/external/vboot_reference/tests/ |
D | vb21_common2_tests.c | 117 struct vb2_signature *sig2; in test_verify_signature() local 124 sig2 = (struct vb2_signature *)buf2; in test_verify_signature() 127 TEST_SUCC(vb2_verify_signature(sig2, size), "verify_sig ok"); in test_verify_signature() 128 sig2->c.magic = VB2_MAGIC_PACKED_KEY; in test_verify_signature() 129 TEST_EQ(vb2_verify_signature(sig2, size), VB2_ERROR_SIG_MAGIC, in test_verify_signature() 133 sig2->c.total_size += 4; in test_verify_signature() 134 TEST_EQ(vb2_verify_signature(sig2, size), VB2_ERROR_COMMON_TOTAL_SIZE, in test_verify_signature() 138 sig2->c.struct_version_minor++; in test_verify_signature() 139 TEST_SUCC(vb2_verify_signature(sig2, size), "verify_sig minor ver"); in test_verify_signature() 140 sig2->c.struct_version_major++; in test_verify_signature() [all …]
|
D | vb20_common2_tests.c | 87 struct vb2_signature *sig2; in test_verify_data() local 92 sig2 = (struct vb2_signature *)malloc(sig_total_size); in test_verify_data() 98 memcpy(sig2, sig, sig_total_size); in test_verify_data() 100 TEST_NEQ(vb2_verify_data(test_data, test_size, sig2, &pubk, &wb), in test_verify_data() 104 memcpy(sig2, sig, sig_total_size); in test_verify_data() 106 TEST_NEQ(vb2_verify_data(test_data, test_size, sig2, &pubk, &wb), in test_verify_data() 111 memcpy(sig2, sig, sig_total_size); in test_verify_data() 112 TEST_NEQ(vb2_verify_data(test_data, test_size, sig2, &pubk, &wb), in test_verify_data() 116 memcpy(sig2, sig, sig_total_size); in test_verify_data() 117 TEST_EQ(vb2_verify_data(test_data, test_size, sig2, &pubk, &wb), in test_verify_data() [all …]
|
D | vb21_host_sig_tests.c | 46 struct vb2_signature *sig, *sig2; in sig_tests() local 149 sig2 = (struct vb2_signature *)(buf + c_sig_offs + sig->c.total_size); in sig_tests() 150 TEST_SUCC(vb2_verify_data(buf, c_sig_offs, sig2, &pubhash, &wb), in sig_tests() 157 TEST_EQ(size, sig->c.total_size + sig2->c.total_size, in sig_tests()
|
/external/python/cryptography/tests/hazmat/primitives/ |
D | test_asym_utils.py | 34 sig2 = encode_dss_signature(*r_s1) 35 assert sig2 == ( 39 assert decode_dss_signature(sig2) == r_s1
|
/external/tensorflow/tensorflow/core/grappler/graph_analyzer/ |
D | sig_node_test.cc | 1196 Signature sig2; in TEST_F() local 1197 sg2.ExtractForSignature(&sig2.map); in TEST_F() 1198 ASSERT_THAT(sig2.Compute(), Eq(Status::OK())); in TEST_F() 1200 EXPECT_TRUE(sig1 == sig2); in TEST_F() 1203 ++sig2.sig_short; in TEST_F() 1204 EXPECT_FALSE(sig1 == sig2); in TEST_F() 1207 --sig2.sig_short; in TEST_F() 1208 EXPECT_TRUE(sig1 == sig2); in TEST_F() 1211 ++sig2.sig_full[0]; in TEST_F() 1212 EXPECT_FALSE(sig1 == sig2); in TEST_F() [all …]
|
/external/tensorflow/tensorflow/core/grappler/optimizers/ |
D | function_api_info.cc | 105 const auto& sig2 = f2.signature(); in IsSameSignature() local 108 if (sig1.input_arg_size() != sig2.input_arg_size()) return false; in IsSameSignature() 110 if (!IsSameArgDef(sig1.input_arg(k), sig2.input_arg(k))) return false; in IsSameSignature() 115 if (sig1.output_arg_size() != sig2.output_arg_size()) return false; in IsSameSignature() 117 if (!IsSameArgDef(sig1.output_arg(k), sig2.output_arg(k))) return false; in IsSameSignature()
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/rsa_extra/ |
D | rsa_test.cc | 1094 uint8_t sig2[256]; in TEST() local 1095 unsigned sig2_len = sizeof(sig2); in TEST() 1096 ASSERT_LE(RSA_size(rsa.get()), sizeof(sig2)); in TEST() 1097 EXPECT_TRUE(RSA_sign(NID_sha256, kDummyHash, sizeof(kDummyHash), sig2, in TEST() 1100 EXPECT_EQ(Bytes(sig, sig_len), Bytes(sig2, sig2_len)); in TEST()
|
/external/boringssl/src/crypto/rsa_extra/ |
D | rsa_test.cc | 1096 uint8_t sig2[256]; in TEST() local 1097 unsigned sig2_len = sizeof(sig2); in TEST() 1098 ASSERT_LE(RSA_size(rsa.get()), sizeof(sig2)); in TEST() 1099 EXPECT_TRUE(RSA_sign(NID_sha256, kDummyHash, sizeof(kDummyHash), sig2, in TEST() 1102 EXPECT_EQ(Bytes(sig, sig_len), Bytes(sig2, sig2_len)); in TEST()
|
/external/libvpx/libvpx/vp8/encoder/mips/msa/ |
D | denoising_msa.c | 322 v16u8 sig2, sig3, sig4, sig5, sig6, sig7; in vp8_denoiser_filter_uv_msa() local 342 sig2 = LD_UB(sig_ptr); in vp8_denoiser_filter_uv_msa() 344 temp0_h += (v8i16)__msa_ilvr_b(zero, (v16i8)sig2); in vp8_denoiser_filter_uv_msa()
|
/external/conscrypt/repackaged/common/src/test/java/com/android/org/conscrypt/java/security/ |
D | SignatureTest.java | 133 Signature sig2 = Signature.getInstance(algorithm, provider); in test_getInstance() 134 assertEquals(algorithm, sig2.getAlgorithm()); in test_getInstance() 135 assertEquals(provider, sig2.getProvider()); in test_getInstance() 136 test_Signature(sig2, kp); in test_getInstance()
|
/external/conscrypt/common/src/test/java/org/conscrypt/java/security/ |
D | SignatureTest.java | 128 Signature sig2 = Signature.getInstance(algorithm, provider); in test_getInstance() 129 assertEquals(algorithm, sig2.getAlgorithm()); in test_getInstance() 130 assertEquals(provider, sig2.getProvider()); in test_getInstance() 131 test_Signature(sig2, kp); in test_getInstance()
|
/external/libpng/contrib/tools/ |
D | pngfix.c | 141 #define sig2 PNG_U32( 13, 10, 26, 10) macro 3221 if (file->length != sig1 || file->type != sig2) in read_callback() 3322 assert(length == sig1 && type == sig2); in read_callback()
|
/external/elfutils/src/ |
D | unstrip.c | 753 const char *sig1, const char *sig2) in compare_unalloc_sections() argument 768 if (sig1 != NULL && sig2 != NULL) in compare_unalloc_sections() 769 return strcmp (sig1, sig2); in compare_unalloc_sections()
|
D | ChangeLog | 563 (compare_unalloc_sections): Take and use sig1 and sig2 as arguments.
|