/external/chromium/net/base/ |
D | cert_verifier_unittest.cc | 44 CertVerifier verifier(time_service); in TEST_F() local 56 error = verifier.Verify(google_cert, "www.example.com", 0, &verify_result, in TEST_F() 62 ASSERT_EQ(1u, verifier.requests()); in TEST_F() 63 ASSERT_EQ(0u, verifier.cache_hits()); in TEST_F() 64 ASSERT_EQ(0u, verifier.inflight_joins()); in TEST_F() 66 error = verifier.Verify(google_cert, "www.example.com", 0, &verify_result, in TEST_F() 72 ASSERT_EQ(2u, verifier.requests()); in TEST_F() 73 ASSERT_EQ(1u, verifier.cache_hits()); in TEST_F() 74 ASSERT_EQ(0u, verifier.inflight_joins()); in TEST_F() 82 CertVerifier verifier(time_service); in TEST_F() local [all …]
|
D | dnssec_unittest.cc | 553 DNSSECChainVerifier verifier(FromDNSName("dnssec-exp.org"), chain); in TEST() local 554 verifier.IgnoreTimestamps(); in TEST() 555 ASSERT_EQ(DNSSECChainVerifier::OK, verifier.Verify()); in TEST() 556 ASSERT_EQ(kDNS_CERT, verifier.rrtype()); in TEST() 562 DNSSECChainVerifier verifier(FromDNSName("foo.org"), chain); in TEST() local 563 verifier.IgnoreTimestamps(); in TEST() 564 ASSERT_EQ(DNSSECChainVerifier::OFF_COURSE, verifier.Verify()); in TEST() 570 DNSSECChainVerifier verifier(FromDNSName("www.dnssec-exp.org"), chain); in TEST() local 571 verifier.IgnoreTimestamps(); in TEST() 572 ASSERT_EQ(DNSSECChainVerifier::BAD_TARGET, verifier.Verify()); in TEST() [all …]
|
D | host_resolver_impl_unittest.cc | 548 DeDupeRequestsVerifier verifier(resolver_proc.get()); in TEST_F() local 553 ResolveRequest req1(host_resolver.get(), "a", 80, &verifier); in TEST_F() 554 ResolveRequest req2(host_resolver.get(), "b", 80, &verifier); in TEST_F() 555 ResolveRequest req3(host_resolver.get(), "b", 81, &verifier); in TEST_F() 556 ResolveRequest req4(host_resolver.get(), "a", 82, &verifier); in TEST_F() 557 ResolveRequest req5(host_resolver.get(), "b", 83, &verifier); in TEST_F() 599 CancelMultipleRequestsVerifier verifier; in TEST_F() local 604 ResolveRequest req1(host_resolver.get(), "a", 80, &verifier); in TEST_F() 605 ResolveRequest req2(host_resolver.get(), "b", 80, &verifier); in TEST_F() 606 ResolveRequest req3(host_resolver.get(), "b", 81, &verifier); in TEST_F() [all …]
|
/external/chromium/crypto/ |
D | signature_verifier_unittest.cc | 203 crypto::SignatureVerifier verifier; in TEST() local 208 ok = verifier.VerifyInit(signature_algorithm, in TEST() 213 verifier.VerifyUpdate(tbs_certificate, sizeof(tbs_certificate)); in TEST() 214 ok = verifier.VerifyFinal(); in TEST() 219 ok = verifier.VerifyInit(signature_algorithm, in TEST() 224 verifier.VerifyUpdate(tbs_certificate, 256); in TEST() 225 verifier.VerifyUpdate(tbs_certificate + 256, 256); in TEST() 226 verifier.VerifyUpdate(tbs_certificate + 512, sizeof(tbs_certificate) - 512); in TEST() 227 ok = verifier.VerifyFinal(); in TEST() 234 ok = verifier.VerifyInit(signature_algorithm, in TEST() [all …]
|
D | signature_creator_unittest.cc | 44 crypto::SignatureVerifier verifier; in TEST() local 45 ASSERT_TRUE(verifier.VerifyInit( in TEST() 50 verifier.VerifyUpdate(reinterpret_cast<const uint8*>(data.c_str()), in TEST() 52 ASSERT_TRUE(verifier.VerifyFinal()); in TEST()
|
/external/chromium/net/tools/dnssec_chain_verify/ |
D | dnssec_chain_verify.cc | 66 net::DNSSECChainVerifier verifier(target_dns, in main() local 69 verifier.IgnoreTimestamps(); in main() 70 net::DNSSECChainVerifier::Error err = verifier.Verify(); in main() 107 fprintf(stderr, "Chain good: rrtype:%d\n", verifier.rrtype()); in main()
|
/external/chromium/chrome/browser/chromeos/login/ |
D | owner_key_utils.cc | 137 crypto::SignatureVerifier verifier; in Verify() local 138 if (!verifier.VerifyInit(kSignatureAlgorithm, sizeof(kSignatureAlgorithm), in Verify() 144 verifier.VerifyUpdate(reinterpret_cast<const uint8*>(data.c_str()), in Verify() 146 return (verifier.VerifyFinal()); in Verify()
|
/external/openssl/crypto/srp/ |
D | srp_vfy.c | 525 char **verifier, const char *N, const char *g) in SRP_create_verifier() argument 538 (verifier == NULL)) in SRP_create_verifier() 580 *verifier = vf; in SRP_create_verifier() 607 int SRP_create_verifier_BN(const char *user, const char *pass, BIGNUM **salt, BIGNUM **verifier, BI… in SRP_create_verifier_BN() argument 617 (verifier == NULL)|| in SRP_create_verifier_BN() 635 *verifier = BN_new(); in SRP_create_verifier_BN() 636 if(*verifier == NULL) goto err; in SRP_create_verifier_BN() 638 if (!BN_mod_exp(*verifier,g,x,N,bn_ctx)) in SRP_create_verifier_BN() 640 BN_clear_free(*verifier); in SRP_create_verifier_BN() 644 srp_bn_print(*verifier); in SRP_create_verifier_BN()
|
D | srp.h | 122 char **verifier, const char *N, const char *g); 123 int SRP_create_verifier_BN(const char *user, const char *pass, BIGNUM **salt, BIGNUM **verifier, BI…
|
/external/chromium/chrome/common/extensions/docs/examples/apps/hello-python/oauth2/ |
D | __init__.py | 160 verifier = None variable in Token 173 def set_verifier(self, verifier=None): argument 174 if verifier is not None: 175 self.verifier = verifier 177 self.verifier = generate_verifier() 180 if self.callback and self.verifier: 185 query = '%s&oauth_verifier=%s' % (query, self.verifier) 187 query = 'oauth_verifier=%s' % self.verifier 470 if token.verifier: 471 parameters['oauth_verifier'] = token.verifier
|
/external/llvm/test/Verifier/ |
D | README.txt | 1 This directory contains testcases that the verifier is supposed to detect as 2 malformed LLVM code. Testcases for situations that the verifier incorrectly
|
/external/oauth/core/src/main/java/net/oauth/signature/ |
D | RSA_SHA1.java | 234 Signature verifier = Signature.getInstance("SHA1withRSA"); in verify() local 235 verifier.initVerify(publicKey); in verify() 236 verifier.update(message); in verify() 237 return verifier.verify(signature); in verify()
|
/external/openssl/include/openssl/ |
D | srp.h | 122 char **verifier, const char *N, const char *g); 123 int SRP_create_verifier_BN(const char *user, const char *pass, BIGNUM **salt, BIGNUM **verifier, BI…
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/transport/ |
D | KexManager.java | 66 ServerHostKeyVerifier verifier; field in KexManager 80 this.verifier = keyVerifier; in KexManager() 541 if (verifier != null) in handleMessage() 547 vres = verifier.verifyServerHostKey(hostname, port, kxs.np.server_host_key_algo, kxs.hostkey); in handleMessage() 597 if (verifier != null) in handleMessage() 603 vres = verifier.verifyServerHostKey(hostname, port, kxs.np.server_host_key_algo, kxs.hostkey); in handleMessage()
|
/external/chromium/base/threading/ |
D | simple_thread_unittest.cc | 161 VerifyPoolRunner verifier(&seq2, 9, &event); in TEST() local 164 pool.AddWork(&verifier, 10); in TEST()
|
/external/chromium/chrome/browser/extensions/ |
D | sandboxed_extension_unpacker.cc | 370 crypto::SignatureVerifier verifier; in ValidateSignature() local 371 if (!verifier.VerifyInit(extension_misc::kSignatureAlgorithm, in ValidateSignature() 389 verifier.VerifyUpdate(buf, len); in ValidateSignature() 391 if (!verifier.VerifyFinal()) { in ValidateSignature()
|
/external/kernel-headers/original/linux/ |
D | nfs_xdr.h | 126 nfs4_verifier verifier; /* EXCLUSIVE */ member 270 __u32 verifier[2]; member 424 __u32 verifier[2]; member 612 nfs4_verifier verifier; member 620 nfs4_verifier verifier; member
|
/external/ppp/pppd/ |
D | chap-new.c | 316 int (*verifier)(char *, char *, int, struct chap_digest_type *, in chap_handle_response() local 350 verifier = chap_verify_hook; in chap_handle_response() 352 verifier = chap_verify_response; in chap_handle_response() 353 ok = (*verifier)(name, ss->name, id, ss->digest, in chap_handle_response()
|
/external/llvm/test/Assembler/ |
D | 2002-08-22-DominanceProblem.ll | 4 ; which causes the verifier to barf on this input.
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/ |
D | Connection.java | 563 public synchronized ConnectionInfo connect(ServerHostKeyVerifier verifier) throws IOException in connect() argument 565 return connect(verifier, 0, 0); in connect() 639 …public synchronized ConnectionInfo connect(ServerHostKeyVerifier verifier, int connectTimeout, int… in connect() argument 707 tm.initialize(identification, cryptoWishList, verifier, dhgexpara, connectTimeout, in connect()
|
/external/llvm/test/Other/ |
D | 2002-02-24-InlineBrokePHINodes.ll | 2 ; when a node is split around the call instruction. The verifier caught the error.
|
/external/llvm/test/CodeGen/PowerPC/ |
D | 2009-07-16-InlineAsm-M-Operand.ll | 3 ; Machine code verifier will call isRegTiedToDefOperand() on /all/ register use
|
/external/openssl/apps/ |
D | srp.c | 217 char *verifier = NULL; in srp_verify_user() local 228 if (!(gNid=SRP_create_verifier(user, password, &srp_usersalt, &verifier, N, g))) in srp_verify_user() 234 if (strcmp(verifier, srp_verifier)) in srp_verify_user() 236 OPENSSL_free(verifier); in srp_verify_user()
|
/external/llvm/test/Analysis/Profiling/ |
D | profiling-tool-chain.ll | 16 ; Test the loaded profile also with verifier. 17 ; RUX opt %t1 -profile-loader -profile-verifier -o %t3 20 ; RUN: opt %t1 -profile-estimator -profile-verifier -o %t3
|
/external/chromium/chrome/common/extensions/docs/examples/apps/hello-php/lib/oauth/ |
D | OAuth.php | 534 $verifier = $request->get_parameter('oauth_verifier'); 535 $new_token = $this->data_store->new_access_token($token, $consumer, $verifier); 719 function new_access_token($token, $consumer, $verifier = null) { argument
|