/prebuilts/gcc/linux-x86/x86/i686-linux-android-4.6/bin/ |
i686-linux-android-objcopy | |
i686-linux-android-strip | |
i686-linux-android-as | |
i686-linux-android-objdump | |
/prebuilts/gcc/linux-x86/x86/i686-linux-android-4.6/i686-linux-android/bin/ |
objcopy | |
strip | |
as | |
objdump | |
/prebuilts/gcc/linux-x86/x86/i686-linux-android-4.6/lib/gcc/i686-linux-android/4.6/gcov-src/ |
gcov-io.h | 34 program. We do hold version information, so that mismatches can be [all...] |
/external/chromium/chrome/browser/sync/engine/ |
syncapi.h | 23 // application's own build, to avoid e.g. mismatches in calling convention, [all...] |
/external/chromium/net/base/ |
x509_certificate_unittest.cc | [all...] |
/external/chromium/net/socket/ |
ssl_client_socket_mac.cc | 861 // and catches hostname/certificate name mismatches. [all...] |
/external/chromium_org/media/ |
media.gyp | 12 # detection of ABI mismatches and prevents silent errors. [all...] |
/external/chromium_org/third_party/libjingle/source/talk/app/webrtc/ |
webrtcsession.cc | 110 // fingerprint. Mismatches, such as replying with a DTLS fingerprint to SDES [all...] |
/external/e2fsprogs/e2fsck/ |
dict.c | 185 * mismatches. It does not check for every nil node being black, because there [all...] |
/libcore/luni/src/main/java/javax/xml/datatype/ |
DatatypeFactory.java | [all...] |
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/bin/ |
i686-linux-as | |
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/i686-linux/bin/ |
as | |
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/bin/ |
i686-linux-as | |
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/i686-linux/bin/ |
as | |
/prebuilts/gcc/linux-x86/mips/mipsel-linux-android-4.6/bin/ |
mipsel-linux-android-run | |
/external/clang/lib/CodeGen/ |
CGCall.cpp | [all...] |
/external/clang/lib/Sema/ |
SemaTemplateInstantiate.cpp | [all...] |
/external/chromium_org/chrome/app/ |
google_chrome_strings.grd | 208 In this case, the address listed in the certificate does not match the address of the website your browser tried to go to. One possible reason for this is that your communications are being intercepted by an attacker who is presenting a certificate for a different website, which would cause a mismatch. Another possible reason is that the server is set up to return the same certificate for multiple websites, including the one you are attempting to visit, even though that certificate is not valid for all of those websites. Google Chrome can say for sure that you reached <strong><ph name="DOMAIN2">$1<ex>paypal.com</ex></ph></strong>, but cannot verify that that is the same site as <strong><ph name="DOMAIN">$2<ex>www.paypal.com</ex></ph></strong> which you intended to reach. If you proceed, Chrome will not check for any further name mismatches. [all...] |
/external/chromium_org/third_party/JSON/JSON-2.59/ |
README | [all...] |