Lines Matching defs:signature

555     private Signature signature;
565 signature.update(clntNonce);
566 signature.update(svrNonce);
569 signature.update((byte)(tmp >> 8));
570 signature.update((byte)(tmp & 0x0ff));
571 signature.update(rsa_modulus);
574 signature.update((byte)(tmp >> 8));
575 signature.update((byte)(tmp & 0x0ff));
576 signature.update(rsa_exponent);
596 signature = RSASignature.getInstance();
597 signature.initSign(privateKey, sr);
599 signatureBytes = signature.sign();
609 signature = RSASignature.getInstance();
639 signature.initVerify(certifiedKey);
641 return signature.verify(signatureBytes);
672 * But they still need a signature algorithm like DSS/DSA to support the
691 private byte signature [];
696 // the preferable signature algorithm used by this ServerKeyExchange message
709 signature = null;
742 signature = sig.sign();
764 signature = null;
788 // read the signature and hash algorithm
791 int signature = input.getInt8(); // signature algorithm
794 SignatureAndHashAlgorithm.valueOf(hash, signature, 0);
796 // Is it a local supported signature algorithm?
807 // read the signature
808 byte signature[];
810 signature = input.getBytes16();
816 signature = new byte[messageSize];
817 input.read(signature);
838 if (sig.verify(signature) == false ) {
897 if (signature != null) {
902 temp += signature.length;
916 if (signature != null) {
923 s.putBytes16(signature);
925 s.write(signature);
938 if (signature == null) {
972 // signature bytes (or null if anonymous)
981 // the preferable signature algorithm used by this ServerKeyExchange message
1065 // read the signature and hash algorithm
1068 int signature = input.getInt8(); // signature algorithm
1071 SignatureAndHashAlgorithm.valueOf(hash, signature, 0);
1073 // Is it a local supported signature algorithm?
1082 // read the signature
1085 // verify the signature
1099 "Invalid signature on ECDH server key exchange message");
1296 "No supported signature algorithms");
1329 int signature = input.getInt8(); // signature algorithm
1332 SignatureAndHashAlgorithm.valueOf(hash, signature,
1335 remains -= 2; // one byte for hash, one byte for signature
1405 output.putInt8(algorithm.getSignatureValue()); // signature
1523 * Sent after client sends signature-capable certificates (e.g. not
1528 // the signature bytes
1529 private byte[] signature;
1534 // the preferable signature algorithm used by this CertificateVerify message
1559 signature = sig.sign();
1571 // read the signature and hash algorithm
1574 int signAlg = input.getInt8(); // signature algorithm
1579 // Is it a local supported signature algorithm?
1588 // read the signature
1589 signature = input.getBytes16();
1593 * Get the preferable signature algorithm used by this message
1617 return sig.verify(signature);
1622 * given signature algorithm and protocol version.
1640 * signature algorithm and protocol version so that the object is
1658 // The signature must be an instance of RSASignature, need
1787 return temp + signature.length;
1797 s.putBytes16(signature);