Home
last modified time | relevance | path

Searched refs:verified (Results 1 – 25 of 269) sorted by relevance

1234567891011

/external/wycheproof/java/com/google/security/wycheproof/testcases/
DRsaSignatureTest.java1139 boolean verified = false; in testVectors()
1141 verified = verifier.verify(signatureBytes); in testVectors()
1145 if (first && !verified) { in testVectors()
1148 } else if (!first && verified) { in testVectors()
1201 boolean verified = false; in testLegacySignatures()
1203 verified = verifier.verify(signatureBytes); in testLegacySignatures()
1205 verified = false; in testLegacySignatures()
1207 if (verified) { in testLegacySignatures()
DEcdsaTest.java623 boolean verified = false; in testVectors()
625 verified = verifier.verify(signatureBytes); in testVectors()
629 verified = false; in testVectors()
631 if (!verified && isValidDER) { in testVectors()
635 if (verified && !isValidBER) { in testVectors()
DDsaTest.java695 boolean verified = false; in testVectors()
697 verified = verifier.verify(signatureBytes); in testVectors()
701 verified = false; in testVectors()
709 if (isValidDER && !verified) { in testVectors()
712 } else if (!isValidBER && verified) { in testVectors()
/external/ukey2/src/main/java/com/google/security/cryptauth/lib/securemessage/
DSecureMessageParser.java243 boolean verified = CryptoOps.verify(verificationKey, sigType, signature, signedData); in verifyHeaderAndBody()
251 verified &= (result.getHeader().getSignatureScheme() == sigType.getSigScheme()); in verifyHeaderAndBody()
252 verified &= (result.getHeader().getEncryptionScheme() == encType.getEncScheme()); in verifyHeaderAndBody()
254 verified &= (encType != EncType.NONE) || !result.getHeader().hasDecryptionKeyId(); in verifyHeaderAndBody()
257 verified &= (encType == EncType.NONE) || !sigType.isPublicKeyScheme() || in verifyHeaderAndBody()
260 verified &= (result.getHeader().getAssociatedDataLength() == associatedDataLength); in verifyHeaderAndBody()
262 verified = false; in verifyHeaderAndBody()
265 if (verified) { in verifyHeaderAndBody()
/external/mockito/src/main/java/org/mockito/internal/verification/
DInOrderContextImpl.java13 final IdentitySet verified = new IdentitySet(); field in InOrderContextImpl
16 return verified.contains(invocation); in isVerified()
20 verified.add(i); in markVerified()
/external/mockito/src/test/java/org/mockito/internal/invocation/
DInvocationBuilder.java33 private boolean verified; field in InvocationBuilder
70 if (verified) { in toInvocation()
106 public InvocationBuilder verified() { in verified() method in InvocationBuilder
107 this.verified = true; in verified()
DInvocationMatcherTest.java86 Invocation verified = new InvocationBuilder().simpleMethod().verified().toInvocation(); in should_not_be_similar_to_verified_invocation() local
87 assertFalse(simpleMethod.hasSimilarMethod(verified)); in should_not_be_similar_to_verified_invocation()
/external/python/rsa/tests/
Dtest_integers.py47 verified = rsa.core.decrypt_int(signed, self.pub.e, self.pub.n)
48 print("\tVerified: %d" % verified)
50 self.assertEqual(message, verified)
/external/mockito/src/test/java/org/mockito/internal/exceptions/util/
DScenarioPrinterTest.java25 Invocation verified = new InvocationBuilder().simpleMethod().verified().toInvocation(); in shouldPrintInvocations() local
29 String out = sp.print((List) asList(verified, unverified)); in shouldPrintInvocations()
/external/u-boot/common/
Dimage-sig.c218 int verified = 0; in fit_image_verify_sig() local
233 verified = 1; in fit_image_verify_sig()
244 return verified ? 0 : -EPERM; in fit_image_verify_sig()
399 int verified = 0; in fit_config_verify_sig() local
414 verified = 1; in fit_config_verify_sig()
425 return verified ? 0 : -EPERM; in fit_config_verify_sig()
/external/mockito/src/main/java/org/mockito/internal/invocation/
DInterceptedInvocation.java32 private boolean verified; field in InterceptedInvocation
53 return verified || isIgnoredForVerification; in isVerified()
78 verified = true; in markVerified()
/external/curl/docs/cmdline-opts/
Dinsecure.d8 By default, every SSL connection curl makes is verified to be secure. This
12 The server connection is verified by making sure the server's certificate
/external/deqp/doc/testspecs/GLES31/
Dfunctional.shaders.sample_variables.txt44 Values are verified with verifier fragment shader.
48 fragment output value and then texture contents are verified. With default
51 gl_SampleID output a non-zero green value. Result image is then verified to
68 verified for legality, uniqueness and distribution. With framebuffer and
69 renderbuffer render targets only the legality and distribution are verified.
70 Distribution is verified by averaging sample position values (texture) or by
Dfunctional.shaders.atomic_counter.txt48 the shader. Atomic counter values are verified by comparing against the
55 counters are verified separately.
57 Test cases using only atomicCounter() call are verified by checking that all
71 atomicCounterDecrement() are verified by counting how many times each value
Dfunctional.tessellation.txt71 comparisons, and thus not all rules are exactly verified (such as
90 winding mode specified in the TES. The patterns drawn are simple and verified by
98 value of gl_PatchVerticesIn is verified. The "quads" mode is used.
113 the cases with differing input and output patch sizes are verified with
115 gl_TessLevel*[] cases draw simple all-white patterns and are verified as such.
135 potential cracks are likely to become visible. The resulting image is verified
/external/clang/bindings/python/tests/cindex/
Dtest_location.py65 verified = False
68 verified = True
70 assert verified
/external/ImageMagick/.github/
DPULL_REQUEST_TEMPLATE.md4 - [ ] I have verified that there are no overlapping [pull-requests](https://github.com/ImageMagick/…
5 - [ ] I have verified that I am following the existing coding patterns and practices as demonstrate…
/external/u-boot/doc/SPL/
DREADME.spl-secure-boot1 Overview of SPL verified boot on powerpc/mpc85xx & arm/layerscape platforms
7 This document provides an overview of how SPL verified boot works on powerpc/
/external/easymock/src/org/easymock/internal/
DMocksBehavior.java165 boolean verified = true; in verify()
170 verified = false; in verify()
173 if (verified) { in verify()
/external/autotest/client/site_tests/platform_BootLockbox/
Dcontrol19 lockbox data can be signed and verified before finalization but after
20 finalization it can only be verified. This test requires a reboot of the DUT
/external/ipsec-tools/src/racoon/
Dnattraversal.c187 int verified = 0; in natt_compare_addr_hash() local
190 return verified; in natt_compare_addr_hash()
203 return verified; /* XXX should abort */ in natt_compare_addr_hash()
209 verified = 1; in natt_compare_addr_hash()
214 return verified; in natt_compare_addr_hash()
/external/autotest/server/site_tests/platform_BootLockboxServer/
Dcontrol17 lockbox data can be signed and verified before finalization, but after
18 finalization it can only be verified.
/external/skia/src/compute/hs/cuda/bench/
Dmain.c402 bool verified = false; in hs_bench() local
424 verified = hs_verify_linear(hs_words,sorted_h,vout_h,count_padded_in); in hs_bench()
427 if (!verified) in hs_bench()
448 verify ? (verified ? " OK " : "*FAIL*") : "UNVERIFIED", in hs_bench()
465 if (verify && !verified) in hs_bench()
/external/skqp/src/compute/hs/cuda/bench/
Dmain.c402 bool verified = false; in hs_bench() local
424 verified = hs_verify_linear(hs_words,sorted_h,vout_h,count_padded_in); in hs_bench()
427 if (!verified) in hs_bench()
448 verify ? (verified ? " OK " : "*FAIL*") : "UNVERIFIED", in hs_bench()
465 if (verify && !verified) in hs_bench()
/external/u-boot/doc/uImage.FIT/
Dbeaglebone_vboot.txt7 Before reading this, please read verified-boot.txt and signature.txt. These
11 verified boot works in U-Boot. There is also a test which runs through the
16 for an example of how to enable verified boot using U-Boot.
22 packaged with the kernel. In particular this is important with verified boot,
24 public keys can be changed and verified boot is useless. An attacker can
37 1. Build U-Boot for the board, with the verified boot options enabled.
68 b. Configure and build U-Boot with verified boot enabled:
199 'required' property, which tells U-Boot that this key must be verified for the
302 'dev' and the '+' means that it verified. If it showed '-' that would be bad.
304 Once the configuration is verified it is then possible to rely on the hashes
[all …]

1234567891011