/third_party/node/test/parallel/ |
D | test-crypto-sign-verify.js | 103 const verified = crypto.createVerify('SHA1') constant 107 assert.strictEqual(verified, true); 119 let verified = crypto.createVerify('SHA256') variable 123 assert.strictEqual(verified, true); 129 verified = verStream.verify(certPem, s2, 'latin1'); 130 assert.strictEqual(verified, true); 137 let verified = crypto.createVerify('SHA1') 141 assert.strictEqual(verified, true); 147 verified = verStream.verify(certPem, s3); 148 assert.strictEqual(verified, true); [all …]
|
/third_party/cef/libcef/common/ |
D | value_base.h | 51 inline bool verified() { return verified_; } in verified() function 203 if (!auto_lock.verified()) \ 213 if (!auto_lock.verified()) \ 400 if (lock_scope.verified()) in SetOwnsController() 409 verified_ = (auto_lock_.verified() && impl->VerifyAccess(modify)); in AutoLock() 415 inline bool verified() { return verified_; } in verified() function
|
/third_party/mbedtls/3rdparty/everest/ |
D | README.md | 3 This is a formally verified implementation of Curve25519-based handshakes. The C code is automatica… 5 … 128-bit integer type and KreMLin therefore has to use additional (also verified) code to simulate…
|
/third_party/skia/third_party/externals/swiftshader/src/Vulkan/Debug/ |
D | Server.cpp | 109 bool verified = false; in Impl() local 110 ctx->clientEventBroadcast()->onSetBreakpoint(reqBP.name, verified); in Impl() 113 resBP.verified = verified; in Impl() 148 bool verified = false; in Impl() local 149 ctx->clientEventBroadcast()->onSetBreakpoint(location, verified); in Impl() 152 respBP.verified = verified; in Impl() 178 bp.verified = false; in Impl()
|
/third_party/curl/docs/cmdline-opts/ |
D | insecure.d | 9 By default, every SSL connection curl makes is verified to be secure. This 13 The server connection is verified by making sure the server's certificate
|
/third_party/vk-gl-cts/doc/testspecs/GLES31/ |
D | functional.shaders.sample_variables.txt | 44 Values are verified with verifier fragment shader. 48 fragment output value and then texture contents are verified. With default 51 gl_SampleID output a non-zero green value. Result image is then verified to 68 verified for legality, uniqueness and distribution. With framebuffer and 69 renderbuffer render targets only the legality and distribution are verified. 70 Distribution is verified by averaging sample position values (texture) or by
|
D | functional.shaders.atomic_counter.txt | 48 the shader. Atomic counter values are verified by comparing against the 55 counters are verified separately. 57 Test cases using only atomicCounter() call are verified by checking that all 71 atomicCounterDecrement() are verified by counting how many times each value
|
D | functional.tessellation.txt | 71 comparisons, and thus not all rules are exactly verified (such as 90 winding mode specified in the TES. The patterns drawn are simple and verified by 98 value of gl_PatchVerticesIn is verified. The "quads" mode is used. 113 the cases with differing input and output patch sizes are verified with 115 gl_TessLevel*[] cases draw simple all-white patterns and are verified as such. 135 potential cracks are likely to become visible. The resulting image is verified
|
D | functional.image_load_store.txt | 50 of a FBO and read with glReadPixels(). Texture is verified with exact 54 mapping. Texture is verified with some tolerance. 82 result cases are verified by comparing the pixels of the first image to 84 of the operation. The results for the return value cases are verified by reading 119 verification result into a 2d r32ui image. The result is trivially verified.
|
D | functional.fbo.no_attachments.txt | 42 Rendering is verified to happen with occlusion queries. This rather limited 50 is verified by running a shader that discard all fragments that are not within
|
D | functional.tessellation_geometry_interaction.txt | 55 cells, and the result image is verified. 72 grid of green and yellow cells, and the result image is verified. 91 is then verified from the image.
|
D | functional.vertex_attribute_binding.txt | 62 pointer API is also verified. 66 then verified. Mixed API rendering tests intermix both vertex
|
D | functional.uniform_location.txt | 44 are verified to match the given ones with glGetUniformLocation. Generated 50 shader is verified to be fully white.
|
/third_party/boost/libs/graph/test/ |
D | vf2_sub_graph_iso_test.cpp | 180 bool verified; in operator ()() local 181 BOOST_TEST(verified = verify_vf2_subgraph_iso( in operator ()() 185 if (!verified || output_) in operator ()() 187 std::cout << "Verfied: " << std::boolalpha << verified << std::endl; in operator ()()
|
/third_party/vk-gl-cts/doc/testspecs/GLES3/ |
D | functional.pbo.txt | 44 the write data is verified to be correct by mapping the buffer. Additionally, 46 is verified by doing the same operation without pack buffer and then comparing
|
/third_party/python/Modules/_decimal/libmpdec/literature/ |
D | mulmod-ppro.txt | 101 (III) can easily be verified by substituting the largest possible 105 can be exhaustively verified with a test program. 126 (III) can easily be verified by substituting the largest possible 130 can be exhaustively verified with a test program.
|
/third_party/node/deps/npm/test/tap/ |
D | doctor.js | 102 t.match(list[8][1], /^verified \d+ tarballs?$/, 'Cache verified') 123 t.match(list[8][1], /^verified \d+ tarballs?$/, 'Cache verified')
|
/third_party/openssl/doc/man3/ |
D | X509_STORE_CTX_new.pod | 75 entity certificate to be verified is set to B<x509> and a set of additional 84 X509_STORE_CTX_set_cert() sets the certificate to be verified in B<ctx> to 150 verified in the I<ctx>. Built-in available values for the I<purpose> argument 156 the key usage declared within certificates in the chain being verified is 159 same time. During verification this trust setting will be verified to check it 164 being verified in the I<ctx>. Built-in available values for the I<trust>
|
D | SSL_get_peer_cert_chain.pod | 26 has sent them) it is B<not> a verified chain. 28 SSL_get0_verified_chain() returns the B<verified> certificate chain
|
D | SSL_CTX_set_stateless_cookie_generate_cb.pod | 54 including the application-controlled portion, is automatically verified by HMAC 69 integrity of the cookie is not verified by OpenSSL. This is an application
|
/third_party/ltp/testscripts/ |
D | Readme_ROBind | 36 written can be verified (this is the usual method). 102 is re-seeded, and the file is verified.
|
/third_party/boost/libs/metaparse/example/regexp/ |
D | README | 3 which is parsed (and verified) at compile-time. A boost::xpressive
|
/third_party/node/test/es-module/ |
D | test-esm-import-meta.mjs | 11 delete descriptor.value; // Values are verified below.
|
/third_party/ltp/testcases/kernel/fs/doio/ |
D | README | 20 written can be verified (this is the usual method). 42 whole file content can be verified. It can cause disk fragmentation.
|
/third_party/selinux/libselinux/src/ |
D | setexecfilecon.c | 58 int rpm_execcon(unsigned int verified __attribute__ ((unused)), in rpm_execcon() argument
|