/external/chromium/net/base/ |
D | cert_verifier_unittest.cc | 44 CertVerifier verifier(time_service); in TEST_F() local 56 error = verifier.Verify(google_cert, "www.example.com", 0, &verify_result, in TEST_F() 62 ASSERT_EQ(1u, verifier.requests()); in TEST_F() 63 ASSERT_EQ(0u, verifier.cache_hits()); in TEST_F() 64 ASSERT_EQ(0u, verifier.inflight_joins()); in TEST_F() 66 error = verifier.Verify(google_cert, "www.example.com", 0, &verify_result, in TEST_F() 72 ASSERT_EQ(2u, verifier.requests()); in TEST_F() 73 ASSERT_EQ(1u, verifier.cache_hits()); in TEST_F() 74 ASSERT_EQ(0u, verifier.inflight_joins()); in TEST_F() 82 CertVerifier verifier(time_service); in TEST_F() local [all …]
|
D | dnssec_unittest.cc | 553 DNSSECChainVerifier verifier(FromDNSName("dnssec-exp.org"), chain); in TEST() local 554 verifier.IgnoreTimestamps(); in TEST() 555 ASSERT_EQ(DNSSECChainVerifier::OK, verifier.Verify()); in TEST() 556 ASSERT_EQ(kDNS_CERT, verifier.rrtype()); in TEST() 562 DNSSECChainVerifier verifier(FromDNSName("foo.org"), chain); in TEST() local 563 verifier.IgnoreTimestamps(); in TEST() 564 ASSERT_EQ(DNSSECChainVerifier::OFF_COURSE, verifier.Verify()); in TEST() 570 DNSSECChainVerifier verifier(FromDNSName("www.dnssec-exp.org"), chain); in TEST() local 571 verifier.IgnoreTimestamps(); in TEST() 572 ASSERT_EQ(DNSSECChainVerifier::BAD_TARGET, verifier.Verify()); in TEST() [all …]
|
D | host_resolver_impl_unittest.cc | 548 DeDupeRequestsVerifier verifier(resolver_proc.get()); in TEST_F() local 553 ResolveRequest req1(host_resolver.get(), "a", 80, &verifier); in TEST_F() 554 ResolveRequest req2(host_resolver.get(), "b", 80, &verifier); in TEST_F() 555 ResolveRequest req3(host_resolver.get(), "b", 81, &verifier); in TEST_F() 556 ResolveRequest req4(host_resolver.get(), "a", 82, &verifier); in TEST_F() 557 ResolveRequest req5(host_resolver.get(), "b", 83, &verifier); in TEST_F() 599 CancelMultipleRequestsVerifier verifier; in TEST_F() local 604 ResolveRequest req1(host_resolver.get(), "a", 80, &verifier); in TEST_F() 605 ResolveRequest req2(host_resolver.get(), "b", 80, &verifier); in TEST_F() 606 ResolveRequest req3(host_resolver.get(), "b", 81, &verifier); in TEST_F() [all …]
|
/external/chromium/crypto/ |
D | signature_verifier_unittest.cc | 203 crypto::SignatureVerifier verifier; in TEST() local 208 ok = verifier.VerifyInit(signature_algorithm, in TEST() 213 verifier.VerifyUpdate(tbs_certificate, sizeof(tbs_certificate)); in TEST() 214 ok = verifier.VerifyFinal(); in TEST() 219 ok = verifier.VerifyInit(signature_algorithm, in TEST() 224 verifier.VerifyUpdate(tbs_certificate, 256); in TEST() 225 verifier.VerifyUpdate(tbs_certificate + 256, 256); in TEST() 226 verifier.VerifyUpdate(tbs_certificate + 512, sizeof(tbs_certificate) - 512); in TEST() 227 ok = verifier.VerifyFinal(); in TEST() 234 ok = verifier.VerifyInit(signature_algorithm, in TEST() [all …]
|
D | signature_creator_unittest.cc | 44 crypto::SignatureVerifier verifier; in TEST() local 45 ASSERT_TRUE(verifier.VerifyInit( in TEST() 50 verifier.VerifyUpdate(reinterpret_cast<const uint8*>(data.c_str()), in TEST() 52 ASSERT_TRUE(verifier.VerifyFinal()); in TEST()
|
/external/chromium/net/tools/dnssec_chain_verify/ |
D | dnssec_chain_verify.cc | 66 net::DNSSECChainVerifier verifier(target_dns, in main() local 69 verifier.IgnoreTimestamps(); in main() 70 net::DNSSECChainVerifier::Error err = verifier.Verify(); in main() 107 fprintf(stderr, "Chain good: rrtype:%d\n", verifier.rrtype()); in main()
|
/external/chromium/chrome/browser/chromeos/login/ |
D | owner_key_utils.cc | 137 crypto::SignatureVerifier verifier; in Verify() local 138 if (!verifier.VerifyInit(kSignatureAlgorithm, sizeof(kSignatureAlgorithm), in Verify() 144 verifier.VerifyUpdate(reinterpret_cast<const uint8*>(data.c_str()), in Verify() 146 return (verifier.VerifyFinal()); in Verify()
|
/external/chromium/chrome/common/extensions/docs/examples/apps/hello-python/oauth2/ |
D | __init__.py | 160 verifier = None variable in Token 173 def set_verifier(self, verifier=None): argument 174 if verifier is not None: 175 self.verifier = verifier 177 self.verifier = generate_verifier() 180 if self.callback and self.verifier: 185 query = '%s&oauth_verifier=%s' % (query, self.verifier) 187 query = 'oauth_verifier=%s' % self.verifier 470 if token.verifier: 471 parameters['oauth_verifier'] = token.verifier
|
/external/llvm/test/Verifier/ |
D | README.txt | 1 This directory contains testcases that the verifier is supposed to detect as 2 malformed LLVM code. Testcases for situations that the verifier incorrectly
|
/external/oauth/core/src/main/java/net/oauth/signature/ |
D | RSA_SHA1.java | 234 Signature verifier = Signature.getInstance("SHA1withRSA"); in verify() local 235 verifier.initVerify(publicKey); in verify() 236 verifier.update(message); in verify() 237 return verifier.verify(signature); in verify()
|
/external/chromium/base/threading/ |
D | simple_thread_unittest.cc | 161 VerifyPoolRunner verifier(&seq2, 9, &event); in TEST() local 164 pool.AddWork(&verifier, 10); in TEST()
|
/external/chromium/chrome/browser/extensions/ |
D | sandboxed_extension_unpacker.cc | 370 crypto::SignatureVerifier verifier; in ValidateSignature() local 371 if (!verifier.VerifyInit(extension_misc::kSignatureAlgorithm, in ValidateSignature() 389 verifier.VerifyUpdate(buf, len); in ValidateSignature() 391 if (!verifier.VerifyFinal()) { in ValidateSignature()
|
/external/kernel-headers/original/linux/ |
D | nfs_xdr.h | 126 nfs4_verifier verifier; /* EXCLUSIVE */ member 270 __u32 verifier[2]; member 424 __u32 verifier[2]; member 612 nfs4_verifier verifier; member 620 nfs4_verifier verifier; member
|
/external/ppp/pppd/ |
D | chap-new.c | 316 int (*verifier)(char *, char *, int, struct chap_digest_type *, in chap_handle_response() local 350 verifier = chap_verify_hook; in chap_handle_response() 352 verifier = chap_verify_response; in chap_handle_response() 353 ok = (*verifier)(name, ss->name, id, ss->digest, in chap_handle_response()
|
/external/llvm/test/Assembler/ |
D | 2002-08-22-DominanceProblem.ll | 4 ; which causes the verifier to barf on this input.
|
/external/llvm/test/Other/ |
D | 2002-02-24-InlineBrokePHINodes.ll | 2 ; when a node is split around the call instruction. The verifier caught the error.
|
/external/llvm/test/CodeGen/PowerPC/ |
D | 2009-07-16-InlineAsm-M-Operand.ll | 3 ; Machine code verifier will call isRegTiedToDefOperand() on /all/ register use
|
/external/llvm/test/Analysis/Profiling/ |
D | profiling-tool-chain.ll | 16 ; Test the loaded profile also with verifier. 17 ; RUX opt %t1 -profile-loader -profile-verifier -o %t3 20 ; RUN: opt %t1 -profile-estimator -profile-verifier -o %t3
|
/external/chromium/chrome/common/extensions/docs/examples/apps/hello-php/lib/oauth/ |
D | OAuth.php | 534 $verifier = $request->get_parameter('oauth_verifier'); 535 $new_token = $this->data_store->new_access_token($token, $consumer, $verifier); 719 function new_access_token($token, $consumer, $verifier = null) { argument
|
/external/grub/netboot/ |
D | etherboot.h | 429 long verifier; member
|
/external/chromium/net/socket/ |
D | ssl_client_socket_nss.cc | 439 DNSSECChainVerifier verifier(dns_hostname, chain); in CheckDNSSECChain() local 440 DNSSECChainVerifier::Error err = verifier.Verify(); in CheckDNSSECChain() 446 if (verifier.rrtype() != kDNS_TXT) in CheckDNSSECChain() 450 true /* DNSSEC verified */, server_cert_nss, verifier.rrdatas()); in CheckDNSSECChain()
|
/external/android-mock/tests/com/google/android/testing/mocking/ |
D | AndroidMockTest.java | 462 MethodVerifier verifier = new MethodVerifier(method); in testAllForwardedMethods() local 469 method.instrument(verifier); in testAllForwardedMethods() 470 assertTrue(method.getLongName() + " not called.", verifier.expectedMethodCalled()); in testAllForwardedMethods()
|
/external/llvm/lib/Target/PowerPC/ |
D | README_ALTIVEC.txt | 57 be constants. The verifier should enforce this constraint.
|
/external/llvm/ |
D | CREDITS.TXT | 275 D: Machine code verifier
|
/external/llvm/docs/CommandGuide/ |
D | FileCheck.pod | 6 FileCheck - Flexible pattern matching file verifier
|