Searched
full:verified (Results
426 -
450 of
887) sorted by null
<<11121314151617181920>>
/external/chromium_org/third_party/openssl/openssl/apps/ |
dgst.c | 583 BIO_printf(out, "Verified OK\n");
|
pkeyutl.c | 337 BIO_puts(out, "Signature Verified Successfully\n");
|
/external/chromium_org/third_party/skia/include/gpu/ |
GrTypes.h | 380 * should be verified.
|
/external/chromium_org/third_party/tcmalloc/chromium/src/windows/ |
port.h | 210 // here). However, I've verified that all SpinLocks used in
|
/external/chromium_org/third_party/tcmalloc/vendor/src/windows/ |
port.h | 207 // here). However, I've verified that all SpinLocks used in
|
/external/clang/docs/tools/ |
dump_ast_matchers.py | 31 # Cache for doxygen urls we have already verified.
|
/external/clang/test/Index/ |
annotate-comments.cpp | 151 // Verified that Doxygen attaches these.
|
/external/clang/tools/arcmt-test/ |
arcmt-test.cpp | 299 errs() << "error: '" << I->second << "' was not verified!\n";
|
/external/compiler-rt/lib/sanitizer_common/ |
sanitizer_platform_limits_posix.h | 130 // limit. Verified with a compiler assert in .cc.
|
/external/e2fsprogs/lib/ext2fs/ |
undo_io.c | 309 * have already verified it doesn't exist
|
/external/freetype/src/cff/ |
cf2ft.c | 433 /* the counts and verified that each is an even number */
|
/external/openssl/apps/ |
dgst.c | 583 BIO_printf(out, "Verified OK\n");
|
pkeyutl.c | 337 BIO_puts(out, "Signature Verified Successfully\n");
|
/external/openssl/patches/ |
tls12_digests.patch | 71 * verified Channel ID from the client: a P256 point, (x,y), where
|
/external/skia/include/gpu/ |
GrTypes.h | 380 * should be verified.
|
/external/smack/src/org/xbill/DNS/ |
Message.java | 292 * If this message was signed by a TSIG, was the TSIG verified?
|
/external/valgrind/main/coregrind/m_demangle/ |
ansidecl.h | 150 was so. (Verified versions: 5.7, 6.2, 6.3, 6.5) */
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_psk.c | 247 wpa_printf(MSG_DEBUG, "EAP-PSK: MAC_S verified successfully");
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_ikev2.c | 357 return; /* Should not happen; message already verified */
|
eap_server_tnc.c | 458 return; /* Should not happen; message already verified */
|
eap_server_wsc.c | 368 return; /* Should not happen; message already verified */
|
/external/wpa_supplicant_8/wpa_supplicant/ |
README-Windows.txt | 21 All security modes have been verified to work (at least complete
|
/frameworks/av/media/libstagefright/chromium_http/ |
support.cpp | 320 ALOGV("verified: %d", code);
|
/frameworks/base/core/java/android/printservice/ |
PrinterDiscoverySession.java | 341 * ones, therefore they have to be verified first. You do <strong>not need</strong>
|
/frameworks/base/docs/html/training/beam-files/ |
send-files.jd | 196 Once you've verified that the device supports Android Beam file transfer, add a callback
|
Completed in 845 milliseconds
<<11121314151617181920>>