/external/chromium_org/components/data_reduction_proxy/browser/ |
data_reduction_proxy_tamper_detection.h | 16 // UMA. A response is considered to have been tampered with if the 35 // fingerprints have been tampered with and thus they will not be checked. 41 // tampered with for different carriers. For the fingerprint of the 66 // data reduction proxy, and determines if the response had been tampered 69 // the response has been tampered with.
|
data_reduction_proxy_tamper_detection.cc | 64 // Checks if the Chrome-Proxy header has been tampered with. 70 // Chrome-Proxy header has not been tampered with, and thus other 79 bool tampered = false; local 88 tampered = true; 96 tampered = true; 104 tampered = true; 108 if (!tampered) { 116 return tampered;
|
data_reduction_proxy_tamper_detection_unittest.cc | 250 bool tampered = tamper_detection.ValidateChromeProxyHeader( local 253 EXPECT_EQ(test[i].expected_tampered_with, tampered) << test[i].label; 375 bool tampered = tamper_detection.ValidateViaHeader( local 378 EXPECT_EQ(test[i].expected_tampered_with, tampered) << test[i].label; 488 "Checks tampered requested header values.", 507 bool tampered = tamper_detection.ValidateOtherHeaders( local 510 EXPECT_EQ(test[i].expected_tampered_with, tampered) << test[i].label; 583 bool tampered = tamper_detection.ValidateContentLengthHeader( local 586 EXPECT_EQ(test[i].expected_tampered_with, tampered) << test[i].label;
|
/external/chromium_org/chrome/installer/mac/third_party/bsdiff/ |
README.chromium | 26 that an original file that has been intentionally tampered with will produce
|
/external/chromium_org/crypto/ |
encryptor.h | 74 // tampered ciphertext or a wrong decryption key. But successful decryption
|
/external/chromium_org/content/child/webcrypto/test/ |
aes_gcm_unittest.cc | 214 // Decryption should fail if any of the inputs are tampered with.
|
/external/chromium_org/chrome/browser/prefs/ |
profile_pref_store_manager_unittest.cc | 333 // If preference tracking is supported, the tampered value of kProtectedAtomic 404 // If preference tracking is supported, the tampered value of kProtectedAtomic
|
/external/chromium_org/build/mac/ |
change_mach_o_flags.py | 56 with appropriate protection even when vm.allow_data_exec has been tampered
|
/external/chromium_org/chrome/browser/prefs/tracked/ |
pref_hash_browsertest.cc | 361 // Verifies that nothing is reset when nothing is tampered with. 411 // when nothing is tampered with, even if Chrome itself wrote custom prefs in [all...] |
/frameworks/base/docs/html/google/play/licensing/ |
overview.jd | 119 tampered with or that are spoofed.</p>
|
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/java/util/jar/ |
JarFileTest.java | [all...] |
/system/core/libpixelflinger/tests/arch-arm64/assembler/ |
arm64_assembler_test.cpp | 496 printf("Test %x failed Reg(%d) tampered Expected(0x%"PRIx64")," 612 printf("Test %x failed Reg(%d) tampered" [all...] |
/ndk/sources/host-tools/make-3.81/ |
README.DOS | 251 root of the DJGPP installation tree (unless you've tampered with
|
/external/chromium_org/net/quic/ |
quic_protocol.h | 549 // tampered with. [all...] |
/frameworks/base/docs/html/google/play/billing/ |
billing_integrate.jd | 388 been tampered with or that have been spoofed. You can perform this signature
|
/frameworks/base/docs/html/google/play/billing/v2/ |
api.jd | 492 help detect responses that have been tampered with or that have been spoofed. You can perform this
|
billing_integrate.jd | [all...] |
/external/chromium_org/tools/metrics/histograms/ |
histograms.xml | [all...] |
/external/chromium_org/chrome/app/ |
generated_resources.grd | [all...] |
/external/chromium_org/chrome/app/resources/ |
generated_resources_en-GB.xtb | [all...] |