/external/wycheproof/java/com/google/security/wycheproof/testcases/ |
D | RsaSignatureTest.java | 1139 boolean verified = false; in testVectors() 1141 verified = verifier.verify(signatureBytes); in testVectors() 1145 if (first && !verified) { in testVectors() 1148 } else if (!first && verified) { in testVectors() 1201 boolean verified = false; in testLegacySignatures() 1203 verified = verifier.verify(signatureBytes); in testLegacySignatures() 1205 verified = false; in testLegacySignatures() 1207 if (verified) { in testLegacySignatures()
|
D | EcdsaTest.java | 623 boolean verified = false; in testVectors() 625 verified = verifier.verify(signatureBytes); in testVectors() 629 verified = false; in testVectors() 631 if (!verified && isValidDER) { in testVectors() 635 if (verified && !isValidBER) { in testVectors()
|
D | DsaTest.java | 695 boolean verified = false; in testVectors() 697 verified = verifier.verify(signatureBytes); in testVectors() 701 verified = false; in testVectors() 709 if (isValidDER && !verified) { in testVectors() 712 } else if (!isValidBER && verified) { in testVectors()
|
/external/ukey2/src/main/java/com/google/security/cryptauth/lib/securemessage/ |
D | SecureMessageParser.java | 243 boolean verified = CryptoOps.verify(verificationKey, sigType, signature, signedData); in verifyHeaderAndBody() 251 verified &= (result.getHeader().getSignatureScheme() == sigType.getSigScheme()); in verifyHeaderAndBody() 252 verified &= (result.getHeader().getEncryptionScheme() == encType.getEncScheme()); in verifyHeaderAndBody() 254 verified &= (encType != EncType.NONE) || !result.getHeader().hasDecryptionKeyId(); in verifyHeaderAndBody() 257 verified &= (encType == EncType.NONE) || !sigType.isPublicKeyScheme() || in verifyHeaderAndBody() 260 verified &= (result.getHeader().getAssociatedDataLength() == associatedDataLength); in verifyHeaderAndBody() 262 verified = false; in verifyHeaderAndBody() 265 if (verified) { in verifyHeaderAndBody()
|
/external/mockito/src/main/java/org/mockito/internal/verification/ |
D | InOrderContextImpl.java | 13 final IdentitySet verified = new IdentitySet(); field in InOrderContextImpl 16 return verified.contains(invocation); in isVerified() 20 verified.add(i); in markVerified()
|
/external/python/rsa/tests/ |
D | test_integers.py | 47 verified = rsa.core.decrypt_int(signed, self.pub.e, self.pub.n) 48 print("\tVerified: %d" % verified) 50 self.assertEqual(message, verified)
|
/external/mockito/src/test/java/org/mockito/internal/invocation/ |
D | InvocationBuilder.java | 33 private boolean verified; field in InvocationBuilder 70 if (verified) { in toInvocation() 106 public InvocationBuilder verified() { in verified() method in InvocationBuilder 107 this.verified = true; in verified()
|
D | InvocationMatcherTest.java | 86 Invocation verified = new InvocationBuilder().simpleMethod().verified().toInvocation(); in should_not_be_similar_to_verified_invocation() local 87 assertFalse(simpleMethod.hasSimilarMethod(verified)); in should_not_be_similar_to_verified_invocation()
|
/external/mockito/src/test/java/org/mockito/internal/exceptions/util/ |
D | ScenarioPrinterTest.java | 25 Invocation verified = new InvocationBuilder().simpleMethod().verified().toInvocation(); in shouldPrintInvocations() local 29 String out = sp.print((List) asList(verified, unverified)); in shouldPrintInvocations()
|
/external/curl/docs/cmdline-opts/ |
D | insecure.d | 8 By default, every SSL connection curl makes is verified to be secure. This 12 The server connection is verified by making sure the server's certificate
|
/external/u-boot/common/ |
D | image-sig.c | 287 int verified = 0; in fit_image_verify_sig() local 302 verified = 1; in fit_image_verify_sig() 313 return verified ? 0 : -EPERM; in fit_image_verify_sig() 476 int verified = 0; in fit_config_verify_sig() local 491 verified = 1; in fit_config_verify_sig() 502 return verified ? 0 : -EPERM; in fit_config_verify_sig()
|
/external/mockito/src/main/java/org/mockito/internal/invocation/ |
D | InterceptedInvocation.java | 32 private boolean verified; field in InterceptedInvocation 53 return verified || isIgnoredForVerification; in isVerified() 78 verified = true; in markVerified()
|
/external/ImageMagick/.github/ |
D | PULL_REQUEST_TEMPLATE.md | 4 - [ ] I have verified that there are no overlapping [pull-requests](https://github.com/ImageMagick/… 5 - [ ] I have verified that I am following the existing coding patterns and practices as demonstrate…
|
/external/deqp/doc/testspecs/GLES31/ |
D | functional.shaders.sample_variables.txt | 44 Values are verified with verifier fragment shader. 48 fragment output value and then texture contents are verified. With default 51 gl_SampleID output a non-zero green value. Result image is then verified to 68 verified for legality, uniqueness and distribution. With framebuffer and 69 renderbuffer render targets only the legality and distribution are verified. 70 Distribution is verified by averaging sample position values (texture) or by
|
D | functional.shaders.atomic_counter.txt | 48 the shader. Atomic counter values are verified by comparing against the 55 counters are verified separately. 57 Test cases using only atomicCounter() call are verified by checking that all 71 atomicCounterDecrement() are verified by counting how many times each value
|
/external/clang/bindings/python/tests/cindex/ |
D | test_location.py | 65 verified = False 68 verified = True 70 assert verified
|
/external/u-boot/doc/SPL/ |
D | README.spl-secure-boot | 1 Overview of SPL verified boot on powerpc/mpc85xx & arm/layerscape platforms 7 This document provides an overview of how SPL verified boot works on powerpc/
|
/external/autotest/client/site_tests/platform_BootLockbox/ |
D | control | 19 lockbox data can be signed and verified before finalization but after 20 finalization it can only be verified. This test requires a reboot of the DUT
|
/external/easymock/src/org/easymock/internal/ |
D | MocksBehavior.java | 165 boolean verified = true; in verify() 170 verified = false; in verify() 173 if (verified) { in verify()
|
/external/autotest/server/site_tests/platform_BootLockboxServer/ |
D | control | 17 lockbox data can be signed and verified before finalization, but after 18 finalization it can only be verified.
|
/external/ipsec-tools/src/racoon/ |
D | nattraversal.c | 187 int verified = 0; in natt_compare_addr_hash() local 190 return verified; in natt_compare_addr_hash() 203 return verified; /* XXX should abort */ in natt_compare_addr_hash() 209 verified = 1; in natt_compare_addr_hash() 214 return verified; in natt_compare_addr_hash()
|
/external/autotest/server/site_tests/firmware_ECLidShutdown/ |
D | control | 21 - Verifies the device does shutdown when verified boot starts while the lid 23 - Verifies the device does not shutdown when verified boot starts while the
|
/external/skqp/src/compute/hs/cuda/bench/ |
D | main.c | 402 bool verified = false; in hs_bench() local 424 verified = hs_verify_linear(hs_words,sorted_h,vout_h,count_padded_in); in hs_bench() 427 if (!verified) in hs_bench() 448 verify ? (verified ? " OK " : "*FAIL*") : "UNVERIFIED", in hs_bench() 465 if (verify && !verified) in hs_bench()
|
/external/u-boot/doc/ |
D | README.chromium | 21 - Running U-Boot with Chromium OS verified boot. This allows U-Boot to be 27 U-Boot with Chromium OS verified boot 84 environment for new verified-boot features. 119 UCLASS_CROS_VBOOT_FLAG Chrome OS verified boot flag 147 Various options are available which control the operation of verified boot.
|
/external/u-boot/doc/uImage.FIT/ |
D | beaglebone_vboot.txt | 7 Before reading this, please read verified-boot.txt and signature.txt. These 11 verified boot works in U-Boot. There is also a test which runs through the 16 for an example of how to enable verified boot using U-Boot. 22 packaged with the kernel. In particular this is important with verified boot, 24 public keys can be changed and verified boot is useless. An attacker can 37 1. Build U-Boot for the board, with the verified boot options enabled. 68 b. Configure and build U-Boot with verified boot enabled: 199 'required' property, which tells U-Boot that this key must be verified for the 302 'dev' and the '+' means that it verified. If it showed '-' that would be bad. 304 Once the configuration is verified it is then possible to rely on the hashes [all …]
|