HomeSort by relevance Sort by last modified time
    Searched full:verified (Results 326 - 350 of 574) sorted by null

<<11121314151617181920>>

  /external/chromium/chrome/common/extensions/docs/examples/apps/hello-php/lib/oauth/
OAuth.php 157 * verified way to the Service Provider, in a manner which is beyond the scope of this
  /external/chromium/chrome/common/extensions/
extension_file_util.cc 249 // an external URL. Background page for hosted apps are verified when the
  /external/chromium/googleurl/src/
url_canon_ip.cc 473 // already verified that each character in the string was a hex digit, and
  /external/chromium/net/socket/
tcp_client_socket_win.cc 675 // POST. I have verified this:
  /external/e2fsprogs/e2fsck/
pass3.c 270 * verified as being connected to the directory tree,
  /external/grub/netboot/
eepro100.c 54 * It is verified that the BIOS initialized everything properly and if
  /external/icu4c/samples/uciter8/
uit_len8.c 512 /* verified index>=4 above */
  /external/icu4c/test/intltest/
plurults.cpp 536 for (int j = 0; ok && j < count; ++j ) { // we've verified count < 4
  /external/icu4c/tools/makeconv/
makeconv.c 813 * ucm_checkBaseExt() verified it.)
  /external/libnfc-nxp/src/
phFriNfc_NdefRecord.h 354 * verified pointers to the individual records within a raw message. A violation of this
  /external/llvm/lib/Object/
COFFObjectFile.cpp 581 // We already verified the section table data, so no need to check again.
  /external/openssl/crypto/modes/asm/
ghash-armv4.pl 18 # cycles. Having verified that gcc 3.4 didn't unroll corresponding
  /external/openssl/crypto/rsa/
rsa.h 109 * to be signed/verified: this allows them to be used. Note: for this to work
  /external/openssl/include/openssl/
rsa.h 109 * to be signed/verified: this allows them to be used. Note: for this to work
  /external/qemu/distrib/sdl-1.2.15/
docs.html 212 Verified 100% compatibility with Windows 7.
  /external/skia/tests/
CanvasTest.cpp 644 // Verified that deferred canvas state is not affected by flushing
    [all...]
  /external/skia/third_party/glu/libtess/
mesh.c 31 ** published by SGI, but has not been independently verified as being
  /external/srtp/doc/
intro.txt 286 can be decrypted and have their authentication verified (using the
  /external/stressapptest/src/
worker.h 755 // not verified.
  /external/valgrind/main/VEX/priv/
guest_amd64_defs.h 205 end should ensure we're only called with verified values.
  /external/valgrind/main/docs/internals/
3_2_BUGSTATUS.txt 10 Vfd = fix has been verified on 3.2.X branch
  /external/wpa_supplicant_6/wpa_supplicant/
eap_testing.txt 12 Supplicant is verified to match with the one received by the (now
  /external/wpa_supplicant_8/hostapd/
hostapd_cli.c 381 "- PIN to be verified\n");
  /external/wpa_supplicant_8/src/eap_peer/
eap_pwd.c 567 wpa_printf(MSG_DEBUG, "EAP-pwd (peer): confirm verified");
  /external/wpa_supplicant_8/wpa_supplicant/
eap_testing.txt 12 Supplicant is verified to match with the one received by the (now

Completed in 1134 milliseconds

<<11121314151617181920>>