Searched
full:verified (Results
251 -
275 of
574) sorted by null
<<11121314151617181920>>
/external/chromium/chrome/browser/metrics/ |
thread_watcher_unittest.cc | 311 // OnCheckResponsiveness has verified the ping-pong mechanism and the watched
|
/external/chromium/chrome/browser/ui/gtk/ |
gtk_custom_menu_item.cc | 41 // explicitly set upstack. I verified that v_pointer is still set
|
/external/chromium/net/base/ |
x509_certificate_openssl.cc | 486 // correctly verified certs as being from a known root. TODO(joth): if the
|
/external/chromium/net/socket/ |
ssl_server_socket_nss.cc | 647 // NSS calls this if an incoming certificate needs to be verified.
|
/external/clang/tools/arcmt-test/ |
arcmt-test.cpp | 297 errs() << "error: '" << I->second << "' was not verified!\n";
|
/external/e2fsprogs/lib/ext2fs/ |
undo_io.c | 309 * have already verified it doesn't exist
|
/external/openssl/apps/ |
dgst.c | 583 BIO_printf(out, "Verified OK\n");
|
pkeyutl.c | 337 BIO_puts(out, "Signature Verified Successfully\n");
|
/external/skia/third_party/glu/libtess/ |
mesh.h | 31 ** published by SGI, but has not been independently verified as being
|
render.c | 31 ** published by SGI, but has not been independently verified as being
|
tess.c | 31 ** published by SGI, but has not been independently verified as being
|
/external/valgrind/main/coregrind/m_demangle/ |
ansidecl.h | 145 was so. (Verified versions: 5.7, 6.2, 6.3, 6.5) */
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_psk.c | 250 wpa_printf(MSG_DEBUG, "EAP-PSK: MAC_S verified successfully");
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_ikev2.c | 359 return; /* Should not happen; message already verified */
|
eap_tnc.c | 419 return; /* Should not happen; message already verified */
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_psk.c | 245 wpa_printf(MSG_DEBUG, "EAP-PSK: MAC_S verified successfully");
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_ikev2.c | 354 return; /* Should not happen; message already verified */
|
eap_server_tnc.c | 458 return; /* Should not happen; message already verified */
|
eap_server_wsc.c | 368 return; /* Should not happen; message already verified */
|
/external/wpa_supplicant_8/wpa_supplicant/ |
README-Windows.txt | 21 All security modes have been verified to work (at least complete
|
/frameworks/native/opengl/tests/angeles/include/GLES/ |
gl.h | 38 ** published by SGI, but has not been independently verified as being
|
/hardware/ti/wlan/wl1271/TWD/FW_Transfer/ |
txXfer.c | 341 Note: This may be removed once the host-slave HW counter functionality is verified */
|
/ndk/sources/host-tools/make-3.81/ |
README.W32 | 169 I verified all functionality with a slightly modified version
|
/packages/apps/Email/src/com/android/email/activity/setup/ |
AccountSetupIncomingFragment.java | 435 // password the user just set for incoming. Use the verified host address to try and
|
/packages/apps/Email/tests/src/com/android/emailcommon/internet/ |
Rfc822OutputTests.java | 346 * that is verified by testGetHtmlBody().
|
Completed in 1458 milliseconds
<<11121314151617181920>>