/tools/dexter/testdata/expected/ |
D | exit_hooks.code_coverage | 1 1: mi=0 s=0 e=2 2 2: mi=0 s=5 e=5 3 3: mi=1 s=0 e=1 4 4: mi=1 s=3 e=3 5 5: mi=1 s=5 e=5 6 6: mi=1 s=8 e=8 7 7: mi=1 s=11 e=11 8 8: mi=1 s=13 e=13 9 9: mi=1 s=15 e=15 10 10: mi=1 s=18 e=18 [all …]
|
D | entry_hooks.code_coverage | 1 1: mi=0 s=0 e=2 2 2: mi=0 s=5 e=5 3 3: mi=1 s=0 e=3 4 4: mi=1 s=5 e=5 5 5: mi=1 s=7 e=8 6 6: mi=1 s=10 e=15 7 7: mi=1 s=18 e=19 8 8: mi=1 s=21 e=26 9 9: mi=1 s=28 e=28 10 10: mi=1 s=31 e=34 [all …]
|
D | hello_nodebug.code_coverage | 1 1: mi=0 s=0 e=4 2 2: mi=0 s=6 e=7 3 3: mi=0 s=10 e=10 4 4: mi=1 s=0 e=2 5 5: mi=1 s=5 e=5 6 6: mi=2 s=0 e=2 7 7: mi=2 s=5 e=5 8 8: mi=3 s=0 e=2 9 9: mi=3 s=5 e=5 10 10: mi=3 s=7 e=7 [all …]
|
D | hello.code_coverage | 1 1: mi=0 s=0 e=4 2 2: mi=0 s=6 e=7 3 3: mi=0 s=10 e=10 4 4: mi=1 s=0 e=2 5 5: mi=1 s=5 e=5 6 6: mi=2 s=0 e=2 7 7: mi=2 s=5 e=5 8 8: mi=3 s=0 e=2 9 9: mi=3 s=5 e=5 10 10: mi=3 s=7 e=7 [all …]
|
D | try_catch.code_coverage | 1 1: mi=0 s=0 e=2 2 2: mi=0 s=5 e=5 3 3: mi=1 s=0 e=2 4 4: mi=1 s=5 e=5 5 5: mi=2 s=0 e=2 6 6: mi=2 s=5 e=5 7 7: mi=3 s=0 e=2 8 8: mi=3 s=4 e=5 9 9: mi=3 s=8 e=9 10 10: mi=3 s=10 e=10 [all …]
|
D | mi.code_coverage | 1 1: mi=0 s=0 e=0 2 2: mi=0 s=3 e=3 3 3: mi=1 s=0 e=1 4 4: mi=3 s=0 e=0 5 5: mi=3 s=3 e=3 6 6: mi=3 s=5 e=5 7 7: mi=3 s=7 e=7 8 8: mi=4 s=0 e=0 9 9: mi=4 s=2 e=2 10 10: mi=4 s=5 e=6 [all …]
|
D | mi.array_entry_hook | 50 0| const v0, #+4 (0x00000004 | 5.60519e-45) 55 12| const v0, #+1 (0x00000001 | 1.40130e-45) 59 21| const v0, #+2 (0x00000002 | 2.80260e-45) 61 26| const v0, #+3 (0x00000003 | 4.20390e-45) 64 34| const v0, #-16843010 (0xfefefefe | -1.69474e+38) 65 37| const v1, #-16843010 (0xfefefefe | -1.69474e+38) 66 40| const v2, #-16843010 (0xfefefefe | -1.69474e+38) 87 0| const v0, #+4 (0x00000004 | 5.60519e-45) 92 12| const v0, #+1 (0x00000001 | 1.40130e-45) 96 21| const v0, #+2 (0x00000002 | 2.80260e-45) [all …]
|
/tools/test/connectivity/acts/framework/acts/ |
D | base_test.py | 64 except error.ActsError as e: 66 ExceptionRecord(e, 'Logcat for test begin: %s' % 68 test_instance.log.error('BaseTest setup_test error: %s' % e.details) 69 except Exception as e: 72 test_instance.log.warning('Error: %s' % e) 86 except error.ActsError as e: 88 ExceptionRecord(e, 90 test_instance.log.error('BaseTest teardown_test error: %s' % e.details) 91 except Exception as e: 94 test_instance.log.warning('Error: %s' % e) [all …]
|
/tools/security/remote_provisioning/attestation_testing/java/com/google/attestationexample/ |
D | AttestationTest.java | 107 } catch (Exception e) { in doInBackground() 108 Log.e(FAIL, "Something is wrong, check detailed logcat logs:\n", e); in doInBackground() 146 } catch (GeneralSecurityException e) { in testEcAttestation() 147 Log.e(FAIL, "Certificate chain does not verify.", e); in testEcAttestation() 158 Log.e(FAIL, "root certificate public key does not match Google public key"); in testEcAttestation() 165 Log.e(FAIL, "attestation certificate contains unexpected OIDs"); in testEcAttestation() 167 Log.e(FAIL, "Unexpected OID: " + oid); in testEcAttestation() 197 } catch(Exception e) { in testEcAttestation() 198 Log.e(FAIL,"Failed to sign with generated key", e); in testEcAttestation() 218 Log.e("****", pemCertPre); in verifyCertificateSignatures() [all …]
|
/tools/test/graphicsbenchmark/performance_tests/hostside/src/com/android/game/qualification/metric/ |
D | GameQualificationFpsCollector.java | 76 } catch (IOException e) { in doStart() 78 throw new RuntimeException(e); in doStart() 91 } catch (PatternSyntaxException e) { in doStart() 92 throw new RuntimeException(e); in doStart() 103 } catch (DeviceNotAvailableException e) { in collect() 105 "Device not available during FPS data collection: " + e.getMessage()); in collect() 106 throw new RuntimeException(e); in collect() 171 … CLog.e("No overlap with previous poll, we missed some frames!"); // FIND SOMETHING BETTER in processRawData() 175 } catch (IOException e) { in processRawData() 176 throw new RuntimeException(e); in processRawData() [all …]
|
/tools/apksig/src/main/java/com/android/apksig/internal/apk/v1/ |
D | V1SchemeSigner.java | 291 } catch (InvalidKeyException e) { in signManifest() 293 "Failed to sign using signer \"" + signerName + "\"", e); in signManifest() 294 } catch (CertificateException e) { in signManifest() 296 "Failed to sign using signer \"" + signerName + "\"", e); in signManifest() 297 } catch (SignatureException e) { in signManifest() 299 "Failed to sign using signer \"" + signerName + "\"", e); in signManifest() 343 } catch (IOException e) { in generateManifestFile() 344 throw new ApkFormatException("Malformed source META-INF/MANIFEST.MF", e); in generateManifestFile() 361 } catch (IOException e) { in generateManifestFile() 362 throw new RuntimeException("Failed to write in-memory MANIFEST.MF", e); in generateManifestFile() [all …]
|
/tools/test/connectivity/acts/framework/acts/controllers/sl4a_lib/ |
D | sl4a_session.py | 128 except AdbError as e: 129 if 'cannot bind listener' in e.stderr: 133 (hinted_port, server_port, e.stderr)) 136 raise e 195 except OSError as e: 197 if e.errno == errno.EADDRINUSE: 213 except socket.error as e: 219 if e.errno == errno.EADDRNOTAVAIL: 237 except Exception as e: 239 e): [all …]
|
/tools/apkzlib/src/test/java/com/android/tools/build/apkzlib/zip/ |
D | ZFileReadOnlyTest.java | 40 } catch (IOException e) { in cannotCreateRoFileOnNonExistingFile() 61 } catch (IllegalStateException e) { in cannotUpdateInRoMode() 73 } catch (IllegalStateException e) { in cannotAddFilesInRoMode() 86 } catch (IllegalStateException e) { in cannotAddRecursivelyInRoMode() 98 } catch (IllegalStateException e) { in cannotReplaceFilesInRoMode() 112 } catch (IllegalStateException e) { in cannotDeleteFilesInRoMode() 125 } catch (IllegalStateException e) { in cannotMergeInRoMode() 138 } catch (IllegalStateException e) { in cannotTouchInRoMode() 150 } catch (IllegalStateException e) { in cannotRealignInRoMode() 162 } catch (IllegalStateException e) { in cannotAddExtensionInRoMode() [all …]
|
/tools/apksig/src/main/java/com/android/apksig/apk/ |
D | ApkUtils.java | 114 } catch (ZipFormatException e) { in findApkSigningBlock() 115 throw new ApkFormatException("Malformed APK: not a ZIP archive", e); in findApkSigningBlock() 163 } catch (ZipFormatException e) { in getAndroidManifest() 164 throw new ApkFormatException("Not a valid ZIP archive", e); in getAndroidManifest() 184 } catch (ZipFormatException e) { in getAndroidManifest() 185 throw new ApkFormatException("Failed to read " + ANDROID_MANIFEST_ZIP_ENTRY_NAME, e); in getAndroidManifest() 285 } catch (AndroidBinXmlParser.XmlParserException e) { in getMinSdkVersionFromBinaryAndroidManifest() 289 e); in getMinSdkVersionFromBinaryAndroidManifest() 453 } catch (AndroidBinXmlParser.XmlParserException e) { in getDebuggableFromBinaryAndroidManifest() 457 e); in getDebuggableFromBinaryAndroidManifest() [all …]
|
/tools/test/connectivity/acts_tests/tests/google/tel/live/ |
D | TelLiveCellInfoTest.py | 104 except Exception as e: 124 except Exception as e: 126 str(e)) 139 except Exception as e: 176 except Exception as e: 178 str(e)) 203 except Exception as e: 247 except Exception as e: 282 except Exception as e: 284 str(e)) [all …]
|
/tools/apksig/src/main/java/com/android/apksig/internal/apk/v3/ |
D | V3SchemeVerifier.java | 209 } catch (IllegalArgumentException e) { in verify() 236 } catch (ApkFormatException e) { in parseSigners() 248 } catch (CertificateException e) { in parseSigners() 249 throw new RuntimeException("Failed to obtain X.509 CertificateFactory", e); in parseSigners() 262 } catch (ApkFormatException | BufferUnderflowException e) { in parseSigners() 325 } catch (ApkFormatException | BufferUnderflowException e) { in parseSigner() 341 } catch (ApkSigningBlockUtils.NoSupportedSignaturesException e) { in parseSigner() 357 } catch (Exception e) { in parseSigner() 358 result.addError(Issue.V3_SIG_MALFORMED_PUBLIC_KEY, e); in parseSigner() 377 | SignatureException e) { in parseSigner() [all …]
|
/tools/test/connectivity/acts/framework/tests/ |
D | acts_error_test.py | 24 e = error.ActsError() 25 self.assertEqual(e.error_code, 100) 28 e = error.ActsError() 29 self.assertEqual(e.error_doc, 'Base Acts Error') 32 e = error.ActsError() 33 self.assertEqual(e.details, '') 37 e = error.ActsError(*args) 38 self.assertEqual(e.details, 'hello') 41 e = error.ActsError(key='value') 42 self.assertIn(('key', 'value'), e.extras.items())
|
/tools/apksig/src/main/java/com/android/apksig/internal/asn1/ |
D | Asn1BerParser.java | 65 } catch (BerDataValueFormatException e) { in parse() 66 throw new Asn1DecodingException("Failed to decode top-level data value", e); in parse() 101 } catch (BerDataValueFormatException e) { in parseImplicitSetOf() 102 throw new Asn1DecodingException("Failed to decode top-level data value", e); in parseImplicitSetOf() 178 } catch (IllegalArgumentException | ReflectiveOperationException e) { in parseChoice() 179 throw new Asn1DecodingException("Failed to instantiate " + containerClass.getName(), e); in parseChoice() 224 } catch (IllegalArgumentException | ReflectiveOperationException e) { in parseSequence() 225 throw new Asn1DecodingException("Failed to instantiate " + containerClass.getName(), e); in parseSequence() 241 } catch (BerDataValueFormatException e) { in parseSequence() 242 throw new Asn1DecodingException("Malformed data value", e); in parseSequence() [all …]
|
/tools/apksig/src/main/java/com/android/apksig/internal/apk/v2/ |
D | V2SchemeVerifier.java | 186 } catch (ApkFormatException e) { in parseSigners() 198 } catch (CertificateException e) { in parseSigners() 199 throw new RuntimeException("Failed to obtain X.509 CertificateFactory", e); in parseSigners() 220 } catch (ApkFormatException | BufferUnderflowException e) { in parseSigners() 276 } catch (ApkFormatException | BufferUnderflowException e) { in parseSigner() 292 } catch (ApkSigningBlockUtils.NoSupportedSignaturesException e) { in parseSigner() 293 result.addError(Issue.V2_SIG_NO_SUPPORTED_SIGNATURES, e); in parseSigner() 308 } catch (Exception e) { in parseSigner() 309 result.addError(Issue.V2_SIG_MALFORMED_PUBLIC_KEY, e); in parseSigner() 328 | SignatureException e) { in parseSigner() [all …]
|
/tools/apksig/src/main/java/com/android/apksig/ |
D | SourceStampVerifier.java | 140 } catch (IOException e) { in verifySourceStamp() 142 result.addVerificationError(ApkVerificationIssue.UNEXPECTED_EXCEPTION, e); in verifySourceStamp() 186 } catch (SignatureNotFoundException e) { in verifySourceStamp() 220 } catch (SignatureNotFoundException e) { in verifySourceStamp() 239 } catch (SignatureNotFoundException e) { in verifySourceStamp() 270 } catch (ApkFormatException | IOException | ZipFormatException e) { in verifySourceStamp() 271 result.addVerificationError(ApkVerificationIssue.MALFORMED_APK, e); in verifySourceStamp() 272 } catch (NoSuchAlgorithmException e) { in verifySourceStamp() 273 result.addVerificationError(ApkVerificationIssue.UNEXPECTED_EXCEPTION, e); in verifySourceStamp() 274 } catch (SignatureNotFoundException e) { in verifySourceStamp() [all …]
|
/tools/apksig/src/main/java/com/android/apksig/internal/util/ |
D | X509CertificateUtils.java | 59 } catch (CertificateException e) { in buildCertFactory() 60 throw new RuntimeException("Failed to create X.509 CertificateFactory", e); in buildCertFactory() 74 } catch (IOException e) { in generateCertificate() 75 throw new CertificateException("Failed to parse certificate", e); in generateCertificate() 106 } catch (CertificateException e) { in generateCertificate() 138 } catch (Asn1DecodingException | Asn1EncodingException | CertificateException e) { in generateCertificate() 139 throw new CertificateException("Failed to parse certificate", e); in generateCertificate() 173 } catch (IOException e) { in generateCertificates() 174 throw new CertificateException("Failed to read the input stream", e); in generateCertificates() 178 } catch (CertificateException e) { in generateCertificates() [all …]
|
/tools/test/connectivity/acts_tests/acts_contrib/test_utils/tel/ |
D | TelephonyBaseTest.py | 120 except signals.TestFailure as e: 121 self.testsignal_details = e.details 122 self.testsignal_extras = e.extras 126 except Exception as e: 127 self.log.exception(e) 402 except Exception as e: 403 self.log.error("Failure with %s", e) 411 except Exception as e: 412 self.log.error("Failure with %s", e) 415 except Exception as e: [all …]
|
/tools/apksig/src/main/java/com/android/apksig/internal/apk/v4/ |
D | V4SchemeSigner.java | 104 } catch (IOException e) { in generateV4Signature() 106 throw e; in generateV4Signature() 145 } catch (InvalidKeyException | SignatureException | CertificateEncodingException e) { in generateV4Signature() 146 throw new InvalidKeyException("Signer failed", e); in generateV4Signature() 200 } catch (ZipFormatException e) { in getApkDigest() 201 throw new IOException("Malformed APK: not a ZIP archive", e); in getApkDigest() 207 } catch (SignatureException e) { in getApkDigest() 208 v3Exception = e; in getApkDigest() 214 } catch (SignatureException e) { in getApkDigest() 215 v2Exception = e; in getApkDigest() [all …]
|
/tools/apksig/src/main/java/com/android/apksig/internal/apk/ |
D | ApkSigningBlockUtils.java | 180 } catch (DigestException e) { in verifyIntegrity() 181 throw new RuntimeException("Failed to compute content digests", e); in verifyIntegrity() 236 } catch (com.android.apksig.internal.apk.SignatureNotFoundException e) { in findApkSignatureSchemeBlock() 237 throw new SignatureNotFoundException(e.getMessage()); in findApkSignatureSchemeBlock() 353 } catch (IOException e) { in computeOneMbChunkContentDigests() 354 throw new IOException("Failed to read chunk #" + chunkIndex, e); in computeOneMbChunkContentDigests() 502 } catch (IOException | DigestException e) { in run() 503 throw new RuntimeException(e); in run() 573 } catch (IOException e) { in get() 574 throw new IllegalStateException("Failed to read chunk", e); in get() [all …]
|
/tools/apksig/src/apksigner/java/com/android/apksigner/ |
D | SignerParams.java | 217 } catch (NoSuchMethodException e) { in loadPrivateKeyAndCertsFromKeyStore() 328 } catch (UnrecoverableKeyException e) { in loadPrivateKeyAndCertsFromKeyStore() 335 e); in loadPrivateKeyAndCertsFromKeyStore() 368 } catch (Exception e) { in loadKeyStoreFromFile() 369 lastFailure = e; in loadKeyStoreFromFile() 385 } catch (UnrecoverableKeyException e) { in getKeyStoreKey() 386 lastFailure = e; in getKeyStoreKey() 422 } catch (IOException e) { in loadPrivateKeyAndCertsFromFiles() 430 "Failed to parse encrypted private key blob " + keyFile, e); in loadPrivateKeyAndCertsFromFiles() 437 } catch (InvalidKeySpecException e) { in loadPrivateKeyAndCertsFromFiles() [all …]
|