/external/chromium_org/chrome/test/mini_installer/ |
H A D | file_verifier.py | 7 import verifier namespace 10 class FileVerifier(verifier.Verifier): 15 """Overridden from verifier.Verifier.
|
H A D | process_verifier.py | 6 import verifier namespace 9 class ProcessVerifier(verifier.Verifier): 14 """Overridden from verifier.Verifier.
|
H A D | registry_verifier.py | 7 import verifier namespace 10 class RegistryVerifier(verifier.Verifier): 44 """Overridden from verifier.Verifier.
|
/external/chromium/crypto/ |
H A D | signature_creator_unittest.cc | 44 crypto::SignatureVerifier verifier; local 45 ASSERT_TRUE(verifier.VerifyInit( 50 verifier.VerifyUpdate(reinterpret_cast<const uint8*>(data.c_str()), 52 ASSERT_TRUE(verifier.VerifyFinal());
|
H A D | signature_verifier_unittest.cc | 201 // We use the signature verifier to perform four signature verification 203 crypto::SignatureVerifier verifier; local 206 // Test 1: feed all of the data to the verifier at once (a single 208 ok = verifier.VerifyInit(signature_algorithm, 213 verifier.VerifyUpdate(tbs_certificate, sizeof(tbs_certificate)); 214 ok = verifier.VerifyFinal(); 217 // Test 2: feed the data to the verifier in three parts (three VerifyUpdate 219 ok = verifier.VerifyInit(signature_algorithm, 224 verifier.VerifyUpdate(tbs_certificate, 256); 225 verifier [all...] |
/external/chromium_org/crypto/ |
H A D | ec_signature_creator_unittest.cc | 66 crypto::SignatureVerifier verifier; local 67 ASSERT_TRUE(verifier.VerifyInit( 72 verifier.VerifyUpdate(reinterpret_cast<const uint8*>(data.c_str()), 74 ASSERT_TRUE(verifier.VerifyFinal());
|
H A D | signature_creator_unittest.cc | 50 crypto::SignatureVerifier verifier; local 51 ASSERT_TRUE(verifier.VerifyInit( 56 verifier.VerifyUpdate(reinterpret_cast<const uint8*>(data.c_str()), 58 ASSERT_TRUE(verifier.VerifyFinal()); 87 crypto::SignatureVerifier verifier; local 88 ASSERT_TRUE(verifier.VerifyInit( 93 verifier.VerifyUpdate(reinterpret_cast<const uint8*>(data.c_str()), 95 ASSERT_TRUE(verifier.VerifyFinal());
|
/external/chromium_org/chrome/browser/chromeos/policy/ |
H A D | policy_cert_service.cc | 38 PolicyCertVerifier* verifier, 40 : cert_verifier_(verifier), 111 PolicyCertVerifier* verifier, 114 new PolicyCertService(user_id, verifier, user_manager)); 37 PolicyCertService(const std::string& user_id, PolicyCertVerifier* verifier, chromeos::UserManager* user_manager) argument 109 CreateForTesting( const std::string& user_id, PolicyCertVerifier* verifier, chromeos::UserManager* user_manager) argument
|
H A D | policy_cert_verifier.cc | 60 net::MultiThreadedCertVerifier* verifier = local 62 verifier->SetCertTrustAnchorProvider(this); 63 delegate_.reset(verifier);
|
/external/chromium/net/base/ |
H A D | cert_verifier_unittest.cc | 44 CertVerifier verifier(time_service); 56 error = verifier.Verify(google_cert, "www.example.com", 0, &verify_result, 62 ASSERT_EQ(1u, verifier.requests()); 63 ASSERT_EQ(0u, verifier.cache_hits()); 64 ASSERT_EQ(0u, verifier.inflight_joins()); 66 error = verifier.Verify(google_cert, "www.example.com", 0, &verify_result, 72 ASSERT_EQ(2u, verifier.requests()); 73 ASSERT_EQ(1u, verifier.cache_hits()); 74 ASSERT_EQ(0u, verifier.inflight_joins()); 82 CertVerifier verifier(time_servic 228 CertVerifier verifier; local 262 CertVerifier verifier; local [all...] |
/external/okhttp/src/test/java/com/squareup/okhttp/internal/tls/ |
H A D | HostnameVerifierTest.java | 35 * Tests for our hostname verifier. Most of these tests are from AOSP, which 39 private HostnameVerifier verifier = OkHostnameVerifier.INSTANCE; field in class:HostnameVerifierTest 43 assertFalse(verifier.verify("localhost", session)); 74 assertTrue(verifier.verify("foo.com", session)); 75 assertFalse(verifier.verify("a.foo.com", session)); 76 assertFalse(verifier.verify("bar.com", session)); 107 assertTrue(verifier.verify("\u82b1\u5b50.co.jp", session)); 108 assertFalse(verifier.verify("a.\u82b1\u5b50.co.jp", session)); 140 assertFalse(verifier.verify("foo.com", session)); 141 assertFalse(verifier [all...] |
/external/chromium/chrome/browser/chromeos/login/ |
H A D | owner_key_utils.cc | 137 crypto::SignatureVerifier verifier; local 138 if (!verifier.VerifyInit(kSignatureAlgorithm, sizeof(kSignatureAlgorithm), 144 verifier.VerifyUpdate(reinterpret_cast<const uint8*>(data.c_str()), 146 return (verifier.VerifyFinal());
|
/external/chromium_org/net/cert/ |
H A D | x509_util_nss_unittest.cc | 61 crypto::SignatureVerifier verifier; local 62 bool ok = verifier.VerifyInit( 71 verifier.VerifyUpdate(sd.data.data, 74 ok = verifier.VerifyFinal();
|
/external/chromium_org/net/ocsp/ |
H A D | nss_ocsp_unittest.cc | 108 CertVerifier* verifier() const { function in class:net::NssHttpTest 145 int error = verifier()->Verify(test_cert.get(),
|
/external/chromium_org/net/quic/crypto/ |
H A D | proof_test.cc | 32 scoped_ptr<ProofVerifier> verifier( 53 rv = verifier->VerifyProof(hostname, server_config, *certs, signature, 61 rv = verifier->VerifyProof("foo.com", server_config, *certs, signature, 68 rv = verifier->VerifyProof(hostname, server_config.substr(1, string::npos), 76 rv = verifier->VerifyProof(hostname, server_config, *certs, 87 rv = verifier->VerifyProof("foo.com", server_config, wrong_certs, signature, 123 // RunVerification runs |verifier->VerifyProof| and asserts that the result 125 static void RunVerification(ProofVerifier* verifier, argument 138 ProofVerifier::Status status = verifier->VerifyProof( 248 scoped_ptr<ProofVerifier> verifier( [all...] |
H A D | proof_verifier_chromium.cc | 188 crypto::SignatureVerifier verifier; local 200 bool ok = verifier.VerifyInitRSAPSS( 227 if (!verifier.VerifyInit( 241 verifier.VerifyUpdate(reinterpret_cast<const uint8*>(kProofSignatureLabel), 243 verifier.VerifyUpdate(reinterpret_cast<const uint8*>(signed_data.data()), 246 if (!verifier.VerifyFinal()) {
|
/external/chromium_org/net/tools/quic/ |
H A D | quic_client.h | 132 // server's certificate and takes ownership of |verifier|. 133 void SetProofVerifier(ProofVerifier* verifier) { argument 135 crypto_config_.SetProofVerifier(verifier);
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/ |
H A D | SignerInformation.java | 331 SignerInformationVerifier verifier; 337 verifier = new JcaSignerInfoVerifierBuilder(new JcaDigestCalculatorProviderBuilder().build()).setProvider(sigProvider).build(key); 341 verifier = new JcaSimpleSignerInfoVerifierBuilder().setProvider(sigProvider).build(key); 346 verifier = new JcaSimpleSignerInfoVerifierBuilder().build(key); 349 return doVerify(verifier); 353 throw new CMSException("unable to create verifier: " + e.getMessage(), e); 358 SignerInformationVerifier verifier) 366 contentVerifier = verifier.getContentVerifier(encryptionAlgorithm, info.getDigestAlgorithm()); 370 throw new CMSException("can't create content verifier: " + e.getMessage(), e); 379 DigestCalculator calc = verifier 357 doVerify( SignerInformationVerifier verifier) argument 635 verify(SignerInformationVerifier verifier) argument [all...] |
/external/chromium/chrome/browser/extensions/ |
H A D | sandboxed_extension_unpacker.cc | 370 crypto::SignatureVerifier verifier; local 371 if (!verifier.VerifyInit(extension_misc::kSignatureAlgorithm, 389 verifier.VerifyUpdate(buf, len); 391 if (!verifier.VerifyFinal()) {
|
/external/chromium_org/chrome/browser/sync/test/integration/ |
H A D | search_engines_helper.cc | 124 return TemplateURLServiceFactory::GetForProfile(test()->verifier()); 128 TemplateURLService* verifier = GetVerifierService(); local 131 CHECK(verifier); 135 verifier->GetTemplateURLs(); 164 LOG(ERROR) << "TemplateURLService 0 does not match verifier."; 228 // Make sure we do the same on the verifier. 244 // Make sure we do the same on the verifier.
|
/external/chromium_org/components/policy/core/common/cloud/ |
H A D | cloud_policy_validator.cc | 365 crypto::SignatureVerifier verifier; local 367 if (!verifier.VerifyInit(kSignatureAlgorithm, sizeof(kSignatureAlgorithm), 374 verifier.VerifyUpdate(reinterpret_cast<const uint8*>(data.c_str()), 376 return verifier.VerifyFinal();
|
/external/chromium_org/net/quic/ |
H A D | quic_crypto_client_stream.cc | 263 ProofVerifier* verifier = crypto_config_->proof_verifier(); local 264 if (!verifier) { 265 // If no verifier is set then we don't check the certificates. 275 ProofVerifier* verifier = crypto_config_->proof_verifier(); local 276 DCHECK(verifier); 285 ProofVerifier::Status status = verifier->VerifyProof(
|
/external/chromium_org/net/url_request/ |
H A D | url_request_context.h | 166 void set_cert_transparency_verifier(CTVerifier* verifier) { argument 167 cert_transparency_verifier_ = verifier;
|
/external/chromium_org/ui/base/ime/ |
H A D | input_method_base_unittest.cc | 139 // Note: this class does not take the ownership of |verifier|. 140 MockInputMethodBase(ClientChangeVerifier* verifier) : verifier_(verifier) { argument 192 // Note: this class does not take the ownership of |verifier|. 193 explicit MockInputMethodObserver(ClientChangeVerifier* verifier) argument 194 : verifier_(verifier) { 253 ClientChangeVerifier verifier; local 254 MockInputMethodBase input_method(&verifier); 255 MockInputMethodObserver input_method_observer(&verifier); 266 verifier 312 ClientChangeVerifier verifier; local 355 ClientChangeVerifier verifier; local [all...] |
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/transport/ |
H A D | KexManager.java | 66 ServerHostKeyVerifier verifier; field in class:KexManager 80 this.verifier = keyVerifier; 541 if (verifier != null) 547 vres = verifier.verifyServerHostKey(hostname, port, kxs.np.server_host_key_algo, kxs.hostkey); 552 "The server hostkey was not accepted by the verifier callback.").initCause(e); 556 throw new IOException("The server hostkey was not accepted by the verifier callback"); 597 if (verifier != null) 603 vres = verifier.verifyServerHostKey(hostname, port, kxs.np.server_host_key_algo, kxs.hostkey); 608 "The server hostkey was not accepted by the verifier callback.").initCause(e); 612 throw new IOException("The server hostkey was not accepted by the verifier callbac [all...] |