Home
last modified time | relevance | path

Searched refs:verified (Results 1 – 25 of 235) sorted by relevance

12345678910

/third_party/node/test/parallel/
Dtest-crypto-sign-verify.js103 const verified = crypto.createVerify('SHA1') constant
107 assert.strictEqual(verified, true);
119 let verified = crypto.createVerify('SHA256') variable
123 assert.strictEqual(verified, true);
129 verified = verStream.verify(certPem, s2, 'latin1');
130 assert.strictEqual(verified, true);
137 let verified = crypto.createVerify('SHA1')
141 assert.strictEqual(verified, true);
147 verified = verStream.verify(certPem, s3);
148 assert.strictEqual(verified, true);
[all …]
/third_party/cef/libcef/common/
Dvalue_base.h51 inline bool verified() { return verified_; } in verified() function
203 if (!auto_lock.verified()) \
213 if (!auto_lock.verified()) \
400 if (lock_scope.verified()) in SetOwnsController()
409 verified_ = (auto_lock_.verified() && impl->VerifyAccess(modify)); in AutoLock()
415 inline bool verified() { return verified_; } in verified() function
/third_party/mbedtls/3rdparty/everest/
DREADME.md3 This is a formally verified implementation of Curve25519-based handshakes. The C code is automatica…
5 … 128-bit integer type and KreMLin therefore has to use additional (also verified) code to simulate…
/third_party/skia/third_party/externals/swiftshader/src/Vulkan/Debug/
DServer.cpp109 bool verified = false; in Impl() local
110 ctx->clientEventBroadcast()->onSetBreakpoint(reqBP.name, verified); in Impl()
113 resBP.verified = verified; in Impl()
148 bool verified = false; in Impl() local
149 ctx->clientEventBroadcast()->onSetBreakpoint(location, verified); in Impl()
152 respBP.verified = verified; in Impl()
178 bp.verified = false; in Impl()
/third_party/curl/docs/cmdline-opts/
Dinsecure.d9 By default, every SSL connection curl makes is verified to be secure. This
13 The server connection is verified by making sure the server's certificate
/third_party/vk-gl-cts/doc/testspecs/GLES31/
Dfunctional.shaders.sample_variables.txt44 Values are verified with verifier fragment shader.
48 fragment output value and then texture contents are verified. With default
51 gl_SampleID output a non-zero green value. Result image is then verified to
68 verified for legality, uniqueness and distribution. With framebuffer and
69 renderbuffer render targets only the legality and distribution are verified.
70 Distribution is verified by averaging sample position values (texture) or by
Dfunctional.shaders.atomic_counter.txt48 the shader. Atomic counter values are verified by comparing against the
55 counters are verified separately.
57 Test cases using only atomicCounter() call are verified by checking that all
71 atomicCounterDecrement() are verified by counting how many times each value
Dfunctional.tessellation.txt71 comparisons, and thus not all rules are exactly verified (such as
90 winding mode specified in the TES. The patterns drawn are simple and verified by
98 value of gl_PatchVerticesIn is verified. The "quads" mode is used.
113 the cases with differing input and output patch sizes are verified with
115 gl_TessLevel*[] cases draw simple all-white patterns and are verified as such.
135 potential cracks are likely to become visible. The resulting image is verified
Dfunctional.image_load_store.txt50 of a FBO and read with glReadPixels(). Texture is verified with exact
54 mapping. Texture is verified with some tolerance.
82 result cases are verified by comparing the pixels of the first image to
84 of the operation. The results for the return value cases are verified by reading
119 verification result into a 2d r32ui image. The result is trivially verified.
Dfunctional.fbo.no_attachments.txt42 Rendering is verified to happen with occlusion queries. This rather limited
50 is verified by running a shader that discard all fragments that are not within
Dfunctional.tessellation_geometry_interaction.txt55 cells, and the result image is verified.
72 grid of green and yellow cells, and the result image is verified.
91 is then verified from the image.
Dfunctional.vertex_attribute_binding.txt62 pointer API is also verified.
66 then verified. Mixed API rendering tests intermix both vertex
Dfunctional.uniform_location.txt44 are verified to match the given ones with glGetUniformLocation. Generated
50 shader is verified to be fully white.
/third_party/boost/libs/graph/test/
Dvf2_sub_graph_iso_test.cpp180 bool verified; in operator ()() local
181 BOOST_TEST(verified = verify_vf2_subgraph_iso( in operator ()()
185 if (!verified || output_) in operator ()()
187 std::cout << "Verfied: " << std::boolalpha << verified << std::endl; in operator ()()
/third_party/vk-gl-cts/doc/testspecs/GLES3/
Dfunctional.pbo.txt44 the write data is verified to be correct by mapping the buffer. Additionally,
46 is verified by doing the same operation without pack buffer and then comparing
/third_party/python/Modules/_decimal/libmpdec/literature/
Dmulmod-ppro.txt101 (III) can easily be verified by substituting the largest possible
105 can be exhaustively verified with a test program.
126 (III) can easily be verified by substituting the largest possible
130 can be exhaustively verified with a test program.
/third_party/node/deps/npm/test/tap/
Ddoctor.js102 t.match(list[8][1], /^verified \d+ tarballs?$/, 'Cache verified')
123 t.match(list[8][1], /^verified \d+ tarballs?$/, 'Cache verified')
/third_party/openssl/doc/man3/
DX509_STORE_CTX_new.pod75 entity certificate to be verified is set to B<x509> and a set of additional
84 X509_STORE_CTX_set_cert() sets the certificate to be verified in B<ctx> to
150 verified in the I<ctx>. Built-in available values for the I<purpose> argument
156 the key usage declared within certificates in the chain being verified is
159 same time. During verification this trust setting will be verified to check it
164 being verified in the I<ctx>. Built-in available values for the I<trust>
DSSL_get_peer_cert_chain.pod26 has sent them) it is B<not> a verified chain.
28 SSL_get0_verified_chain() returns the B<verified> certificate chain
DSSL_CTX_set_stateless_cookie_generate_cb.pod54 including the application-controlled portion, is automatically verified by HMAC
69 integrity of the cookie is not verified by OpenSSL. This is an application
/third_party/ltp/testscripts/
DReadme_ROBind36 written can be verified (this is the usual method).
102 is re-seeded, and the file is verified.
/third_party/boost/libs/metaparse/example/regexp/
DREADME3 which is parsed (and verified) at compile-time. A boost::xpressive
/third_party/node/test/es-module/
Dtest-esm-import-meta.mjs11 delete descriptor.value; // Values are verified below.
/third_party/ltp/testcases/kernel/fs/doio/
DREADME20 written can be verified (this is the usual method).
42 whole file content can be verified. It can cause disk fragmentation.
/third_party/selinux/libselinux/src/
Dsetexecfilecon.c58 int rpm_execcon(unsigned int verified __attribute__ ((unused)), in rpm_execcon() argument

12345678910