/external/smali/dexlib/src/main/java/org/jf/dexlib/Code/Analysis/ |
MethodAnalyzer.java | 61 private static final int VERIFIED = 2; 128 return analyzerState == VERIFIED; 304 if (analyzerState == VERIFIED) { 305 //we've already verified the bytecode. nothing to do 347 analyzerState = VERIFIED; [all...] |
/external/v8/src/arm/ |
stub-cache-arm.cc | [all...] |
/external/v8/src/mips/ |
stub-cache-mips.cc | [all...] |
/cts/apps/CtsVerifier/res/values/ |
strings.xml | 323 <string name="nfc_hce_offhost_emulator_help">This tests enables a service that declares some AIDs to reside off-host. This test only needs to be passed if your device has a secure element (either embedded or UICC.). The responses from the secure element are not verified by the test - it is up to the tester to verify the responses are as expected.</string> 327 <string name="nfc_hce_on_and_offhost_emulator_help">This tests enables a service that declares some AIDs to reside off-host, and another service that runs on host. It then first sends an APDU sequence that goes off-host, and subsequently some APDUs that should go to the on-host service. This test only needs to be passed if your device has a secure element (either embedded or UICC.). The pass button will be enabled if the on-host sequence is performed as expected. The responses from the secure element are not verified by the test - it is up to the tester to verify the responses are as expected. </string> [all...] |
/dalvik/dexdump/ |
DexDump.cpp | 277 "VERIFIED", /* 0x10000 */ [all...] |
/dalvik/vm/ |
Init.cpp | 122 dvmFprintf(stderr, " -Xdexopt:{none,verified,all,full}\n"); [all...] |
/external/chromium/net/socket/ |
ssl_client_socket_nss.cc | 450 true /* DNSSEC verified */, server_cert_nss, verifier.rrdatas()); [all...] |
/external/chromium_org/net/socket/ |
ssl_client_socket_unittest.cc | [all...] |
tcp_client_socket_win.cc | 59 // POST. I have verified this: [all...] |
/external/wpa_supplicant_8/src/eapol_supp/ |
eapol_supp_sm.c | 558 * transitions are verified only after eapNoResp. They are 733 wpa_printf(MSG_DEBUG, "EAPOL: EAPOL-Key key signature verified"); [all...] |
/ndk/docs/opensles/ |
index.html | 284 with Android OpenSL ES has not been verified. 346 <code>rtsp:</code> is not verified. [all...] |
/cts/apps/CtsVerifier/ |
AndroidManifest.xml | 454 <!-- Disable the test until calibration routine is verified --> [all...] |
/dalvik/vm/analysis/ |
Optimize.cpp | 138 * This is not expected to fail if the class was successfully verified. [all...] |
/dalvik/vm/mterp/c/ |
gotoTargets.cpp | 487 #if 0 /* impossible in optimized + verified code */ [all...] |
/dalvik/vm/mterp/mips/ |
footer.S | 319 * r0 <= pJitProfTable (verified non-NULL) [all...] |
/external/bluetooth/bluedroid/bta/ag/ |
bta_ag_sco.c | 545 /* To be verified with stable 2049 boards */ [all...] |
/external/bluetooth/bluedroid/bta/av/ |
bta_av_main.c | 647 /* no need to verify the function pointer here. it's verified prior */ [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
CertPathValidatorUtilities.java | [all...] |
/external/chromium/chrome/browser/ |
enumerate_modules_model_win.cc | 126 // Said to belong to Killer NIC from BigFoot Networks (not verified). Versions [all...] |
/external/chromium/testing/gtest/test/ |
gtest-death-test_test.cc | [all...] |
/external/chromium_org/cc/layers/ |
layer_unittest.cc | 489 // This is just initialization, but SetNeedsCommit behavior is verified anyway [all...] |
/external/chromium_org/chrome/browser/ |
enumerate_modules_model_win.cc | 148 // Said to belong to Killer NIC from BigFoot Networks (not verified). Versions [all...] |
/external/chromium_org/remoting/host/ |
remoting_me2me_host.cc | 735 // TODO(sergeyu): Currently polices are verified only when they are loaded. [all...] |
/external/chromium_org/skia/ext/ |
vector_canvas_unittest.cc | 445 // verified to be identical.
|
/external/chromium_org/testing/gtest/test/ |
gtest_output_test_.cc | 31 // various conditions. The output will then be verified by
|