/system/core/fs_mgr/ |
fs_mgr_verity.c | 820 /* return the default mode, unless any of the verified partitions are in
|
/system/core/init/ |
builtins.cpp | 637 property_set(android::base::StringPrintf("partition.%s.verified", mount_point).c_str(),
|
/art/runtime/ |
class_linker.cc | [all...] |
parsed_options.cc | 674 UsageMessage(stream, " -Xdexopt:{none,verified,all,full}\n");
|
/dalvik/dexdump/ |
DexDump.cpp | 277 "VERIFIED", /* 0x10000 */ [all...] |
/external/lldb/include/lldb/Host/ |
FileSpec.h | 479 /// verified using the DataBuffer::GetByteSize() function on the return 510 /// verified using the DataBuffer::GetByteSize() function.
|
/external/llvm/test/CodeGen/PowerPC/ |
pr17168.ll | 80 !23 = !MDLocalVariable(tag: DW_TAG_auto_variable, name: "verified", line: 81, scope: !4, file: !5, type: !24) 146 !89 = !MDLocalVariable(tag: DW_TAG_arg_variable, name: "verified", line: 2388, arg: 3, scope: !82, file: !5, type: !85) [all...] |
/external/wpa_supplicant_8/src/eapol_supp/ |
eapol_supp_sm.c | 566 * transitions are verified only after eapNoResp. They are 741 wpa_printf(MSG_DEBUG, "EAPOL: EAPOL-Key key signature verified"); [all...] |
/frameworks/base/docs/html/reference/android/support/test/espresso/intent/ |
Intents.html | 1221 have verified your intents to make sure that nothing unexpected was sent out. This is an [all...] |
VerificationModes.html | 751 verified. 1068 verified. [all...] |
/frameworks/base/packages/SettingsProvider/src/com/android/providers/settings/ |
SettingsProvider.java | [all...] |
/ndk/docs/Additional_library_docs/opensles/ |
index.html | 286 with Android OpenSL ES has not been verified. 350 <code>rtsp:</code> is not verified. [all...] |
/packages/apps/Settings/res/values/ |
arrays.xml | 243 <!-- Status message of Wi-Fi when connectiong is being verified. --> 272 <!-- Status message of Wi-Fi when connectiong is being verified. --> [all...] |
/art/runtime/gc/collector/ |
semi_space.cc | 702 // Object was already verified when we scanned it. [all...] |
/art/test/ |
run-test | 587 # Tests named '<number>-checker-*' will also have their CFGs verified with
|
/cts/tests/tests/keystore/src/android/keystore/cts/ |
SignatureTest.java | [all...] |
/external/boringssl/src/include/openssl/ |
evp.h | 295 * will be verified by |EVP_DigestVerifyFinal|. It returns one. */ [all...] |
/external/boringssl/src/ssl/test/runner/ |
common.go | 188 VerifiedChains [][]*x509.Certificate // verified chains built from PeerCertificates [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
CertPathValidatorUtilities.java | [all...] |
/external/clang/lib/Lex/ |
TokenLexer.cpp | 182 // preprocessor already verified that the following token is a macro name [all...] |
/external/conscrypt/src/main/java/org/conscrypt/ |
OpenSSLSocketImpl.java | 255 * verified if the correspondent property in java.Security is set. All [all...] |
/external/deqp/modules/gles31/functional/ |
es31fUniformLocationTests.cpp | 541 // some buffers to feed to the GPU, only the first element is relevant since the others are never verified [all...] |
/external/google-breakpad/src/client/linux/handler/ |
exception_handler_unittest.cc | [all...] |
/external/google-breakpad/src/google_breakpad/processor/ |
minidump.h | [all...] |
/external/gtest/test/ |
gtest_output_test_.cc | 31 // various conditions. The output will then be verified by
|