Home
last modified time | relevance | path

Searched refs:verified (Results 1 – 25 of 310) sorted by relevance

12345678910>>...13

/external/wycheproof/java/com/google/security/wycheproof/testcases/
DRsaSignatureTest.java1139 boolean verified = false; in testVectors()
1141 verified = verifier.verify(signatureBytes); in testVectors()
1145 if (first && !verified) { in testVectors()
1148 } else if (!first && verified) { in testVectors()
1201 boolean verified = false; in testLegacySignatures()
1203 verified = verifier.verify(signatureBytes); in testLegacySignatures()
1205 verified = false; in testLegacySignatures()
1207 if (verified) { in testLegacySignatures()
DEcdsaTest.java623 boolean verified = false; in testVectors()
625 verified = verifier.verify(signatureBytes); in testVectors()
629 verified = false; in testVectors()
631 if (!verified && isValidDER) { in testVectors()
635 if (verified && !isValidBER) { in testVectors()
DDsaTest.java695 boolean verified = false; in testVectors()
697 verified = verifier.verify(signatureBytes); in testVectors()
701 verified = false; in testVectors()
709 if (isValidDER && !verified) { in testVectors()
712 } else if (!isValidBER && verified) { in testVectors()
/external/ukey2/src/main/java/com/google/security/cryptauth/lib/securemessage/
DSecureMessageParser.java243 boolean verified = CryptoOps.verify(verificationKey, sigType, signature, signedData); in verifyHeaderAndBody()
251 verified &= (result.getHeader().getSignatureScheme() == sigType.getSigScheme()); in verifyHeaderAndBody()
252 verified &= (result.getHeader().getEncryptionScheme() == encType.getEncScheme()); in verifyHeaderAndBody()
254 verified &= (encType != EncType.NONE) || !result.getHeader().hasDecryptionKeyId(); in verifyHeaderAndBody()
257 verified &= (encType == EncType.NONE) || !sigType.isPublicKeyScheme() || in verifyHeaderAndBody()
260 verified &= (result.getHeader().getAssociatedDataLength() == associatedDataLength); in verifyHeaderAndBody()
262 verified = false; in verifyHeaderAndBody()
265 if (verified) { in verifyHeaderAndBody()
/external/mockito/src/main/java/org/mockito/internal/verification/
DInOrderContextImpl.java13 final IdentitySet verified = new IdentitySet(); field in InOrderContextImpl
16 return verified.contains(invocation); in isVerified()
20 verified.add(i); in markVerified()
/external/python/rsa/tests/
Dtest_integers.py47 verified = rsa.core.decrypt_int(signed, self.pub.e, self.pub.n)
48 print("\tVerified: %d" % verified)
50 self.assertEqual(message, verified)
/external/mockito/src/test/java/org/mockito/internal/invocation/
DInvocationBuilder.java33 private boolean verified; field in InvocationBuilder
70 if (verified) { in toInvocation()
106 public InvocationBuilder verified() { in verified() method in InvocationBuilder
107 this.verified = true; in verified()
DInvocationMatcherTest.java86 Invocation verified = new InvocationBuilder().simpleMethod().verified().toInvocation(); in should_not_be_similar_to_verified_invocation() local
87 assertFalse(simpleMethod.hasSimilarMethod(verified)); in should_not_be_similar_to_verified_invocation()
/external/mockito/src/test/java/org/mockito/internal/exceptions/util/
DScenarioPrinterTest.java25 Invocation verified = new InvocationBuilder().simpleMethod().verified().toInvocation(); in shouldPrintInvocations() local
29 String out = sp.print((List) asList(verified, unverified)); in shouldPrintInvocations()
/external/curl/docs/cmdline-opts/
Dinsecure.d8 By default, every SSL connection curl makes is verified to be secure. This
12 The server connection is verified by making sure the server's certificate
/external/u-boot/common/
Dimage-sig.c287 int verified = 0; in fit_image_verify_sig() local
302 verified = 1; in fit_image_verify_sig()
313 return verified ? 0 : -EPERM; in fit_image_verify_sig()
476 int verified = 0; in fit_config_verify_sig() local
491 verified = 1; in fit_config_verify_sig()
502 return verified ? 0 : -EPERM; in fit_config_verify_sig()
/external/mockito/src/main/java/org/mockito/internal/invocation/
DInterceptedInvocation.java32 private boolean verified; field in InterceptedInvocation
53 return verified || isIgnoredForVerification; in isVerified()
78 verified = true; in markVerified()
/external/ImageMagick/.github/
DPULL_REQUEST_TEMPLATE.md4 - [ ] I have verified that there are no overlapping [pull-requests](https://github.com/ImageMagick/…
5 - [ ] I have verified that I am following the existing coding patterns and practices as demonstrate…
/external/deqp/doc/testspecs/GLES31/
Dfunctional.shaders.sample_variables.txt44 Values are verified with verifier fragment shader.
48 fragment output value and then texture contents are verified. With default
51 gl_SampleID output a non-zero green value. Result image is then verified to
68 verified for legality, uniqueness and distribution. With framebuffer and
69 renderbuffer render targets only the legality and distribution are verified.
70 Distribution is verified by averaging sample position values (texture) or by
Dfunctional.shaders.atomic_counter.txt48 the shader. Atomic counter values are verified by comparing against the
55 counters are verified separately.
57 Test cases using only atomicCounter() call are verified by checking that all
71 atomicCounterDecrement() are verified by counting how many times each value
/external/clang/bindings/python/tests/cindex/
Dtest_location.py65 verified = False
68 verified = True
70 assert verified
/external/u-boot/doc/SPL/
DREADME.spl-secure-boot1 Overview of SPL verified boot on powerpc/mpc85xx & arm/layerscape platforms
7 This document provides an overview of how SPL verified boot works on powerpc/
/external/autotest/client/site_tests/platform_BootLockbox/
Dcontrol19 lockbox data can be signed and verified before finalization but after
20 finalization it can only be verified. This test requires a reboot of the DUT
/external/easymock/src/org/easymock/internal/
DMocksBehavior.java165 boolean verified = true; in verify()
170 verified = false; in verify()
173 if (verified) { in verify()
/external/autotest/server/site_tests/platform_BootLockboxServer/
Dcontrol17 lockbox data can be signed and verified before finalization, but after
18 finalization it can only be verified.
/external/ipsec-tools/src/racoon/
Dnattraversal.c187 int verified = 0; in natt_compare_addr_hash() local
190 return verified; in natt_compare_addr_hash()
203 return verified; /* XXX should abort */ in natt_compare_addr_hash()
209 verified = 1; in natt_compare_addr_hash()
214 return verified; in natt_compare_addr_hash()
/external/autotest/server/site_tests/firmware_ECLidShutdown/
Dcontrol21 - Verifies the device does shutdown when verified boot starts while the lid
23 - Verifies the device does not shutdown when verified boot starts while the
/external/skqp/src/compute/hs/cuda/bench/
Dmain.c402 bool verified = false; in hs_bench() local
424 verified = hs_verify_linear(hs_words,sorted_h,vout_h,count_padded_in); in hs_bench()
427 if (!verified) in hs_bench()
448 verify ? (verified ? " OK " : "*FAIL*") : "UNVERIFIED", in hs_bench()
465 if (verify && !verified) in hs_bench()
/external/u-boot/doc/
DREADME.chromium21 - Running U-Boot with Chromium OS verified boot. This allows U-Boot to be
27 U-Boot with Chromium OS verified boot
84 environment for new verified-boot features.
119 UCLASS_CROS_VBOOT_FLAG Chrome OS verified boot flag
147 Various options are available which control the operation of verified boot.
/external/u-boot/doc/uImage.FIT/
Dbeaglebone_vboot.txt7 Before reading this, please read verified-boot.txt and signature.txt. These
11 verified boot works in U-Boot. There is also a test which runs through the
16 for an example of how to enable verified boot using U-Boot.
22 packaged with the kernel. In particular this is important with verified boot,
24 public keys can be changed and verified boot is useless. An attacker can
37 1. Build U-Boot for the board, with the verified boot options enabled.
68 b. Configure and build U-Boot with verified boot enabled:
199 'required' property, which tells U-Boot that this key must be verified for the
302 'dev' and the '+' means that it verified. If it showed '-' that would be bad.
304 Once the configuration is verified it is then possible to rely on the hashes
[all …]

12345678910>>...13