/frameworks/native/libs/input/tests/ |
D | VerifiedInputEvent_test.cpp | 58 VerifiedKeyEvent verified = verifiedKeyEventFromKeyEvent(event); in TEST() local 60 ASSERT_EQ(VerifiedInputEvent::Type::KEY, verified.type); in TEST() 62 ASSERT_EQ(event.getDeviceId(), verified.deviceId); in TEST() 63 ASSERT_EQ(event.getEventTime(), verified.eventTimeNanos); in TEST() 64 ASSERT_EQ(event.getSource(), verified.source); in TEST() 65 ASSERT_EQ(event.getDisplayId(), verified.displayId); in TEST() 67 ASSERT_EQ(event.getAction(), verified.action); in TEST() 68 ASSERT_EQ(event.getDownTime(), verified.downTimeNanos); in TEST() 69 ASSERT_EQ(event.getFlags() & VERIFIED_KEY_EVENT_FLAGS, verified.flags); in TEST() 70 ASSERT_EQ(event.getKeyCode(), verified.keyCode); in TEST() [all …]
|
/frameworks/base/core/java/android/util/apk/ |
D | SourceStampVerificationResult.java | 40 boolean present, boolean verified, @Nullable Certificate certificate, in SourceStampVerificationResult() argument 43 this.mVerified = verified; in SourceStampVerificationResult() 82 public static SourceStampVerificationResult verified(Certificate certificate, in verified() method in SourceStampVerificationResult
|
D | SourceStampVerifier.java | 114 return SourceStampVerificationResult.verified(stampCertificate, stampCertificateLineage); in verify() 216 return SourceStampVerificationResult.verified(sourceStampCertificate, in verify()
|
/frameworks/base/telephony/common/com/android/internal/telephony/ |
D | SipMessageParsingUtils.java | 286 boolean verified; in verifySipRequest() 288 verified = (Uri.parse(request[1]).getScheme() != null); in verifySipRequest() 292 verified &= Arrays.stream(SIP_REQUEST_METHODS).anyMatch(s -> request[0].contains(s)); in verifySipRequest() 293 return verified; in verifySipRequest()
|
/frameworks/base/libs/androidfw/ |
D | ChunkIterator.cpp | 40 return Chunk(this_chunk.verified()); in Next()
|
D | LoadedArsc.cpp | 268 const incfs::verified_map_ptr<ResTable_sparseTypeEntry> entry = (*result).verified(); in GetEntryOffset() 536 builder_ptr = util::make_unique<TypeSpecBuilder>(type_spec.verified()); in Load() 558 builder_ptr->AddType(type.verified()); in Load()
|
D | AssetManager2.cpp | 56 return map_entry.verified(); in GetEntryValue() 785 const auto entry = GetEntryValue(best_entry.verified()); in FindEntryInternal()
|
D | ResourceTypes.cpp | 516 mHeader = header.verified(); in setTo()
|
/frameworks/compile/libbcc/tests/debuginfo/ |
D | README | 12 output is verified against expected output by the llvm tool FileCheck. 19 The output is verified in the same way as host side tests, and the format
|
/frameworks/base/core/tests/mockingcoretests/ |
D | README | 20 regular Mockito library, so tests that use it have to be verified and adapted. For that reason a
|
/frameworks/base/services/core/java/com/android/server/pm/ |
D | WatchedIntentFilter.java | 188 public void setVerified(boolean verified) { in setVerified() argument 189 mFilter.setVerified(verified); in setVerified()
|
/frameworks/native/services/inputflinger/tests/ |
D | InputDispatcher_test.cpp | 2378 std::unique_ptr<VerifiedInputEvent> verified = mDispatcher->verifyInputEvent(*event); in TEST_F() local 2379 ASSERT_NE(verified, nullptr); in TEST_F() 2380 ASSERT_EQ(verified->type, VerifiedInputEvent::Type::KEY); in TEST_F() 2382 ASSERT_EQ(keyArgs.eventTime, verified->eventTimeNanos); in TEST_F() 2383 ASSERT_EQ(keyArgs.deviceId, verified->deviceId); in TEST_F() 2384 ASSERT_EQ(keyArgs.source, verified->source); in TEST_F() 2385 ASSERT_EQ(keyArgs.displayId, verified->displayId); in TEST_F() 2387 const VerifiedKeyEvent& verifiedKey = static_cast<const VerifiedKeyEvent&>(*verified); in TEST_F() 2415 std::unique_ptr<VerifiedInputEvent> verified = mDispatcher->verifyInputEvent(*event); in TEST_F() local 2416 ASSERT_NE(verified, nullptr); in TEST_F() [all …]
|
/frameworks/ex/common/java/com/android/common/ |
D | GoogleLogTags.logtags | 33 # [ 8- 7] package verified (0=not attempted, 1=succeeded, 2=failed)
|
/frameworks/base/core/java/android/os/ |
D | RecoverySystem.java | 349 boolean verified = false; in verifyPackage() 354 verified = true; in verifyPackage() 358 if (!verified) { in verifyPackage()
|
/frameworks/base/core/proto/android/server/ |
D | biometrics.proto | 153 // True if resetLockout requires a HAT to be verified in the TEE or equivalent.
|
/frameworks/base/packages/BackupEncryption/proto/ |
D | backup_chunks_metadata.proto | 32 // Checksum type with which the plaintext is verified.
|
/frameworks/hardware/interfaces/cameraservice/device/2.0/ |
D | ICameraDeviceUser.hal | 203 * @param sessionConfiguration Specific session configuration to be verified.
|
/frameworks/base/core/java/android/content/pm/parsing/ |
D | ParsingPackageUtils.java | 3038 SigningDetails verified; 3044 verified = ApkSignatureVerifier.unsafeGetCertsWithoutVerification( 3047 verified = ApkSignatureVerifier.verify(baseCodePath, minSignatureScheme); 3058 return input.success(verified); 3060 if (!Signature.areExactMatch(existingSigningDetails.signatures, verified.signatures)) {
|
/frameworks/base/core/java/android/content/ |
D | IntentFilter.java | 705 public void setVerified(boolean verified) { in setVerified() argument 708 if (verified) mVerifyState |= STATE_VERIFIED; in setVerified()
|
/frameworks/base/core/java/android/content/pm/ |
D | PackageParser.java | 1402 SigningDetails verified; in collectCertificates() local 1407 verified = ApkSignatureVerifier.unsafeGetCertsWithoutVerification( in collectCertificates() 1410 verified = ApkSignatureVerifier.verify(apkPath, minSignatureScheme); in collectCertificates() 1417 pkg.mSigningDetails = verified; in collectCertificates() 1419 if (!Signature.areExactMatch(pkg.mSigningDetails.signatures, verified.signatures)) { in collectCertificates()
|
/frameworks/base/core/java/android/widget/ |
D | TextView.java | 7734 final boolean verified = super.verifyDrawable(who); in verifyDrawable() 7735 if (!verified && mDrawables != null) { in verifyDrawable() 7742 return verified; in verifyDrawable()
|
/frameworks/proto_logging/stats/ |
D | atoms.proto | 13206 // The PIN was verified automatically successfully. 13208 // The PIN was verified automatically unsuccessfully. 13216 // The PIN was not verified automatically because the SIM card did not match. 14158 // 0 indicates success: connection verified. 14159 // 1 indicates unknown: connection not verified or not known if diverted properly.
|