/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/ |
H A D | RawContentVerifier.java | 16 boolean verify(byte[] digest, byte[] expected); method in interface:RawContentVerifier
|
H A D | ContentVerifier.java | 30 boolean verify(byte[] expected); method in interface:ContentVerifier
|
/external/openssl/crypto/ui/ |
H A D | ui_compat.c | 59 int _ossl_old_des_read_pw_string(char *buf,int length,const char *prompt,int verify) argument 61 return UI_UTIL_read_pw_string(buf, length, prompt, verify); 64 int _ossl_old_des_read_pw(char *buf,char *buff,int size,const char *prompt,int verify) argument 66 return UI_UTIL_read_pw(buf, buff, size, prompt, verify);
|
H A D | ui_util.c | 59 int UI_UTIL_read_pw_string(char *buf,int length,const char *prompt,int verify) argument 64 ret=UI_UTIL_read_pw(buf,buff,(length>BUFSIZ)?BUFSIZ:length,prompt,verify); 69 int UI_UTIL_read_pw(char *buf,char *buff,int size,const char *prompt,int verify) argument 81 if (ok >= 0 && verify)
|
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/tls/ |
H A D | HostnameVerifierTest.java | 41 @Test public void verify() throws Exception { method in class:HostnameVerifierTest 43 assertFalse(verifier.verify("localhost", session)); 74 assertTrue(verifier.verify("foo.com", session)); 75 assertFalse(verifier.verify("a.foo.com", session)); 76 assertFalse(verifier.verify("bar.com", session)); 107 assertTrue(verifier.verify("\u82b1\u5b50.co.jp", session)); 108 assertFalse(verifier.verify("a.\u82b1\u5b50.co.jp", session)); 140 assertFalse(verifier.verify("foo.com", session)); 141 assertFalse(verifier.verify("a.foo.com", session)); 142 assertTrue(verifier.verify("ba [all...] |
/external/mockito/src/org/mockito/ |
H A D | InOrder.java | 16 * inOrder.verify(firstMock).add("was called first"); 17 * inOrder.verify(secondMock).add("was called second"); 29 * Alias to <code>inOrder.verify(mock, times(1))</code> 35 * inOrder.verify(firstMock).someMethod("was called first"); 36 * inOrder.verify(secondMock).someMethod("was called second"); 45 <T> T verify(T mock); method in interface:InOrder 53 * inOrder.verify(firstMock, times(2)).someMethod("was called first two times"); 54 * inOrder.verify(secondMock, atLeastOnce()).someMethod("was called second at least once"); 64 <T> T verify(T mock, VerificationMode mode); method in interface:InOrder 79 * inOrder.verify(moc [all...] |
/external/apache-http/src/org/apache/http/conn/ssl/ |
H A D | X509HostnameVerifier.java | 67 boolean verify(String host, SSLSession session); method in interface:X509HostnameVerifier 69 void verify(String host, SSLSocket ssl) throws IOException; method in interface:X509HostnameVerifier 71 void verify(String host, X509Certificate cert) throws SSLException; method in interface:X509HostnameVerifier 84 * @param host The hostname to verify. 87 void verify(String host, String[] cns, String[] subjectAlts) method in interface:X509HostnameVerifier
|
H A D | BrowserCompatHostnameVerifier.java | 55 public final void verify( method in class:BrowserCompatHostnameVerifier 59 verify(host, cns, subjectAlts, false);
|
H A D | StrictHostnameVerifier.java | 62 public final void verify( method in class:StrictHostnameVerifier 66 verify(host, cns, subjectAlts, true);
|
H A D | AllowAllHostnameVerifier.java | 47 public final void verify( method in class:AllowAllHostnameVerifier
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_common.c | 182 * verify key usage (must allow encryption) 206 int tls_verify_hash_init(struct tls_verify_hash *verify) argument 208 tls_verify_hash_free(verify); 209 verify->md5_client = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); 210 verify->md5_server = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); 211 verify->md5_cert = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); 212 verify->sha1_client = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); 213 verify->sha1_server = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); 214 verify->sha1_cert = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); 215 if (verify 238 tls_verify_hash_add(struct tls_verify_hash *verify, const u8 *buf, size_t len) argument 264 tls_verify_hash_free(struct tls_verify_hash *verify) argument [all...] |
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_common.c | 182 * verify key usage (must allow encryption) 206 int tls_verify_hash_init(struct tls_verify_hash *verify) argument 208 tls_verify_hash_free(verify); 209 verify->md5_client = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); 210 verify->md5_server = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); 211 verify->md5_cert = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); 212 verify->sha1_client = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); 213 verify->sha1_server = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); 214 verify->sha1_cert = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); 215 if (verify 238 tls_verify_hash_add(struct tls_verify_hash *verify, const u8 *buf, size_t len) argument 264 tls_verify_hash_free(struct tls_verify_hash *verify) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_common.c | 182 * verify key usage (must allow encryption) 206 int tls_verify_hash_init(struct tls_verify_hash *verify) argument 208 tls_verify_hash_free(verify); 209 verify->md5_client = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); 210 verify->md5_server = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); 211 verify->md5_cert = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); 212 verify->sha1_client = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); 213 verify->sha1_server = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); 214 verify->sha1_cert = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); 215 if (verify 238 tls_verify_hash_add(struct tls_verify_hash *verify, const u8 *buf, size_t len) argument 264 tls_verify_hash_free(struct tls_verify_hash *verify) argument [all...] |
/external/junit/src/org/junit/rules/ |
H A D | Verifier.java | 17 * @Override public void verify() { 34 verify(); 43 protected void verify() throws Throwable { method in class:Verifier
|
/external/chromium_org/chrome/installer/mac/ |
H A D | sign_app.sh.in | 66 codesign --verify -vvvvvv "${framework}" 67 codesign --verify --deep -vvvvvv "${helper_app}" 68 codesign --verify --deep -vvvvvv "${helper_eh_app}" 69 codesign --verify --deep -vvvvvv "${helper_np_app}" 70 codesign --verify --deep --no-strict -vvvvvv "${browser_app}"
|
H A D | sign_versioned_dir.sh.in | 71 codesign --verify "${framework}" 72 codesign --verify --deep "${helper_app}" 73 codesign --verify --deep "${helper_eh_app}" 74 codesign --verify --deep "${helper_np_app}"
|
/external/guava/guava-tests/test/com/google/common/cache/ |
H A D | ForwardingLoadingCacheTest.java | 22 import static org.easymock.EasyMock.verify; 60 verify(mock); 67 verify(mock); 74 verify(mock); 81 verify(mock); 88 verify(mock); 95 verify(mock); 102 verify(mock); 109 verify(mock); 116 verify(moc [all...] |
H A D | ForwardingCacheTest.java | 22 import static org.easymock.EasyMock.verify; 60 verify(mock); 69 verify(mock); 76 verify(mock); 83 verify(mock); 90 verify(mock); 97 verify(mock); 104 verify(mock); 111 verify(mock); 118 verify(moc [all...] |
/external/littlemock/tests/com/google/testing/littlemock/ |
H A D | LittleMockTest.java | 49 import static com.google.testing.littlemock.LittleMock.verify; 173 verify("hello").contains("something"); 180 verify(createNotARealMock()).add("something"); 187 verify(mFoo).add("something"); 193 verify(mFoo).add("something"); 194 verify(mFoo).add("something else"); 200 verify(mFoo).add("something else"); 201 verify(mFoo).add("something"); 208 verify(mFoo).add("something"); 216 verify(mFo [all...] |
/external/mockito/src/org/mockito/verification/ |
H A D | VerificationMode.java | 16 * verify(mock, times(5)).someMethod("was called five times"); 18 * verify(mock, never()).someMethod("was never called"); 20 * verify(mock, atLeastOnce()).someMethod("was called at least once"); 22 * verify(mock, atLeast(2)).someMethod("was called at least twice"); 24 * verify(mock, atMost(3)).someMethod("was called at most 3 times"); 30 * See examples in javadoc for {@link Mockito#verify(Object, VerificationMode)} 34 void verify(VerificationData data); method in interface:VerificationMode
|
/external/openssl/crypto/des/ |
H A D | read2pwd.c | 117 int DES_read_password(DES_cblock *key, const char *prompt, int verify) argument 122 if ((ok=UI_UTIL_read_pw(buf,buff,BUFSIZ,prompt,verify)) == 0) 130 int verify) 135 if ((ok=UI_UTIL_read_pw(buf,buff,BUFSIZ,prompt,verify)) == 0) 129 DES_read_2passwords(DES_cblock *key1, DES_cblock *key2, const char *prompt, int verify) argument
|
/external/mockito/src/org/mockito/internal/verification/ |
H A D | MockAwareVerificationMode.java | 20 public void verify(VerificationData data) {
method in class:MockAwareVerificationMode 21 mode.verify(data);
|
/external/chromium_org/third_party/libaddressinput/src/java/test/com/android/i18n/addressinput/ |
H A D | FieldVerifierTest.java | 45 VERIFIER.verify(addr, problems); 54 VERIFIER.verify(addr, problems); 66 VERIFIER.verify(addr, problems); 80 VERIFIER.verify(addr, problems); 92 VERIFIER.verify(addr, problems); 98 VERIFIER.verify(addr, problems); 110 VERIFIER.verify(addr, problems); 117 VERIFIER.verify(addr, problems); 126 VERIFIER.verify(addr, problems); 146 VERIFIER.verify(add [all...] |
/external/guava/guava-tests/test/com/google/common/util/concurrent/ |
H A D | UncaughtExceptionHandlersTest.java | 21 import static org.easymock.EasyMock.verify; 45 verify(runtimeMock);
|
/external/openfst/src/script/ |
H A D | info.cc | 28 bool pipe, bool verify) { 29 InfoArgs args(f, test_properties, arc_filter, info_type, pipe, verify); 26 PrintFstInfo(const FstClass &f, bool test_properties, const string &arc_filter, const string &info_type, bool pipe, bool verify) argument
|