OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:verification
(Results
326 - 350
of
1049
) sorted by null
<<
11
12
13
14
15
16
17
18
19
20
>>
/external/vboot_reference/tests/
vb20_rsa_padding_tests.c
59
/* All other signatures should fail
verification
. */
/frameworks/base/core/java/org/apache/http/conn/ssl/
AllowAllHostnameVerifier.java
35
* The ALLOW_ALL HostnameVerifier essentially turns hostname
verification
/frameworks/base/docs/html/google/play/licensing/
index.jd
54
<dd>Provides a step-by-step guide to add licensing
verification
to your application.</dd>
/frameworks/compile/libbcc/tests/debuginfo/
lit.site.cfg
100
lit.note('using
verification
script: %r' % config.test_bcc_debuginfo)
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/support/
MyExemptionMechanismSpi.java
36
* Additional class for
verification
ExemptionMechanismSpi
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/
MyKeyStoreSpi.java
41
* Additional class for KeyStoreSpi and KeyStore
verification
MySSLContextSpi.java
36
* Additional class for
verification
of SSLContextSpi and SSLContext
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/cert/
MyCertificateFactorySpi.java
40
* Additional class for
verification
CertificateFactorySpi and
/libcore/support/src/test/java/org/apache/harmony/xnet/tests/support/
MySSLContextSpi.java
36
* Additional class for
verification
of SSLContextSpi and SSLContext
/packages/apps/PackageInstaller/src/com/android/packageinstaller/
InstallFlowAnalytics.java
227
/** Sets whether app
verification
is enabled. */
232
/** Gets whether app
verification
is enabled. */
450
// If this user has consented to app
verification
, augment the logged event with the hash of
563
* Checks whether the user has consented to app
verification
.
/external/deqp/modules/gles3/functional/
es3fTextureShadowTests.cpp
136
log << TestLog::Message << "ERROR: Result
verification
failed, got " << numFailedPixels << " invalid pixels!" << TestLog::EndMessage;
138
log << TestLog::ImageSet("VerifyResult", "
Verification
result")
379
m_testCtx.getLog() << TestLog::Message << "Warning:
Verification
assuming high-quality PCF filtering failed." << TestLog::EndMessage;
390
m_testCtx.getLog() << TestLog::Message << "ERROR:
Verification
against low precision requirements failed, failing test case." << TestLog::EndMessage;
391
m_testCtx.setTestResult(QP_TEST_RESULT_FAIL, "Image
verification
failed");
669
m_testCtx.getLog() << TestLog::Message << "Warning:
Verification
assuming high-quality PCF filtering failed." << TestLog::EndMessage;
680
m_testCtx.getLog() << TestLog::Message << "ERROR:
Verification
against low precision requirements failed, failing test case." << TestLog::EndMessage;
681
m_testCtx.setTestResult(QP_TEST_RESULT_FAIL, "Image
verification
failed");
[
all
...]
/bootable/recovery/
install.cpp
202
// Give
verification
half the progress bar...
239
LOGE("signature
verification
failed\n");
/build/tools/zipalign/
ZipAlign.cpp
181
fprintf(stderr, "Unable to open '%s' for
verification
\n", fileName);
215
printf("
Verification
%s\n", foundBad ? "FAILED" : "succesful");
/cts/tests/tests/media/src/android/media/cts/
MediaPlayerTestBase.java
222
* @param width width of the video to verify, or null to skip
verification
223
* @param height height of the video to verify, or null to skip
verification
/external/google-breakpad/src/testing/gtest/include/gtest/
gtest-spi.h
124
// The
verification
of the assertion is done correctly even when the statement
184
// The
verification
of the assertion is done correctly even when the statement
/external/gtest/include/gtest/
gtest-spi.h
124
// The
verification
of the assertion is done correctly even when the statement
184
// The
verification
of the assertion is done correctly even when the statement
/external/guava/guava/src/com/google/common/base/
Verify.java
64
* autoboxing and varargs array creation may happen as well, even when the
verification
succeeds and
65
* the message ends up unneeded. Performance-sensitive
verification
checks should continue to use
/external/llvm/lib/CodeGen/
RegAllocBase.cpp
41
// Temporary
verification
option until we can put
verification
inside
/external/llvm/utils/unittest/googletest/include/gtest/
gtest-spi.h
125
// The
verification
of the assertion is done correctly even when the statement
185
// The
verification
of the assertion is done correctly even when the statement
/external/mesa3d/src/gtest/include/gtest/
gtest-spi.h
124
// The
verification
of the assertion is done correctly even when the statement
184
// The
verification
of the assertion is done correctly even when the statement
/external/protobuf/gtest/include/gtest/
gtest-spi.h
124
// The
verification
of the assertion is done correctly even when the statement
184
// The
verification
of the assertion is done correctly even when the statement
/external/smali/smali/src/test/resources/LexerTest/
InstructionTest.tokens
61
INSTRUCTION_FORMAT20bc("throw-
verification
-error")
215
INSTRUCTION_FORMAT20bc("throw-
verification
-error")
/external/vboot_reference/futility/
cmd_vbutil_firmware.c
281
" skipping body
verification
.\n");
289
printf("Body
verification
succeeded.\n");
/frameworks/base/docs/html/training/articles/
security-ssl.jd
20
<li><a href="#CommonHostnameProbs">Common Problems with Hostname
Verification
</a></li>
337
<h2 id="CommonHostnameProbs">Common Problems with Hostname
Verification
</h2>
393
<p>If you are still sure you want to override hostname
verification
, here is an example
419
<p>But remember, if you find yourself replacing hostname
verification
, especially
435
far to deal with certificate
verification
issues also apply to {@link javax.net.ssl.SSLSocket}.
444
{@link javax.net.ssl.SSLSocket} <strong>does not</strong> perform hostname
verification
. It is
445
up the your app to do its own hostname
verification
, preferably by calling {@link
471
// we have performed hostname
verification
, so it is safe to proceed.
/frameworks/base/keystore/java/android/security/keystore/
KeyProtection.java
111
* <p><h3>Example: EC key pair for signing/
verification
using ECDSA</h3>
114
* digests. The use of public key is unrestricted, thus permitting signature
verification
using any
140
* <p><h3>Example: RSA key pair for signing/
verification
using PKCS#1 padding</h3>
145
*
verification
using any padding schemes and digests, and without user authentication. Both the
256
* Gets the time instant after which the key is no long valid for decryption and
verification
.
467
*
verification
.
507
* <p>This must be specified for RSA keys which are used for signing/
verification
.
523
* <p>This must be specified for signing/
verification
keys and RSA encryption/decryption
[
all
...]
Completed in 317 milliseconds
<<
11
12
13
14
15
16
17
18
19
20
>>