-
aQute.bnd.osgi.Verifier.verify()
-
aQute.lib.osgi.Verifier.verify()
-
au.edu.qut.yawl.elements.data.YParameter.verify()
-
au.edu.qut.yawl.elements.data.YVariable.verify()
-
au.org.intersect.samifier.domain.Genome.verify()
-
be.c4j.ee.security.custom.AbstractGenericVoter.verify()
-
ch.ethz.iks.slp.ServiceURL.verify()
-
com.asakusafw.dmdl.spi.AttributeDriver.verify()
Verifies the attributed declaration. This will be invoked after all attributes are {@link #process(DmdlSemantics,Declaration,AstAttribute) processed}.
@param environment the processing environment
@param attribute the attribute with the {@link #getTargetName() target name}
@param declaration the declaration with the {@code attribute}
@see #getTargetName()
@since 0.7.0
-
com.asakusafw.testdriver.core.Verifier.verify()
Verifies the result data.
@param results result data
@return the detected differences (will be trimmed)
@throws IOException if failed to
@throws IllegalArgumentException if some parameters were {@code null}
-
com.asakusafw.testdriver.core.VerifyRule.verify()
-
com.auth0.jwt.JWTVerifier.verify()
Performs JWT validation
@param token token to verify
@throws SignatureException when signature is invalid
@throws IllegalStateException when token's structure, expiration, issuer or audience are invalid
-
com.bitsofproof.supernode.common.ECKeyPair.verify()
-
com.bitsofproof.supernode.common.Key.verify()
-
com.dyuproject.oauth.Signature.verify()
Verifies whether the params and method generates the same exact signature.
-
com.esri.gpt.catalog.publication.ValidationRequest.verify()
Verifies the document.
@throws SchemaException if a schems related exception occurs
-
com.google.nigori.common.DSAVerify.verify()
Returns {@code true} iff {@code sig} verifies.
@param sig the signature to verify.
@throws NoSuchAlgorithmException if {@code DIGEST_ALGORITHM} is not available.
-
com.hazelcast.config.JoinConfig.verify()
Verifies this JoinConfig is valid. So at most a single joiner should be active.
@throws IllegalStateException when the join config is not valid.
-
com.intel.mountwilson.manifest.data.IManifest.verify()
-
com.itextpdf.text.pdf.security.OCSPVerifier.verify()
Verifies if a a valid OCSP response is found for the certificate. If this method returns false, it doesn't mean the certificate isn't valid. It means we couldn't verify it against any OCSP response that was available.
@param signCert the certificate that needs to be checked
@param issuerCert its issuer
@return a list of VerificationOK
objects.The list will be empty if the certificate couldn't be verified.
@see com.itextpdf.text.pdf.security.RootStoreVerifier#verify(java.security.cert.X509Certificate,java.security.cert.X509Certificate,java.util.Date)
-
com.itextpdf.text.pdf.security.PdfPKCS7.verify()
Verify the digest.
@throws SignatureException on error
@return true
if the signature checks out, false
otherwise
-
com.lowagie.text.pdf.PdfPKCS7.verify()
Verify the digest.
@throws SignatureException on error
@return true
if the signature checks out, false
otherwise
-
com.mockobjects.dynamic.Mock.verify()
-
com.mockobjects.jms.MockMessage.verify()
-
com.mockobjects.jms.MockQueue.verify()
-
com.mockobjects.jms.MockQueueReceiver.verify()
-
com.mockobjects.jms.MockQueueSender.verify()
-
com.mockobjects.jms.MockQueueSession.verify()
-
com.mockobjects.jms.MockTemporaryQueue.verify()
-
com.mockobjects.jms.MockTextMessage.verify()
-
com.mockobjects.jms.MockTopic.verify()
-
com.mockobjects.servlet.MockHttpServletResponse.verify()
-
com.mockobjects.servlet.MockJspWriter.verify()
-
com.mockobjects.servlet.MockPageContext.verify()
-
com.nimbusds.jose.JWSObject.verify()
Checks the signature of this JWS object with the specified verifier. The JWS object must be in a {@link State#SIGNED signed} state.
@param verifier The JWS verifier. Must not be {@code null}.
@return {@code true} if the signature was successfully verified, else {@code false}.
@throws IllegalStateException If the JWS object is not in a {@link State#SIGNED signed} or{@link State#VERIFIED verified state}.
@throws JOSEException If the JWS object couldn't be verified.
-
com.nimbusds.jose.JWSVerifier.verify()
Verifies the specified {@link JWSObject#getSignature signature} of a{@link JWSObject JWS object}.
@param header The JSON Web Signature (JWS) header. Must specify an accepted JWS algorithm, must contain only accepted header parameters, and must not be {@code null}.
@param signingInput The signing input. Must not be {@code null}.
@param signature The signature part of the JWS object. Must notbe {@code null}.
@return {@code true} if the signature was successfully verified, else {@code false}.
@throws JOSEException If the JWS algorithm is not accepted, if a header parameter is not accepted, or if signature verification failed for some other reason.
-
com.sk89q.skmcl.session.YggdrasilSession.verify()
-
com.sleepycat.db.internal.Db.verify()
-
com.sleepycat.je.dbi.DatabaseImpl.verify()
-
com.sleepycat.je.rep.ReplicationConfig.verify()
@hidden For internal use only. Performs the checks need to ensure that this is a valid replicated environment configuration. This method must only be invoked after all the appropriate fields are set.
-
com.sleepycat.je.tree.BIN.verify()
-
com.sleepycat.je.tree.DBIN.verify()
-
com.sleepycat.je.tree.LN.verify()
-
com.softwaremill.common.paypal.service.PayPalVerificationService.verify()
-
com.sun.grid.cull.CullDefinition.verify()
Verify the cull definition
@return number of errors
-
com.sun.org.apache.xml.internal.security.algorithms.SignatureAlgorithm.verify()
Proxy method for {@link java.security.Signature#verify(byte[])}which is executed on the internal {@link java.security.Signature} object.
@param signature
@return true if if the signature is valid.
@throws XMLSignatureException
-
com.sun.xml.ws.security.opt.crypto.dsig.internal.HmacSHA1.verify()
Verifies the signature
@param siganture the signature to be verified
-
com.taobao.metamorphosis.server.utils.MetaConfig.verify()
У�������Ƿ���ȷ
-
com.thoughtworks.xstream.testutil.CallLog.verify()
-
com.volantis.shared.metadata.type.MetaDataType.verify()
Verifies if the specified meta data value has the expected type and meets all of the constraints of this type.
The returned collection contains all of the verification errors that were found during the check. Members of the collection are {@link VerificationError}s.
Empty collection is returned if no errors were found.
@param value the value to check
@return collection of VerificationErrors
-
com.volantis.shared.metadata.type.mutable.MutableBooleanType.verify()
-
com.volantis.shared.metadata.type.mutable.MutableChoiceType.verify()
-
com.volantis.shared.metadata.type.mutable.MutableCollectionType.verify()
-
com.volantis.shared.metadata.type.mutable.MutableListType.verify()
-
com.volantis.shared.metadata.type.mutable.MutableNumberType.verify()
-
com.volantis.shared.metadata.type.mutable.MutableQuantityType.verify()
-
com.volantis.shared.metadata.type.mutable.MutableStringType.verify()
-
com.volantis.shared.metadata.type.mutable.MutableStructureType.verify()
-
com.volantis.testtools.mock.ExpectationContainer.verify()
-
com.volantis.xml.pipeline.sax.impl.template.TValue.verify()
Should be called to indicate that the value has been verified.
-
cryptix.openpgp.PGPDetachedSignatureMessage.verify()
-
de.anomic.tools.SignatureOutputStream.verify()
verify signature, don't use this stream for another signature afterwards
@param sign signature as bytes
@return true, when signature was right
@throws SignatureException
-
gnu.java.security.sig.ISignature.verify()
-
gnu.java.security.sig.dss.DSSSignature.verify()
-
gnu.testlet.gnu.javax.swing.text.html.parser.support.Parser.Parser_Test.verify()
-
gov.nasa.arc.mct.fastplot.view.TimeSpanTextField.DurationVerifier.verify()
-
gov.nasa.arc.mct.fastplot.view.TimeTextField.TimeVerifier.verify()
-
iaik.x509.NetscapeCertRequest.verify()
-
io.undertow.security.idm.IdentityManager.verify()
Verify a previously authenticated account. Typical checks could be along the lines of verifying that the account is not now locked or that the password has not been reset since last verified, also this provides an opportunity for roles to be re-loaded if membership information has changed.
@param account - The {@link Account} to verify.
@return An updates {@link Account} if verification is successful, null otherwise.
-
ivory.regression.GroundTruth.verify()
-
java.security.Signature.verify()
Verifies the passed-in signature.
A call to this method resets this signature object to the state it was in when previously initialized for verification via a call to initVerify(PublicKey)
. That is, the object is reset and available to verify another signature from the identity whose public key was specified in the call to initVerify
.
@param signature the signature bytes to be verified.
@return true if the signature was verified, false if not.
@exception SignatureException if this signature object is not initialized properly, the passed-in signature is improperly encoded or of the wrong type, if this signature algorithm is unable to process the input data provided, etc.
-
java.security.SignedObject.verify()
Verifies that the signature in this SignedObject is the valid signature for the object stored inside, with the given verification key, using the designated verification engine.
@param verificationKey the public key for verification.
@param verificationEngine the signature verification engine.
@exception SignatureException if signature verification failed.
@exception InvalidKeyException if the verification key is invalid.
@return true if the signature is valid, false otherwise
-
java.security.cert.Certificate.verify()
Verifies that this certificate was signed using the private key that corresponds to the specified public key.
@param key the PublicKey used to carry out the verification.
@exception NoSuchAlgorithmException on unsupported signaturealgorithms.
@exception InvalidKeyException on incorrect key.
@exception NoSuchProviderException if there's no default provider.
@exception SignatureException on signature errors.
@exception CertificateException on encoding errors.
-
java.security.cert.X509CRL.verify()
Verifies that this CRL was signed using the private key that corresponds to the given public key.
@param key the PublicKey used to carry out the verification.
@exception NoSuchAlgorithmException on unsupported signaturealgorithms.
@exception InvalidKeyException on incorrect key.
@exception NoSuchProviderException if there's no default provider.
@exception SignatureException on signature errors.
@exception CRLException on encoding errors.
-
java.security.cert.X509Certificate.verify()
Verifies that this certificate was signed using the private key that corresponds to the specified public key. This method uses the signature verification engine supplied by the specified provider. Note that the specified Provider object does not have to be registered in the provider list. This method was added to version 1.8 of the Java Platform Standard Edition. In order to maintain backwards compatibility with existing service providers, this method is not {@code abstract}and it provides a default implementation.
@param key the PublicKey used to carry out the verification.
@param sigProvider the signature provider.
@exception NoSuchAlgorithmException on unsupported signaturealgorithms.
@exception InvalidKeyException on incorrect key.
@exception SignatureException on signature errors.
@exception CertificateException on encoding errors.
@exception UnsupportedOperationException if the method is not supported
@since 1.8
-
javax.net.ssl.HostnameVerifier.verify()
-
javax.swing.InputVerifier.verify()
Checks whether the JComponent's input is valid. This method should have no side effects. It returns a boolean indicating the status of the argument's input.
@param input the JComponent to verify
@return true
when valid, false
when invalid
@see JComponent#setInputVerifier
@see JComponent#getInputVerifier
-
jc.pbntools.download.HtmlTourDownloader.verify()
Verifies whether link points to a valid data in this format. Sets the following members:
- m_sTitle
- m_sDirName
- m_cDeals
Prints the title and dirname.
-
jc.pbntools.download.LinReader.verify()
Verifies if the sUrl
contains valid data in this format
-
jfun.yan.Component.verify()
-
jfun.yan.Container.verify()
Verifies the components in this container. Dependencies are resolved in the current container.
@throws AmbiguousComponentResolutionException if ambiguity happens.
@throws CyclicDependencyException if cyclic dependency is detected.
@throws UnresolvedComponentException if any component cannot be resolved.
@throws UnsatisfiedComponentException if some requirement of a component cannot be satisfied.
@throws YanException for any other exception.
-
jfun.yan.containers.DefaultContainer.verify()
-
jfun.yan.containers.SimpleContainer.verify()
-
jfun.yan.lifecycle.DefaultLifecycleManager.verify()
To call the "verify" phase for all managed instances.
@throws Throwable when any exception happens.
-
mykeynote.keynote.KeyNoteCL.verify()
This method is used to start the keynote program and check what the permissions for the given set of credentials and resource is. Note that some configuration options are missing, which are automatically inserted:
The file where the return values reside:
@param unique The unique id
@param report The report
@param resource The resource, which we want to use.
@param key The file, where the public key resides.
@return Returns the keynote permission string.
@throws IOException
@throws RetValStringNotParsableException
@throws KeyNoteCLProcessCreationException
@throws KeyNoteCLException
@throws InterruptedException
-
net.schmizz.sshj.signature.Signature.verify()
Verify against the given signature.
@param sig the signature to verify against
@return {@code true} on successful verification, {@code false} on failure
-
net.sf.jasperreports.engine.component.ComponentCompiler.verify()
Logically verifies a component.
@param component the component
@param verifier the verifier object, which can be used to raise validationerrors
@see JRVerifier#getCurrentComponentElement()
-
net.tomp2p.connection.SignatureFactory.verify()
-
net.tomp2p.storage.Data.verify()
-
org.apache.abdera.security.Signature.verify()
Verifies that the digitally signed element is valid
-
org.apache.bcel.verifier.statics.Pass3aVerifier.verify()
-
org.apache.bcel.verifier.structurals.Pass3bVerifier.verify()
-
org.apache.beehive.netui.core.urltemplates.URLTemplate.verify()
Verification will ensure the URL template conforms to a valid format for known tokens and contains the required tokens. It will also parse the tokens and literal data into a list to improve the replacement performance when constructing the final URL string.
Allow clients to define a set of required and known tokens for the template verification. Tokens are expected to be qualified in braces. E.g. {url:path}
If the template does not contain the required tokens or if the format of a known token is incorrect, this method will log the error and return false.
Should call verify after creating a new template.
@param knownTokens the collection of known tokens (Strings) for a valid template.
@param requiredTokens the collection of required tokens (Strings) in a valid template.
@return true if the template conforms to a valid format, otherwise return false.
-
org.apache.cloudstack.network.contrail.model.NetworkPolicyModel.verify()
-
org.apache.cloudstack.network.contrail.model.VirtualNetworkModel.verify()
-
org.apache.commons.configuration2.SynchronizerTestImpl.verify()
Verifies that the passed in methods were called in this order.
@param expMethods the expected methods
-
org.apache.deltaspike.data.impl.meta.verifier.EntityVerifier.verify()
-
org.apache.directory.ldapstudio.browser.core.model.Password.verify()
-
org.apache.geronimo.crypto.jce.PKCS10CertificationRequest.verify()
verify the request using the BC provider.
-
org.apache.geronimo.util.jce.PKCS10CertificationRequest.verify()
verify the request using the BC provider.
-
org.apache.harmony.security.tests.support.MySignature1.verify()
-
org.apache.harmony.security.tests.support.cert.MyCertificate.verify()
Does nothing
-
org.apache.http.conn.ssl.BrowserCompatHostnameVerifier.verify()
-
org.apache.openejb.tomcat.installer.Paths.verify()
Verifies the following:
- {@link #openejbWarDir} is unpacked
- {@link #catalinaHomeDir} is defined
- {@link #catalinaBaseDir} is defined
- {@link #catalinaHomeDir} exists, is a directory and is readable
- {@link #catalinaBaseDir} exists, is a directory and is readable
- {@link #getCatalinaLibDir()} exists, is a directory , is readable and is writable
- {@link #getCatalinaConfDir()} exists, is a directory , is readable and is writable
- {@link #getCatalinaBinDir()} exists, is a directory , is readable
- {@link #getCatalinaShFile()} exists, is a File , is readable and is writable
- {@link #getCatalinaBatFile()()} exists, is a File , is readable and is writable
- {@link #getServerXmlFile()} exists, is a File , is readable and is writable
- {@link #getOpenEJBLibDir()} exists, is a directory and is readable
- {@link #getOpenEJBTomcatLoaderJar()} is not null, exists, is a File and is readable
- {@link #getOpenEJBJavaagentJar()} is not null, exists, is a File and is readable
- {@link #getOpenEJBCoreJar()} is not null, exists, is a File and is readable
- {@link #getOpenEJBJavaagentJar()} exists, is a File and is readable
@return true if verification succeeds
-
org.apache.shale.util.TokenProcessor.verify()
Verify that the specified transaction token value (retrieved from an incoming request) is a valid transaaction token. In addition, remove it from any stored cache of tokens, so that it may not be reused.
@param context
FacesContext
for the current request
@param token Transaction token to be verified
@return
True
if this token has been verified,else
false
-
org.apache.sshd.common.Signature.verify()
Verify against the given signature
@param sig
@return
@throws Exception
-
org.apache.tomee.installer.Paths.verify()
Verifies the following:
- {@link #openejbWarDir} is unpacked
- {@link #catalinaHomeDir} is defined
- {@link #catalinaBaseDir} is defined
- {@link #catalinaHomeDir} exists, is a directory and is readable
- {@link #catalinaBaseDir} exists, is a directory and is readable
- {@link #getCatalinaLibDir()} exists, is a directory , is readable and is writable
- {@link #getCatalinaConfDir()} exists, is a directory , is readable and is writable
- {@link #getCatalinaBinDir()} exists, is a directory , is readable
- {@link #getCatalinaShFile()} exists, is a File , is readable and is writable
- {@link #getCatalinaBatFile()()} exists, is a File , is readable and is writable
- {@link #getServerXmlFile()} exists, is a File , is readable and is writable
- {@link #getOpenEJBLibDir()} exists, is a directory and is readable
- {@link #getOpenEJBTomcatLoaderJar()} is not null, exists, is a File and is readable
- {@link #getOpenEJBJavaagentJar()} is not null, exists, is a File and is readable
- {@link #getOpenEJBCoreJar()} is not null, exists, is a File and is readable
- {@link #getOpenEJBJavaagentJar()} exists, is a File and is readable
@return true if verification succeeds
-
org.apache.tomee.installer.PathsInterface.verify()
-
org.apache.vysper.xmpp.modules.extension.xep0220_server_dailback.DialbackIdGenerator.verify()
-
org.apache.xml.security.algorithms.SignatureAlgorithm.verify()
Proxy method for {@link java.security.Signature#verify(byte[])}which is executed on the internal {@link java.security.Signature} object.
@param signature
@return true if if the signature is valid.
@throws XMLSignatureException
-
org.apache.xml.security.stax.securityToken.InboundSecurityToken.verify()
Verifies the key if applicable
@throws XMLSecurityException if the key couldn't be verified or the key isn't valid
-
org.apache.zookeeper.test.AsyncOps.StringCB.verify()
-
org.aspectj.apache.bcel.verifier.statics.Pass3aVerifier.verify()
-
org.aspectj.apache.bcel.verifier.structurals.Pass3bVerifier.verify()
-
org.aspectj.weaver.patterns.IVerificationRequired.verify()
-
org.bouncycastle.cms.SignerInformation.verify()
verify that the given public key succesfully handles and confirms the signature associated with this signer.
-
org.bouncycastle.jce.PKCS10CertificationRequest.verify()
verify the request using the BC provider.
-
org.bouncycastle.jce.PKCS7SignedData.verify()
Verify the digest
-
org.bouncycastle.jce.netscape.NetscapeCertRequest.verify()
-
org.bouncycastle.ocsp.BasicOCSPResp.verify()
verify the signature against the tbsResponseData object we contain.
-
org.bouncycastle.ocsp.OCSPReq.verify()
verify the signature against the TBSRequest object we contain.
-
org.bouncycastle.openpgp.PGPOnePassSignature.verify()
Verify the calculated signature against the passed in PGPSignature.
@param pgpSig
@return boolean
@throws PGPException
@throws SignatureException
-
org.bouncycastle.openpgp.PGPPBEEncryptedData.verify()
-
org.bouncycastle.openpgp.PGPPublicKeyEncryptedData.verify()
-
org.bouncycastle.openpgp.PGPSignature.verify()
-
org.bouncycastle.pqc.crypto.gmss.util.WinternitzOTSVerify.Verify()
This method computes the public OTS key from the one-time signature of a message. This is *NOT* a complete OTS signature verification, but it suffices for usage with CMSS.
@param message the message
@param signature the one-time signature
@return The public OTS key
-
org.bouncycastle.x509.X509AttributeCertificate.verify()
-
org.bouncycastle.x509.X509V2AttributeCertificate.verify()
-
org.codehaus.plexus.digest.Digester.verify()
Verify that a checksum is correct.
@param file the file to compute the checksum for
@param checksum the checksum to compare to
@throws DigesterException if there was a problem computing the hashcode.
-
org.codehaus.plexus.digest.Md5Digester.verify()
-
org.codehaus.plexus.digest.Sha1Digester.verify()
-
org.drools.compiler.kie.builder.impl.KieProject.verify()
-
org.drools.guvnor.server.util.VerifierRunner.verify()
-
org.easymock.IMocksControl.verify()
Verifies that all expectations were met.
-
org.easymock.MockControl.verify()
Verifies that all expectations have been met. For more information, see the EasyMock documentation.
@throws IllegalStateException if the mock object is in record state.
@throws AssertionError if any expectation has not been met.
-
org.easymock.classextension.IMocksControl.verify()
-
org.ejbca.core.protocol.CVCRequestMessage.verify()
@see org.ejbca.core.protocol.IRequestMessage
-
org.ejbca.core.protocol.PKCS10RequestMessage.verify()
DOCUMENT ME!
@return DOCUMENT ME!
@throws InvalidKeyException DOCUMENT ME!
@throws NoSuchAlgorithmException DOCUMENT ME!
@throws NoSuchProviderException DOCUMENT ME!
-
org.ejbca.core.protocol.scep.ScepRequestMessage.verify()
Verifies signatures, popo etc on the request message. If verification fails the request should be considered invalid.
@return True if verification was successful, false if it failed.
-
org.ejbca.cvc.CVCAuthenticatedRequest.verify()
-
org.ejbca.cvc.CardVerifiableCertificate.verify()
-
org.elasticsearch.action.admin.cluster.repositories.put.PutRepositoryRequest.verify()
Sets whether or not the repository should be verified after creation
-
org.elasticsearch.index.snapshots.IndexShardRepository.verify()
Verifies repository settings on data node
@param verificationToken value returned by {@link org.elasticsearch.repositories.Repository#startVerification()}
-
org.ethereum.crypto.ECKey.verify()
Verifies the given ECDSA signature against the message bytes using the public key bytes.
When using native ECDSA verification, data must be 32 bytes, and no element may be larger than 520 bytes.
@param data Hash of the data to verify.
@param signature signature.
@param pub The public key bytes to use.
-
org.geowebcache.util.MockLockProvider.verify()
-
org.gephi.io.importer.api.Container.verify()
This method must be called after the loading is complete and before unloading. Its aim is to verify data consistency as a whole.
@return true
if container data is consistent, false
otherwise
-
org.globus.gsi.GlobusCredential.verify()
-
org.gudy.azureus2.core3.config.COConfigurationManager.ParameterVerifier.verify()
-
org.hornetq.core.server.cluster.ClusterConnection.verify()
Verifies whether user and password match the ones configured for this ClusterConnection.
@param clusterUser
@param clusterPassword
@return {@code true} if username and password match, {@code false} otherwise.
-
org.infoglue.common.util.cvsclient.MyConnection.verify()
Authenticate with the server. Closes the connection immediately. Clients can use this method to ensure that they are capable of authenticating with the server. If no exception is thrown, you can assume that authentication was successful.
@throws AuthenticationException if the connection with the servercannot be established
-
org.iso_relax.verifier.Verifier.verify()
-
org.jbehave.core.mock.Mock.verify()
Verify all the expectations on this mock
-
org.jbehave.core.model.OutcomesTable.verify()
-
org.jboss.aerogear.crypto.signature.VerifyKey.verify()
-
org.jboss.as.webservices.verification.JwsWebServiceEndpointVerifier.verify()
-
org.jboss.forge.classloader.mock.collisions.ClassWithClassAsParameter.verify()
-
org.jboss.forge.classloader.mock.collisions.ClassWithListAsParameter.verify()
-
org.jboss.resteasy.security.doseta.DKIMSignature.verify()
Headers can be a Map or a Map>. This gives some compatibility with JAX-RS's MultivaluedMap. If a map of lists, every value of each header duplicate will be added.
@param headers
@param body
@param key
@return
@throws java.security.SignatureException
-
org.jboss.resteasy.security.doseta.Verification.verify()
Headers can be a Map or a Map>. This gives some compatibility with JAX-RS's MultivaluedMap. If a map of lists, every value of each header duplicate will be added.
@param signature
@param headers
@param body
@param publicKey
@return map of validated headers and their values
@throws SignatureException if verification fails
-
org.jboss.resteasy.security.smime.PKCS7SignatureInput.verify()
-
org.jboss.resteasy.security.smime.SignedInput.verify()
-
org.jboss.security.srp.SRPClientSession.verify()
@param M2 The server's response to the client's challenge
@returns True if and only if the server's response was correct.
-
org.jboss.security.srp.SRPServerInterface.verify()
Verify the session key hash. The client sends their username and M1 hash to validate completion of the SRP handshake.
@param username, the user ID by which the client is known. This is repeated to simplifythe server session management.
@param M1, the client hash of the session key; M1 = H(H(N) xor H(g) | H(U) | A | B | K)
@return M2, the server hash of the client challenge; M2 = H(A | M1 | K)
@throws SecurityException , thrown if M1 cannot be verified by the server
@throws RemoteException , thrown by remote implementations
-
org.jboss.test.faces.mock.MockFacesEnvironment.verify()
-
org.jboss.verifier.BeanVerifier.verify()
Checks the Enterprise Java Beans found in this Jar for EJB spec compliance (EJB Spec. 1.1). Ensures that the given interfaces and implementation classes implement required methods and follow the contract given in the spec.
@param url URL to the bean jar file
-
org.jboss.ws.extensions.security.SecurityDecoder.verify()
-
org.jbpm.identity.hibernate.IdentitySession.verify()
-
org.jitterbit.integration.data.validation.SimpleValidatorMessageCollector.verify()
-
org.jmock.Mock.verify()
-
org.jmock.dynamic.DynaMock.verify()
-
org.kapott.hbci.passport.HBCIPassportInternal.verify()
-
org.kapott.hbci.security.Sig.verify()
-
org.keyczar.Signer.verify()
-
org.keyczar.UnversionedSigner.verify()
-
org.keyczar.UnversionedVerifier.verify()
Verifies a standard signature on the given byte array of data
@param data The data to verify the signature on
@param signature The signture to verify
@return Whether this is a valid signature
@throws KeyczarException If the signature is malformed or a JCE erroroccurs.
-
org.keyczar.Verifier.verify()
Verifies a signature on the given byte array of data
@param data The data to verify the signature on
@param signature The signture to verify
@return Whether this is a valid signature
@throws KeyczarException If the signature is malformed or a JCE erroroccurs.
-
org.keyczar.interfaces.VerifyingStream.verify()
Verify that the given signautre is a valid signautre on the updated data.
@param signature The signature to verify
@return Whether the given signature is valid.
@throws KeyczarException If a Java JCE error occurs.
-
org.kie.api.runtime.KieContainer.verify()
-
org.kie.internal.utils.KieHelper.verify()
-
org.mockito.InOrder.verify()
Verifies interaction
happened once in order.
Alias to inOrder.verify(mock, times(1))
Example:
InOrder inOrder = inOrder(firstMock, secondMock); inOrder.verify(firstMock).someMethod("was called first"); inOrder.verify(secondMock).someMethod("was called second");
See examples in javadoc for {@link Mockito} class
@param mock to be verified
@return mock object itself
-
org.mockito.internal.verification.api.VerificationMode.verify()
-
org.mockito.verification.VerificationMode.verify()
-
org.mockserver.client.proxy.ProxyClient.verify()
Verify a request has been sent for example: mockServerClient .verify( request() .withPath("/some_path") .withBody("some_request_body") );
@param httpRequest the http request that must be matched for this verification to pass
@throws AssertionError if the request has not been found
-
org.objectstyle.wolips.eomodeler.core.model.EOModel.verify()
-
org.objectstyle.wolips.eomodeler.core.model.EOModelGroup.verify()
-
org.openiaml.verification.crocopat.VerificationEngine.verify()
Verify a given model. Violations can then be obtained by {@link #getViolations()}.
@param model
@return OK if verification was successful; Warning if a violation was found; Error otherwise
@throws VerificationException if verification could not be executed
-
org.openiaml.verification.nusmv.VerificationEngine.verify()
Verify a given model. Violations can then be obtained by {@link #getViolations()}.
@param model the model to check
@param monitor the monitor to notify progress
@return OK if no violations were found; warning if some were found; error if an exception occured; cancel if the monitor was cancelled
@throws VerificationException
-
org.openid4java.consumer.ConsumerManager.verify()
Performs verification on the Authentication Response (assertion) received from the OpenID Provider.
Three verification steps are performed:
- nonce: the same assertion will not be accepted more than once
- signatures: verifies that the message was indeed sent by the OpenID Provider that was contacted earlier after discovery
- discovered information: the information contained in the assertion matches the one obtained during the discovery (the OpenID Provider is authoritative for the claimed identifier; the received assertion is not meaningful otherwise
@param receivingUrl The URL where the Consumer (Relying Party) hasaccepted the incoming message.
@param response ParameterList of the authentication responsebeing verified.
@param discovered Previously discovered information (which cantherefore be trusted) obtained during the discovery phase; this should be stored and retrieved by the RP in the user's session.
@return A VerificationResult, containing a verifiedidentifier; the verified identifier is null if the verification failed).
-
org.openid4java.server.ServerManager.verify()
Responds to a verification request from the consumer.
@param requestParams ParameterList containing the parameters receivedin a verification request from a consumer site.
@return VerificationResponse to be sent back to theconsumer site.
-
org.opensaml.SAMLAssertion.verify()
-
org.picocontainer.ComponentAdapter.verify()
Verify that all dependencies for this adapter can be satisifed. Normally, the adapter should verify this by checking that the associated PicoContainer contains all the needed dependnecies.
@param container the {@link PicoContainer}, that is used to resolve any possible dependencies of the instance.
@throws PicoIntrospectionException if one or more dependencies cannot be resolved.
-
org.powermock.core.spi.MethodInvocationControl.verify()
-
org.rioproject.test.simple.Fork.verify()
-
org.springframework.security.jwt.crypto.sign.MacSigner.verify()
-
org.springframework.security.jwt.crypto.sign.SignatureVerifier.verify()
-
org.terasology.identity.PublicIdentityCertificate.verify()
Verifies that the signedData was created by this certificate's corresponding private certificate, over the given data.
@param data
@param signedData
@return
-
org.vngx.jsch.algorithm.SignatureDSA.verify()
-
org.vngx.jsch.algorithm.SignatureRSA.verify()
-
org.voltdb.licensetool.LicenseApi.verify()
-
org.w3c.tools.resources.DirectoryResource.verify()
Was return false (don't khow why)
-
org.wso2.carbon.identity.provider.openid.ui.client.OpenIDAdminClient.verify()
-
org.xbill.DNS.TSIG.verify()
Verifies a TSIG record on an incoming message. Since this is only called in the context where a TSIG is expected to be present, it is an error if one is not present.
@param m The message
@param b An array containing the message in unparsed form. This isnecessary since TSIG signs the message in wire format, and we can't recreate the exact wire format (with the same name compression).
@param length The length of the message in the array.
@param old If this message is a response, the TSIG from the request
@return The result of the verification (as an Rcode)
@see Rcode
-
org.xbill.DNS.utils.HMAC.verify()
Verifies the data (computes the secure hash and compares it to the input)
@param signature The signature to compare against
@return true if the signature matched, false otherwise
-
picard.illumina.parser.ParameterizedFileUtil.verify()
Given the expected tiles/expected cycles for this file type, return a list of error messages describing any missing/or malformed files
@param expectedTiles An ordered list of tile numbers
@param expectedCycles An ordered list of cycle numbers that may contain gaps
@return A list of error messages for this format
-
pt.webdetails.browserid.BrowserIdVerifier.verify()
Verify if the given assertion is valid
@param assertion The assertion as returned
@param audience
@return
@throws HttpException if an HTTP protocol exception occurs or the service returns a code not in the 200 range.
@throws IOException if a transport error occurs.
@throws JSONException if the result cannot be parsed as JSON markup
-
uk.org.ogsadai.activity.MockInputPipe.verify()
Verifies that all the input data has been consumed and the input has been closed. If not, the test will fail.
-
uk.org.ogsadai.activity.MockOutputPipe.verify()
Verifies that the expected output data has been put into the output and that the output has been closed. If not, the test will fail.