/frameworks/base/location/java/com/android/internal/location/ |
GpsNetInitiatedHandler.java | 171 * (and verification) event is received. 591 // change this to configure dialog display (for verification) 597 // change this to configure dialog display (for verification)
|
/libcore/luni/src/main/java/java/security/ |
Signature.java | 65 * initialized for verification. 284 * Initializes this {@code Signature} instance for signature verification, 300 * Initializes this {@code Signature} instance for signature verification,
|
/external/deqp/modules/glshared/ |
glsTextureTestUtil.cpp | [all...] |
glsRasterizationTestUtil.cpp | [all...] |
/art/runtime/gc/ |
heap.h | 367 // Enable verification of object references when the runtime is sufficiently initialized. 375 // Disable object reference verification for image writing. [all...] |
heap.cc | 24 #include <unwind.h> // For GC verification. 178 * verification is enabled, we limit the size of allocation stacks to speed up their [all...] |
/external/littlemock/src/com/google/testing/littlemock/ |
LittleMock.java | 148 /** Begins a verification step on a mock: the next method invocation on that mock will verify. */ 202 /** Begins a verification step for exactly one method call. */ 618 * <p>It is not null when in the verification state, and it is actually used to determine if we 619 * are in the verification state. 621 * <p>It is reset to null once the verification has occurred. [all...] |
/frameworks/base/docs/html/google/play/licensing/ |
setting-up.jd | 17 <li><a href="#lvl-setup">Setting Up the Licensing Verification Library</a></li> 34 <p>Before you start adding license verification to your application, you need to set up your Google 98 <li><a href="#lvl-setup">Setting up the Licensing Verification Library</a></li> 234 <p>The License Verification Library (LVL) is a collection of helper classes that 271 <h3 id="lvl-setup">Setting Up the Licensing Verification Library</h3>
|
/prebuilts/tools/common/proguard/proguard4.7/docs/manual/ |
troubleshooting.html | 74 <li><a href="#invalidclassexception1">InvalidClassException, class loading error, or verification error</a></li> 87 <li><a href="#invalidclassexception2">InvalidClassException, class loading error, or verification error (in Java Micro Edition)</a></li> 489 <dt><a name="invalidclassexception1"><b>InvalidClassException</b>, <b>class loading error</b>, or <b>verification error</b></a></dt> [all...] |
/art/compiler/driver/ |
compiler_driver.cc | 530 // We store the verification information in the class status in the oat file, which the linker 531 // can validate (checksums) and use to skip load-time verification. It is thus safe to 537 // Class verification has soft-failed. Anyway, ensure at least correctness. 541 // Class verification has failed: do not run DEX-to-DEX compilation. 637 VLOG(compiler) << "Verify none mode specified, skipping verification."; [all...] |
/frameworks/base/docs/html/google/play/ |
expansion-files.jd | 378 License Verification Library (LVL) to use APK expansion files. Of course, if your application 379 is free, you don't need to enforce license verification—you simply need the 418 APKExpansionPolicy}</a> class (included in the License Verification Library) as your licensing 462 <li>Create a new Library Project for the License Verification Library and Downloader 468 ({@code market_licensing/} for the License Verification Library or {@code 476 Verification Library. Be sure to add the License 477 Verification Library to the Downloader Library's project properties (same process as 499 <p>With both the License Verification Library and Downloader Library added to your [all...] |
/external/fio/ |
fio.1 | 471 if zero_buffers isn't specified, naturally. If data verification is enabled, [all...] |
/external/dexmaker/lib/ |
mockito-core-1.9.1-SNAPSHOT.jar | |
/prebuilts/tools/common/m2/repository/org/mockito/mockito-core/1.9.5/ |
mockito-core-1.9.5.jar | |
/prebuilts/tools/common/m2/repository/org/mockito/mockito-all/1.9.5/ |
mockito-all-1.9.5.jar | |
/external/deqp/modules/gles2/stress/ |
es2sSpecialFloatTests.cpp | 202 << tcu::TestLog::ImageSet("Results", "Result verification") 210 << tcu::TestLog::ImageSet("Results", "Result verification") 339 << tcu::TestLog::ImageSet("Results", "Result verification") [all...] |
/bootable/recovery/applypatch/ |
applypatch.c | 458 // drop caches so our subsequent verification read 500 printf("verification failed starting at %zu\n", p); 507 printf("verification read succeeded (attempt %d)\n", attempt+1); [all...] |
/external/proguard/src/proguard/classfile/editor/ |
CodeAttributeEditor.java | [all...] |
/external/wpa_supplicant_8/src/crypto/ |
tls_gnutls.c | 934 "GnuTLS: No peer certificate verification enabled"); 974 "GnuTLS: Failed to print verification status"); 1044 wpa_printf(MSG_INFO, "TLS: Unknown verification status: %d", [all...] |
/frameworks/base/docs/html/google/play/billing/ |
billing_integrate.jd | 395 By performing signature verification you can detect responses that have 397 verification step in your application; however, if your application connects 399 verification on that server.</p>
|
billing_subscriptions.jd | 19 <li><a href="#strategies">Purchase Verification Strategies</a></li> 485 <h2 id="strategies">Purchase Verification Strategies</h2> 498 approach to purchase verification accounts for the offline use-case.</p>
|
/art/build/ |
Android.common_test.mk | 67 # Do you want tests with GC verification enabled run?
|
/art/runtime/gc/collector/ |
mark_sweep.h | 315 // Verification.
|
/art/runtime/gc/space/ |
malloc_space.cc | 117 // No verification since the object is dead.
|
rosalloc_space.cc | 41 // Use this only for verification, it is not safe to use since the class of the object may have
|