/external/llvm/lib/TableGen/ |
StringMatcher.cpp | 49 // If we have verified that the entire string matches, we're done: output the
|
/external/open-vcdiff/src/ |
instruction_map.h | 45 // verified that code_table_data->Validate() returned true before
|
/external/openssl/crypto/pkcs7/ |
dec.c | 187 fprintf(stderr,"Signature verified\n");
|
/external/webrtc/test/testsupport/ |
fileutils_unittest.cc | 173 // verified the result confirms with the specified documentation for the
|
/libcore/luni/src/main/java/org/apache/harmony/security/utils/ |
JarUtils.java | 60 * @param signature - the input stream of signature file to be verified
|
/system/netd/ |
IdletimerController.cpp | 70 * verified with tcpdump. First take a note of the pkts count for the two rules:
|
/dalvik/vm/oo/ |
Object.h | 82 CLASS_ISPREVERIFIED = (1<<16), // class has been pre-verified 131 CLASS_VERIFYING = 4, /* in the process of being verified */ 754 /* has class been verified? */
|
Resolve.cpp | 26 * if a class isn't pre-verified. Those functions must not update the 100 * If the referrer was pre-verified, the resolved class must come 137 "Class ref in pre-verified class resolved to unexpected "
|
/external/chromium_org/chrome/browser/ui/views/website_settings/ |
website_settings_popup_view.cc | 60 // identity was sucessfully verified. 527 // section is only displayed if the site's identity was verified. If the 528 // site's identity was verified, then the headline contains the organization
|
/external/chromium_org/chrome/browser/webdata/ |
autofill_profile_syncable_service.cc | 329 // Verified profiles should never be overwritten by unverified ones. 469 // Unverified profiles should never overwrite verified ones. 474 // Ensure that a verified profile can never revert back to an unverified
|
/external/chromium_org/components/autofill/core/browser/ |
credit_card_unittest.cc | 211 // Try again, but with only the original card having a verified origin. 223 // Try again, but with only the new card having a verified origin. 233 // Try again, with both cards having a verified origin.
|
personal_data_manager_unittest.cc | [all...] |
personal_data_manager.cc | 750 // whereas verified profiles should only ever be overwritten by verified 752 // verified profile, just drop it. [all...] |
/external/chromium_org/third_party/openssl/openssl/apps/ |
pkcs12.c | 534 /* Exclude verified certificate */ 664 BIO_printf (bio_err, "MAC verified OK\n"); 823 /* Given a single certificate return a verified chain or NULL if error */
|
/external/openssl/apps/ |
pkcs12.c | 534 /* Exclude verified certificate */ 664 BIO_printf (bio_err, "MAC verified OK\n"); 823 /* Given a single certificate return a verified chain or NULL if error */
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_config.h | 77 * verified. This is insecure and a trusted CA certificate should 89 * is verified. This is configured with the following format: 215 * verified. This is insecure and a trusted CA certificate should
|
/frameworks/base/core/tests/coretests/src/android/os/storage/ |
StorageManagerBaseTest.java | 513 Log.i(LOG_TAG, "File " + filename + " successfully verified."); 527 * @param checkContents If true, the contents of the file are actually verified; if false, 549 Log.i(LOG_TAG, "File " + filename + " successfully verified for " + size + " zeros");
|
/external/libmtp/src/ |
music-players.h | 103 // From anonymous SourceForge user, not verified 176 // From Anonymous SourceForge user, NOT VERIFIED TO BE MTP 266 // From anonymous Sourceforge user, not verified to be MTP! 630 // Not verified to be MTP [all...] |
/external/mockito/src/org/mockito/ |
Mockito.java | 192 * The consequence is that you cannot use <code>anyObject()</code>, <code>eq()</code> methods outside of verified/stubbed method.
279 * //create inOrder object passing any mocks that need to be verified in order
[all...] |
/packages/providers/ContactsProvider/src/com/android/providers/contacts/aggregation/ |
ContactAggregator.java | 247 boolean verified; field in class:ContactAggregator.DisplayNameCandidate 258 verified = false; [all...] |
/external/openssh/ |
monitor.c | 1325 int verified = 0; local [all...] |
monitor_wrap.c | 441 int verified = 0; local 460 verified = buffer_get_int(&m); 464 return (verified); [all...] |
/frameworks/base/services/java/com/android/server/net/ |
NetworkPolicyManagerService.java | 497 // on background handler thread, and verified 515 // on background handler thread, and verified MANAGE_NETWORK_POLICY 529 // on background handler thread, and verified MANAGE_NETWORK_POLICY 543 // on background handler thread, and verified CONNECTIVITY_INTERNAL 570 // on background handler thread, and verified CONNECTIVITY_INTERNAL [all...] |
/external/bluetooth/bluedroid/stack/bnep/ |
bnep_utils.c | 578 ** message. The destination UUID is verified and response sent 680 ** message. The response code is verified and 777 ** message. The destination UUID is verified and response sent [all...] |
/external/chromium_org/chrome/browser/chromeos/login/ |
existing_user_controller.cc | 503 // Value of AllowNewUser setting is still not verified. 564 // If device policy is not verified yet, this function will be called again [all...] |