HomeSort by relevance Sort by last modified time
    Searched full:verified (Results 251 - 275 of 574) sorted by null

<<11121314151617181920>>

  /external/chromium/chrome/browser/metrics/
thread_watcher_unittest.cc 311 // OnCheckResponsiveness has verified the ping-pong mechanism and the watched
  /external/chromium/chrome/browser/ui/gtk/
gtk_custom_menu_item.cc 41 // explicitly set upstack. I verified that v_pointer is still set
  /external/chromium/net/base/
x509_certificate_openssl.cc 486 // correctly verified certs as being from a known root. TODO(joth): if the
  /external/chromium/net/socket/
ssl_server_socket_nss.cc 647 // NSS calls this if an incoming certificate needs to be verified.
  /external/clang/tools/arcmt-test/
arcmt-test.cpp 297 errs() << "error: '" << I->second << "' was not verified!\n";
  /external/e2fsprogs/lib/ext2fs/
undo_io.c 309 * have already verified it doesn't exist
  /external/openssl/apps/
dgst.c 583 BIO_printf(out, "Verified OK\n");
pkeyutl.c 337 BIO_puts(out, "Signature Verified Successfully\n");
  /external/skia/third_party/glu/libtess/
mesh.h 31 ** published by SGI, but has not been independently verified as being
render.c 31 ** published by SGI, but has not been independently verified as being
tess.c 31 ** published by SGI, but has not been independently verified as being
  /external/valgrind/main/coregrind/m_demangle/
ansidecl.h 145 was so. (Verified versions: 5.7, 6.2, 6.3, 6.5) */
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_psk.c 250 wpa_printf(MSG_DEBUG, "EAP-PSK: MAC_S verified successfully");
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_ikev2.c 359 return; /* Should not happen; message already verified */
eap_tnc.c 419 return; /* Should not happen; message already verified */
  /external/wpa_supplicant_8/src/eap_peer/
eap_psk.c 245 wpa_printf(MSG_DEBUG, "EAP-PSK: MAC_S verified successfully");
  /external/wpa_supplicant_8/src/eap_server/
eap_server_ikev2.c 354 return; /* Should not happen; message already verified */
eap_server_tnc.c 458 return; /* Should not happen; message already verified */
eap_server_wsc.c 368 return; /* Should not happen; message already verified */
  /external/wpa_supplicant_8/wpa_supplicant/
README-Windows.txt 21 All security modes have been verified to work (at least complete
  /frameworks/native/opengl/tests/angeles/include/GLES/
gl.h 38 ** published by SGI, but has not been independently verified as being
  /hardware/ti/wlan/wl1271/TWD/FW_Transfer/
txXfer.c 341 Note: This may be removed once the host-slave HW counter functionality is verified */
  /ndk/sources/host-tools/make-3.81/
README.W32 169 I verified all functionality with a slightly modified version
  /packages/apps/Email/src/com/android/email/activity/setup/
AccountSetupIncomingFragment.java 435 // password the user just set for incoming. Use the verified host address to try and
  /packages/apps/Email/tests/src/com/android/emailcommon/internet/
Rfc822OutputTests.java 346 * that is verified by testGetHtmlBody().

Completed in 1458 milliseconds

<<11121314151617181920>>