Home
last modified time | relevance | path

Searched refs:verify (Results 1 – 25 of 109) sorted by relevance

12345

/system/incremental_delivery/incfs/util/
Dmap_ptr.cpp65 bool verify) { in Create() argument
67 verify && IsVerificationEnabled(fd)); in Create()
71 const char* file_name, bool verify) { in CreateForceVerification() argument
78 verification_enabled_ = verify; in CreateForceVerification()
140 bool verify) { in Create() argument
141 return CreateForceVerification(fd, offset, length, file_name, verify); in Create()
/system/gatekeeper/tests/
Dgatekeeper_device_test.cpp70 ret = device->verify(device, 400, 0, password_handle, password_handle_length, in TEST_F()
93 ret = device->verify(device, 400, 0, password_handle, password_handle_length, in TEST_F()
125 ret = device->verify(device, 400, 0, password_handle, password_handle_length, in TEST_F()
142 ret = device->verify(device, 400, 0, password_handle, password_handle_length, in TEST_F()
166 ret = device->verify(device, 400, 0, password_handle, password_handle_length, in TEST_F()
195 ret = device->verify(device, 400, 0, password_handle, password_handle_length, in TEST_F()
/system/nfc/src/fuzzers/
Dfuzz.sh75 run_once $CRASH >./logs/verify.log 2>&1
76 SIG=$(grep -m 1 -aoP "#?? \S+ in \K\S+ system/nfc/src\S+:\S+" ./logs/verify.log)
80 cat ./logs/verify.log>>./logs/fuzz.log
82 cp ./logs/verify.log ./logs/fuzz.log
/system/tools/xsdc/tests/
DAndroid.bp73 // These tests verify that enums-only and parser-only
101 // These tests verify that enums-only module can be used on
/system/core/gatekeeperd/binder/android/service/gatekeeper/
DIGateKeeperService.aidl53 …GateKeeperResponse verify(int userId, in byte[] enrolledPasswordHandle, in byte[] providedPassword… in verify() method
/system/iorap/src/inode2filename/
Dinode_resolver.cc70 iorap::common::AppendArgsRepeatedly(args, ToArgs(deps.verify)); in ToArgs()
157 const bool needs_verification = dependencies.verify == VerifyKind::kStat; in FindFilenamesFromInodes()
175 const bool needs_verification = dependencies.verify == VerifyKind::kStat; in EmitAll()
Dinode_resolver.h54 VerifyKind verify{VerifyKind::kStat}; // Filter out results that aren't up-to-date with stat(2) ?
Dmain.cc200 VerifyKind verify = VerifyKind::kStat; in main() local
280 verify = *vy; in main()
363 ir_dependencies.verify = verify; in main()
/system/tools/aidl/build/
Dmessage_check_integrity.txt5 be checked at runtime to verify interface stability. If a device is shipped
/system/security/ondevice-signing/
DKeystoreHmacKey.h38 android::base::Result<void> verify(const std::string& message,
/system/security/keystore2/src/km_compat/
Dcertificate_test.cpp81 static void verify(const Certificate& certificate) { in verify() function
139 verify(std::get<std::vector<Certificate>>(result).back()); in TEST()
154 verify(std::get<std::vector<Certificate>>(result)[0]); in TEST()
/system/sepolicy/private/
Dupdate_engine_common.te5 # TODO Have build system attempt to verify this
/system/sepolicy/prebuilts/api/31.0/private/
Dupdate_engine_common.te5 # TODO Have build system attempt to verify this
/system/incremental_delivery/incfs/util/include/util/
Dmap_ptr.h71 bool Create(int fd, off64_t offset, size_t length, const char* file_name, bool verify);
77 bool verify);
296 return verify();
356 bool verify(size_t n = 1) const {
/system/extras/verity/
DVeritySigner.java51 if (Utils.verify(publicKey, content, signature, in main()
/system/sepolicy/prebuilts/api/26.0/private/
Dbinderservicedomain.te20 …w binderservicedomain keystore:keystore_key { get_state get insert delete exist list sign verify };
/system/sepolicy/prebuilts/api/28.0/private/
Dbinderservicedomain.te20 …w binderservicedomain keystore:keystore_key { get_state get insert delete exist list sign verify };
/system/sepolicy/prebuilts/api/27.0/public/
Dracoon.te32 verify
/system/sepolicy/prebuilts/api/27.0/private/
Dbinderservicedomain.te20 …w binderservicedomain keystore:keystore_key { get_state get insert delete exist list sign verify };
/system/sepolicy/prebuilts/api/30.0/private/
Dbinderservicedomain.te20 …w binderservicedomain keystore:keystore_key { get_state get insert delete exist list sign verify };
/system/sepolicy/prebuilts/api/28.0/public/
Dracoon.te32 verify
/system/sepolicy/prebuilts/api/29.0/private/
Dbinderservicedomain.te20 …w binderservicedomain keystore:keystore_key { get_state get insert delete exist list sign verify };
/system/sepolicy/prebuilts/api/26.0/public/
Dracoon.te32 verify
/system/sepolicy/prebuilts/api/31.0/public/
Dracoon.te34 verify
/system/sepolicy/public/
Dracoon.te34 verify

12345