HomeSort by relevance Sort by last modified time
    Searched full:trust (Results 176 - 200 of 396) sorted by null

1 2 3 4 5 6 78 91011>>

  /dalvik/vm/analysis/
VfyBasicBlock.cpp 192 /* these values have already been verified, so we can trust them */
  /external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/cert/
TestUtils.java 127 throw new RuntimeException("Could not create trust anchor set");
  /external/chromium/chrome/browser/chromeos/login/
login_performer.cc 276 // trust whitelist returned by PrefService. So make separate check.
  /external/chromium/chrome/browser/chromeos/
user_cros_settings_provider.cc 296 // Do not trust before fetching complete.
  /external/chromium/third_party/libjingle/source/talk/base/
opensslstreamadapter.cc 291 // Don't trust OpenSSL with zero byte reads
  /external/icu4c/i18n/
japancal.cpp 327 // TODO do we assume we can trust 'era'? What if it is denormalized?
  /external/jmonkeyengine/engine/src/core/com/jme3/app/
Application.java 596 //up that I don't trust my eyes. -pspeed
  /external/jsilver/src/com/google/streamhtmlparser/util/
HtmlUtils.java 191 * with "on" which is not exactly correct but we trust a developer to
  /external/llvm/lib/CodeGen/
MachineCopyPropagation.cpp 314 // since we don't want to trust live-in lists.
  /external/nist-sip/java/gov/nist/javax/sip/
SipStackImpl.java 409 * trust store will default to the same store file. A password must be provided
414 * The trust store can be changed, to a separate file with the following
419 * If the trust store property is provided the password on the trust store must
    [all...]
  /external/oprofile/opjitconv/
opjitconv.c 271 * We should not trust symbolic links because we only produce normal dump
  /external/protobuf/java/src/main/java/com/google/protobuf/
ByteString.java 305 // We trust CodedInputStream not to modify the bytes, or to give anyone
  /external/replicaisland/res/values/
kabocha.xml 150 I underestimated you, my little friend. Your capabilities have far surpassed even my most optimistic projections. Still, you are hardwired to follow my command. And besides, Rokudou is a soulless monster. What makes you think you can trust him?
  /external/skia/src/core/
SkGlyphCache.cpp 402 // don't trust that the low bits of checksum vary enough, so...
  /external/skia/src/images/
SkImageDecoder_libico.cpp 369 #if 1 // don't trust the alphaBit for 32bit images <mrr>
  /external/v8/test/cctest/
test-log-stack-tracer.cc 371 // so we can't trust ebp/rbp.
  /external/webkit/Source/WebCore/platform/network/mac/
WebCoreURLResponse.mm 43 // Otherwise, we'll trust the server.
  /external/webkit/Source/WebKit/mac/History/
WebHistoryItem.mm 364 // Can't trust data on disk, and we've had at least one report of this (<rdar://6572300>).
  /external/webkit/Source/WebKit/win/
WebHistoryItem.cpp 127 // Can't trust data on disk, and we've had at least one report of this (<rdar://6572300>).
  /frameworks/base/core/java/android/view/
ViewParent.java 223 * positioned onto the screen. {@link ViewGroup}s overriding this can trust
  /frameworks/base/docs/html/distribute/googleplay/about/
visibility.jd 212 of all of your apps. For users, the badge signifies an additional level of trust
  /packages/apps/Email/emailcommon/src/com/android/emailcommon/provider/
HostAuth.java 53 public static final int FLAG_TRUST_ALL = 0x08; // Trust all certificates
  /system/core/adb/
fdevent.c 388 // Can't trust the FD sets after an error.
  /system/core/run-as/
package.c 40 * - Do not trust user input and/or the filesystem whenever possible.
  /external/chromium/net/base/
dnssec_chain_verifier.cc 93 The verifier enters ., it already trusts the long-term root key and both root keys are presented in order to extend the trust to the smaller root key.
550 // entry key is the DNS root key that we already know and trust. Additionally,

Completed in 526 milliseconds

1 2 3 4 5 6 78 91011>>