/external/chromium_org/sandbox/win/src/ |
interception_agent.cc | 123 VERIFY(PatchDll(dll_info, dlls_[i]));
|
sandbox_nt_util.cc | 172 // Physically reads or writes from memory to verify that (at this time), it is 570 VERIFY(g_nt.RtlFreeHeap(sandbox::g_heap, 0, memory));
|
/external/chromium_org/third_party/libjingle/source/talk/base/ |
messagequeue.cc | 307 VERIFY(0 != ++dmsgq_next_num_);
|
physicalsocketserver.cc | 128 VERIFY(0 == getsockopt(s_, SOL_SOCKET, SO_TYPE, (SockOptArg)&type, &len)); 572 if (VERIFY(1 == write(afd_[1], b, sizeof(b)))) { 589 VERIFY(1 == read(afd_[0], b, sizeof(b))); [all...] |
socketadapters.cc | 191 VERIFY(sizeof(kSslClientHello) ==
|
/external/chromium_org/third_party/libjingle/source/talk/session/tunnel/ |
securetunnelsessionclient.cc | 383 VERIFY(channel_->Connect(
|
/external/eigen/test/eigen2/ |
eigen2_hyperplane.cpp | 112 VERIFY(line_u.coeffs().isApprox(converted_coeffs));
|
/external/eigen/test/ |
geo_hyperplane.cpp | 113 VERIFY(line_u.coeffs().isApprox(converted_coeffs));
|
mapstaticmethods.cpp | 143 VERIFY(true); // just to avoid 'unused function' warning
|
product_notemporary.cpp | 26 VERIFY( (#XPR) && nb_temporaries==N ); \
|
geo_transformations.cpp | 69 VERIFY((t0 * t1).matrix().isIdentity(test_precision<Scalar>())); 180 VERIFY((t0 * t1).matrix().isIdentity(test_precision<Scalar>())); 260 VERIFY( (t20.fromPositionOrientationScale(v20,a,v21)
|
/external/eigen/unsupported/test/ |
matrix_function.cpp | 15 #define VERIFY_IS_APPROX_ABS(a, b) VERIFY(test_isApprox_abs(a, b))
|
/external/chromium_org/third_party/openssl/openssl/crypto/des/ |
des.c | 110 #define VERIFY 1 279 if (des_read_pw_string(key,KEYSIZB+1,"Enter key:",eflag?VERIFY:0))
|
/external/openssl/crypto/des/ |
des.c | 110 #define VERIFY 1 279 if (des_read_pw_string(key,KEYSIZB+1,"Enter key:",eflag?VERIFY:0))
|
/external/chromium/third_party/libjingle/source/talk/base/ |
physicalsocketserver.cc | 126 VERIFY(0 == getsockopt(s_, SOL_SOCKET, SO_TYPE, (SockOptArg)&type, &len)); 541 if (VERIFY(1 == write(afd_[1], b, sizeof(b)))) { 558 VERIFY(1 == read(afd_[0], b, sizeof(b))); [all...] |
socketadapters.cc | 191 VERIFY(sizeof(kSslClientHello) ==
|
/frameworks/av/media/libmedia/ |
IDrm.cpp | 54 VERIFY, 371 virtual status_t verify(Vector<uint8_t> const &sessionId, function in struct:android::BpDrm 384 remote()->transact(VERIFY, data, &reply); 713 case VERIFY: 722 uint32_t result = verify(sessionId, keyId, message, signature, match);
|
/external/chromium_org/third_party/libjingle/source/talk/app/webrtc/ |
localvideosource.cc | 436 if (VERIFY(state_ != new_state)) {
|
mediastreamsignaling.cc | 817 if (!VERIFY(data_channel_it != data_channels_.end())) { [all...] |
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/ |
stun.cc | 235 VERIFY(AddAttribute(msg_integrity_attr)); 296 VERIFY(AddAttribute(fingerprint_attr));
|
/external/chromium_org/third_party/libjingle/source/talk/sound/ |
pulseaudiosoundsystem.cc | 259 VERIFY(success); 619 VERIFY(success); [all...] |
/system/security/keystore/ |
IKeystoreService.cpp | 382 virtual int32_t verify(const String16& name, const uint8_t* in, size_t inLength, function in class:android::BpKeystoreService 396 status_t status = remote()->transact(BnKeystoreService::VERIFY, data, &reply); 398 ALOGD("verify() could not contact remote: %d\n", status); 404 ALOGD("verify() caught exception %d\n", err); 773 case VERIFY: { 792 bool ret = verify(name, (const uint8_t*) in, (size_t) inSize, (const uint8_t*) sig,
|
/external/chromium_org/rlz/lib/ |
rlz_lib.cc | 331 // Verify the RLZ length. 340 VERIFY(strlen(new_rlz) == rlz_length);
|
/external/chromium_org/third_party/libjingle/source/talk/session/media/ |
channel.cc | 528 VERIFY(SetDtlsSrtpCiphers(rtcp_transport_channel_, true)); [all...] |
/external/zlib/src/ |
make_vms.com | 258 $ V = 'F$Verify(0) 289 $ VV=F$VERIFY(0) 292 $ VV='F$Verify(VV) 294 $ If V Then Set Verify
|