/external/bison/src/ |
H A D | scan-gram.l | 538 verify (UCHAR_MAX < ULONG_MAX); 778 verify (INT_MAX < ULONG_MAX); 800 verify (UCHAR_MAX <= INT_MAX);
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/ |
H A D | X509AttributeCertificateHolder.java | 341 return verifier.verify(attrCert.getSignatureValue().getBytes());
|
H A D | X509CRLHolder.java | 292 return verifier.verify(x509CRL.getSignature().getBytes());
|
/external/guava/guava-tests/test/com/google/common/collect/ |
H A D | PeekingIteratorTest.java | 52 * later verify that {@link PeekingIterator#remove()} removes the 65 // make copy from master to verify later 70 @Override protected void verify(List<T> elements) { method in class:PeekingIteratorTest.PeekingIteratorTester 71 // verify same objects were removed from reference and target
|
/external/libvpx/libvpx/examples/includes/geshi/geshi/ |
H A D | reg.php | 35 * all lines after the first does not verify that the previous line contains
|
/external/llvm/lib/CodeGen/ |
H A D | LiveInterval.cpp | 420 verify(); 635 void LiveInterval::verify() const { 835 LI->verify(); 853 LI->verify();
|
H A D | RegisterScavenging.cpp | 194 MBB->getParent()->verify(NULL, "In Register Scavenger");
|
/external/okhttp/src/main/java/com/squareup/okhttp/ |
H A D | Connection.java | 156 if (!address.hostnameVerifier.verify(address.uriHost, sslSocket.getSession())) {
|
/external/openfst/src/include/fst/script/ |
H A D | fstscript.h | 68 #include <fst/script/verify.h>
|
/external/openssl/apps/ |
H A D | apps.h | 225 int password_callback(char *buf, int bufsiz, int verify,
|
H A D | req.c | 112 * -verify - check request signature 173 int informat,outformat,verify=0,noout=0,text=0,keyform=FORMAT_PEM; local 328 else if (strcmp(*argv,"-verify") == 0) 329 verify=1; 414 BIO_printf(bio_err," -verify verify signature on REQ\n"); 934 if (verify && !x509) 957 BIO_printf(bio_err,"verify failure\n"); 961 BIO_printf(bio_err,"verify OK\n");
|
/external/smack/src/org/jivesoftware/smack/ |
H A D | ServerTrustManager.java | 110 // verify that the subject of the certificate is the issuer of the 122 x509Certificates[i].verify(publickey); 177 // For every certificate in the chain, verify that the certificate
|
/external/smack/src/org/xbill/DNS/ |
H A D | SimpleResolver.java | 198 int error = tsig.verify(response, b, query.getTSIG()); 200 System.err.println("TSIG verify: " + Rcode.TSIGstring(error));
|
/external/tinyxml/ |
H A D | xmltest.cpp | 467 // Round trip check: stream in, then stream back out to verify. The stream 543 FILE* verify = fopen( "utf8testverify.xml", "r" ); local 544 if ( saved && verify ) 546 while ( fgets( verifyBuf, 256, verify ) ) 556 fclose( verify );
|
/external/openssl/crypto/x509/ |
H A D | x509_vfy.c | 365 /* At this point, we have a chain and need to verify it */ 366 if (ctx->verify != NULL) 367 ok=ctx->verify(ctx); 1119 /* Copy verify params across */ 2071 if (store && store->verify) 2072 ctx->verify = store->verify; 2074 ctx->verify = internal_verify;
|
/external/openssl/android.testssl/ |
H A D | testssl | 122 echo test sslv2/sslv3 with both client and server authentication via BIO pair and app verify
|
/external/easymock/src/org/easymock/internal/ |
H A D | RecordState.java | 88 public void verify() {
method in class:RecordState 90 "calling verify is not allowed in record state"));
|
/external/llvm/include/llvm/CodeGen/ |
H A D | MachineFunction.h | 298 /// verify - Run the current MachineFunction through the machine code 300 void verify(Pass *p = NULL, const char *Banner = NULL) const;
|
/external/openfst/src/test/ |
H A D | fst_test.h | 27 #include <fst/verify.h>
|
/external/openssl/crypto/evp/ |
H A D | evp.h | 175 int (*verify)(int type, const unsigned char *m, unsigned int m_length, member in struct:env_md_st 271 /* Public key context for sign/verify */ 567 int EVP_read_pw_string(char *buf,int length,const char *prompt,int verify); 568 int EVP_read_pw_string_min(char *buf,int minlen,int maxlen,const char *prompt,int verify); 1208 int (*verify)(EVP_PKEY_CTX *ctx, const unsigned char *sig, size_t siglen,
|
/external/openssl/include/openssl/ |
H A D | evp.h | 175 int (*verify)(int type, const unsigned char *m, unsigned int m_length, member in struct:env_md_st 271 /* Public key context for sign/verify */ 567 int EVP_read_pw_string(char *buf,int length,const char *prompt,int verify); 568 int EVP_read_pw_string_min(char *buf,int minlen,int maxlen,const char *prompt,int verify); 1208 int (*verify)(EVP_PKEY_CTX *ctx, const unsigned char *sig, size_t siglen,
|
/external/robolectric/src/test/java/com/xtremelabs/robolectric/shadows/ |
H A D | FragmentTransactionTest.java | 11 import static org.mockito.Mockito.verify;
|
/external/android-mock/src/com/google/android/testing/mocking/ |
H A D | AndroidMock.java | 53 * AndroidMock.verify(mockObject); } * } 2540 * The {@code verify} method captures the scenario where several methods were invoked correctly, 2541 * but some invocations did not occur. Typically, the {@code verify} method is the final thing 2546 public static void verify(Object... mocks) { method in class:AndroidMock 2549 EasyMock.verify(((MockObject) mockObject).getDelegate___AndroidMock()); 2551 EasyMock.verify(mockObject);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
H A D | X509CertificateObject.java | 760 public final void verify( method in class:X509CertificateObject 780 public final void verify( method in class:X509CertificateObject 812 if (!signature.verify(this.getSignature())) 814 throw new SignatureException("certificate does not verify with supplied key");
|
/external/chromium/chrome/common/extensions/docs/examples/apps/hello-php/lib/oauth/ |
H A D | OAuth.php | 541 * verify an api call, checks all the parameters 670 // verify that timestamp is recentish 688 // verify that the nonce is uniqueish
|