Home
last modified time | relevance | path

Searched refs:verified (Results 1 – 25 of 25) sorted by relevance

/frameworks/native/libs/input/tests/
DVerifiedInputEvent_test.cpp58 VerifiedKeyEvent verified = verifiedKeyEventFromKeyEvent(event); in TEST() local
60 ASSERT_EQ(VerifiedInputEvent::Type::KEY, verified.type); in TEST()
62 ASSERT_EQ(event.getDeviceId(), verified.deviceId); in TEST()
63 ASSERT_EQ(event.getEventTime(), verified.eventTimeNanos); in TEST()
64 ASSERT_EQ(event.getSource(), verified.source); in TEST()
65 ASSERT_EQ(event.getDisplayId(), verified.displayId); in TEST()
67 ASSERT_EQ(event.getAction(), verified.action); in TEST()
68 ASSERT_EQ(event.getDownTime(), verified.downTimeNanos); in TEST()
69 ASSERT_EQ(event.getFlags() & VERIFIED_KEY_EVENT_FLAGS, verified.flags); in TEST()
70 ASSERT_EQ(event.getKeyCode(), verified.keyCode); in TEST()
[all …]
/frameworks/base/core/java/android/util/apk/
DSourceStampVerificationResult.java40 boolean present, boolean verified, @Nullable Certificate certificate, in SourceStampVerificationResult() argument
43 this.mVerified = verified; in SourceStampVerificationResult()
82 public static SourceStampVerificationResult verified(Certificate certificate, in verified() method in SourceStampVerificationResult
DSourceStampVerifier.java114 return SourceStampVerificationResult.verified(stampCertificate, stampCertificateLineage); in verify()
221 return SourceStampVerificationResult.verified(sourceStampCertificate, in verify()
/frameworks/base/core/java/android/content/pm/parsing/
DFrameworkParsingPackageUtils.java235 final ParseResult<SigningDetails> verified; in getSigningDetails() local
240 verified = ApkSignatureVerifier.unsafeGetCertsWithoutVerification(input, baseCodePath, in getSigningDetails()
243 verified = ApkSignatureVerifier.verify(input, baseCodePath, minSignatureScheme); in getSigningDetails()
246 if (verified.isError()) { in getSigningDetails()
247 return input.error(verified); in getSigningDetails()
254 return verified; in getSigningDetails()
257 verified.getResult())) { in getSigningDetails()
/frameworks/base/telephony/common/com/android/internal/telephony/
DSipMessageParsingUtils.java286 boolean verified; in verifySipRequest()
288 verified = (Uri.parse(request[1]).getScheme() != null); in verifySipRequest()
292 verified &= Arrays.stream(SIP_REQUEST_METHODS).anyMatch(s -> request[0].contains(s)); in verifySipRequest()
293 return verified; in verifySipRequest()
/frameworks/base/libs/androidfw/
DChunkIterator.cpp40 return Chunk(this_chunk.verified()); in Next()
DLoadedArsc.cpp161 return entry.verified(); in VerifyResTableEntry()
206 return entry.verified(); in VerifyResTableEntry()
278 const incfs::verified_map_ptr<ResTable_sparseTypeEntry> entry = (*result).verified(); in GetEntryOffset()
582 maybe_type_builder.emplace(type_spec.verified()); in Load()
604 maybe_type_builder->AddType(type.verified()); in Load()
DAssetManager2.cpp56 return table_entry.convert<ResTable_map_entry>().verified(); in GetEntryValue()
DResourceTypes.cpp547 mHeader = header.verified(); in setTo()
/frameworks/compile/libbcc/tests/debuginfo/
DREADME12 output is verified against expected output by the llvm tool FileCheck.
19 The output is verified in the same way as host side tests, and the format
/frameworks/base/core/tests/mockingcoretests/
DREADME20 regular Mockito library, so tests that use it have to be verified and adapted. For that reason a
/frameworks/base/tools/lint/global/integration_tests/
DAndroid.bp28 // library. Silence it here, the lint output is verified in tests.py.
/frameworks/base/services/core/java/com/android/server/pm/
DWatchedIntentFilter.java188 public void setVerified(boolean verified) { in setVerified() argument
189 mFilter.setVerified(verified); in setVerified()
/frameworks/base/packages/SystemUI/tests/src/com/android/systemui/biometrics/domain/interactor/
DPromptCredentialInteractorTest.kt240 credentialInteractor.verifyCredentialResponse = { _ -> flowOf(verified(hat)) } in <lambda>()
381 private fun verified(hat: ByteArray) = CredentialStatus.Success.Verified(hat) method
/frameworks/ex/common/java/com/android/common/
DGoogleLogTags.logtags33 # [ 8- 7] package verified (0=not attempted, 1=succeeded, 2=failed)
/frameworks/base/core/java/android/os/
DRecoverySystem.java346 boolean verified = false; in verifyPackage()
351 verified = true; in verifyPackage()
355 if (!verified) { in verifyPackage()
/frameworks/base/core/proto/android/server/
Dbiometrics.proto139 // True if resetLockout requires a HAT to be verified in the TEE or equivalent.
/frameworks/base/core/java/android/content/pm/
Dflags.aconfig236 description: "Feature flag to enable pre-verified domains"
DPackageParser.java1441 final android.content.pm.SigningDetails verified = result.getResult(); in collectCertificates() local
1443 pkg.mSigningDetails = new SigningDetails(verified.getSignatures(), in collectCertificates()
1444 verified.getSignatureSchemeVersion(), in collectCertificates()
1445 verified.getPublicKeys(), in collectCertificates()
1446 verified.getPastSigningCertificates()); in collectCertificates()
1449 verified.getSignatures())) { in collectCertificates()
/frameworks/base/core/java/com/android/internal/pm/pkg/parsing/
DParsingPackageUtils.java3279 final ParseResult<SigningDetails> verified;
3282 verified = ApkSignatureVerifier.unsafeGetCertsWithoutVerification(input, baseCodePath,
3285 verified = ApkSignatureVerifier.verify(input, baseCodePath, minSignatureScheme);
3288 if (verified.isError()) {
3289 return input.error(verified);
3296 return verified;
3298 if (!Signature.areExactMatch(existingSigningDetails, verified.getResult())) {
/frameworks/hardware/interfaces/cameraservice/device/2.0/
DICameraDeviceUser.hal203 * @param sessionConfiguration Specific session configuration to be verified.
/frameworks/native/services/inputflinger/tests/
DInputDispatcher_test.cpp7283 std::unique_ptr<VerifiedInputEvent> verified = mDispatcher->verifyInputEvent(*event); in TEST_F() local
7284 ASSERT_NE(verified, nullptr); in TEST_F()
7285 ASSERT_EQ(verified->type, VerifiedInputEvent::Type::KEY); in TEST_F()
7287 ASSERT_EQ(keyArgs.eventTime, verified->eventTimeNanos); in TEST_F()
7288 ASSERT_EQ(keyArgs.deviceId, verified->deviceId); in TEST_F()
7289 ASSERT_EQ(keyArgs.source, verified->source); in TEST_F()
7290 ASSERT_EQ(keyArgs.displayId, verified->displayId); in TEST_F()
7292 const VerifiedKeyEvent& verifiedKey = static_cast<const VerifiedKeyEvent&>(*verified); in TEST_F()
7327 std::unique_ptr<VerifiedInputEvent> verified = mDispatcher->verifyInputEvent(*event); in TEST_F() local
7328 ASSERT_NE(verified, nullptr); in TEST_F()
[all …]
/frameworks/base/core/java/android/content/
DIntentFilter.java780 public void setVerified(boolean verified) { in setVerified() argument
783 if (verified) mVerifyState |= STATE_VERIFIED; in setVerified()
/frameworks/proto_logging/stats/atoms/adservices/
Dadservices_extension_atoms.proto906 // Number of keys that failed to verified the signature
/frameworks/proto_logging/stats/
Datoms.proto16323 // The PIN was verified automatically successfully.
16325 // The PIN was verified automatically unsuccessfully.
16333 // The PIN was not verified automatically because the SIM card did not match.
17530 // 0 indicates success: connection verified.
17531 // 1 indicates unknown: connection not verified or not known if diverted properly.