/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
H A D | tlsv1_common.c | 182 * verify key usage (must allow encryption) in tls_parse_cert() 206 int tls_verify_hash_init(struct tls_verify_hash *verify) in tls_verify_hash_init() argument 208 tls_verify_hash_free(verify); in tls_verify_hash_init() 209 verify->md5_client = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); in tls_verify_hash_init() 210 verify->md5_server = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); in tls_verify_hash_init() 211 verify->md5_cert = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); in tls_verify_hash_init() 212 verify->sha1_client = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); in tls_verify_hash_init() 213 verify->sha1_server = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); in tls_verify_hash_init() 214 verify->sha1_cert = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); in tls_verify_hash_init() 215 if (verify in tls_verify_hash_init() 238 tls_verify_hash_add(struct tls_verify_hash *verify, const u8 *buf, size_t len) tls_verify_hash_add() argument 264 tls_verify_hash_free(struct tls_verify_hash *verify) tls_verify_hash_free() argument [all...] |
H A D | tlsv1_client_write.c | 246 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start); in tls_send_client_hello() 340 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start); in tls_write_client_certificate() 568 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start); in tls_write_client_key_exchange() 623 if (conn->verify.sha256_cert == NULL || in tls_write_client_certificate_verify() 624 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) < in tls_write_client_certificate_verify() 626 conn->verify.sha256_cert = NULL; in tls_write_client_certificate_verify() 631 conn->verify.sha256_cert = NULL; in tls_write_client_certificate_verify() 655 if (conn->verify.md5_cert == NULL || in tls_write_client_certificate_verify() 656 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) { in tls_write_client_certificate_verify() 659 conn->verify in tls_write_client_certificate_verify() [all...] |
H A D | tlsv1_server_read.c | 987 if (conn->verify.sha256_cert == NULL || in tls_process_certificate_verify() 988 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) < in tls_process_certificate_verify() 990 conn->verify.sha256_cert = NULL; in tls_process_certificate_verify() 995 conn->verify.sha256_cert = NULL; in tls_process_certificate_verify() 1000 if (conn->verify.md5_cert == NULL || in tls_process_certificate_verify() 1001 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) { in tls_process_certificate_verify() 1004 conn->verify.md5_cert = NULL; in tls_process_certificate_verify() 1005 crypto_hash_finish(conn->verify.sha1_cert, NULL, NULL); in tls_process_certificate_verify() 1006 conn->verify.sha1_cert = NULL; in tls_process_certificate_verify() 1011 conn->verify in tls_process_certificate_verify() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
H A D | tlsv1_common.c | 182 * verify key usage (must allow encryption) in tls_parse_cert() 206 int tls_verify_hash_init(struct tls_verify_hash *verify) in tls_verify_hash_init() argument 208 tls_verify_hash_free(verify); in tls_verify_hash_init() 209 verify->md5_client = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); in tls_verify_hash_init() 210 verify->md5_server = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); in tls_verify_hash_init() 211 verify->md5_cert = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); in tls_verify_hash_init() 212 verify->sha1_client = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); in tls_verify_hash_init() 213 verify->sha1_server = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); in tls_verify_hash_init() 214 verify->sha1_cert = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); in tls_verify_hash_init() 215 if (verify in tls_verify_hash_init() 238 tls_verify_hash_add(struct tls_verify_hash *verify, const u8 *buf, size_t len) tls_verify_hash_add() argument 264 tls_verify_hash_free(struct tls_verify_hash *verify) tls_verify_hash_free() argument [all...] |
H A D | tlsv1_client_write.c | 234 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start); in tls_send_client_hello() 328 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start); in tls_write_client_certificate() 556 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start); in tls_write_client_key_exchange() 611 if (conn->verify.sha256_cert == NULL || in tls_write_client_certificate_verify() 612 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) < in tls_write_client_certificate_verify() 614 conn->verify.sha256_cert = NULL; in tls_write_client_certificate_verify() 619 conn->verify.sha256_cert = NULL; in tls_write_client_certificate_verify() 643 if (conn->verify.md5_cert == NULL || in tls_write_client_certificate_verify() 644 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) { in tls_write_client_certificate_verify() 647 conn->verify in tls_write_client_certificate_verify() [all...] |
H A D | tlsv1_server_read.c | 987 if (conn->verify.sha256_cert == NULL || in tls_process_certificate_verify() 988 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) < in tls_process_certificate_verify() 990 conn->verify.sha256_cert = NULL; in tls_process_certificate_verify() 995 conn->verify.sha256_cert = NULL; in tls_process_certificate_verify() 1000 if (conn->verify.md5_cert == NULL || in tls_process_certificate_verify() 1001 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) { in tls_process_certificate_verify() 1004 conn->verify.md5_cert = NULL; in tls_process_certificate_verify() 1005 crypto_hash_finish(conn->verify.sha1_cert, NULL, NULL); in tls_process_certificate_verify() 1006 conn->verify.sha1_cert = NULL; in tls_process_certificate_verify() 1011 conn->verify in tls_process_certificate_verify() [all...] |
/third_party/node/test/parallel/ |
H A D | test-crypto-sign-verify.js | 74 () => crypto.createVerify('SHA256').verify({ 85 () => crypto.createVerify('SHA256').verify({ 108 .verify(certPem, s1, 'base64'); 124 .verify(certPem, s2, 'latin1'); 131 verified = verStream.verify(certPem, s2, 'latin1'); 142 .verify(certPem, s3); 149 verified = verStream.verify(certPem, s3); 229 .verify({ 234 assert.strictEqual(verified, crypto.verify(algo, data, { 247 .verify({ [all...] |
H A D | test-crypto-rsa-dsa-revert.js | 333 assert.strictEqual(rsaVerify.verify(rsaPubPem, rsaSignature, 'hex'), true); 343 assert.strictEqual(rsaVerify.verify(rsaPubPem, rsaSignature, 'hex'), true); 354 assert.strictEqual(rsaVerify.verify(rsaPubPem, rsaSignature, 'hex'), true); 383 const verify = crypto.createVerify('SHA256'); 384 verify.update(input); 386 assert.strictEqual(verify.verify(publicKey, signature, 'hex'), true); 398 assert.strictEqual(verify2.verify(publicKey, signature, 'hex'), true); 408 // DSA signatures vary across runs so there is no static string to verify 414 const verify [all...] |
H A D | test-crypto-rsa-dsa.js | 350 assert.strictEqual(rsaVerify.verify(rsaPubPem, rsaSignature, 'hex'), true); 360 assert.strictEqual(rsaVerify.verify(rsaPubPem, rsaSignature, 'hex'), true); 371 assert.strictEqual(rsaVerify.verify(rsaPubPem, rsaSignature, 'hex'), true); 400 const verify = crypto.createVerify('SHA256'); 401 verify.update(input); 403 assert.strictEqual(verify.verify(publicKey, signature, 'hex'), true); 415 assert.strictEqual(verify2.verify(publicKey, signature, 'hex'), true); 425 // DSA signatures vary across runs so there is no static string to verify 431 const verify [all...] |
H A D | test-crypto-async-sign-verify.js | 52 crypto.verify(algorithm, data, key, actual), true); 59 crypto.verify(algorithm, data, key, expected, common.mustSucceed( 62 crypto.verify(algorithm, data, key, Buffer.from(''), common.mustSucceed( 127 const verify = util.promisify(crypto.verify); 137 verify('sha256', data, publicKey, signature), 138 verify('sha256', data, publicKey, signature), 139 verify('sha256', data, publicKey, signature),
|
H A D | test-assert-calltracker-verify.js | 5 // This test ensures that assert.CallTracker.verify() works as intended. 20 () => tracker.verify(), 28 () => tracker.verify(), 34 tracker.verify(); 42 () => tracker.verify(), 51 () => tracker.verify(),
|
H A D | test-crypto-verify-failure.js | 41 verify(); 48 function verify() { function 51 .verify(certPem, 'asdfasdfas', 'base64'); 59 verify();
|
H A D | test-crypto-binary-default.js | 54 }, /^Error: mac verify failure$/); 58 }, /^Error: mac verify failure$/); 439 .verify(certPem, s1, 'base64'); 448 .verify(certPem, s2); // binary 457 .verify(certPem, s3); 635 assert.strictEqual(rsaVerify.verify(rsaPubPem, rsaSignature, 'hex'), true); 658 const verify = crypto.createVerify('SHA256'); 659 verify.update(input); 661 assert.strictEqual(verify.verify(publicKe [all...] |
/third_party/vk-gl-cts/modules/gles3/functional/ |
H A D | es3fBufferMapTests.cpp | 110 BufferMapWriteCase (Context& context, const char* name, const char* desc, deUint32 bufferTarget, deUint32 usage, int size, VerifyType verify) in BufferMapWriteCase() argument 115 , m_verify (verify) in BufferMapWriteCase() 141 bool isOk = verifier.verify(buf, refBuf.getPtr(), 0, m_size, m_bufferTarget); in iterate() 159 BufferPartialMapWriteCase (Context& context, const char* name, const char* desc, deUint32 bufferTarget, deUint32 usage, int bufferSize, int mapOffset, int mapSize, VerifyType verify) in BufferPartialMapWriteCase() argument 166 , m_verify (verify) in BufferPartialMapWriteCase() 195 bool isOk = verifier.verify(buf, refBuf.getPtr(), 0, m_bufferSize, m_bufferTarget); in iterate() 215 BufferMapInvalidateCase (Context& context, const char* name, const char* desc, deUint32 bufferTarget, deUint32 usage, bool partialWrite, VerifyType verify) in BufferMapInvalidateCase() argument 220 , m_verify (verify) in BufferMapInvalidateCase() 256 bool isOk = verifier.verify(buf, refBuf.getPtr(), verifyOffset, verifySize, m_bufferTarget); in iterate() 274 BufferMapPartialInvalidateCase (Context& context, const char* name, const char* desc, deUint32 bufferTarget, deUint32 usage, bool partialWrite, VerifyType verify) in BufferMapPartialInvalidateCase() argument 333 BufferMapExplicitFlushCase(Context& context, const char* name, const char* desc, deUint32 bufferTarget, deUint32 usage, bool partialWrite, VerifyType verify) BufferMapExplicitFlushCase() argument 474 BufferMapReadWriteCase(Context& context, const char* name, const char* desc, deUint32 bufferTarget, deUint32 usage, int bufferSize, int mapOffset, int mapSize, VerifyType verify) BufferMapReadWriteCase() argument 590 VerifyType verify; init() member 651 VerifyType verify = bufferUses[useNdx].verify; init() local 756 VerifyType verify = bufferUses[useNdx].verify; init() local [all...] |
H A D | es3fBufferCopyTests.cpp | 109 isOk = verifier.verify(srcBuf, srcRef.getPtr(), 0, m_srcSize, m_srcTarget) && isOk; in iterate() 110 isOk = verifier.verify(dstBuf, dstRef.getPtr(), 0, m_dstSize, m_dstTarget) && isOk; in iterate() 121 isOk = verifier.verify(srcBuf, srcRef.getPtr(), 0, m_srcSize, m_srcTarget) && isOk; in iterate() 122 isOk = verifier.verify(dstBuf, dstRef.getPtr(), 0, m_dstSize, m_dstTarget) && isOk; in iterate() 214 isOk = verifier.verify(buf, ref.getPtr(), 0, size, m_dstTarget) && isOk; in iterate() 269 VerifyType verify = VERIFY_AS_VERTEX_ARRAY; in init() local 272 basicGroup->addChild(new BasicBufferCopyCase(m_context, name.c_str(), "", srcTarget, size, hint, dstTarget, size, hint, 0, 0, size, verify)); in init() 307 VerifyType verify = VERIFY_AS_VERTEX_ARRAY; in init() local 313 verify)); in init() 332 VerifyType verify in init() local [all...] |
/third_party/node/deps/npm/node_modules/sigstore/dist/ |
H A D | sigstore.js | 26 exports.createVerifier = exports.verify = exports.attest = exports.sign = void 0; 44 const verify_1 = require("@sigstore/verify"); 62 async function verify(bundle, dataOrOptions, options) { 70 return createVerifier(options).then((verifier) => verifier.verify(bundle, data)); 72 exports.verify = verify; 95 verify: (bundle, payload) => { 98 verifier.verify(signedEntity, policy);
|
/third_party/node/deps/npm/node_modules/@sigstore/core/dist/ |
H A D | crypto.js | 6 exports.bufferEqual = exports.verify = exports.hash = exports.digest = exports.createPublicKey = void 0; 50 function verify(data, key, signature, algorithm) { function 51 // The try/catch is to work around an issue in Node 14.x where verify throws 54 return crypto_1.default.verify(algorithm, data, key, signature); 61 exports.verify = verify;
|
/third_party/ltp/testcases/kernel/syscalls/clock_adjtime/ |
H A D | clock_adjtime01.c | 124 struct tst_timex verify; in verify_clock_adjtime() local 129 memset(&verify, 0, sizeof(verify)); in verify_clock_adjtime() 131 ttxc.type = verify.type = tv->type; in verify_clock_adjtime() 162 rval = tv->clock_adjtime(CLOCK_REALTIME, tst_timex_get(&verify)); in verify_clock_adjtime() 168 timex_show("VERIFY", &verify); in verify_clock_adjtime() 172 timex_get_field_long(&verify, tc[i].modes)) { in verify_clock_adjtime()
|
/third_party/vk-gl-cts/modules/gles2/functional/ |
H A D | es2fBufferWriteTests.cpp | 180 BasicBufferDataCase (Context& context, const char* name, const char* desc, deUint32 target, deUint32 usage, int size, VerifyType verify) in BasicBufferDataCase() argument 185 , m_verify (verify) in BasicBufferDataCase() 205 isOk = verifier.verify(buf, refBuf.getPtr(), 0, m_size); in iterate() 224 RecreateBufferDataStoreCase (Context& context, const char* name, const char* desc, const DataStoreSpec* specs, int numSpecs, VerifyType verify) in RecreateBufferDataStoreCase() argument 227 , m_verify (verify) in RecreateBufferDataStoreCase() 252 iterOk = verifier.verify(buf, refBuf.getPtr(), 0, spec->size); in iterate() 273 BasicBufferSubDataCase (Context& context, const char* name, const char* desc, deUint32 target, deUint32 usage, int size, int subDataOffs, int subDataSize, VerifyType verify) in BasicBufferSubDataCase() argument 280 , m_verify (verify) in BasicBufferSubDataCase() 306 isOk = verifier.verify(buf, refBuf.getPtr(), 0, m_size); in iterate() 327 SubDataToUndefinedCase (Context& context, const char* name, const char* desc, deUint32 target, deUint32 usage, int size, const tcu::IVec2* ranges, int numRanges, VerifyType verify) in SubDataToUndefinedCase() argument 562 VerifyType verify; init() member 581 const VerifyType verify = VERIFY_AS_VERTEX_ARRAY; init() local 604 const VerifyType verify = verifyTypes[verifyNdx].verify; init() local 666 const VerifyType verify = VERIFY_AS_VERTEX_ARRAY; init() local 697 const VerifyType verify = VERIFY_AS_VERTEX_ARRAY; init() local [all...] |
/third_party/icu/icu4j/main/tests/core/src/com/ibm/icu/dev/test/format/ |
H A D | IntlTestDecimalFormatSymbolsC.java | 125 verify(34.5, "00.00", sym, "34.50"); in TestSymbols() 127 verify(34.5, "00.00", sym, "34S50"); in TestSymbols() 129 verify(34.5, "00 %", sym, "3450 P"); in TestSymbols() 131 verify(34.5, "\u00a4##.##", sym, "D 34.50"); in TestSymbols() 133 verify(3456.5, "0,000.##", sym, "3|456S5"); in TestSymbols() 137 public void verify(double value, String pattern, DecimalFormatSymbols sym, String expected) { in verify() method in IntlTestDecimalFormatSymbolsC
|
/third_party/icu/ohos_icu4j/src/main/tests/ohos/global/icu/dev/test/format/ |
H A D | IntlTestDecimalFormatSymbolsC.java | 128 verify(34.5, "00.00", sym, "34.50"); in TestSymbols() 130 verify(34.5, "00.00", sym, "34S50"); in TestSymbols() 132 verify(34.5, "00 %", sym, "3450 P"); in TestSymbols() 134 verify(34.5, "\u00a4##.##", sym, "D 34.50"); in TestSymbols() 136 verify(3456.5, "0,000.##", sym, "3|456S5"); in TestSymbols() 140 public void verify(double value, String pattern, DecimalFormatSymbols sym, String expected) { in verify() method in IntlTestDecimalFormatSymbolsC
|
/third_party/rust/crates/rust-openssl/openssl/src/ssl/ |
H A D | error.rs | 164 let verify = s.ssl().verify_result(); in fmt() 165 if verify != X509VerifyResult::OK { in fmt() 166 write!(f, ": {}", verify)?; in fmt() 171 let verify = s.ssl().verify_result(); in fmt() 172 if verify != X509VerifyResult::OK { in fmt() 173 write!(f, ": {}", verify)?; in fmt()
|
/third_party/typescript/tests/baselines/reference/ |
H A D | constAssertions.js | 87 type Action = "verify" | "write"; 91 function ff4(verify: boolean, contentMatches: boolean) { 92 const action : Action = verify ? `verify` : `write`; 98 function ff5(verify: boolean, contentMatches: boolean) { 99 const action = verify ? `verify` : `write`; 180 function ff4(verify, contentMatches) {
181 const action = verify ? `verify` [all...] |
/third_party/curl/tests/unit/ |
H A D | unit1652.c | 86 static int verify(const char *info, const char *two) in verify() function 100 fail_unless(verify(result, input) == 0, "Simple string test"); 104 fail_unless(verify(result, "Simple Test 42 testing 43\n") == 0, 111 fail_unless(verify(result, "(nil)") == 0, "Passing NULL as string"); 118 fail_unless(verify(result, input) == 0, "No truncation of infof input");
|
/third_party/vk-gl-cts/modules/glshared/ |
H A D | glsBufferTestUtil.hpp | 199 virtual bool verify (deUint32 buffer, const deUint8* reference, int offset, int numBytes) = DE_NULL; 200 virtual bool verify (deUint32 buffer, const deUint8* reference, int offset, int numBytes, deUint32 targetHint); 221 bool verify (deUint32 buffer, const deUint8* reference, int offset, int numBytes); 222 bool verify (deUint32 buffer, const deUint8* reference, int offset, int numBytes, deUint32 targetHint); 239 bool verify (deUint32 buffer, const deUint8* reference, int offset, int numBytes); 240 bool verify (deUint32 buffer, const deUint8* reference, int offset, int numBytes, deUint32 target); 251 bool verify (deUint32 buffer, const deUint8* reference, int offset, int numBytes); 271 bool verify (deUint32 buffer, const deUint8* reference, int offset, int numBytes);
|