10901091109210931094109510961097109810991100
ops.update((byte)ch); } p3 = (PGPSignatureList)pgpFact.nextObject(); if (!ops.verify(p3.get(0))) { fail("Failed generated signature check"); } //
11621163116411651166116711681169117011711172
ops.update((byte)ch); } p3 = (PGPSignatureList)pgpFact.nextObject(); if (!ops.verify(p3.get(0))) { fail("Failed v3 generated signature check"); } //
376377378379380381382383384385386
ops.update((byte)ch); } PGPSignatureList p3 = (PGPSignatureList)pgpFact.nextObject(); if (!ops.verify(p3.get(0))) { fail("Failed generated signature check"); } }
432433434435436437438439440441442
ops.update((byte)ch); } PGPSignatureList p3 = (PGPSignatureList)pgpFact.nextObject(); if (!ops.verify(p3.get(0))) { fail("Failed signature check"); } //
511512513514515516517518519520521
680681682683684685686687688689690
out.write(ch); } final PGPSignatureList p3 = (PGPSignatureList) pgpFact .nextObject(); if (ops.verify(p3.get(0))) { setLicense(new String(out.toByteArray())); verified = true; } else { verified = false; licenseProperties = null;
281282283284285286287288289290291
} if (signature != null) { signature.update(answer); PGPSignatureList sigList = (PGPSignatureList) pgpFactory.nextObject(); if (!signature.verify(sigList.get(0))) { throw new SignatureException("Cannot verify PGP signature"); } } return answer;