type signature hash table. */ 1052 /* Given a type signature hash table and a type signature, return the 1319 ULong signature = get_ULong (c); local 1320 ULong work = signature; 1321 TRACE_D3("8 byte signature: "); 1330 cts->u.val = lookup_signatured_type (cc->signature_types, signature, 3780 mapping from a type signature t [all...] |
H A D | readpdb.c | 114 unsigned short e_magic; /* 00: MZ Header signature */ 310 // that ends in "\r\n\032". This is followed by a 4-byte "signature" 316 //unsigned long signature; // "JG\0\0" 326 //char signature[32]; // "Microsoft C/C++ MSF 7.00\r\n\032DS\0\0" 488 unsigned long signature; member in struct:_PDB_SYMBOLS 831 char signature[4]; member in struct:codeview_symbol::__anon32510 1016 unsigned* signature ) 1025 *signature = *(unsigned*)(1+ txteof); 1664 BYTE md5[16]; /* MD5 signature of file (signature o 2190 unsigned signature; local [all...] |
/external/svox/pico_resources/tools/LingwareBuilding/PicoLingware_tools_windows/tools/ |
H A D | genlingware.pl | 22 2. SVOX PICO header (signature)
|
/external/tcpdump/ |
H A D | Android.mk | 30 print-wb.c print-zephyr.c print-zeromq.c print-vxlan.c print-otv.c signature.c setsignal.c tcpdump.c util.c
|
H A D | print-tcp.c | 61 #include <signature.h>
|
/external/tcpdump/win32/prj/ |
H A D | GNUmakefile | 163 ../../signature.o
|
/external/srec/srec/crec/ |
H A D | srec_context.c | 2723 asr_int32_t signature = 0; local 2724 ENCODE(signature, arcID); 2725 ENCODE(signature, nodeID); 2726 ENCODE(signature, wordID); 2727 ENCODE(signature, labelID); 2728 ENCODE(signature, costdata); 2729 return signature;
|
/external/smack/src/org/xbill/DNS/ |
H A D | DNSSEC.java | 178 * @param previous If this is a response, the signature from the query. 233 "does not match signature " + 241 * A DNSSEC verification failed because the signature has expired. 247 super("signature expired"); 253 * @return When the signature expired 270 * A DNSSEC verification failed because the signature has not yet become valid. 276 super("signature is not yet valid"); 282 * @return When the signature will become valid 299 * A DNSSEC verification failed because the cryptographic signature 304 super("signature verificatio 612 DSASignaturetoDNS(byte [] signature, int t) argument 651 ECDSASignaturefromDNS(byte [] signature, ECKeyInfo keyinfo) argument 689 ECDSASignaturetoDNS(byte [] signature, ECKeyInfo keyinfo) argument 726 verify(PublicKey key, int alg, byte [] data, byte [] signature) argument [all...] |
H A D | RRSIGRecord.java | 8 * Recource Record Signature - An RRSIG provides the digital signature of an 10 * The signature is generated by a key contained in a DNSKEY Record. 31 * @param covered The RRset type covered by this signature 33 * signature 35 * @param expire The time at which the signature expires 36 * @param timeSigned The time at which this signature was generated 39 * @param signature Binary data representing the signature 44 byte [] signature) 47 timeSigned, footprint, signer, signature); 42 RRSIGRecord(Name name, int dclass, long ttl, int covered, int alg, long origttl, Date expire, Date timeSigned, int footprint, Name signer, byte [] signature) argument [all...] |
H A D | SIGBase.java | 25 protected byte [] signature; field in class:SIGBase 33 byte [] signature) 48 this.signature = signature; 61 signature = in.readByteArray(); 80 signature = st.getBase64(); 106 sb.append(base64.formatString(signature, 64, "\t", 110 sb.append(base64.toString(signature)); 115 /** Returns the RRset type covered by this signature */ 122 * Returns the cryptographic algorithm of the key that generated the signature 31 SIGBase(Name name, int type, int dclass, long ttl, int covered, int alg, long origttl, Date expire, Date timeSigned, int footprint, Name signer, byte [] signature) argument 176 setSignature(byte [] signature) argument [all...] |
H A D | SIGRecord.java | 8 * Signature - A SIG provides the digital signature of an RRset, so that 10 * signature is usually generated by a key contained in a KEYRecord 31 * @param covered The RRset type covered by this signature 33 * signature 35 * @param expire The time at which the signature expires 36 * @param timeSigned The time at which this signature was generated 39 * @param signature Binary data representing the signature 44 byte [] signature) 47 timeSigned, footprint, signer, signature); 42 SIGRecord(Name name, int dclass, long ttl, int covered, int alg, long origttl, Date expire, Date timeSigned, int footprint, Name signer, byte [] signature) argument [all...] |
H A D | TSIG.java | 9 * Transaction signature handling. This class generates and verifies 257 byte [] signature; 259 signature = hmac.sign(); 261 signature = new byte[0]; 275 signature, m.getHeader().getID(), error, other)); 339 byte [] signature = hmac.sign(); 343 signature, m.getHeader().getID(), 422 byte [] signature = tsig.getSignature(); 426 if (signature.length > digestLength) { 428 System.err.println("BADSIG: signature to [all...] |
H A D | TSIGRecord.java | 26 private byte [] signature; field in class:TSIGRecord 44 * received is not in the range [now - fudge, now + fudge], the signature 46 * @param signature The signature 55 int fudge, byte [] signature, int originalID, int error, 62 this.signature = signature; 79 signature = in.readByteArray(sigLen); 109 sb.append (signature.length); 112 sb.append (base64.formatString(signature, 6 54 TSIGRecord(Name name, int dclass, long ttl, Name alg, Date timeSigned, int fudge, byte [] signature, int originalID, int error, byte other[]) argument [all...] |
/external/smack/src/org/xbill/DNS/utils/ |
H A D | HMAC.java | 127 * @return An array with the signature 139 * @param signature The signature to compare against 140 * @return true if the signature matches, false otherwise 143 verify(byte [] signature) { argument 144 return verify(signature, false); 149 * @param signature The signature to compare against 150 * @param truncation_ok If true, the signature may be truncated; only the 151 * number of bytes in the provided signature ar 155 verify(byte [] signature, boolean truncation_ok) argument [all...] |
/external/smali/baksmali/src/main/java/org/jf/baksmali/Adaptors/Debug/ |
H A D | EndLocalMethodItem.java | 59 String signature = endLocal.getSignature(); 60 if (name != null || type != null || signature != null) { 62 LocalFormatter.writeLocal(writer, name, type, signature);
|
H A D | LocalFormatter.java | 53 * One of name, type or signature must be non-null 56 @Nullable String signature) throws IOException { 68 if (signature != null) { 70 ReferenceFormatter.writeStringReference(writer, signature); 55 writeLocal(@onnull IndentingWriter writer, @Nullable String name, @Nullable String type, @Nullable String signature) argument
|
H A D | RestartLocalMethodItem.java | 59 String signature = restartLocal.getSignature(); 60 if (name != null || type != null || signature != null) { 62 LocalFormatter.writeLocal(writer, name, type, signature);
|
H A D | StartLocalMethodItem.java | 59 String signature = startLocal.getSignature(); 61 if (name != null || type != null || signature != null) { 63 LocalFormatter.writeLocal(writer, name, type, signature);
|
/external/smali/dexlib2/src/main/java/org/jf/dexlib2/builder/ |
H A D | MethodImplementationBuilder.java | 125 @Nullable StringReference signature) { 126 currentLocation.addStartLocal(registerNumber, name, type, signature); 124 addStartLocal(int registerNumber, @Nullable StringReference name, @Nullable TypeReference type, @Nullable StringReference signature) argument
|