| /external/openscreen/cast/common/certificate/ |
| D | cast_cert_validator_unittest.cc | 34 // Reads a test chain from |certs_file_name|, and asserts that verifying it as 42 // * |time| - The timestamp to use when verifying the certificate. 43 // * |trust_store_dependency| - Which trust store to use when verifying (see 166 // Tests verifying a valid certificate chain of length 2: 182 // Tests verifying a valid certificate chain of length 2: 198 // Tests verifying a valid certificate chain of length 2: 213 // Tests verifying a valid certificate chain of length 3: 229 // Tests verifying an invalid certificate chain of length 1: 245 // Tests verifying one of the self-signed trust anchors (chain of length 1): 263 // Tests verifying a valid certificate chain of length 2: [all …]
|
| /external/mbedtls/tests/opt-testcases/ |
| D | tls13-compat.sh | 4411 -c "Verifying peer X.509 certificate... ok" \ 4429 -c "Verifying peer X.509 certificate... ok" \ 4447 -c "Verifying peer X.509 certificate... ok" \ 4466 -c "Verifying peer X.509 certificate... ok" \ 4484 -c "Verifying peer X.509 certificate... ok" \ 4502 -c "Verifying peer X.509 certificate... ok" \ 4520 -c "Verifying peer X.509 certificate... ok" \ 4539 -c "Verifying peer X.509 certificate... ok" \ 4557 -c "Verifying peer X.509 certificate... ok" \ 4575 -c "Verifying peer X.509 certificate... ok" \ [all …]
|
| /external/bazel-skylib/tests/ |
| D | selects_tests.bzl | 168 """Test verifying match on an ANDing config_setting_group.""" 192 """Test verifying first condition mismatch on an ANDing config_setting_group.""" 216 """Test verifying middle condition mismatch on an ANDing config_setting_group.""" 240 """Test verifying last condition mismatch on an ANDing config_setting_group.""" 264 """Test verifying multiple conditions mismatch on an ANDing config_setting_group.""" 288 """Test verifying all conditions mismatch on an ANDing config_setting_group.""" 312 """Test verifying match on single-entry ANDing config_setting_group.""" 336 """Test verifying no match on single-entry ANDing config_setting_group.""" 360 """Test verifying no matches on an ORing config_setting_group.""" 384 """Test verifying first condition matching on an ORing config_setting_group.""" [all …]
|
| /external/pigweed/pw_software_update/ |
| D | get_started.rst | 114 Verifying: my_bundle.pb 122 Verifying incoming root metadata 138 Verifying targets metadata 144 Verifying target file: "application" 145 Verifying target file: "rtos"
|
| D | design.rst | 138 Transferred --> Verifying: Verify() 139 Transferred --> Verifying: Apply() 142 Verifying --> Verifying: GetStatus() 143 Verifying --> Verified 144 Verifying --> Aborting: Abort()
|
| D | bundled_update.proto | 47 // Verify() called --> VERIFYING 48 // Apply() called --> VERIFYING 55 // Verifying finished --> VERIFIED 56 // Verifying failed --> FINISHED 58 VERIFYING = 4; enumerator 124 // Examples: "Failed verifying: ml_model.bin", "Flash partition couldn't be
|
| /external/webrtc/p2p/base/ |
| D | async_stun_tcp_socket_unittest.cc | 167 // Verifying TURN channel data message with zero length. 176 // Verifying TURN channel data message. 184 // Verifying TURN channel messages which needs padding handled properly. 193 // Verifying stun message with invalid length. 212 // Verifying TURN channel data message with invalid length. 229 // Verifying a small buffer handled (dropped) properly. This will be 236 // Verifying a legal large turn message. 246 // Verifying a legal large stun message.
|
| /external/libpng/ci/ |
| D | ci_verify_version.sh | 39 ci_info "## VERIFYING: png.h version definitions ##" 80 ci_info "## VERIFYING: png.h build definitions ##" 113 ci_info "## VERIFYING: png.h type definitions ##" 116 ci_info "## VERIFYING: configure.ac version definitions ##" 124 ci_info "## VERIFYING: CMakeLists.txt version definitions ##"
|
| /external/autotest/server/site_tests/firmware_TPMExtend/ |
| D | firmware_TPMExtend.py | 72 logging.info('Verifying HWID digest in PCR1') 80 logging.info('Verifying bootmode digest in PCR0 in normal mode') 88 logging.info('Verifying bootmode digest in PCR0 in recovery mode') 100 logging.info('Verifying bootmode digest in PCR0 in developer mode') 108 logging.info('Verifying bootmode digest in PCR0 in dev-recovery mode')
|
| /external/autotest/client/common_lib/ |
| D | host_queue_entry_states.py | 10 Status_list = ['Queued', 'Starting', 'Resetting', 'Verifying', 'Provisioning', 16 ACTIVE_STATUSES = (Status.STARTING, Status.RESETTING, Status.VERIFYING, 23 PRE_JOB_STATUSES = (Status.RESETTING, Status.PROVISIONING, Status.VERIFYING,
|
| /external/libwebsockets/lib/tls/mbedtls/wrapper/include/openssl/ |
| D | ssl.h | 143 * @brief get the verifying result of the SSL certification 147 * @return the result of verifying 685 * @brief get the SSL verifying mode of the SSL context 689 * @return verifying mode 694 * @brief get the SSL verifying depth of the SSL context 698 * @return verifying depth 703 * @brief set the SSL context verifying of the SSL context 706 * @param mode - verifying mode 707 * @param verify_callback - verifying callback function 714 * @brief set the SSL verifying of the SSL context [all …]
|
| /external/cronet/net/cert/ |
| D | README.md | 3 This directory contains the core code for verifying server certificates. 4 Limited support is also included for verifying client certificates, but only to 22 The top-level interface for verifying server certificates is the asynchronous
|
| /external/tink/go/signature/subtle/ |
| D | ed25519_signer_verifier_test.go | 49 t.Errorf("unexpected error when verifying: %s", err) 57 t.Errorf("unexpected error when verifying: %s", err) 86 t.Errorf("unexpected error when verifying: %s", err) 113 t.Errorf("unexpected error when verifying: %s", err) 136 t.Errorf("unexpected error when verifying: %s", err) 150 t.Errorf("unexpected error when verifying: %s", err)
|
| /external/googleapis/google/cloud/osconfig/agentendpoint/v1/ |
| D | agentendpoint.proto | 68 // https://cloud.google.com/compute/docs/instances/verifying-instance-identity 85 // https://cloud.google.com/compute/docs/instances/verifying-instance-identity 100 // https://cloud.google.com/compute/docs/instances/verifying-instance-identity 138 // https://cloud.google.com/compute/docs/instances/verifying-instance-identity 178 // https://cloud.google.com/compute/docs/instances/verifying-instance-identity 215 // https://cloud.google.com/compute/docs/instances/verifying-instance-identity
|
| /external/google-cloud-java/java-grafeas/src/main/java/io/grafeas/v1/ |
| D | AttestationOccurrence.java | 28 * trusts the public key of the signer, then verifying the signature is 194 * when verifying these JWTs. 215 * when verifying these JWTs. 236 * when verifying these JWTs. 257 * when verifying these JWTs. 278 * when verifying these JWTs. 478 * trusts the public key of the signer, then verifying the signature is 1245 * when verifying these JWTs. 1269 * when verifying these JWTs. 1293 * when verifying these JWTs. [all …]
|
| D | AttestationOccurrenceOrBuilder.java | 114 * when verifying these JWTs. 132 * when verifying these JWTs. 150 * when verifying these JWTs. 168 * when verifying these JWTs. 186 * when verifying these JWTs.
|
| /external/flatbuffers/rust/flatbuffers/src/ |
| D | get_root.rs | 22 /// Gets the root of the Flatbuffer, verifying it first with default options. 35 /// Gets the root of the Flatbuffer, verifying it first with given options. 52 /// Gets the root of a size prefixed Flatbuffer, verifying it first with default options. 65 /// Gets the root of a size prefixed Flatbuffer, verifying it first with given options.
|
| /external/autotest/server/site_tests/firmware_EventLog/ |
| D | firmware_EventLog.py | 87 logging.info('Verifying eventlog behavior on normal mode boot') 108 logging.info('Verifying eventlog behavior on developer mode boot') 128 logging.info('Verifying eventlog behavior in recovery mode') 148 logging.info('Verifying eventlog behavior on suspend/resume') 183 logging.info('Verifying eventlog behavior with hardware watchdog')
|
| /external/googleapis/google/cloud/osconfig/agentendpoint/v1beta/ |
| D | agentendpoint.proto | 70 // https://cloud.google.com/compute/docs/instances/verifying-instance-identity 87 // https://cloud.google.com/compute/docs/instances/verifying-instance-identity 102 // https://cloud.google.com/compute/docs/instances/verifying-instance-identity 137 // https://cloud.google.com/compute/docs/instances/verifying-instance-identity 174 // https://cloud.google.com/compute/docs/instances/verifying-instance-identity
|
| /external/mockito-kotlin/mockito-kotlin/src/main/kotlin/org/mockito/kotlin/ |
| D | Verification.kt | 94 * Allows verifying exact number of invocations. 164 …* Allows verifying over a given period. It causes a verify to wait for a specified period of time … 173 …* Allows verifying with timeout. It causes a verify to wait for a specified period of time for a d… 191 * Creates [InOrder] object that allows verifying mocks in order. 200 * Creates [InOrder] object that allows verifying mocks in order.
|
| /external/libwebsockets/minimal-examples/crypto/minimal-crypto-jws/ |
| D | README.md | 4 commandline tool for signing and verifying stdin. 14 Stdin is either the plaintext (if signing) or compact JWS (if verifying). 57 When verifying, if the signature is valid the plaintext is output on stdout
|
| /external/tink/java_src/src/main/java/com/google/crypto/tink/subtle/ |
| D | SelfKeyTestValidators.java | 47 "RSA PSS signing with private key followed by verifying with public key failed." in validateRsaSsaPss() 63 "RSA PKCS1 signing with private key followed by verifying with public key failed." in validateRsaSsaPkcs1() 83 "ECDSA signing with private key followed by verifying with public key failed." in validateEcdsa()
|
| /external/google-cloud-java/java-deploy/proto-google-cloud-deploy-v1/src/main/java/com/google/cloud/deploy/v1/ |
| D | StrategyOrBuilder.java | 31 * verifying the deployment. 44 * verifying the deployment. 57 * verifying the deployment.
|
| /external/google-auth-library-java/samples/snippets/src/main/java/ |
| D | VerifyGoogleIdToken.java | 48 // The most common use case for verifying the ID token is when you are protecting 50 // so verifying ID tokens before making Google API calls is usually unnecessary. 56 // Optional, when verifying a Google ID token, the jwk url is set by default. in verifyGoogleIdToken()
|
| /external/deqp/modules/gles31/functional/ |
| D | es31fSampleShadingTests.cpp | 93 …m_testCtx.getLog() << tcu::TestLog::Message << "Verifying initial value" << tcu::TestLog::EndMessa… in iterate() 99 …m_testCtx.getLog() << tcu::TestLog::Message << "Verifying random values" << tcu::TestLog::EndMessa… in iterate() 146 …m_testCtx.getLog() << tcu::TestLog::Message << "Verifying initial value" << tcu::TestLog::EndMessa… in iterate() 152 …m_testCtx.getLog() << tcu::TestLog::Message << "Verifying special values" << tcu::TestLog::EndMess… in iterate() 169 …m_testCtx.getLog() << tcu::TestLog::Message << "Verifying random values" << tcu::TestLog::EndMessa… in iterate() 215 …m_testCtx.getLog() << tcu::TestLog::Message << "Verifying clamped values. Value is clamped when sp… in iterate() 301 …<< "Verifying that a varying is given at least N different values for different samples within a s… in init() 379 … << tcu::TestLog::Message << "Verifying image has (at least) " << numShadesRequired in verifyImage()
|