/libcore/luni/src/main/java/org/apache/harmony/security/utils/ |
JarUtils.java | 60 * @param signature - the input stream of signature file to be verified
|
/system/netd/ |
IdletimerController.cpp | 70 * verified with tcpdump. First take a note of the pkts count for the two rules:
|
/dalvik/vm/oo/ |
Object.h | 82 CLASS_ISPREVERIFIED = (1<<16), // class has been pre-verified 131 CLASS_VERIFYING = 4, /* in the process of being verified */ 754 /* has class been verified? */
|
Resolve.cpp | 26 * if a class isn't pre-verified. Those functions must not update the 100 * If the referrer was pre-verified, the resolved class must come 137 "Class ref in pre-verified class resolved to unexpected "
|
/external/chromium_org/chrome/browser/ui/views/website_settings/ |
website_settings_popup_view.cc | 61 // identity was sucessfully verified. 517 // section is only displayed if the site's identity was verified. If the 518 // site's identity was verified, then the headline contains the organization
|
/external/chromium_org/chrome/browser/webdata/ |
autofill_profile_syncable_service.cc | 329 // Verified profiles should never be overwritten by unverified ones. 469 // Unverified profiles should never overwrite verified ones. 474 // Ensure that a verified profile can never revert back to an unverified
|
/external/chromium_org/content/renderer/webcrypto/ |
webcrypto_impl_nss.cc | 272 // Flags are verified at the Blink layer; here the flags are set to all 745 // Flags are verified at the Blink layer; here the flags are set to all 940 // verified.
|
/external/chromium_org/third_party/openssl/openssl/apps/ |
pkcs12.c | 534 /* Exclude verified certificate */ 664 BIO_printf (bio_err, "MAC verified OK\n"); 823 /* Given a single certificate return a verified chain or NULL if error */
|
/external/openssl/apps/ |
pkcs12.c | 534 /* Exclude verified certificate */ 664 BIO_printf (bio_err, "MAC verified OK\n"); 823 /* Given a single certificate return a verified chain or NULL if error */
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_config.h | 77 * verified. This is insecure and a trusted CA certificate should 89 * is verified. This is configured with the following format: 215 * verified. This is insecure and a trusted CA certificate should
|
/frameworks/base/core/tests/coretests/src/android/os/storage/ |
StorageManagerBaseTest.java | 513 Log.i(LOG_TAG, "File " + filename + " successfully verified."); 527 * @param checkContents If true, the contents of the file are actually verified; if false, 549 Log.i(LOG_TAG, "File " + filename + " successfully verified for " + size + " zeros");
|
/external/libmtp/src/ |
music-players.h | 103 // From anonymous SourceForge user, not verified 176 // From Anonymous SourceForge user, NOT VERIFIED TO BE MTP 266 // From anonymous Sourceforge user, not verified to be MTP! 630 // Not verified to be MTP [all...] |
/external/chromium_org/components/autofill/core/browser/ |
personal_data_manager_unittest.cc | [all...] |
/external/mockito/src/org/mockito/ |
Mockito.java | 192 * The consequence is that you cannot use <code>anyObject()</code>, <code>eq()</code> methods outside of verified/stubbed method.
279 * //create inOrder object passing any mocks that need to be verified in order
[all...] |
/packages/providers/ContactsProvider/src/com/android/providers/contacts/aggregation/ |
ContactAggregator.java | 247 boolean verified; field in class:ContactAggregator.DisplayNameCandidate 258 verified = false; [all...] |
/external/openssh/ |
monitor.c | 1325 int verified = 0; local [all...] |
monitor_wrap.c | 441 int verified = 0; local 460 verified = buffer_get_int(&m); 464 return (verified); [all...] |
/frameworks/base/services/java/com/android/server/net/ |
NetworkPolicyManagerService.java | 497 // on background handler thread, and verified 515 // on background handler thread, and verified MANAGE_NETWORK_POLICY 529 // on background handler thread, and verified MANAGE_NETWORK_POLICY 543 // on background handler thread, and verified CONNECTIVITY_INTERNAL 570 // on background handler thread, and verified CONNECTIVITY_INTERNAL [all...] |
/external/bluetooth/bluedroid/stack/bnep/ |
bnep_utils.c | 578 ** message. The destination UUID is verified and response sent 680 ** message. The response code is verified and 777 ** message. The destination UUID is verified and response sent [all...] |
/external/chromium_org/chrome/browser/chromeos/login/ |
existing_user_controller.cc | 476 // Value of AllowNewUser setting is still not verified. 537 // If device policy is not verified yet, this function will be called again [all...] |
/bootable/recovery/ |
verifier.cpp | 202 LOGI("whole-file signature verified against key %d\n", i);
|
/cts/tests/tests/accessibilityservice/src/android/accessibilityservice/cts/ |
AccessibilityEndToEndTest.java | 42 * are generated and their correct dispatch verified.
|
/cts/tests/tests/hardware/src/android/hardware/camera2/cts/ |
ImageReaderTest.java | 62 // number of frame (for streaming requests) to be verified.
|
/external/apache-harmony/auth/src/test/java/common/org/ietf/jgss/ |
OidTest.java | 253 * Two Oid constructors are verified:
|
/external/bison/lib/ |
verify.h | 56 expression of integral type, whose value is later verified to be
|