/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/ |
H A D | SignerInformation.java | 172 throw new IllegalStateException("method can only be called after verify."); 542 return rawVerifier.verify(digInfo.getEncoded(ASN1Encoding.DER), this.getSignature()); 545 return rawVerifier.verify(resultDigest, this.getSignature()); 549 return contentVerifier.verify(this.getSignature()); 558 * verify that the given public key successfully handles and confirms the 560 * @deprecated use verify(ContentVerifierProvider) 562 public boolean verify( method in class:SignerInformation 567 return verify(key, CMSUtils.getProvider(sigProvider)); 571 * verify that the given public key successfully handles and confirms the 573 * @deprecated use verify(ContentVerifierProvide 575 public boolean verify( method in class:SignerInformation 593 public boolean verify( method in class:SignerInformation 610 public boolean verify( method in class:SignerInformation 635 public boolean verify(SignerInformationVerifier verifier) method in class:SignerInformation [all...] |
/external/android-mock/tests/com/google/android/testing/mocking/ |
H A D | AndroidMockTest.java | 179 AndroidMock.verify(mockVector); 191 AndroidMock.verify(mockTimeZone); 203 AndroidMock.verify(mockCalendar); 219 AndroidMock.verify(mockTimeZone); 256 AndroidMock.verify(mockMap); 268 AndroidMock.verify(mockVector); 280 AndroidMock.verify(mockVector); 319 AndroidMock.verify(mockTimeZone); 332 AndroidMock.verify(mockTimeZone); 345 AndroidMock.verify(mockMa [all...] |
/external/protobuf/java/src/test/java/com/google/protobuf/ |
H A D | ServiceTest.java | 95 control.verify(); 137 control.verify(); 166 control.verify(); 195 control.verify(); 225 control.verify();
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_client_read.c | 823 if (conn->verify.sha256_server == NULL || 824 crypto_hash_finish(conn->verify.sha256_server, hash, &hlen) 828 conn->verify.sha256_server = NULL; 831 conn->verify.sha256_server = NULL; 836 if (conn->verify.md5_server == NULL || 837 crypto_hash_finish(conn->verify.md5_server, hash, &hlen) < 0) { 840 conn->verify.md5_server = NULL; 841 crypto_hash_finish(conn->verify.sha1_server, NULL, NULL); 842 conn->verify.sha1_server = NULL; 845 conn->verify [all...] |
H A D | tlsv1_client_i.h | 40 struct tls_verify_hash verify; member in struct:tlsv1_client
|
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_client_read.c | 823 if (conn->verify.sha256_server == NULL || 824 crypto_hash_finish(conn->verify.sha256_server, hash, &hlen) 828 conn->verify.sha256_server = NULL; 831 conn->verify.sha256_server = NULL; 836 if (conn->verify.md5_server == NULL || 837 crypto_hash_finish(conn->verify.md5_server, hash, &hlen) < 0) { 840 conn->verify.md5_server = NULL; 841 crypto_hash_finish(conn->verify.sha1_server, NULL, NULL); 842 conn->verify.sha1_server = NULL; 845 conn->verify [all...] |
H A D | tlsv1_client_i.h | 40 struct tls_verify_hash verify; member in struct:tlsv1_client
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_client_read.c | 823 if (conn->verify.sha256_server == NULL || 824 crypto_hash_finish(conn->verify.sha256_server, hash, &hlen) 828 conn->verify.sha256_server = NULL; 831 conn->verify.sha256_server = NULL; 836 if (conn->verify.md5_server == NULL || 837 crypto_hash_finish(conn->verify.md5_server, hash, &hlen) < 0) { 840 conn->verify.md5_server = NULL; 841 crypto_hash_finish(conn->verify.sha1_server, NULL, NULL); 842 conn->verify.sha1_server = NULL; 845 conn->verify [all...] |
H A D | tlsv1_client_i.h | 40 struct tls_verify_hash verify; member in struct:tlsv1_client
|
/external/flac/libFLAC/ |
H A D | stream_encoder.c | 297 /* verify-related routines: */ 425 * The data for the verify section 441 } verify; member in struct:FLAC__StreamEncoderPrivate 607 if(0 != encoder->private_->verify.decoder) 608 FLAC__stream_decoder_delete(encoder->private_->verify.decoder); 988 * Set up the verify stuff if necessary 990 if(encoder->protected_->verify) { 995 encoder->private_->verify.input_fifo.size = encoder->protected_->blocksize+OVERREAD_; 997 if(0 == (encoder->private_->verify.input_fifo.data[i] = (FLAC__int32*)safe_malloc_mul_2op_(sizeof(FLAC__int32), /*times*/encoder->private_->verify [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/ |
H A D | PKCS10CertificationRequest.java | 484 * verify the request using the BC provider. 486 public boolean verify() method in class:PKCS10CertificationRequest 490 return verify(BouncyCastleProvider.PROVIDER_NAME); 494 * verify the request using the passed in provider. 496 public boolean verify( method in class:PKCS10CertificationRequest 501 return verify(this.getPublicKey(provider), provider); 505 * verify the request using the passed in public key and the provider.. 507 public boolean verify( method in class:PKCS10CertificationRequest 563 return sig.verify(sigBits.getBytes());
|
/external/guava/guava-tests/test/com/google/common/collect/ |
H A D | LinkedHashMultimapTest.java | 220 @Override protected void verify(List<Integer> elements) { 248 @Override protected void verify(List<Entry<String, Integer>> elements) { 268 @Override protected void verify(List<String> elements) { 288 @Override protected void verify(List<Integer> elements) { 313 @Override protected void verify(List<String> elements) { 351 @Override protected void verify(
|
H A D | ForwardingMapTest.java | 23 import static org.easymock.EasyMock.verify; 281 verify(map, entrySet); 313 verify(entrySet, map); 344 verify(entrySet, map);
|
/external/apache-harmony/auth/src/test/java/common/javax/security/auth/x500/ |
H A D | X500PrivateCredentialTest.java | 115 public void verify(PublicKey key) throws CertificateException, NoSuchAlgorithmException, InvalidKeyException, NoSuchProviderException, SignatureException { 118 public void verify(PublicKey key, String sigProvider) throws CertificateException, NoSuchAlgorithmException, InvalidKeyException, NoSuchProviderException, SignatureException {
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/ |
H A D | X509CRLTest.java | 86 public void verify(PublicKey key) method in class:X509CRLTest.TBTCRL 93 public void verify(PublicKey key, String sigProvider) method in class:X509CRLTest.TBTCRL
|
/external/apache-harmony/security/src/test/impl/java.injected/java/security/cert/ |
H A D | X509CertificateTest.java | 152 public void verify(PublicKey key) method in class:X509CertificateTest.MyX509Certificate 159 public void verify(PublicKey key, method in class:X509CertificateTest.MyX509Certificate
|
/external/openssl/crypto/ui/ |
H A D | ui.h | 100 verify use the string as verification prompt. This 101 is used to verify a previous input. 112 The string input and verify addition functions also take a flag argument, 115 the maximum number of characters). Additionally, the verify addition 299 UIT_VERIFY, /* Prompt for a string and verify */ 345 int UI_UTIL_read_pw_string(char *buf,int length,const char *prompt,int verify); 346 int UI_UTIL_read_pw(char *buf,char *buff,int size,const char *prompt,int verify);
|
/external/openssl/include/openssl/ |
H A D | ui.h | 100 verify use the string as verification prompt. This 101 is used to verify a previous input. 112 The string input and verify addition functions also take a flag argument, 115 the maximum number of characters). Additionally, the verify addition 299 UIT_VERIFY, /* Prompt for a string and verify */ 345 int UI_UTIL_read_pw_string(char *buf,int length,const char *prompt,int verify); 346 int UI_UTIL_read_pw(char *buf,char *buff,int size,const char *prompt,int verify);
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/ |
H A D | SignedObjectTest.java | 91 if (!test.verify(tkp.getPublic(), sig)) { 92 fail("verify() failed");
|
/external/bison/lib/ |
H A D | pipe2.c | 26 #include "verify.h" 98 verify (O_NONBLOCK == 0);
|
/external/easymock/src/org/easymock/ |
H A D | EasyMockSupport.java | 199 c.verify();
|
/external/easymock/src/org/easymock/internal/ |
H A D | UnorderedBehavior.java | 69 public boolean verify() {
method in class:UnorderedBehavior
|
H A D | MocksBehavior.java | 100 if (!behaviorLists.get(position).verify()) {
164 public void verify() {
method in class:MocksBehavior 169 if (!behaviorList.verify()) {
181 errorMessage.append("\n Expectation failure on verify:");
|
/external/mockito/src/org/mockito/internal/verification/ |
H A D | AtLeast.java | 33 public void verify(VerificationData data) { method in class:AtLeast
|
H A D | Times.java | 33 public void verify(VerificationData data) { method in class:Times
|