HomeSort by relevance Sort by last modified time
    Searched full:verified (Results 426 - 450 of 887) sorted by null

<<11121314151617181920>>

  /external/chromium_org/third_party/openssl/openssl/apps/
dgst.c 583 BIO_printf(out, "Verified OK\n");
pkeyutl.c 337 BIO_puts(out, "Signature Verified Successfully\n");
  /external/chromium_org/third_party/skia/include/gpu/
GrTypes.h 380 * should be verified.
  /external/chromium_org/third_party/tcmalloc/chromium/src/windows/
port.h 210 // here). However, I've verified that all SpinLocks used in
  /external/chromium_org/third_party/tcmalloc/vendor/src/windows/
port.h 207 // here). However, I've verified that all SpinLocks used in
  /external/clang/docs/tools/
dump_ast_matchers.py 31 # Cache for doxygen urls we have already verified.
  /external/clang/test/Index/
annotate-comments.cpp 151 // Verified that Doxygen attaches these.
  /external/clang/tools/arcmt-test/
arcmt-test.cpp 299 errs() << "error: '" << I->second << "' was not verified!\n";
  /external/compiler-rt/lib/sanitizer_common/
sanitizer_platform_limits_posix.h 130 // limit. Verified with a compiler assert in .cc.
  /external/e2fsprogs/lib/ext2fs/
undo_io.c 309 * have already verified it doesn't exist
  /external/freetype/src/cff/
cf2ft.c 433 /* the counts and verified that each is an even number */
  /external/openssl/apps/
dgst.c 583 BIO_printf(out, "Verified OK\n");
pkeyutl.c 337 BIO_puts(out, "Signature Verified Successfully\n");
  /external/openssl/patches/
tls12_digests.patch 71 * verified Channel ID from the client: a P256 point, (x,y), where
  /external/skia/include/gpu/
GrTypes.h 380 * should be verified.
  /external/smack/src/org/xbill/DNS/
Message.java 292 * If this message was signed by a TSIG, was the TSIG verified?
  /external/valgrind/main/coregrind/m_demangle/
ansidecl.h 150 was so. (Verified versions: 5.7, 6.2, 6.3, 6.5) */
  /external/wpa_supplicant_8/src/eap_peer/
eap_psk.c 247 wpa_printf(MSG_DEBUG, "EAP-PSK: MAC_S verified successfully");
  /external/wpa_supplicant_8/src/eap_server/
eap_server_ikev2.c 357 return; /* Should not happen; message already verified */
eap_server_tnc.c 458 return; /* Should not happen; message already verified */
eap_server_wsc.c 368 return; /* Should not happen; message already verified */
  /external/wpa_supplicant_8/wpa_supplicant/
README-Windows.txt 21 All security modes have been verified to work (at least complete
  /frameworks/av/media/libstagefright/chromium_http/
support.cpp 320 ALOGV("verified: %d", code);
  /frameworks/base/core/java/android/printservice/
PrinterDiscoverySession.java 341 * ones, therefore they have to be verified first. You do <strong>not need</strong>
  /frameworks/base/docs/html/training/beam-files/
send-files.jd 196 Once you've verified that the device supports Android Beam file transfer, add a callback

Completed in 845 milliseconds

<<11121314151617181920>>