/external/mockito/src/org/mockito/internal/verification/ |
H A D | InOrderContextImpl.java | 13 final IdentitySet verified = new IdentitySet();
field in class:InOrderContextImpl 16 return verified.contains(invocation);
20 verified.add(i);
|
/external/chromium_org/chrome/browser/download/ |
H A D | download_path_reservation_tracker_unittest.cc | 70 const base::FilePath& path, bool verified); 136 const base::FilePath& path, bool verified) { 139 *return_verified = verified; 167 bool verified = false; local 177 &verified); 179 EXPECT_TRUE(verified); 197 bool verified = false; local 207 &verified); 209 EXPECT_TRUE(verified); 226 bool verified local 134 TestReservedPathCallback( base::FilePath* return_path, bool* return_verified, bool* did_run_callback, const base::FilePath& path, bool verified) argument 266 bool verified = false; local 304 bool verified = false; local 399 bool verified = false; local 423 bool verified = true; local 453 bool verified = true; local 485 bool verified = true; local 501 bool verified = true; local 526 bool verified = false; local 585 bool verified = false; local 628 bool verified = false; local 658 bool verified = false; local [all...] |
H A D | download_path_reservation_tracker.cc | 150 // - Returns true if |reserved_path| has been successfully verified. 213 // If ...PROMPT, then |has_conflicts| will remain true, |verified| will be 244 bool verified = (is_path_writeable && !has_conflicts && !name_too_long); local 246 return verified; 282 bool verified) { 284 callback.Run(*reserved_path, verified); 279 RunGetReservedPathCallback( const DownloadPathReservationTracker::ReservedPathCallback& callback, const base::FilePath* reserved_path, bool verified) argument
|
H A D | download_target_determiner.h | 178 void ReserveVirtualPathDone(const base::FilePath& path, bool verified);
|
H A D | download_target_determiner.cc | 301 const base::FilePath& path, bool verified) { 304 << " Verified:" << verified; 307 should_prompt_ = (should_prompt_ || !verified); 300 ReserveVirtualPathDone( const base::FilePath& path, bool verified) argument
|
/external/chromium_org/chrome/browser/extensions/api/networking_private/ |
H A D | crypto_verify_impl.h | 22 bool* verified,
|
H A D | crypto_verify_impl.cc | 38 bool* verified, 40 *verified = VerifyCredentials(credentials); 37 VerifyDestination(const Credentials& credentials, bool* verified, std::string* error) argument
|
H A D | networking_private_service_client.h | 75 bool* verified,
|
H A D | networking_private_apitest.cc | 115 bool* verified, 117 *verified = true;
|
/external/mockito/src/org/mockito/internal/invocation/ |
H A D | InvocationImpl.java | 37 private boolean verified; field in class:InvocationImpl 66 return verified || isIgnoredForVerification; 112 this.verified = true;
|
/external/clang/bindings/python/tests/cindex/ |
H A D | test_location.py | 65 verified = False 68 verified = True 70 assert verified
|
/external/chromium_org/chrome/browser/extensions/ |
H A D | install_verifier.cc | 383 bool verified = true; local 386 verified = false; 389 verified = false; 394 // extension from the webstore verified to avoid false positives on existing 403 verified = false; 407 if (!verified && !ShouldEnforce()) { 408 verified = true; 413 if (!verified) { 421 return !verified; 476 // Iterate through the extensions and, if any are newly-verified an [all...] |
H A D | install_signer.cc | 434 // could not be verified to be in the webstore. 497 bool verified = VerifySignature(*result); local 498 UMA_HISTOGRAM_BOOLEAN("ExtensionInstallSigner.ResultWasValid", verified); 501 if (!verified)
|
/external/chromium_org/chrome/common/extensions/api/networking_private/ |
H A D | networking_private_crypto_nss.cc | 85 SECStatus verified = CERT_VerifySignedDataWithPublicKey( local 87 if (verified != SECSuccess) { 121 verified = VFY_VerifyDataDirect( 130 if (verified != SECSuccess) {
|
/external/chromium_org/net/cert/ |
H A D | multi_log_ct_verifier.cc | 180 bool verified = false; 194 verified |= VerifySingleSCT(decoded_sct, expected_entry, result); 197 return verified; 223 // SCT verified ok, just make sure the timestamp is legitimate.
|
/external/easymock/src/org/easymock/internal/ |
H A D | MocksBehavior.java | 165 boolean verified = true;
170 verified = false;
173 if (verified) {
|
/external/ipsec-tools/src/racoon/ |
H A D | nattraversal.c | 187 int verified = 0; local 190 return verified; 203 return verified; /* XXX should abort */ 209 verified = 1; 214 return verified;
|
/external/apache-harmony/luni/src/test/api/common/org/apache/harmony/luni/tests/internal/net/www/protocol/https/ |
H A D | HttpsURLConnectionTest.java | 277 assertTrue("Hostname verification was not done", hnv.verified); 280 hnv_late.verified); 322 assertTrue("Hostname verification was not done", hnv.verified); 325 hnv_late.verified); 403 assertTrue("Hostname verification was not done", hnv_late.verified); 406 hnv.verified); 1057 boolean verified = false; field in class:HttpsURLConnectionTest.TestHostnameVerifier 1064 verified = true;
|
/external/chromium_org/third_party/webrtc/base/ |
H A D | nssidentity.cc | 179 SECStatus verified = CERT_VerifySignedDataWithPublicKey( 182 return verified == SECSuccess;
|
/external/bluetooth/bluedroid/stack/btm/ |
H A D | btm_ble.c | 1963 ** Returns TRUE if signature verified correctly; otherwise FALSE. 1969 BOOLEAN verified = FALSE; local 1995 verified = TRUE; 2000 return verified;
|
/external/chromium_org/extensions/browser/api/cast_channel/ |
H A D | cast_auth_util_nss.cc | 694 SECStatus verified = CERT_VerifySignedDataWithPublicKey( local 696 if (verified != SECSuccess) { 718 verified = VFY_VerifyDataDirect( 726 if (verified != SECSuccess) {
|
/external/chromium_org/native_client_sdk/src/doc/ |
H A D | faq.rst | 365 few simple rules that can be verified by a small trusted validator: the 458 must include the correct, verified domain of the embedding page.
|
/external/chromium_org/chrome/common/extensions/docs/examples/apps/hello-php/lib/oauth/ |
H A D | OAuth.php | 157 * verified way to the Service Provider, in a manner which is beyond the scope of this
|
/external/robolectric/lib/test/ |
H A D | mockito-core-1.8.5.jar | META-INF/ META-INF/MANIFEST.MF org/ org/mockito/ org/mockito/asm/ org/mockito/asm/signature/ ... |
/external/dexmaker/lib/ |
H A D | mockito-core-1.9.1-SNAPSHOT.jar | META-INF/ META-INF/MANIFEST.MF org/ org/mockito/ org/mockito/asm/ org/mockito/asm/signature/ ... |