/external/autotest/client/cros/ |
D | pkcs11.py | 129 verify_result = True 133 verify_result = False 139 verify_result = False 140 return verify_result
|
/external/libwebsockets/lib/tls/mbedtls/wrapper/platform/ |
D | ssl_pm.c | 772 long verify_result; in ssl_pm_get_verify_result() local 781 verify_result = X509_V_ERR_INVALID_CA; in ssl_pm_get_verify_result() 784 verify_result = X509_V_ERR_HOSTNAME_MISMATCH; in ssl_pm_get_verify_result() 788 verify_result = X509_V_ERR_CA_KEY_TOO_SMALL; in ssl_pm_get_verify_result() 792 verify_result = X509_V_ERR_CA_MD_TOO_WEAK; in ssl_pm_get_verify_result() 796 verify_result = X509_V_ERR_CERT_NOT_YET_VALID; in ssl_pm_get_verify_result() 800 verify_result = X509_V_ERR_CERT_HAS_EXPIRED; in ssl_pm_get_verify_result() 803 verify_result = X509_V_ERR_UNSPECIFIED; in ssl_pm_get_verify_result() 808 return verify_result; in ssl_pm_get_verify_result()
|
/external/avb/libavb_ab/ |
D | avb_ab_flow.c | 231 AvbSlotVerifyResult verify_result; in avb_ab_flow() local 234 verify_result = avb_slot_verify(ops, in avb_ab_flow() 240 switch (verify_result) { in avb_ab_flow() 270 avb_slot_verify_result_to_string(verify_result), in avb_ab_flow() 291 avb_slot_verify_result_to_string(verify_result), in avb_ab_flow()
|
/external/linux-kselftest/tools/testing/selftests/bpf/ |
D | test_tcpnotify_user.c | 65 int verify_result(const struct tcpnotify_globals *result) in verify_result() function 153 if (verify_result(&g)) { in main()
|
D | test_tcpbpf_user.c | 33 int verify_result(const struct tcpbpf_globals *result) in verify_result() function 154 if (verify_result(&g)) { in main()
|
/external/OpenCL-CTS/test_conformance/pipes/ |
D | test_pipe_subgroups.cpp | 64 static int verify_result(void *ptr1, void *ptr2, int n) in verify_result() function 199 if( verify_result( active_work_item_buffer, outptr, num_elements)){ in test_pipe_subgroups_divergence()
|
D | test_pipe_query_functions.cpp | 59 static int verify_result(void *ptr1, void *ptr2, int n) in verify_result() function 246 if( verify_result(outptr1, outptr2, num_elements )){ in test_pipe_query_functions()
|
D | test_pipe_limits.cpp | 117 static int verify_result(void *ptr1, void *ptr2, int n) in verify_result() function 255 if( verify_result( inptr, outptr, num_pipe_elements*sizeof(cl_int))){ in test_pipe_max_args() 395 if( verify_result( inptr, outptr, size)){ in test_pipe_max_packet_size()
|
/external/boringssl/src/ssl/ |
D | handshake.cc | 330 hs->new_session->verify_result = prev_session->verify_result; in ssl_verify_peer_cert() 340 hs->new_session->verify_result = X509_V_OK; in ssl_verify_peer_cert() 348 hs->new_session->verify_result = X509_V_ERR_APPLICATION_VERIFICATION; in ssl_verify_peer_cert()
|
D | ssl_asn1.cc | 250 if (in->verify_result != X509_V_OK) { in SSL_SESSION_to_bytes_full() 252 !CBB_add_asn1_uint64(&child, in->verify_result)) { in SSL_SESSION_to_bytes_full() 633 !SSL_SESSION_parse_long(&session, &ret->verify_result, kVerifyResultTag, in SSL_SESSION_parse()
|
D | ssl_session.cc | 233 new_session->verify_result = session->verify_result; in SSL_SESSION_dup() 412 session->verify_result = X509_V_ERR_INVALID_CALL; in ssl_get_new_session()
|
D | ssl_x509.cc | 406 session->verify_result = ctx->error; in ssl_crypto_x509_session_verify_cert_chain() 714 return session->verify_result; in SSL_get_verify_result()
|
D | tls13_both.cc | 330 hs->new_session->verify_result = X509_V_OK; in tls13_process_certificate()
|
D | handshake_server.cc | 820 hs->new_session->verify_result = X509_V_OK; in do_select_parameters() 1185 hs->new_session->verify_result = X509_V_OK; in do_read_client_certificate()
|
/external/rust/crates/quiche/deps/boringssl/src/ssl/ |
D | handshake.cc | 328 hs->new_session->verify_result = prev_session->verify_result; in ssl_verify_peer_cert() 338 hs->new_session->verify_result = X509_V_OK; in ssl_verify_peer_cert() 346 hs->new_session->verify_result = X509_V_ERR_APPLICATION_VERIFICATION; in ssl_verify_peer_cert()
|
D | ssl_asn1.cc | 243 if (in->verify_result != X509_V_OK) { in SSL_SESSION_to_bytes_full() 245 !CBB_add_asn1_uint64(&child, in->verify_result)) { in SSL_SESSION_to_bytes_full() 613 !SSL_SESSION_parse_long(&session, &ret->verify_result, kVerifyResultTag, in SSL_SESSION_parse()
|
D | ssl_session.cc | 234 new_session->verify_result = session->verify_result; in SSL_SESSION_dup() 417 session->verify_result = X509_V_ERR_INVALID_CALL; in ssl_get_new_session()
|
D | ssl_x509.cc | 406 session->verify_result = ctx->error; in ssl_crypto_x509_session_verify_cert_chain() 714 return session->verify_result; in SSL_get_verify_result()
|
D | tls13_both.cc | 331 hs->new_session->verify_result = X509_V_OK; in tls13_process_certificate()
|
D | handshake_server.cc | 814 hs->new_session->verify_result = X509_V_OK; in do_select_parameters() 1179 hs->new_session->verify_result = X509_V_OK; in do_read_client_certificate()
|
/external/avb/libavb/ |
D | avb_slot_verify.h | 180 AvbVBMetaVerifyResult verify_result; member
|
/external/openscreen/cast/sender/channel/ |
D | cast_auth_util.cc | 354 Error verify_result = in VerifyCredentialsImpl() local 359 Error result = MapToOpenscreenError(verify_result.code(), in VerifyCredentialsImpl()
|
/external/libwebsockets/lib/tls/mbedtls/wrapper/include/internal/ |
D | ssl_types.h | 231 long verify_result; member
|
/external/pigweed/pw_kvs/ |
D | key_value_store.cc | 547 Status verify_result = in Get() local 549 if (!verify_result.ok()) { in Get() 551 return StatusWithSize(verify_result, 0); in Get() 554 return StatusWithSize(verify_result, result.size()); in Get()
|
/external/tensorflow/tensorflow/compiler/mlir/tensorflow/ir/ |
D | tf_ops_a_m.cc | 1817 LogicalResult verify_result = in Verify() local 1819 if (failed(verify_result)) { in Verify() 1820 return verify_result; in Verify()
|