214215216217218219220221222223224
{ do { lookAhead = readInputLine(lineOut, lookAhead, sigIn); sig.update((byte)'\r'); sig.update((byte)'\n'); processLine(sig, lineOut.toByteArray()); } while (lookAhead != -1);
215216217218219220221222223224225
do { lookAhead = readInputLine(lineOut, lookAhead, sigIn); sig.update((byte)'\r'); sig.update((byte)'\n'); processLine(sig, lineOut.toByteArray()); } while (lookAhead != -1); }
167168169170171172173174175176177
168169170171172173174175176177178
96979899100101102103104105106
sig.init(new JcaPGPContentVerifierBuilderProvider().setProvider("BC"), key); int ch; while ((ch = dIn.read()) >= 0) { sig.update((byte)ch); } dIn.close(); if (sig.verify())
752753754755756757758759760761762
sig.initVerify(pubKey, "BC"); for (int i = 0; i != original.length; i++) { sig.update(original[i]); } sig.update(original); if (!sig.verify())
755756757758759760761762763764765
for (int i = 0; i != original.length; i++) { sig.update(original[i]); } sig.update(original); if (!sig.verify()) { fail("Failed generated signature check against original data"); }
227228229230231232233234235236237
228229230231232233234235236237238
202203204205206207208209210211212
final byte[] buff = new byte[BUFFER_SIZE]; int chunk; do { chunk = resource.read(buff); if (chunk > 0) { pgpSignature.update(buff, 0, chunk); } } while (chunk >= 0); return pgpSignature.verify(); }