/external/curl/docs/cmdline-opts/ |
cert-status.d | 4 Help: Verify the status of the server certificate 6 Tells curl to verify the status of the server certificate by using the
|
/prebuilts/go/darwin-x86/misc/cgo/test/ |
issue5337.go | 28 // Verify that we can withstand SIGPROF received on foreign threads
|
/prebuilts/go/darwin-x86/test/ |
const2.go | 7 // Verify that large integer constant expressions cause overflow.
|
convert3.go | 7 // Verify allowed and disallowed conversions.
|
func3.go | 7 // Verify that illegal function signatures are detected.
|
method1.go | 7 // Verify that method redeclarations are caught by the compiler.
|
switch4.go | 7 // Verify that erroneous switch statements are detected by the compiler.
|
/prebuilts/go/darwin-x86/test/interface/ |
receiver1.go | 7 // Verify compiler complains about missing implicit methods.
|
/prebuilts/go/linux-x86/misc/cgo/test/ |
issue5337.go | 28 // Verify that we can withstand SIGPROF received on foreign threads
|
/prebuilts/go/linux-x86/test/ |
const2.go | 7 // Verify that large integer constant expressions cause overflow.
|
convert3.go | 7 // Verify allowed and disallowed conversions.
|
func3.go | 7 // Verify that illegal function signatures are detected.
|
method1.go | 7 // Verify that method redeclarations are caught by the compiler.
|
switch4.go | 7 // Verify that erroneous switch statements are detected by the compiler.
|
/prebuilts/go/linux-x86/test/interface/ |
receiver1.go | 7 // Verify compiler complains about missing implicit methods.
|
/system/keymaster/ |
hmac_test.cpp | 75 EXPECT_TRUE(hmac.Verify(data_buffer, digest_buffer)); 79 EXPECT_FALSE(hmac.Verify(data_buffer, digest_buffer));
|
/toolchain/binutils/binutils-2.25/gas/testsuite/gas/mips/ |
branch-misc-4.d | 5 # Verify PC-relative relocations do not overflow.
|
/toolchain/binutils/binutils-2.25/ld/testsuite/ld-cris/ |
tls-ok-30.d | 6 # Verify that the first and last R_CRIS_16_GOT_GD entries are ok just
|
/system/core/gatekeeperd/tests/ |
gatekeeper_test.cpp | 79 gatekeeper.Verify(request, &response); 112 // verify first password 116 gatekeeper.Verify(request, &response); 135 // verify new password 141 gatekeeper.Verify(new_request, &response); 160 // verify first password 164 gatekeeper.Verify(request, &response); 180 // verify new password 186 gatekeeper.Verify(new_request, &response); 201 gatekeeper.Verify(request, &response) [all...] |
/system/core/libziparchive/ |
zip_archive_stream_entry.cc | 59 bool Verify() override; 110 bool ZipArchiveStreamEntryUncompressed::Verify() { 122 bool Verify() override; 193 bool ZipArchiveStreamEntryCompressed::Verify() { 259 bool Verify() override; 274 bool ZipArchiveStreamEntryRawCompressed::Verify() {
|
/external/swiftshader/third_party/LLVM/lib/Analysis/ |
DebugInfo.cpp | 352 if (DTy.Verify()) 356 if (BTy.Verify()) { 365 /// Verify - Verify that a compile unit is well formed. 366 bool DICompileUnit::Verify() const { 376 /// Verify - Verify that a type descriptor is well formed. 377 bool DIType::Verify() const { 380 if (getContext() && !getContext().Verify()) 394 /// Verify - Verify that a basic type descriptor is well formed [all...] |
/external/icu/icu4c/source/test/intltest/ |
tsdcfmsy.cpp | 202 Verify(34.5, (UnicodeString)"00.00", sym, (UnicodeString)"34.50"); 204 Verify(34.5, (UnicodeString)"00.00", sym, (UnicodeString)"34S50"); 206 Verify(34.5, (UnicodeString)"00 %", sym, (UnicodeString)"3450 P"); 208 Verify(34.5, CharsToUnicodeString("\\u00a4##.##"), sym, (UnicodeString)"D34.5"); 210 Verify(3456.5, (UnicodeString)"0,000.##", sym, (UnicodeString)"3|456S5"); 248 Verify(1234567.25, "#,##0.##", *lastResort, "1,234,567.25"); 251 void IntlTestDecimalFormatSymbols::Verify(double value, const UnicodeString& pattern,
|
/external/boringssl/src/crypto/x509/ |
x509_test.cc | 483 static int Verify(X509 *leaf, const std::vector<X509 *> &roots, 539 static int Verify(X509 *leaf, const std::vector<X509 *> &roots, 543 const int r1 = Verify(leaf, roots, intermediates, crls, flags, false); 544 const int r2 = Verify(leaf, roots, intermediates, crls, flags, true); 548 "Verify with, and without, use_additional_untrusted gave different " 580 Verify(leaf.get(), empty, empty, empty_crls)); 582 Verify(leaf.get(), empty, {intermediate.get()}, empty_crls)); 585 Verify(leaf.get(), {root.get()}, {intermediate.get()}, empty_crls)); 587 Verify(leaf.get(), {cross_signing_root.get()}, 590 Verify(leaf.get(), {cross_signing_root.get(), root.get()} [all...] |
/external/flatbuffers/include/flatbuffers/ |
reflection_generated.h | 89 bool Verify(flatbuffers::Verifier &verifier) const { 151 bool Verify(flatbuffers::Verifier &verifier) const { 154 verifier.Verify(key()) && 156 verifier.Verify(value()) && 231 bool Verify(flatbuffers::Verifier &verifier) const { 234 verifier.Verify(name()) && 324 bool Verify(flatbuffers::Verifier &verifier) const { 327 verifier.Verify(name()) && 329 verifier.Verify(values()) && 335 verifier.Verify(attributes()) & [all...] |
/system/chre/apps/wifi_offload/include/chre/apps/wifi_offload/ |
flatbuffers_types_generated.h | 52 bool Verify(flatbuffers::Verifier &verifier) const { 55 verifier.Verify(ssid()) && verifier.EndTable(); 97 bool Verify(flatbuffers::Verifier &verifier) const { 159 bool Verify(flatbuffers::Verifier &verifier) const { 165 verifier.Verify(bssid()) && 245 bool Verify(flatbuffers::Verifier &verifier) const { 248 verifier.Verify(scan_results()) && 309 bool Verify(flatbuffers::Verifier &verifier) const { 312 verifier.Verify(ssids_to_scan()) && 316 verifier.Verify(frequencies_to_scan_mhz()) & [all...] |