/external/wycheproof/java/com/google/security/wycheproof/testcases/ |
D | RsaSignatureTest.java | 1139 boolean verified = false; in testVectors() 1141 verified = verifier.verify(signatureBytes); in testVectors() 1145 if (first && !verified) { in testVectors() 1148 } else if (!first && verified) { in testVectors() 1201 boolean verified = false; in testLegacySignatures() 1203 verified = verifier.verify(signatureBytes); in testLegacySignatures() 1205 verified = false; in testLegacySignatures() 1207 if (verified) { in testLegacySignatures()
|
D | EcdsaTest.java | 623 boolean verified = false; in testVectors() 625 verified = verifier.verify(signatureBytes); in testVectors() 629 verified = false; in testVectors() 631 if (!verified && isValidDER) { in testVectors() 635 if (verified && !isValidBER) { in testVectors()
|
D | DsaTest.java | 695 boolean verified = false; in testVectors() 697 verified = verifier.verify(signatureBytes); in testVectors() 701 verified = false; in testVectors() 709 if (isValidDER && !verified) { in testVectors() 712 } else if (!isValidBER && verified) { in testVectors()
|
/external/ukey2/src/main/java/com/google/security/cryptauth/lib/securemessage/ |
D | SecureMessageParser.java | 243 boolean verified = CryptoOps.verify(verificationKey, sigType, signature, signedData); in verifyHeaderAndBody() 251 verified &= (result.getHeader().getSignatureScheme() == sigType.getSigScheme()); in verifyHeaderAndBody() 252 verified &= (result.getHeader().getEncryptionScheme() == encType.getEncScheme()); in verifyHeaderAndBody() 254 verified &= (encType != EncType.NONE) || !result.getHeader().hasDecryptionKeyId(); in verifyHeaderAndBody() 257 verified &= (encType == EncType.NONE) || !sigType.isPublicKeyScheme() || in verifyHeaderAndBody() 260 verified &= (result.getHeader().getAssociatedDataLength() == associatedDataLength); in verifyHeaderAndBody() 262 verified = false; in verifyHeaderAndBody() 265 if (verified) { in verifyHeaderAndBody()
|
/external/mockito/src/main/java/org/mockito/internal/verification/ |
D | InOrderContextImpl.java | 13 final IdentitySet verified = new IdentitySet(); field in InOrderContextImpl 16 return verified.contains(invocation); in isVerified() 20 verified.add(i); in markVerified()
|
/external/mockito/src/test/java/org/mockito/internal/invocation/ |
D | InvocationBuilder.java | 33 private boolean verified; field in InvocationBuilder 70 if (verified) { in toInvocation() 106 public InvocationBuilder verified() { in verified() method in InvocationBuilder 107 this.verified = true; in verified()
|
D | InvocationMatcherTest.java | 86 Invocation verified = new InvocationBuilder().simpleMethod().verified().toInvocation(); in should_not_be_similar_to_verified_invocation() local 87 assertFalse(simpleMethod.hasSimilarMethod(verified)); in should_not_be_similar_to_verified_invocation()
|
/external/python/rsa/tests/ |
D | test_integers.py | 47 verified = rsa.core.decrypt_int(signed, self.pub.e, self.pub.n) 48 print("\tVerified: %d" % verified) 50 self.assertEqual(message, verified)
|
/external/mockito/src/test/java/org/mockito/internal/exceptions/util/ |
D | ScenarioPrinterTest.java | 25 Invocation verified = new InvocationBuilder().simpleMethod().verified().toInvocation(); in shouldPrintInvocations() local 29 String out = sp.print((List) asList(verified, unverified)); in shouldPrintInvocations()
|
/external/u-boot/common/ |
D | image-sig.c | 218 int verified = 0; in fit_image_verify_sig() local 233 verified = 1; in fit_image_verify_sig() 244 return verified ? 0 : -EPERM; in fit_image_verify_sig() 399 int verified = 0; in fit_config_verify_sig() local 414 verified = 1; in fit_config_verify_sig() 425 return verified ? 0 : -EPERM; in fit_config_verify_sig()
|
/external/mockito/src/main/java/org/mockito/internal/invocation/ |
D | InterceptedInvocation.java | 32 private boolean verified; field in InterceptedInvocation 53 return verified || isIgnoredForVerification; in isVerified() 78 verified = true; in markVerified()
|
/external/curl/docs/cmdline-opts/ |
D | insecure.d | 8 By default, every SSL connection curl makes is verified to be secure. This 12 The server connection is verified by making sure the server's certificate
|
/external/deqp/doc/testspecs/GLES31/ |
D | functional.shaders.sample_variables.txt | 44 Values are verified with verifier fragment shader. 48 fragment output value and then texture contents are verified. With default 51 gl_SampleID output a non-zero green value. Result image is then verified to 68 verified for legality, uniqueness and distribution. With framebuffer and 69 renderbuffer render targets only the legality and distribution are verified. 70 Distribution is verified by averaging sample position values (texture) or by
|
D | functional.shaders.atomic_counter.txt | 48 the shader. Atomic counter values are verified by comparing against the 55 counters are verified separately. 57 Test cases using only atomicCounter() call are verified by checking that all 71 atomicCounterDecrement() are verified by counting how many times each value
|
D | functional.tessellation.txt | 71 comparisons, and thus not all rules are exactly verified (such as 90 winding mode specified in the TES. The patterns drawn are simple and verified by 98 value of gl_PatchVerticesIn is verified. The "quads" mode is used. 113 the cases with differing input and output patch sizes are verified with 115 gl_TessLevel*[] cases draw simple all-white patterns and are verified as such. 135 potential cracks are likely to become visible. The resulting image is verified
|
/external/clang/bindings/python/tests/cindex/ |
D | test_location.py | 65 verified = False 68 verified = True 70 assert verified
|
/external/ImageMagick/.github/ |
D | PULL_REQUEST_TEMPLATE.md | 4 - [ ] I have verified that there are no overlapping [pull-requests](https://github.com/ImageMagick/… 5 - [ ] I have verified that I am following the existing coding patterns and practices as demonstrate…
|
/external/u-boot/doc/SPL/ |
D | README.spl-secure-boot | 1 Overview of SPL verified boot on powerpc/mpc85xx & arm/layerscape platforms 7 This document provides an overview of how SPL verified boot works on powerpc/
|
/external/easymock/src/org/easymock/internal/ |
D | MocksBehavior.java | 165 boolean verified = true; in verify() 170 verified = false; in verify() 173 if (verified) { in verify()
|
/external/autotest/client/site_tests/platform_BootLockbox/ |
D | control | 19 lockbox data can be signed and verified before finalization but after 20 finalization it can only be verified. This test requires a reboot of the DUT
|
/external/ipsec-tools/src/racoon/ |
D | nattraversal.c | 187 int verified = 0; in natt_compare_addr_hash() local 190 return verified; in natt_compare_addr_hash() 203 return verified; /* XXX should abort */ in natt_compare_addr_hash() 209 verified = 1; in natt_compare_addr_hash() 214 return verified; in natt_compare_addr_hash()
|
/external/autotest/server/site_tests/platform_BootLockboxServer/ |
D | control | 17 lockbox data can be signed and verified before finalization, but after 18 finalization it can only be verified.
|
/external/skia/src/compute/hs/cuda/bench/ |
D | main.c | 402 bool verified = false; in hs_bench() local 424 verified = hs_verify_linear(hs_words,sorted_h,vout_h,count_padded_in); in hs_bench() 427 if (!verified) in hs_bench() 448 verify ? (verified ? " OK " : "*FAIL*") : "UNVERIFIED", in hs_bench() 465 if (verify && !verified) in hs_bench()
|
/external/skqp/src/compute/hs/cuda/bench/ |
D | main.c | 402 bool verified = false; in hs_bench() local 424 verified = hs_verify_linear(hs_words,sorted_h,vout_h,count_padded_in); in hs_bench() 427 if (!verified) in hs_bench() 448 verify ? (verified ? " OK " : "*FAIL*") : "UNVERIFIED", in hs_bench() 465 if (verify && !verified) in hs_bench()
|
/external/u-boot/doc/uImage.FIT/ |
D | beaglebone_vboot.txt | 7 Before reading this, please read verified-boot.txt and signature.txt. These 11 verified boot works in U-Boot. There is also a test which runs through the 16 for an example of how to enable verified boot using U-Boot. 22 packaged with the kernel. In particular this is important with verified boot, 24 public keys can be changed and verified boot is useless. An attacker can 37 1. Build U-Boot for the board, with the verified boot options enabled. 68 b. Configure and build U-Boot with verified boot enabled: 199 'required' property, which tells U-Boot that this key must be verified for the 302 'dev' and the '+' means that it verified. If it showed '-' that would be bad. 304 Once the configuration is verified it is then possible to rely on the hashes [all …]
|