511512513514515516517518519520521
ops.update((byte)ch); } p3 = (PGPSignatureList)pgpFact.nextObject(); if (!ops.verify(p3.get(0))) { fail("Failed generated signature check"); } //
968969970971972973974975976977978
ops.update((byte)ch); } PGPSignatureList p3 = (PGPSignatureList)pgpFact.nextObject(); if (!ops.verify(p3.get(0))) { fail("Failed signature check"); } //
13151316131713181319132013211322132313241325
13871388138913901391139213931394139513961397
ops.update((byte)ch); } p3 = (PGPSignatureList)pgpFact.nextObject(); if (!ops.verify(p3.get(0))) { fail("Failed v3 generated signature check"); } //
258259260261262263264265266267268
} if (signature != null) { signature.update(answer); PGPSignatureList sigList = (PGPSignatureList) pgpFactory.nextObject(); if (!signature.verify(sigList.get(0))) { throw new SignatureException("Cannot verify PGP signature"); } } return answer;
224225226227228229230231232233234
ops.update((byte)ch); } PGPSignatureList p3 = (PGPSignatureList)pgpFact.nextObject(); if (!ops.verify(p3.get(0))) { fail("Failed generated signature check"); } //
365366367368369370371372373374375
bOut.write(ch); } p3 = (PGPSignatureList)pgpFact.nextObject(); if (!ops.verify(p3.get(0))) { fail("Failed signature check"); } if (!areEqual(bOut.toByteArray(), text))
144145146147148149150151152153154
out.close(); PGPSignatureList p3 = (PGPSignatureList)pgpFact.nextObject(); if (ops.verify(p3.get(0))) { System.out.println("signature verified."); } else {
729730731732733734735736737738739
if (sig.getKeyID() != pubKey.getKeyID()) { fail("key id mismatch in signature"); } if (!ops.verify(sig)) { fail("Failed generated signature check - " + hashAlgorithm); } sig.initVerify(pubKey, "BC");
743744745746747748749750751752753