Home
last modified time | relevance | path

Searched refs:verified (Results 1 – 22 of 22) sorted by relevance

/frameworks/native/libs/input/tests/
DVerifiedInputEvent_test.cpp58 VerifiedKeyEvent verified = verifiedKeyEventFromKeyEvent(event); in TEST() local
60 ASSERT_EQ(VerifiedInputEvent::Type::KEY, verified.type); in TEST()
62 ASSERT_EQ(event.getDeviceId(), verified.deviceId); in TEST()
63 ASSERT_EQ(event.getEventTime(), verified.eventTimeNanos); in TEST()
64 ASSERT_EQ(event.getSource(), verified.source); in TEST()
65 ASSERT_EQ(event.getDisplayId(), verified.displayId); in TEST()
67 ASSERT_EQ(event.getAction(), verified.action); in TEST()
68 ASSERT_EQ(event.getDownTime(), verified.downTimeNanos); in TEST()
69 ASSERT_EQ(event.getFlags() & VERIFIED_KEY_EVENT_FLAGS, verified.flags); in TEST()
70 ASSERT_EQ(event.getKeyCode(), verified.keyCode); in TEST()
[all …]
/frameworks/base/core/java/android/util/apk/
DSourceStampVerificationResult.java40 boolean present, boolean verified, @Nullable Certificate certificate, in SourceStampVerificationResult() argument
43 this.mVerified = verified; in SourceStampVerificationResult()
82 public static SourceStampVerificationResult verified(Certificate certificate, in verified() method in SourceStampVerificationResult
DSourceStampVerifier.java114 return SourceStampVerificationResult.verified(stampCertificate, stampCertificateLineage); in verify()
216 return SourceStampVerificationResult.verified(sourceStampCertificate, in verify()
/frameworks/base/telephony/common/com/android/internal/telephony/
DSipMessageParsingUtils.java286 boolean verified; in verifySipRequest()
288 verified = (Uri.parse(request[1]).getScheme() != null); in verifySipRequest()
292 verified &= Arrays.stream(SIP_REQUEST_METHODS).anyMatch(s -> request[0].contains(s)); in verifySipRequest()
293 return verified; in verifySipRequest()
/frameworks/base/libs/androidfw/
DChunkIterator.cpp40 return Chunk(this_chunk.verified()); in Next()
DLoadedArsc.cpp268 const incfs::verified_map_ptr<ResTable_sparseTypeEntry> entry = (*result).verified(); in GetEntryOffset()
536 builder_ptr = util::make_unique<TypeSpecBuilder>(type_spec.verified()); in Load()
558 builder_ptr->AddType(type.verified()); in Load()
DAssetManager2.cpp56 return map_entry.verified(); in GetEntryValue()
785 const auto entry = GetEntryValue(best_entry.verified()); in FindEntryInternal()
DResourceTypes.cpp516 mHeader = header.verified(); in setTo()
/frameworks/compile/libbcc/tests/debuginfo/
DREADME12 output is verified against expected output by the llvm tool FileCheck.
19 The output is verified in the same way as host side tests, and the format
/frameworks/base/core/tests/mockingcoretests/
DREADME20 regular Mockito library, so tests that use it have to be verified and adapted. For that reason a
/frameworks/base/services/core/java/com/android/server/pm/
DWatchedIntentFilter.java188 public void setVerified(boolean verified) { in setVerified() argument
189 mFilter.setVerified(verified); in setVerified()
/frameworks/native/services/inputflinger/tests/
DInputDispatcher_test.cpp2378 std::unique_ptr<VerifiedInputEvent> verified = mDispatcher->verifyInputEvent(*event); in TEST_F() local
2379 ASSERT_NE(verified, nullptr); in TEST_F()
2380 ASSERT_EQ(verified->type, VerifiedInputEvent::Type::KEY); in TEST_F()
2382 ASSERT_EQ(keyArgs.eventTime, verified->eventTimeNanos); in TEST_F()
2383 ASSERT_EQ(keyArgs.deviceId, verified->deviceId); in TEST_F()
2384 ASSERT_EQ(keyArgs.source, verified->source); in TEST_F()
2385 ASSERT_EQ(keyArgs.displayId, verified->displayId); in TEST_F()
2387 const VerifiedKeyEvent& verifiedKey = static_cast<const VerifiedKeyEvent&>(*verified); in TEST_F()
2415 std::unique_ptr<VerifiedInputEvent> verified = mDispatcher->verifyInputEvent(*event); in TEST_F() local
2416 ASSERT_NE(verified, nullptr); in TEST_F()
[all …]
/frameworks/ex/common/java/com/android/common/
DGoogleLogTags.logtags33 # [ 8- 7] package verified (0=not attempted, 1=succeeded, 2=failed)
/frameworks/base/core/java/android/os/
DRecoverySystem.java349 boolean verified = false; in verifyPackage()
354 verified = true; in verifyPackage()
358 if (!verified) { in verifyPackage()
/frameworks/base/core/proto/android/server/
Dbiometrics.proto153 // True if resetLockout requires a HAT to be verified in the TEE or equivalent.
/frameworks/base/packages/BackupEncryption/proto/
Dbackup_chunks_metadata.proto32 // Checksum type with which the plaintext is verified.
/frameworks/hardware/interfaces/cameraservice/device/2.0/
DICameraDeviceUser.hal203 * @param sessionConfiguration Specific session configuration to be verified.
/frameworks/base/core/java/android/content/pm/parsing/
DParsingPackageUtils.java3038 SigningDetails verified;
3044 verified = ApkSignatureVerifier.unsafeGetCertsWithoutVerification(
3047 verified = ApkSignatureVerifier.verify(baseCodePath, minSignatureScheme);
3058 return input.success(verified);
3060 if (!Signature.areExactMatch(existingSigningDetails.signatures, verified.signatures)) {
/frameworks/base/core/java/android/content/
DIntentFilter.java705 public void setVerified(boolean verified) { in setVerified() argument
708 if (verified) mVerifyState |= STATE_VERIFIED; in setVerified()
/frameworks/base/core/java/android/content/pm/
DPackageParser.java1402 SigningDetails verified; in collectCertificates() local
1407 verified = ApkSignatureVerifier.unsafeGetCertsWithoutVerification( in collectCertificates()
1410 verified = ApkSignatureVerifier.verify(apkPath, minSignatureScheme); in collectCertificates()
1417 pkg.mSigningDetails = verified; in collectCertificates()
1419 if (!Signature.areExactMatch(pkg.mSigningDetails.signatures, verified.signatures)) { in collectCertificates()
/frameworks/base/core/java/android/widget/
DTextView.java7734 final boolean verified = super.verifyDrawable(who); in verifyDrawable()
7735 if (!verified && mDrawables != null) { in verifyDrawable()
7742 return verified; in verifyDrawable()
/frameworks/proto_logging/stats/
Datoms.proto13206 // The PIN was verified automatically successfully.
13208 // The PIN was verified automatically unsuccessfully.
13216 // The PIN was not verified automatically because the SIM card did not match.
14158 // 0 indicates success: connection verified.
14159 // 1 indicates unknown: connection not verified or not known if diverted properly.