/frameworks/native/libs/input/tests/ |
D | VerifiedInputEvent_test.cpp | 58 VerifiedKeyEvent verified = verifiedKeyEventFromKeyEvent(event); in TEST() local 60 ASSERT_EQ(VerifiedInputEvent::Type::KEY, verified.type); in TEST() 62 ASSERT_EQ(event.getDeviceId(), verified.deviceId); in TEST() 63 ASSERT_EQ(event.getEventTime(), verified.eventTimeNanos); in TEST() 64 ASSERT_EQ(event.getSource(), verified.source); in TEST() 65 ASSERT_EQ(event.getDisplayId(), verified.displayId); in TEST() 67 ASSERT_EQ(event.getAction(), verified.action); in TEST() 68 ASSERT_EQ(event.getDownTime(), verified.downTimeNanos); in TEST() 69 ASSERT_EQ(event.getFlags() & VERIFIED_KEY_EVENT_FLAGS, verified.flags); in TEST() 70 ASSERT_EQ(event.getKeyCode(), verified.keyCode); in TEST() [all …]
|
/frameworks/base/core/java/android/util/apk/ |
D | SourceStampVerificationResult.java | 40 boolean present, boolean verified, @Nullable Certificate certificate, in SourceStampVerificationResult() argument 43 this.mVerified = verified; in SourceStampVerificationResult() 82 public static SourceStampVerificationResult verified(Certificate certificate, in verified() method in SourceStampVerificationResult
|
D | SourceStampVerifier.java | 114 return SourceStampVerificationResult.verified(stampCertificate, stampCertificateLineage); in verify() 221 return SourceStampVerificationResult.verified(sourceStampCertificate, in verify()
|
/frameworks/base/core/java/android/content/pm/parsing/ |
D | FrameworkParsingPackageUtils.java | 235 final ParseResult<SigningDetails> verified; in getSigningDetails() local 240 verified = ApkSignatureVerifier.unsafeGetCertsWithoutVerification(input, baseCodePath, in getSigningDetails() 243 verified = ApkSignatureVerifier.verify(input, baseCodePath, minSignatureScheme); in getSigningDetails() 246 if (verified.isError()) { in getSigningDetails() 247 return input.error(verified); in getSigningDetails() 254 return verified; in getSigningDetails() 257 verified.getResult())) { in getSigningDetails()
|
/frameworks/base/telephony/common/com/android/internal/telephony/ |
D | SipMessageParsingUtils.java | 286 boolean verified; in verifySipRequest() 288 verified = (Uri.parse(request[1]).getScheme() != null); in verifySipRequest() 292 verified &= Arrays.stream(SIP_REQUEST_METHODS).anyMatch(s -> request[0].contains(s)); in verifySipRequest() 293 return verified; in verifySipRequest()
|
/frameworks/base/libs/androidfw/ |
D | ChunkIterator.cpp | 40 return Chunk(this_chunk.verified()); in Next()
|
D | LoadedArsc.cpp | 161 return entry.verified(); in VerifyResTableEntry() 206 return entry.verified(); in VerifyResTableEntry() 278 const incfs::verified_map_ptr<ResTable_sparseTypeEntry> entry = (*result).verified(); in GetEntryOffset() 582 maybe_type_builder.emplace(type_spec.verified()); in Load() 604 maybe_type_builder->AddType(type.verified()); in Load()
|
D | AssetManager2.cpp | 56 return table_entry.convert<ResTable_map_entry>().verified(); in GetEntryValue()
|
D | ResourceTypes.cpp | 547 mHeader = header.verified(); in setTo()
|
/frameworks/compile/libbcc/tests/debuginfo/ |
D | README | 12 output is verified against expected output by the llvm tool FileCheck. 19 The output is verified in the same way as host side tests, and the format
|
/frameworks/base/core/tests/mockingcoretests/ |
D | README | 20 regular Mockito library, so tests that use it have to be verified and adapted. For that reason a
|
/frameworks/base/tools/lint/global/integration_tests/ |
D | Android.bp | 28 // library. Silence it here, the lint output is verified in tests.py.
|
/frameworks/base/services/core/java/com/android/server/pm/ |
D | WatchedIntentFilter.java | 188 public void setVerified(boolean verified) { in setVerified() argument 189 mFilter.setVerified(verified); in setVerified()
|
/frameworks/base/packages/SystemUI/tests/src/com/android/systemui/biometrics/domain/interactor/ |
D | PromptCredentialInteractorTest.kt | 240 credentialInteractor.verifyCredentialResponse = { _ -> flowOf(verified(hat)) } in <lambda>() 381 private fun verified(hat: ByteArray) = CredentialStatus.Success.Verified(hat) method
|
/frameworks/ex/common/java/com/android/common/ |
D | GoogleLogTags.logtags | 33 # [ 8- 7] package verified (0=not attempted, 1=succeeded, 2=failed)
|
/frameworks/base/core/java/android/os/ |
D | RecoverySystem.java | 346 boolean verified = false; in verifyPackage() 351 verified = true; in verifyPackage() 355 if (!verified) { in verifyPackage()
|
/frameworks/base/core/proto/android/server/ |
D | biometrics.proto | 139 // True if resetLockout requires a HAT to be verified in the TEE or equivalent.
|
/frameworks/base/core/java/android/content/pm/ |
D | flags.aconfig | 236 description: "Feature flag to enable pre-verified domains"
|
D | PackageParser.java | 1441 final android.content.pm.SigningDetails verified = result.getResult(); in collectCertificates() local 1443 pkg.mSigningDetails = new SigningDetails(verified.getSignatures(), in collectCertificates() 1444 verified.getSignatureSchemeVersion(), in collectCertificates() 1445 verified.getPublicKeys(), in collectCertificates() 1446 verified.getPastSigningCertificates()); in collectCertificates() 1449 verified.getSignatures())) { in collectCertificates()
|
/frameworks/base/core/java/com/android/internal/pm/pkg/parsing/ |
D | ParsingPackageUtils.java | 3279 final ParseResult<SigningDetails> verified; 3282 verified = ApkSignatureVerifier.unsafeGetCertsWithoutVerification(input, baseCodePath, 3285 verified = ApkSignatureVerifier.verify(input, baseCodePath, minSignatureScheme); 3288 if (verified.isError()) { 3289 return input.error(verified); 3296 return verified; 3298 if (!Signature.areExactMatch(existingSigningDetails, verified.getResult())) {
|
/frameworks/hardware/interfaces/cameraservice/device/2.0/ |
D | ICameraDeviceUser.hal | 203 * @param sessionConfiguration Specific session configuration to be verified.
|
/frameworks/native/services/inputflinger/tests/ |
D | InputDispatcher_test.cpp | 7283 std::unique_ptr<VerifiedInputEvent> verified = mDispatcher->verifyInputEvent(*event); in TEST_F() local 7284 ASSERT_NE(verified, nullptr); in TEST_F() 7285 ASSERT_EQ(verified->type, VerifiedInputEvent::Type::KEY); in TEST_F() 7287 ASSERT_EQ(keyArgs.eventTime, verified->eventTimeNanos); in TEST_F() 7288 ASSERT_EQ(keyArgs.deviceId, verified->deviceId); in TEST_F() 7289 ASSERT_EQ(keyArgs.source, verified->source); in TEST_F() 7290 ASSERT_EQ(keyArgs.displayId, verified->displayId); in TEST_F() 7292 const VerifiedKeyEvent& verifiedKey = static_cast<const VerifiedKeyEvent&>(*verified); in TEST_F() 7327 std::unique_ptr<VerifiedInputEvent> verified = mDispatcher->verifyInputEvent(*event); in TEST_F() local 7328 ASSERT_NE(verified, nullptr); in TEST_F() [all …]
|
/frameworks/base/core/java/android/content/ |
D | IntentFilter.java | 780 public void setVerified(boolean verified) { in setVerified() argument 783 if (verified) mVerifyState |= STATE_VERIFIED; in setVerified()
|
/frameworks/proto_logging/stats/atoms/adservices/ |
D | adservices_extension_atoms.proto | 906 // Number of keys that failed to verified the signature
|
/frameworks/proto_logging/stats/ |
D | atoms.proto | 16323 // The PIN was verified automatically successfully. 16325 // The PIN was verified automatically unsuccessfully. 16333 // The PIN was not verified automatically because the SIM card did not match. 17530 // 0 indicates success: connection verified. 17531 // 1 indicates unknown: connection not verified or not known if diverted properly.
|