Home
last modified time | relevance | path

Searched refs:verify (Results 1 - 25 of 513) sorted by relevance

12345678910>>...21

/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/
H A Dtlsv1_common.c182 * verify key usage (must allow encryption) in tls_parse_cert()
206 int tls_verify_hash_init(struct tls_verify_hash *verify) in tls_verify_hash_init() argument
208 tls_verify_hash_free(verify); in tls_verify_hash_init()
209 verify->md5_client = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); in tls_verify_hash_init()
210 verify->md5_server = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); in tls_verify_hash_init()
211 verify->md5_cert = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); in tls_verify_hash_init()
212 verify->sha1_client = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); in tls_verify_hash_init()
213 verify->sha1_server = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); in tls_verify_hash_init()
214 verify->sha1_cert = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); in tls_verify_hash_init()
215 if (verify in tls_verify_hash_init()
238 tls_verify_hash_add(struct tls_verify_hash *verify, const u8 *buf, size_t len) tls_verify_hash_add() argument
264 tls_verify_hash_free(struct tls_verify_hash *verify) tls_verify_hash_free() argument
[all...]
H A Dtlsv1_client_write.c246 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start); in tls_send_client_hello()
340 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start); in tls_write_client_certificate()
568 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start); in tls_write_client_key_exchange()
623 if (conn->verify.sha256_cert == NULL || in tls_write_client_certificate_verify()
624 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) < in tls_write_client_certificate_verify()
626 conn->verify.sha256_cert = NULL; in tls_write_client_certificate_verify()
631 conn->verify.sha256_cert = NULL; in tls_write_client_certificate_verify()
655 if (conn->verify.md5_cert == NULL || in tls_write_client_certificate_verify()
656 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) { in tls_write_client_certificate_verify()
659 conn->verify in tls_write_client_certificate_verify()
[all...]
H A Dtlsv1_server_read.c987 if (conn->verify.sha256_cert == NULL || in tls_process_certificate_verify()
988 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) < in tls_process_certificate_verify()
990 conn->verify.sha256_cert = NULL; in tls_process_certificate_verify()
995 conn->verify.sha256_cert = NULL; in tls_process_certificate_verify()
1000 if (conn->verify.md5_cert == NULL || in tls_process_certificate_verify()
1001 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) { in tls_process_certificate_verify()
1004 conn->verify.md5_cert = NULL; in tls_process_certificate_verify()
1005 crypto_hash_finish(conn->verify.sha1_cert, NULL, NULL); in tls_process_certificate_verify()
1006 conn->verify.sha1_cert = NULL; in tls_process_certificate_verify()
1011 conn->verify in tls_process_certificate_verify()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/
H A Dtlsv1_common.c182 * verify key usage (must allow encryption) in tls_parse_cert()
206 int tls_verify_hash_init(struct tls_verify_hash *verify) in tls_verify_hash_init() argument
208 tls_verify_hash_free(verify); in tls_verify_hash_init()
209 verify->md5_client = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); in tls_verify_hash_init()
210 verify->md5_server = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); in tls_verify_hash_init()
211 verify->md5_cert = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); in tls_verify_hash_init()
212 verify->sha1_client = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); in tls_verify_hash_init()
213 verify->sha1_server = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); in tls_verify_hash_init()
214 verify->sha1_cert = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); in tls_verify_hash_init()
215 if (verify in tls_verify_hash_init()
238 tls_verify_hash_add(struct tls_verify_hash *verify, const u8 *buf, size_t len) tls_verify_hash_add() argument
264 tls_verify_hash_free(struct tls_verify_hash *verify) tls_verify_hash_free() argument
[all...]
H A Dtlsv1_client_write.c234 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start); in tls_send_client_hello()
328 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start); in tls_write_client_certificate()
556 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start); in tls_write_client_key_exchange()
611 if (conn->verify.sha256_cert == NULL || in tls_write_client_certificate_verify()
612 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) < in tls_write_client_certificate_verify()
614 conn->verify.sha256_cert = NULL; in tls_write_client_certificate_verify()
619 conn->verify.sha256_cert = NULL; in tls_write_client_certificate_verify()
643 if (conn->verify.md5_cert == NULL || in tls_write_client_certificate_verify()
644 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) { in tls_write_client_certificate_verify()
647 conn->verify in tls_write_client_certificate_verify()
[all...]
H A Dtlsv1_server_read.c987 if (conn->verify.sha256_cert == NULL || in tls_process_certificate_verify()
988 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) < in tls_process_certificate_verify()
990 conn->verify.sha256_cert = NULL; in tls_process_certificate_verify()
995 conn->verify.sha256_cert = NULL; in tls_process_certificate_verify()
1000 if (conn->verify.md5_cert == NULL || in tls_process_certificate_verify()
1001 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) { in tls_process_certificate_verify()
1004 conn->verify.md5_cert = NULL; in tls_process_certificate_verify()
1005 crypto_hash_finish(conn->verify.sha1_cert, NULL, NULL); in tls_process_certificate_verify()
1006 conn->verify.sha1_cert = NULL; in tls_process_certificate_verify()
1011 conn->verify in tls_process_certificate_verify()
[all...]
/third_party/node/test/parallel/
H A Dtest-crypto-sign-verify.js74 () => crypto.createVerify('SHA256').verify({
85 () => crypto.createVerify('SHA256').verify({
108 .verify(certPem, s1, 'base64');
124 .verify(certPem, s2, 'latin1');
131 verified = verStream.verify(certPem, s2, 'latin1');
142 .verify(certPem, s3);
149 verified = verStream.verify(certPem, s3);
229 .verify({
234 assert.strictEqual(verified, crypto.verify(algo, data, {
247 .verify({
[all...]
H A Dtest-crypto-rsa-dsa-revert.js333 assert.strictEqual(rsaVerify.verify(rsaPubPem, rsaSignature, 'hex'), true);
343 assert.strictEqual(rsaVerify.verify(rsaPubPem, rsaSignature, 'hex'), true);
354 assert.strictEqual(rsaVerify.verify(rsaPubPem, rsaSignature, 'hex'), true);
383 const verify = crypto.createVerify('SHA256');
384 verify.update(input);
386 assert.strictEqual(verify.verify(publicKey, signature, 'hex'), true);
398 assert.strictEqual(verify2.verify(publicKey, signature, 'hex'), true);
408 // DSA signatures vary across runs so there is no static string to verify
414 const verify
[all...]
H A Dtest-crypto-rsa-dsa.js350 assert.strictEqual(rsaVerify.verify(rsaPubPem, rsaSignature, 'hex'), true);
360 assert.strictEqual(rsaVerify.verify(rsaPubPem, rsaSignature, 'hex'), true);
371 assert.strictEqual(rsaVerify.verify(rsaPubPem, rsaSignature, 'hex'), true);
400 const verify = crypto.createVerify('SHA256');
401 verify.update(input);
403 assert.strictEqual(verify.verify(publicKey, signature, 'hex'), true);
415 assert.strictEqual(verify2.verify(publicKey, signature, 'hex'), true);
425 // DSA signatures vary across runs so there is no static string to verify
431 const verify
[all...]
H A Dtest-crypto-async-sign-verify.js52 crypto.verify(algorithm, data, key, actual), true);
59 crypto.verify(algorithm, data, key, expected, common.mustSucceed(
62 crypto.verify(algorithm, data, key, Buffer.from(''), common.mustSucceed(
127 const verify = util.promisify(crypto.verify);
137 verify('sha256', data, publicKey, signature),
138 verify('sha256', data, publicKey, signature),
139 verify('sha256', data, publicKey, signature),
H A Dtest-assert-calltracker-verify.js5 // This test ensures that assert.CallTracker.verify() works as intended.
20 () => tracker.verify(),
28 () => tracker.verify(),
34 tracker.verify();
42 () => tracker.verify(),
51 () => tracker.verify(),
H A Dtest-crypto-verify-failure.js41 verify();
48 function verify() { function
51 .verify(certPem, 'asdfasdfas', 'base64');
59 verify();
H A Dtest-crypto-binary-default.js54 }, /^Error: mac verify failure$/);
58 }, /^Error: mac verify failure$/);
439 .verify(certPem, s1, 'base64');
448 .verify(certPem, s2); // binary
457 .verify(certPem, s3);
635 assert.strictEqual(rsaVerify.verify(rsaPubPem, rsaSignature, 'hex'), true);
658 const verify = crypto.createVerify('SHA256');
659 verify.update(input);
661 assert.strictEqual(verify.verify(publicKe
[all...]
/third_party/vk-gl-cts/modules/gles3/functional/
H A Des3fBufferMapTests.cpp110 BufferMapWriteCase (Context& context, const char* name, const char* desc, deUint32 bufferTarget, deUint32 usage, int size, VerifyType verify) in BufferMapWriteCase() argument
115 , m_verify (verify) in BufferMapWriteCase()
141 bool isOk = verifier.verify(buf, refBuf.getPtr(), 0, m_size, m_bufferTarget); in iterate()
159 BufferPartialMapWriteCase (Context& context, const char* name, const char* desc, deUint32 bufferTarget, deUint32 usage, int bufferSize, int mapOffset, int mapSize, VerifyType verify) in BufferPartialMapWriteCase() argument
166 , m_verify (verify) in BufferPartialMapWriteCase()
195 bool isOk = verifier.verify(buf, refBuf.getPtr(), 0, m_bufferSize, m_bufferTarget); in iterate()
215 BufferMapInvalidateCase (Context& context, const char* name, const char* desc, deUint32 bufferTarget, deUint32 usage, bool partialWrite, VerifyType verify) in BufferMapInvalidateCase() argument
220 , m_verify (verify) in BufferMapInvalidateCase()
256 bool isOk = verifier.verify(buf, refBuf.getPtr(), verifyOffset, verifySize, m_bufferTarget); in iterate()
274 BufferMapPartialInvalidateCase (Context& context, const char* name, const char* desc, deUint32 bufferTarget, deUint32 usage, bool partialWrite, VerifyType verify) in BufferMapPartialInvalidateCase() argument
333 BufferMapExplicitFlushCase(Context& context, const char* name, const char* desc, deUint32 bufferTarget, deUint32 usage, bool partialWrite, VerifyType verify) BufferMapExplicitFlushCase() argument
474 BufferMapReadWriteCase(Context& context, const char* name, const char* desc, deUint32 bufferTarget, deUint32 usage, int bufferSize, int mapOffset, int mapSize, VerifyType verify) BufferMapReadWriteCase() argument
590 VerifyType verify; init() member
651 VerifyType verify = bufferUses[useNdx].verify; init() local
756 VerifyType verify = bufferUses[useNdx].verify; init() local
[all...]
H A Des3fBufferCopyTests.cpp109 isOk = verifier.verify(srcBuf, srcRef.getPtr(), 0, m_srcSize, m_srcTarget) && isOk; in iterate()
110 isOk = verifier.verify(dstBuf, dstRef.getPtr(), 0, m_dstSize, m_dstTarget) && isOk; in iterate()
121 isOk = verifier.verify(srcBuf, srcRef.getPtr(), 0, m_srcSize, m_srcTarget) && isOk; in iterate()
122 isOk = verifier.verify(dstBuf, dstRef.getPtr(), 0, m_dstSize, m_dstTarget) && isOk; in iterate()
214 isOk = verifier.verify(buf, ref.getPtr(), 0, size, m_dstTarget) && isOk; in iterate()
269 VerifyType verify = VERIFY_AS_VERTEX_ARRAY; in init() local
272 basicGroup->addChild(new BasicBufferCopyCase(m_context, name.c_str(), "", srcTarget, size, hint, dstTarget, size, hint, 0, 0, size, verify)); in init()
307 VerifyType verify = VERIFY_AS_VERTEX_ARRAY; in init() local
313 verify)); in init()
332 VerifyType verify in init() local
[all...]
/third_party/node/deps/npm/node_modules/sigstore/dist/
H A Dsigstore.js26 exports.createVerifier = exports.verify = exports.attest = exports.sign = void 0;
44 const verify_1 = require("@sigstore/verify");
62 async function verify(bundle, dataOrOptions, options) {
70 return createVerifier(options).then((verifier) => verifier.verify(bundle, data));
72 exports.verify = verify;
95 verify: (bundle, payload) => {
98 verifier.verify(signedEntity, policy);
/third_party/node/deps/npm/node_modules/@sigstore/core/dist/
H A Dcrypto.js6 exports.bufferEqual = exports.verify = exports.hash = exports.digest = exports.createPublicKey = void 0;
50 function verify(data, key, signature, algorithm) { function
51 // The try/catch is to work around an issue in Node 14.x where verify throws
54 return crypto_1.default.verify(algorithm, data, key, signature);
61 exports.verify = verify;
/third_party/ltp/testcases/kernel/syscalls/clock_adjtime/
H A Dclock_adjtime01.c124 struct tst_timex verify; in verify_clock_adjtime() local
129 memset(&verify, 0, sizeof(verify)); in verify_clock_adjtime()
131 ttxc.type = verify.type = tv->type; in verify_clock_adjtime()
162 rval = tv->clock_adjtime(CLOCK_REALTIME, tst_timex_get(&verify)); in verify_clock_adjtime()
168 timex_show("VERIFY", &verify); in verify_clock_adjtime()
172 timex_get_field_long(&verify, tc[i].modes)) { in verify_clock_adjtime()
/third_party/vk-gl-cts/modules/gles2/functional/
H A Des2fBufferWriteTests.cpp180 BasicBufferDataCase (Context& context, const char* name, const char* desc, deUint32 target, deUint32 usage, int size, VerifyType verify) in BasicBufferDataCase() argument
185 , m_verify (verify) in BasicBufferDataCase()
205 isOk = verifier.verify(buf, refBuf.getPtr(), 0, m_size); in iterate()
224 RecreateBufferDataStoreCase (Context& context, const char* name, const char* desc, const DataStoreSpec* specs, int numSpecs, VerifyType verify) in RecreateBufferDataStoreCase() argument
227 , m_verify (verify) in RecreateBufferDataStoreCase()
252 iterOk = verifier.verify(buf, refBuf.getPtr(), 0, spec->size); in iterate()
273 BasicBufferSubDataCase (Context& context, const char* name, const char* desc, deUint32 target, deUint32 usage, int size, int subDataOffs, int subDataSize, VerifyType verify) in BasicBufferSubDataCase() argument
280 , m_verify (verify) in BasicBufferSubDataCase()
306 isOk = verifier.verify(buf, refBuf.getPtr(), 0, m_size); in iterate()
327 SubDataToUndefinedCase (Context& context, const char* name, const char* desc, deUint32 target, deUint32 usage, int size, const tcu::IVec2* ranges, int numRanges, VerifyType verify) in SubDataToUndefinedCase() argument
562 VerifyType verify; init() member
581 const VerifyType verify = VERIFY_AS_VERTEX_ARRAY; init() local
604 const VerifyType verify = verifyTypes[verifyNdx].verify; init() local
666 const VerifyType verify = VERIFY_AS_VERTEX_ARRAY; init() local
697 const VerifyType verify = VERIFY_AS_VERTEX_ARRAY; init() local
[all...]
/third_party/icu/icu4j/main/tests/core/src/com/ibm/icu/dev/test/format/
H A DIntlTestDecimalFormatSymbolsC.java125 verify(34.5, "00.00", sym, "34.50"); in TestSymbols()
127 verify(34.5, "00.00", sym, "34S50"); in TestSymbols()
129 verify(34.5, "00 %", sym, "3450 P"); in TestSymbols()
131 verify(34.5, "\u00a4##.##", sym, "D 34.50"); in TestSymbols()
133 verify(3456.5, "0,000.##", sym, "3|456S5"); in TestSymbols()
137 public void verify(double value, String pattern, DecimalFormatSymbols sym, String expected) { in verify() method in IntlTestDecimalFormatSymbolsC
/third_party/icu/ohos_icu4j/src/main/tests/ohos/global/icu/dev/test/format/
H A DIntlTestDecimalFormatSymbolsC.java128 verify(34.5, "00.00", sym, "34.50"); in TestSymbols()
130 verify(34.5, "00.00", sym, "34S50"); in TestSymbols()
132 verify(34.5, "00 %", sym, "3450 P"); in TestSymbols()
134 verify(34.5, "\u00a4##.##", sym, "D 34.50"); in TestSymbols()
136 verify(3456.5, "0,000.##", sym, "3|456S5"); in TestSymbols()
140 public void verify(double value, String pattern, DecimalFormatSymbols sym, String expected) { in verify() method in IntlTestDecimalFormatSymbolsC
/third_party/rust/crates/rust-openssl/openssl/src/ssl/
H A Derror.rs164 let verify = s.ssl().verify_result(); in fmt()
165 if verify != X509VerifyResult::OK { in fmt()
166 write!(f, ": {}", verify)?; in fmt()
171 let verify = s.ssl().verify_result(); in fmt()
172 if verify != X509VerifyResult::OK { in fmt()
173 write!(f, ": {}", verify)?; in fmt()
/third_party/typescript/tests/baselines/reference/
H A DconstAssertions.js87 type Action = "verify" | "write";
91 function ff4(verify: boolean, contentMatches: boolean) {
92 const action : Action = verify ? `verify` : `write`;
98 function ff5(verify: boolean, contentMatches: boolean) {
99 const action = verify ? `verify` : `write`;
180 function ff4(verify, contentMatches) {
181 const action = verify ? `verify`
[all...]
/third_party/curl/tests/unit/
H A Dunit1652.c86 static int verify(const char *info, const char *two) in verify() function
100 fail_unless(verify(result, input) == 0, "Simple string test");
104 fail_unless(verify(result, "Simple Test 42 testing 43\n") == 0,
111 fail_unless(verify(result, "(nil)") == 0, "Passing NULL as string");
118 fail_unless(verify(result, input) == 0, "No truncation of infof input");
/third_party/vk-gl-cts/modules/glshared/
H A DglsBufferTestUtil.hpp199 virtual bool verify (deUint32 buffer, const deUint8* reference, int offset, int numBytes) = DE_NULL;
200 virtual bool verify (deUint32 buffer, const deUint8* reference, int offset, int numBytes, deUint32 targetHint);
221 bool verify (deUint32 buffer, const deUint8* reference, int offset, int numBytes);
222 bool verify (deUint32 buffer, const deUint8* reference, int offset, int numBytes, deUint32 targetHint);
239 bool verify (deUint32 buffer, const deUint8* reference, int offset, int numBytes);
240 bool verify (deUint32 buffer, const deUint8* reference, int offset, int numBytes, deUint32 target);
251 bool verify (deUint32 buffer, const deUint8* reference, int offset, int numBytes);
271 bool verify (deUint32 buffer, const deUint8* reference, int offset, int numBytes);

Completed in 12 milliseconds

12345678910>>...21