/external/bison/lib/ |
H A D | verify.h | 30 integer constant expression contexts. verify (R) is for declaration 53 the verify macro: 55 void function (int n) { verify (n < 0); } 57 * For the verify macro, the struct verify_type__ will need to 69 two uses of the verify macro would yield colliding declarations 77 But this has the problem that two invocations of verify from 113 # define verify(R) \ 139 # define verify(R) extern int (* verify_function__ (void)) [verify_true (R)] macro
|
/external/apache-http/src/org/apache/http/protocol/ |
H A D | HttpExpectationVerifier.java | 39 * Defines an interface to verify whether an incoming HTTP request meets 70 void verify(HttpRequest request, HttpResponse response, HttpContext context) method in interface:HttpExpectationVerifier
|
/external/openssl/crypto/des/ |
H A D | read2pwd.c | 117 int DES_read_password(DES_cblock *key, const char *prompt, int verify) argument 122 if ((ok=UI_UTIL_read_pw(buf,buff,BUFSIZ,prompt,verify)) == 0) 130 int verify) 135 if ((ok=UI_UTIL_read_pw(buf,buff,BUFSIZ,prompt,verify)) == 0) 129 DES_read_2passwords(DES_cblock *key1, DES_cblock *key2, const char *prompt, int verify) argument
|
/external/openssl/crypto/ui/ |
H A D | ui_compat.c | 59 int _ossl_old_des_read_pw_string(char *buf,int length,const char *prompt,int verify) argument 61 return UI_UTIL_read_pw_string(buf, length, prompt, verify); 64 int _ossl_old_des_read_pw(char *buf,char *buff,int size,const char *prompt,int verify) argument 66 return UI_UTIL_read_pw(buf, buff, size, prompt, verify);
|
H A D | ui_util.c | 59 int UI_UTIL_read_pw_string(char *buf,int length,const char *prompt,int verify) argument 64 ret=UI_UTIL_read_pw(buf,buff,(length>BUFSIZ)?BUFSIZ:length,prompt,verify); 69 int UI_UTIL_read_pw(char *buf,char *buff,int size,const char *prompt,int verify) argument 81 if (ok >= 0 && verify)
|
/external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/cert/ |
H A D | MyCertificate.java | 64 public void verify(PublicKey key) throws CertificateException, method in class:MyCertificate 72 public void verify(PublicKey key, String sigProvider) method in class:MyCertificate
|
/external/apache-http/src/org/apache/http/conn/ssl/ |
H A D | AllowAllHostnameVerifier.java | 42 public final void verify( method in class:AllowAllHostnameVerifier
|
H A D | BrowserCompatHostnameVerifier.java | 50 public final void verify( method in class:BrowserCompatHostnameVerifier 54 verify(host, cns, subjectAlts, false);
|
H A D | StrictHostnameVerifier.java | 57 public final void verify( method in class:StrictHostnameVerifier 61 verify(host, cns, subjectAlts, true);
|
H A D | X509HostnameVerifier.java | 62 boolean verify(String host, SSLSession session); method in interface:X509HostnameVerifier 64 void verify(String host, SSLSocket ssl) throws IOException; method in interface:X509HostnameVerifier 66 void verify(String host, X509Certificate cert) throws SSLException; method in interface:X509HostnameVerifier 79 * @param host The hostname to verify. 82 void verify(String host, String[] cns, String[] subjectAlts) method in interface:X509HostnameVerifier
|
H A D | AbstractVerifier.java | 86 public final void verify(String host, SSLSocket ssl) method in class:AbstractVerifier 89 throw new NullPointerException("host to verify is null"); 95 verify(host, x509); 98 public final boolean verify(String host, SSLSession session) { method in class:AbstractVerifier 102 verify(host, x509); 110 public final void verify(String host, X509Certificate cert) method in class:AbstractVerifier 114 verify(host, cns, subjectAlts); 117 public final void verify(final String host, final String[] cns, method in class:AbstractVerifier
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/javax/security/cert/ |
H A D | CertificateTest.java | 52 public void verify(PublicKey key) method in class:CertificateTest.TBTCert 58 public void verify(PublicKey key, String sigProvider) method in class:CertificateTest.TBTCert
|
/external/bouncycastle/src/main/java/org/bouncycastle/x509/ |
H A D | X509AttributeCertificate.java | 89 public void verify(PublicKey key, String provider) method in interface:X509AttributeCertificate
|
/external/easymock/src/org/easymock/ |
H A D | IMocksControl.java | 72 void verify();
method in interface:IMocksControl
|
/external/easymock/src/org/easymock/internal/ |
H A D | IMocksBehavior.java | 38 // verify
39 void verify();
method in interface:IMocksBehavior
|
H A D | UnorderedBehavior.java | 69 public boolean verify() {
method in class:UnorderedBehavior
|
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
H A D | tlsv1_common.c | 166 * verify key usage (must allow encryption) 190 int tls_verify_hash_init(struct tls_verify_hash *verify) argument 192 tls_verify_hash_free(verify); 193 verify->md5_client = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); 194 verify->md5_server = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); 195 verify->md5_cert = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); 196 verify->sha1_client = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); 197 verify->sha1_server = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); 198 verify->sha1_cert = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); 199 if (verify 209 tls_verify_hash_add(struct tls_verify_hash *verify, const u8 *buf, size_t len) argument 227 tls_verify_hash_free(struct tls_verify_hash *verify) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_common.c | 166 * verify key usage (must allow encryption) 190 int tls_verify_hash_init(struct tls_verify_hash *verify) argument 192 tls_verify_hash_free(verify); 193 verify->md5_client = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); 194 verify->md5_server = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); 195 verify->md5_cert = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); 196 verify->sha1_client = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); 197 verify->sha1_server = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); 198 verify->sha1_cert = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); 199 if (verify 209 tls_verify_hash_add(struct tls_verify_hash *verify, const u8 *buf, size_t len) argument 227 tls_verify_hash_free(struct tls_verify_hash *verify) argument [all...] |
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_common.c | 166 * verify key usage (must allow encryption) 190 int tls_verify_hash_init(struct tls_verify_hash *verify) argument 192 tls_verify_hash_free(verify); 193 verify->md5_client = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); 194 verify->md5_server = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); 195 verify->md5_cert = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); 196 verify->sha1_client = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); 197 verify->sha1_server = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); 198 verify->sha1_cert = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); 199 if (verify 209 tls_verify_hash_add(struct tls_verify_hash *verify, const u8 *buf, size_t len) argument 227 tls_verify_hash_free(struct tls_verify_hash *verify) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_common.c | 166 * verify key usage (must allow encryption) 190 int tls_verify_hash_init(struct tls_verify_hash *verify) argument 192 tls_verify_hash_free(verify); 193 verify->md5_client = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); 194 verify->md5_server = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); 195 verify->md5_cert = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); 196 verify->sha1_client = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); 197 verify->sha1_server = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); 198 verify->sha1_cert = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); 199 if (verify 209 tls_verify_hash_add(struct tls_verify_hash *verify, const u8 *buf, size_t len) argument 227 tls_verify_hash_free(struct tls_verify_hash *verify) argument [all...] |
/external/llvm/lib/CodeGen/ |
H A D | LiveIntervalUnion.cpp | 96 void LiveIntervalUnion::verify(LiveVirtRegBitSet& VisitedVRegs) { function in class:LiveIntervalUnion
|
/external/oauth/core/src/main/java/net/oauth/signature/ |
H A D | RSA_SHA1.java | 51 * A service provider that wishes to verify signatures made by such a 65 * Alternatively, a service provider that wishes to verify signatures made 206 return verify(decodeBase64(signature), 227 private boolean verify(byte[] signature, byte[] message) method in class:RSA_SHA1 237 return verifier.verify(signature);
|
/external/openssl/apps/ |
H A D | spkac.c | 87 int verify=0,noout=0,pubkey=0; local 158 else if (strcmp(*argv,"-verify") == 0) 159 verify=1; 178 BIO_printf(bio_err," -verify verify SPKAC signature\n"); 286 if(verify) {
|
/external/apache-harmony/security/src/test/api/java.injected/java/security/ |
H A D | SignatureTest.java | 130 * Class under test for boolean verify(byte[]) 136 s.verify(b); 143 s.verify(b); 149 s.verify(b); 151 assertTrue("verify() failed", s.runEngineVerify); 155 * Class under test for boolean verify(byte[], int, int) 161 s.verify(b, 0, 3); 169 s.verify(b, 0, 3); 177 s.verify(b, 0, 5); 182 s.verify( 302 public void verify(PublicKey key) {} method in class:SignatureTest.MyCertificate 304 public void verify(PublicKey key, String sigProvider) {} method in class:SignatureTest.MyCertificate [all...] |
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/ |
H A D | KSBuilder_ImplTest.java | 508 public void verify(PublicKey key) throws CertificateException, method in class:KSBuilder_ImplTest.MCertificate 513 public void verify(PublicKey key, String sigProvider) method in class:KSBuilder_ImplTest.MCertificate
|