HomeSort by relevance Sort by last modified time
    Searched full:verification (Results 326 - 350 of 1049) sorted by null

<<11121314151617181920>>

  /external/vboot_reference/tests/
vb20_rsa_padding_tests.c 59 /* All other signatures should fail verification. */
  /frameworks/base/core/java/org/apache/http/conn/ssl/
AllowAllHostnameVerifier.java 35 * The ALLOW_ALL HostnameVerifier essentially turns hostname verification
  /frameworks/base/docs/html/google/play/licensing/
index.jd 54 <dd>Provides a step-by-step guide to add licensing verification to your application.</dd>
  /frameworks/compile/libbcc/tests/debuginfo/
lit.site.cfg 100 lit.note('using verification script: %r' % config.test_bcc_debuginfo)
  /libcore/luni/src/test/java/org/apache/harmony/crypto/tests/support/
MyExemptionMechanismSpi.java 36 * Additional class for verification ExemptionMechanismSpi
  /libcore/support/src/test/java/org/apache/harmony/security/tests/support/
MyKeyStoreSpi.java 41 * Additional class for KeyStoreSpi and KeyStore verification
MySSLContextSpi.java 36 * Additional class for verification of SSLContextSpi and SSLContext
  /libcore/support/src/test/java/org/apache/harmony/security/tests/support/cert/
MyCertificateFactorySpi.java 40 * Additional class for verification CertificateFactorySpi and
  /libcore/support/src/test/java/org/apache/harmony/xnet/tests/support/
MySSLContextSpi.java 36 * Additional class for verification of SSLContextSpi and SSLContext
  /packages/apps/PackageInstaller/src/com/android/packageinstaller/
InstallFlowAnalytics.java 227 /** Sets whether app verification is enabled. */
232 /** Gets whether app verification is enabled. */
450 // If this user has consented to app verification, augment the logged event with the hash of
563 * Checks whether the user has consented to app verification.
  /external/deqp/modules/gles3/functional/
es3fTextureShadowTests.cpp 136 log << TestLog::Message << "ERROR: Result verification failed, got " << numFailedPixels << " invalid pixels!" << TestLog::EndMessage;
138 log << TestLog::ImageSet("VerifyResult", "Verification result")
379 m_testCtx.getLog() << TestLog::Message << "Warning: Verification assuming high-quality PCF filtering failed." << TestLog::EndMessage;
390 m_testCtx.getLog() << TestLog::Message << "ERROR: Verification against low precision requirements failed, failing test case." << TestLog::EndMessage;
391 m_testCtx.setTestResult(QP_TEST_RESULT_FAIL, "Image verification failed");
669 m_testCtx.getLog() << TestLog::Message << "Warning: Verification assuming high-quality PCF filtering failed." << TestLog::EndMessage;
680 m_testCtx.getLog() << TestLog::Message << "ERROR: Verification against low precision requirements failed, failing test case." << TestLog::EndMessage;
681 m_testCtx.setTestResult(QP_TEST_RESULT_FAIL, "Image verification failed");
    [all...]
  /bootable/recovery/
install.cpp 202 // Give verification half the progress bar...
239 LOGE("signature verification failed\n");
  /build/tools/zipalign/
ZipAlign.cpp 181 fprintf(stderr, "Unable to open '%s' for verification\n", fileName);
215 printf("Verification %s\n", foundBad ? "FAILED" : "succesful");
  /cts/tests/tests/media/src/android/media/cts/
MediaPlayerTestBase.java 222 * @param width width of the video to verify, or null to skip verification
223 * @param height height of the video to verify, or null to skip verification
  /external/google-breakpad/src/testing/gtest/include/gtest/
gtest-spi.h 124 // The verification of the assertion is done correctly even when the statement
184 // The verification of the assertion is done correctly even when the statement
  /external/gtest/include/gtest/
gtest-spi.h 124 // The verification of the assertion is done correctly even when the statement
184 // The verification of the assertion is done correctly even when the statement
  /external/guava/guava/src/com/google/common/base/
Verify.java 64 * autoboxing and varargs array creation may happen as well, even when the verification succeeds and
65 * the message ends up unneeded. Performance-sensitive verification checks should continue to use
  /external/llvm/lib/CodeGen/
RegAllocBase.cpp 41 // Temporary verification option until we can put verification inside
  /external/llvm/utils/unittest/googletest/include/gtest/
gtest-spi.h 125 // The verification of the assertion is done correctly even when the statement
185 // The verification of the assertion is done correctly even when the statement
  /external/mesa3d/src/gtest/include/gtest/
gtest-spi.h 124 // The verification of the assertion is done correctly even when the statement
184 // The verification of the assertion is done correctly even when the statement
  /external/protobuf/gtest/include/gtest/
gtest-spi.h 124 // The verification of the assertion is done correctly even when the statement
184 // The verification of the assertion is done correctly even when the statement
  /external/smali/smali/src/test/resources/LexerTest/
InstructionTest.tokens 61 INSTRUCTION_FORMAT20bc("throw-verification-error")
215 INSTRUCTION_FORMAT20bc("throw-verification-error")
  /external/vboot_reference/futility/
cmd_vbutil_firmware.c 281 " skipping body verification.\n");
289 printf("Body verification succeeded.\n");
  /frameworks/base/docs/html/training/articles/
security-ssl.jd 20 <li><a href="#CommonHostnameProbs">Common Problems with Hostname Verification</a></li>
337 <h2 id="CommonHostnameProbs">Common Problems with Hostname Verification</h2>
393 <p>If you are still sure you want to override hostname verification, here is an example
419 <p>But remember, if you find yourself replacing hostname verification, especially
435 far to deal with certificate verification issues also apply to {@link javax.net.ssl.SSLSocket}.
444 {@link javax.net.ssl.SSLSocket} <strong>does not</strong> perform hostname verification. It is
445 up the your app to do its own hostname verification, preferably by calling {@link
471 // we have performed hostname verification, so it is safe to proceed.
  /frameworks/base/keystore/java/android/security/keystore/
KeyProtection.java 111 * <p><h3>Example: EC key pair for signing/verification using ECDSA</h3>
114 * digests. The use of public key is unrestricted, thus permitting signature verification using any
140 * <p><h3>Example: RSA key pair for signing/verification using PKCS#1 padding</h3>
145 * verification using any padding schemes and digests, and without user authentication. Both the
256 * Gets the time instant after which the key is no long valid for decryption and verification.
467 * verification.
507 * <p>This must be specified for RSA keys which are used for signing/verification.
523 * <p>This must be specified for signing/verification keys and RSA encryption/decryption
    [all...]

Completed in 317 milliseconds

<<11121314151617181920>>