/external/easymock/src/org/easymock/internal/ |
D | MocksBehavior.java | 165 boolean verified = true; in verify() 170 verified = false; in verify() 173 if (verified) { in verify()
|
/external/ipsec-tools/src/racoon/ |
D | nattraversal.c | 187 int verified = 0; in natt_compare_addr_hash() local 190 return verified; in natt_compare_addr_hash() 203 return verified; /* XXX should abort */ in natt_compare_addr_hash() 209 verified = 1; in natt_compare_addr_hash() 214 return verified; in natt_compare_addr_hash()
|
/external/apache-harmony/luni/src/test/api/common/org/apache/harmony/luni/tests/internal/net/www/protocol/https/ |
D | HttpsURLConnectionTest.java | 277 assertTrue("Hostname verification was not done", hnv.verified); in testSetDefaultSSLSocketFactory() 280 hnv_late.verified); in testSetDefaultSSLSocketFactory() 322 assertTrue("Hostname verification was not done", hnv.verified); in testSetSSLSocketFactory() 325 hnv_late.verified); in testSetSSLSocketFactory() 403 assertTrue("Hostname verification was not done", hnv_late.verified); in testSetHostnameVerifier() 406 hnv.verified); in testSetHostnameVerifier() 1059 boolean verified = false; field in HttpsURLConnectionTest.TestHostnameVerifier 1066 verified = true; in verify()
|
/external/llvm/test/Transforms/GVN/ |
D | 2008-12-15-CacheVisited.ll | 2 ; Cached results must be added to and verified against the visited sets.
|
/external/compiler-rt/lib/asan/ |
D | README.txt | 15 Temporary build instructions (verified on linux):
|
/external/llvm/test/CodeGen/ARM/ |
D | widen-vmovs.ll | 17 ; - Register liveness is verified.
|
/external/libgsm/ |
D | README | 25 on most SPARCstations. The implementation has been verified against the
|
/external/zlib/contrib/asm586/ |
D | README.586 | 20 not yet verified this.
|
/external/skia/third_party/glu/libtess/ |
D | Imakefile | 30 XCOMM published by SGI, but has not been independently verified as being
|
/external/valgrind/main/docs/internals/ |
D | 3_3_BUGSTATUS.txt | 11 Vfd = fix has been verified on 3.3.X branch 17 Vfd fix has been verified on 3.3.X branch
|
D | 3_2_BUGSTATUS.txt | 10 Vfd = fix has been verified on 3.2.X branch
|
/external/openssh/ |
D | monitor.c | 1325 int verified = 0; in mm_answer_keyverify() local 1355 verified = key_verify(key, signature, signaturelen, data, datalen); in mm_answer_keyverify() 1357 __func__, key, (verified == 1) ? "verified" : "unverified"); in mm_answer_keyverify() 1369 buffer_put_int(m, verified); in mm_answer_keyverify() 1372 return (verified == 1); in mm_answer_keyverify()
|
D | monitor_wrap.c | 441 int verified = 0; in mm_key_verify() local 460 verified = buffer_get_int(&m); in mm_key_verify() 464 return (verified); in mm_key_verify()
|
D | ssh_config.0 | 645 changed. The host keys of known hosts will be verified
|
D | ssh.0 | 620 available: SSH fingerprints verified by DNS. An additional resource
|
/external/chromium/chrome/browser/ui/cocoa/bookmarks/ |
D | bookmark_button_cell.mm | 194 // Note: as verified in a debugger, mouseEntered: does NOT increase
|
/external/wpa_supplicant_6/wpa_supplicant/ |
D | eap_testing.txt | 12 Supplicant is verified to match with the one received by the (now
|
D | wpa_supplicant.conf.orig | 370 # included, server certificate will not be verified. This is insecure and 464 # server certificate will not be verified. This is insecure and a trusted
|
D | ChangeLog | 850 verified)
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | eap_testing.txt | 12 Supplicant is verified to match with the one received by the (now
|
D | README-Windows.txt | 26 All security modes have been verified to work (at least complete
|
D | ChangeLog | 949 verified)
|
/external/srtp/doc/ |
D | intro.txt | 286 can be decrypted and have their authentication verified (using the
|
/external/quake/quake/src/WinQuake/data/ |
D | README.TXT | 384 the numpages field was verified to be greater than 0, and no mode was
|
/external/bouncycastle/src/main/java/org/bouncycastle/x509/ |
D | CertPathReviewerMessages.properties | 188 # signature can not be verified
|