/external/vboot_reference/tests/ |
D | vb21_common2_tests.c | 117 struct vb2_signature *sig2; in test_verify_signature() local 124 sig2 = (struct vb2_signature *)buf2; in test_verify_signature() 127 TEST_SUCC(vb2_verify_signature(sig2, size), "verify_sig ok"); in test_verify_signature() 128 sig2->c.magic = VB2_MAGIC_PACKED_KEY; in test_verify_signature() 129 TEST_EQ(vb2_verify_signature(sig2, size), VB2_ERROR_SIG_MAGIC, in test_verify_signature() 133 sig2->c.total_size += 4; in test_verify_signature() 134 TEST_EQ(vb2_verify_signature(sig2, size), VB2_ERROR_COMMON_TOTAL_SIZE, in test_verify_signature() 138 sig2->c.struct_version_minor++; in test_verify_signature() 139 TEST_SUCC(vb2_verify_signature(sig2, size), "verify_sig minor ver"); in test_verify_signature() 140 sig2->c.struct_version_major++; in test_verify_signature() [all …]
|
D | vb20_common2_tests.c | 87 struct vb2_signature *sig2; in test_verify_data() local 92 sig2 = (struct vb2_signature *)malloc(sig_total_size); in test_verify_data() 98 memcpy(sig2, sig, sig_total_size); in test_verify_data() 100 TEST_NEQ(vb2_verify_data(test_data, test_size, sig2, &pubk, &wb), in test_verify_data() 104 memcpy(sig2, sig, sig_total_size); in test_verify_data() 106 TEST_NEQ(vb2_verify_data(test_data, test_size, sig2, &pubk, &wb), in test_verify_data() 111 memcpy(sig2, sig, sig_total_size); in test_verify_data() 112 TEST_NEQ(vb2_verify_data(test_data, test_size, sig2, &pubk, &wb), in test_verify_data() 116 memcpy(sig2, sig, sig_total_size); in test_verify_data() 117 TEST_EQ(vb2_verify_data(test_data, test_size, sig2, &pubk, &wb), in test_verify_data() [all …]
|
D | vb21_host_sig_tests.c | 46 struct vb2_signature *sig, *sig2; in sig_tests() local 149 sig2 = (struct vb2_signature *)(buf + c_sig_offs + sig->c.total_size); in sig_tests() 150 TEST_SUCC(vb2_verify_data(buf, c_sig_offs, sig2, &pubhash, &wb), in sig_tests() 157 TEST_EQ(size, sig->c.total_size + sig2->c.total_size, in sig_tests()
|
/external/epid-sdk/epid/verifier/1.1/unittests/ |
D | sigs_linked-test.cc | 44 auto& sig2 = this->kSigGrpXMember0Sha256RandbaseMsg1; in TEST_F() local 46 (Epid11BasicSignature const*)sig2.data())); in TEST_F() 51 auto& sig2 = this->kSigGrpXMember0Sha256Bsn0Msg1; in TEST_F() local 53 (Epid11BasicSignature const*)sig2.data())); in TEST_F() 59 auto& sig2 = this->kSigGrpXMember0Sha256Bsn1Msg0; in TEST_F() local 61 (Epid11BasicSignature const*)sig2.data())); in TEST_F() 67 auto& sig2 = this->kSigGrpXMember1Sha256Bsn0Msg0; in TEST_F() local 69 (Epid11BasicSignature const*)sig2.data())); in TEST_F()
|
/external/epid-sdk/epid/verifier/unittests/ |
D | sigs_linked-test.cc | 43 auto& sig2 = this->kSigGrpXMember0Sha256RandbaseMsg1; in TEST_F() local 45 (BasicSignature const*)sig2.data())); in TEST_F() 50 auto& sig2 = this->kSigGrpXMember0Sha256Bsn0Msg1; in TEST_F() local 52 (BasicSignature const*)sig2.data())); in TEST_F() 57 auto& sig2 = this->kSigGrpXMember0Sha256Bsn1Msg0; in TEST_F() local 59 (BasicSignature const*)sig2.data())); in TEST_F() 64 auto& sig2 = this->kSigGrpXMember1Sha256Bsn0Msg0; in TEST_F() local 66 (BasicSignature const*)sig2.data())); in TEST_F()
|
D | context-test.cc | 975 auto sig2 = this->kSigGrpXMember1Sha256Bsn0Msg0; in TEST_F() local 980 EXPECT_EQ(kEpidNoErr, EpidBlacklistSig(verifier, (EpidSignature*)sig2.data(), in TEST_F() 981 sig2.size(), msg.data(), msg.size())); in TEST_F()
|
/external/epid-sdk/epid/verifier/1.1/src/ |
D | sigs_linked.c | 26 Epid11BasicSignature const* sig2) { in Epid11AreSigsLinked() argument 27 return (sig1 && sig2 && 0 == memcmp(&sig1->B, &sig2->B, sizeof(sig2->B)) && in Epid11AreSigsLinked() 28 0 == memcmp(&sig1->K, &sig2->K, sizeof(sig2->K))); in Epid11AreSigsLinked()
|
/external/epid-sdk/epid/verifier/src/ |
D | sigs_linked.c | 27 bool EpidAreSigsLinked(BasicSignature const* sig1, BasicSignature const* sig2) { in EpidAreSigsLinked() argument 29 return (sig1 && sig2 && 0 == memcmp(&sig1->B, &sig2->B, sizeof(sig2->B)) && in EpidAreSigsLinked() 30 0 == memcmp(&sig1->K, &sig2->K, sizeof(sig2->K))); in EpidAreSigsLinked()
|
/external/tensorflow/tensorflow/core/grappler/graph_analyzer/ |
D | sig_node_test.cc | 1196 Signature sig2; in TEST_F() local 1197 sg2.ExtractForSignature(&sig2.map); in TEST_F() 1198 ASSERT_THAT(sig2.Compute(), Eq(Status::OK())); in TEST_F() 1200 EXPECT_TRUE(sig1 == sig2); in TEST_F() 1203 ++sig2.sig_short; in TEST_F() 1204 EXPECT_FALSE(sig1 == sig2); in TEST_F() 1207 --sig2.sig_short; in TEST_F() 1208 EXPECT_TRUE(sig1 == sig2); in TEST_F() 1211 ++sig2.sig_full[0]; in TEST_F() 1212 EXPECT_FALSE(sig1 == sig2); in TEST_F() [all …]
|
/external/tensorflow/tensorflow/core/grappler/optimizers/ |
D | function_api_info.cc | 105 const auto& sig2 = f2.signature(); in IsSameSignature() local 108 if (sig1.input_arg_size() != sig2.input_arg_size()) return false; in IsSameSignature() 110 if (!IsSameArgDef(sig1.input_arg(k), sig2.input_arg(k))) return false; in IsSameSignature() 115 if (sig1.output_arg_size() != sig2.output_arg_size()) return false; in IsSameSignature() 117 if (!IsSameArgDef(sig1.output_arg(k), sig2.output_arg(k))) return false; in IsSameSignature()
|
/external/boringssl/src/ssl/test/runner/ed25519/ |
D | ed25519_test.go | 134 sig2 := Sign(priv[:], msg) 135 if !bytes.Equal(sig, sig2[:]) { 136 t.Errorf("different signature result on line %d: %x vs %x", lineNo, sig, sig2) 139 if !Verify(pubKey, msg, sig2) {
|
/external/epid-sdk/epid/member/tiny/unittests/ |
D | sign-test.cc | 158 std::vector<uint8_t> sig2(EpidGetSigSize(nullptr)); in TEST_F() local 163 (EpidSignature*)sig2.data(), sig2.size())); in TEST_F() 164 EXPECT_TRUE(sig1.size() == sig2.size() && in TEST_F() 165 0 != memcmp(sig1.data(), sig2.data(), sig1.size())); in TEST_F() 206 std::vector<uint8_t> sig2(EpidGetSigSize(nullptr)); in TEST_F() local 214 (EpidSignature*)sig2.data(), sig2.size())); in TEST_F() 215 EXPECT_TRUE(sig1.size() == sig2.size() && in TEST_F() 216 0 != memcmp(sig1.data(), sig2.data(), sig1.size())); in TEST_F()
|
/external/epid-sdk/epid/member/unittests/ |
D | sign-test.cc | 129 std::vector<uint8_t> sig2(EpidGetSigSize(nullptr)); in TEST_F() local 134 (EpidSignature*)sig2.data(), sig2.size())); in TEST_F() 135 EXPECT_TRUE(sig1.size() == sig2.size() && in TEST_F() 136 0 != memcmp(sig1.data(), sig2.data(), sig1.size())); in TEST_F() 177 std::vector<uint8_t> sig2(EpidGetSigSize(nullptr)); in TEST_F() local 185 (EpidSignature*)sig2.data(), sig2.size())); in TEST_F() 186 EXPECT_TRUE(sig1.size() == sig2.size() && in TEST_F() 187 0 != memcmp(sig1.data(), sig2.data(), sig1.size())); in TEST_F()
|
/external/epid-sdk/epid/verifier/1.1/ |
D | api.h | 371 Epid11BasicSignature const* sig2);
|
/external/boringssl/src/crypto/rsa_extra/ |
D | rsa_test.cc | 1093 uint8_t sig2[256]; in TEST() local 1094 unsigned sig2_len = sizeof(sig2); in TEST() 1095 ASSERT_LE(RSA_size(rsa.get()), sizeof(sig2)); in TEST() 1096 EXPECT_TRUE(RSA_sign(NID_sha256, kDummyHash, sizeof(kDummyHash), sig2, in TEST() 1099 EXPECT_EQ(Bytes(sig, sig_len), Bytes(sig2, sig2_len)); in TEST()
|
/external/epid-sdk/epid/verifier/ |
D | api.h | 406 bool EpidAreSigsLinked(BasicSignature const* sig1, BasicSignature const* sig2);
|
/external/libvpx/libvpx/vp8/encoder/mips/msa/ |
D | denoising_msa.c | 322 v16u8 sig2, sig3, sig4, sig5, sig6, sig7; in vp8_denoiser_filter_uv_msa() local 342 sig2 = LD_UB(sig_ptr); in vp8_denoiser_filter_uv_msa() 344 temp0_h += (v8i16)__msa_ilvr_b(zero, (v16i8)sig2); in vp8_denoiser_filter_uv_msa()
|
/external/conscrypt/repackaged/openjdk-integ-tests/src/test/java/com/android/org/conscrypt/java/security/ |
D | SignatureTest.java | 141 Signature sig2 = Signature.getInstance(algorithm, provider); in test_getInstance() local 142 assertEquals(algorithm, sig2.getAlgorithm()); in test_getInstance() 143 assertEquals(provider, sig2.getProvider()); in test_getInstance() 144 test_Signature(sig2, kp); in test_getInstance()
|
/external/conscrypt/openjdk-integ-tests/src/test/java/org/conscrypt/java/security/ |
D | SignatureTest.java | 137 Signature sig2 = Signature.getInstance(algorithm, provider); in test_getInstance() local 138 assertEquals(algorithm, sig2.getAlgorithm()); in test_getInstance() 139 assertEquals(provider, sig2.getProvider()); in test_getInstance() 140 test_Signature(sig2, kp); in test_getInstance()
|
/external/elfutils/src/ |
D | unstrip.c | 743 const char *sig1, const char *sig2) in compare_unalloc_sections() argument 758 if (sig1 != NULL && sig2 != NULL) in compare_unalloc_sections() 759 return strcmp (sig1, sig2); in compare_unalloc_sections()
|
D | ChangeLog | 157 (compare_unalloc_sections): Take and use sig1 and sig2 as arguments.
|
/external/libpng/contrib/tools/ |
D | pngfix.c | 141 #define sig2 PNG_U32( 13, 10, 26, 10) macro 3221 if (file->length != sig1 || file->type != sig2) in read_callback() 3322 assert(length == sig1 && type == sig2); in read_callback()
|