Home
last modified time | relevance | path

Searched refs:e (Results 1 – 25 of 372) sorted by relevance

12345678910>>...15

/tools/dexter/testdata/expected/
Dexit_hooks.code_coverage1 1: mi=0 s=0 e=2
2 2: mi=0 s=5 e=5
3 3: mi=1 s=0 e=1
4 4: mi=1 s=3 e=3
5 5: mi=1 s=5 e=5
6 6: mi=1 s=8 e=8
7 7: mi=1 s=11 e=11
8 8: mi=1 s=13 e=13
9 9: mi=1 s=15 e=15
10 10: mi=1 s=18 e=18
[all …]
Dentry_hooks.code_coverage1 1: mi=0 s=0 e=2
2 2: mi=0 s=5 e=5
3 3: mi=1 s=0 e=3
4 4: mi=1 s=5 e=5
5 5: mi=1 s=7 e=8
6 6: mi=1 s=10 e=15
7 7: mi=1 s=18 e=19
8 8: mi=1 s=21 e=26
9 9: mi=1 s=28 e=28
10 10: mi=1 s=31 e=34
[all …]
Dhello_nodebug.code_coverage1 1: mi=0 s=0 e=4
2 2: mi=0 s=6 e=7
3 3: mi=0 s=10 e=10
4 4: mi=1 s=0 e=2
5 5: mi=1 s=5 e=5
6 6: mi=2 s=0 e=2
7 7: mi=2 s=5 e=5
8 8: mi=3 s=0 e=2
9 9: mi=3 s=5 e=5
10 10: mi=3 s=7 e=7
[all …]
Dhello.code_coverage1 1: mi=0 s=0 e=4
2 2: mi=0 s=6 e=7
3 3: mi=0 s=10 e=10
4 4: mi=1 s=0 e=2
5 5: mi=1 s=5 e=5
6 6: mi=2 s=0 e=2
7 7: mi=2 s=5 e=5
8 8: mi=3 s=0 e=2
9 9: mi=3 s=5 e=5
10 10: mi=3 s=7 e=7
[all …]
Dtry_catch.code_coverage1 1: mi=0 s=0 e=2
2 2: mi=0 s=5 e=5
3 3: mi=1 s=0 e=2
4 4: mi=1 s=5 e=5
5 5: mi=2 s=0 e=2
6 6: mi=2 s=5 e=5
7 7: mi=3 s=0 e=2
8 8: mi=3 s=4 e=5
9 9: mi=3 s=8 e=9
10 10: mi=3 s=10 e=10
[all …]
Dmi.code_coverage1 1: mi=0 s=0 e=0
2 2: mi=0 s=3 e=3
3 3: mi=1 s=0 e=1
4 4: mi=3 s=0 e=0
5 5: mi=3 s=3 e=3
6 6: mi=3 s=5 e=5
7 7: mi=3 s=7 e=7
8 8: mi=4 s=0 e=0
9 9: mi=4 s=2 e=2
10 10: mi=4 s=5 e=6
[all …]
Dmi.array_entry_hook50 0| const v0, #+4 (0x00000004 | 5.60519e-45)
55 12| const v0, #+1 (0x00000001 | 1.40130e-45)
59 21| const v0, #+2 (0x00000002 | 2.80260e-45)
61 26| const v0, #+3 (0x00000003 | 4.20390e-45)
64 34| const v0, #-16843010 (0xfefefefe | -1.69474e+38)
65 37| const v1, #-16843010 (0xfefefefe | -1.69474e+38)
66 40| const v2, #-16843010 (0xfefefefe | -1.69474e+38)
87 0| const v0, #+4 (0x00000004 | 5.60519e-45)
92 12| const v0, #+1 (0x00000001 | 1.40130e-45)
96 21| const v0, #+2 (0x00000002 | 2.80260e-45)
[all …]
/tools/test/connectivity/acts/framework/acts/
Dbase_test.py64 except error.ActsError as e:
66 ExceptionRecord(e, 'Logcat for test begin: %s' %
68 test_instance.log.error('BaseTest setup_test error: %s' % e.details)
69 except Exception as e:
72 test_instance.log.warning('Error: %s' % e)
86 except error.ActsError as e:
88 ExceptionRecord(e,
90 test_instance.log.error('BaseTest teardown_test error: %s' % e.details)
91 except Exception as e:
94 test_instance.log.warning('Error: %s' % e)
[all …]
/tools/security/remote_provisioning/attestation_testing/java/com/google/attestationexample/
DAttestationTest.java107 } catch (Exception e) { in doInBackground()
108 Log.e(FAIL, "Something is wrong, check detailed logcat logs:\n", e); in doInBackground()
146 } catch (GeneralSecurityException e) { in testEcAttestation()
147 Log.e(FAIL, "Certificate chain does not verify.", e); in testEcAttestation()
158 Log.e(FAIL, "root certificate public key does not match Google public key"); in testEcAttestation()
165 Log.e(FAIL, "attestation certificate contains unexpected OIDs"); in testEcAttestation()
167 Log.e(FAIL, "Unexpected OID: " + oid); in testEcAttestation()
197 } catch(Exception e) { in testEcAttestation()
198 Log.e(FAIL,"Failed to sign with generated key", e); in testEcAttestation()
218 Log.e("****", pemCertPre); in verifyCertificateSignatures()
[all …]
/tools/test/graphicsbenchmark/performance_tests/hostside/src/com/android/game/qualification/metric/
DGameQualificationFpsCollector.java76 } catch (IOException e) { in doStart()
78 throw new RuntimeException(e); in doStart()
91 } catch (PatternSyntaxException e) { in doStart()
92 throw new RuntimeException(e); in doStart()
103 } catch (DeviceNotAvailableException e) { in collect()
105 "Device not available during FPS data collection: " + e.getMessage()); in collect()
106 throw new RuntimeException(e); in collect()
171 … CLog.e("No overlap with previous poll, we missed some frames!"); // FIND SOMETHING BETTER in processRawData()
175 } catch (IOException e) { in processRawData()
176 throw new RuntimeException(e); in processRawData()
[all …]
/tools/apksig/src/main/java/com/android/apksig/internal/apk/v1/
DV1SchemeSigner.java291 } catch (InvalidKeyException e) { in signManifest()
293 "Failed to sign using signer \"" + signerName + "\"", e); in signManifest()
294 } catch (CertificateException e) { in signManifest()
296 "Failed to sign using signer \"" + signerName + "\"", e); in signManifest()
297 } catch (SignatureException e) { in signManifest()
299 "Failed to sign using signer \"" + signerName + "\"", e); in signManifest()
343 } catch (IOException e) { in generateManifestFile()
344 throw new ApkFormatException("Malformed source META-INF/MANIFEST.MF", e); in generateManifestFile()
361 } catch (IOException e) { in generateManifestFile()
362 throw new RuntimeException("Failed to write in-memory MANIFEST.MF", e); in generateManifestFile()
[all …]
/tools/test/connectivity/acts/framework/acts/controllers/sl4a_lib/
Dsl4a_session.py128 except AdbError as e:
129 if 'cannot bind listener' in e.stderr:
133 (hinted_port, server_port, e.stderr))
136 raise e
195 except OSError as e:
197 if e.errno == errno.EADDRINUSE:
213 except socket.error as e:
219 if e.errno == errno.EADDRNOTAVAIL:
237 except Exception as e:
239 e):
[all …]
/tools/apkzlib/src/test/java/com/android/tools/build/apkzlib/zip/
DZFileReadOnlyTest.java40 } catch (IOException e) { in cannotCreateRoFileOnNonExistingFile()
61 } catch (IllegalStateException e) { in cannotUpdateInRoMode()
73 } catch (IllegalStateException e) { in cannotAddFilesInRoMode()
86 } catch (IllegalStateException e) { in cannotAddRecursivelyInRoMode()
98 } catch (IllegalStateException e) { in cannotReplaceFilesInRoMode()
112 } catch (IllegalStateException e) { in cannotDeleteFilesInRoMode()
125 } catch (IllegalStateException e) { in cannotMergeInRoMode()
138 } catch (IllegalStateException e) { in cannotTouchInRoMode()
150 } catch (IllegalStateException e) { in cannotRealignInRoMode()
162 } catch (IllegalStateException e) { in cannotAddExtensionInRoMode()
[all …]
/tools/apksig/src/main/java/com/android/apksig/apk/
DApkUtils.java114 } catch (ZipFormatException e) { in findApkSigningBlock()
115 throw new ApkFormatException("Malformed APK: not a ZIP archive", e); in findApkSigningBlock()
163 } catch (ZipFormatException e) { in getAndroidManifest()
164 throw new ApkFormatException("Not a valid ZIP archive", e); in getAndroidManifest()
184 } catch (ZipFormatException e) { in getAndroidManifest()
185 throw new ApkFormatException("Failed to read " + ANDROID_MANIFEST_ZIP_ENTRY_NAME, e); in getAndroidManifest()
285 } catch (AndroidBinXmlParser.XmlParserException e) { in getMinSdkVersionFromBinaryAndroidManifest()
289 e); in getMinSdkVersionFromBinaryAndroidManifest()
453 } catch (AndroidBinXmlParser.XmlParserException e) { in getDebuggableFromBinaryAndroidManifest()
457 e); in getDebuggableFromBinaryAndroidManifest()
[all …]
/tools/test/connectivity/acts_tests/tests/google/tel/live/
DTelLiveCellInfoTest.py104 except Exception as e:
124 except Exception as e:
126 str(e))
139 except Exception as e:
176 except Exception as e:
178 str(e))
203 except Exception as e:
247 except Exception as e:
282 except Exception as e:
284 str(e))
[all …]
/tools/apksig/src/main/java/com/android/apksig/internal/apk/v3/
DV3SchemeVerifier.java209 } catch (IllegalArgumentException e) { in verify()
236 } catch (ApkFormatException e) { in parseSigners()
248 } catch (CertificateException e) { in parseSigners()
249 throw new RuntimeException("Failed to obtain X.509 CertificateFactory", e); in parseSigners()
262 } catch (ApkFormatException | BufferUnderflowException e) { in parseSigners()
325 } catch (ApkFormatException | BufferUnderflowException e) { in parseSigner()
341 } catch (ApkSigningBlockUtils.NoSupportedSignaturesException e) { in parseSigner()
357 } catch (Exception e) { in parseSigner()
358 result.addError(Issue.V3_SIG_MALFORMED_PUBLIC_KEY, e); in parseSigner()
377 | SignatureException e) { in parseSigner()
[all …]
/tools/test/connectivity/acts/framework/tests/
Dacts_error_test.py24 e = error.ActsError()
25 self.assertEqual(e.error_code, 100)
28 e = error.ActsError()
29 self.assertEqual(e.error_doc, 'Base Acts Error')
32 e = error.ActsError()
33 self.assertEqual(e.details, '')
37 e = error.ActsError(*args)
38 self.assertEqual(e.details, 'hello')
41 e = error.ActsError(key='value')
42 self.assertIn(('key', 'value'), e.extras.items())
/tools/apksig/src/main/java/com/android/apksig/internal/asn1/
DAsn1BerParser.java65 } catch (BerDataValueFormatException e) { in parse()
66 throw new Asn1DecodingException("Failed to decode top-level data value", e); in parse()
101 } catch (BerDataValueFormatException e) { in parseImplicitSetOf()
102 throw new Asn1DecodingException("Failed to decode top-level data value", e); in parseImplicitSetOf()
178 } catch (IllegalArgumentException | ReflectiveOperationException e) { in parseChoice()
179 throw new Asn1DecodingException("Failed to instantiate " + containerClass.getName(), e); in parseChoice()
224 } catch (IllegalArgumentException | ReflectiveOperationException e) { in parseSequence()
225 throw new Asn1DecodingException("Failed to instantiate " + containerClass.getName(), e); in parseSequence()
241 } catch (BerDataValueFormatException e) { in parseSequence()
242 throw new Asn1DecodingException("Malformed data value", e); in parseSequence()
[all …]
/tools/apksig/src/main/java/com/android/apksig/internal/apk/v2/
DV2SchemeVerifier.java186 } catch (ApkFormatException e) { in parseSigners()
198 } catch (CertificateException e) { in parseSigners()
199 throw new RuntimeException("Failed to obtain X.509 CertificateFactory", e); in parseSigners()
220 } catch (ApkFormatException | BufferUnderflowException e) { in parseSigners()
276 } catch (ApkFormatException | BufferUnderflowException e) { in parseSigner()
292 } catch (ApkSigningBlockUtils.NoSupportedSignaturesException e) { in parseSigner()
293 result.addError(Issue.V2_SIG_NO_SUPPORTED_SIGNATURES, e); in parseSigner()
308 } catch (Exception e) { in parseSigner()
309 result.addError(Issue.V2_SIG_MALFORMED_PUBLIC_KEY, e); in parseSigner()
328 | SignatureException e) { in parseSigner()
[all …]
/tools/apksig/src/main/java/com/android/apksig/
DSourceStampVerifier.java140 } catch (IOException e) { in verifySourceStamp()
142 result.addVerificationError(ApkVerificationIssue.UNEXPECTED_EXCEPTION, e); in verifySourceStamp()
186 } catch (SignatureNotFoundException e) { in verifySourceStamp()
220 } catch (SignatureNotFoundException e) { in verifySourceStamp()
239 } catch (SignatureNotFoundException e) { in verifySourceStamp()
270 } catch (ApkFormatException | IOException | ZipFormatException e) { in verifySourceStamp()
271 result.addVerificationError(ApkVerificationIssue.MALFORMED_APK, e); in verifySourceStamp()
272 } catch (NoSuchAlgorithmException e) { in verifySourceStamp()
273 result.addVerificationError(ApkVerificationIssue.UNEXPECTED_EXCEPTION, e); in verifySourceStamp()
274 } catch (SignatureNotFoundException e) { in verifySourceStamp()
[all …]
/tools/apksig/src/main/java/com/android/apksig/internal/util/
DX509CertificateUtils.java59 } catch (CertificateException e) { in buildCertFactory()
60 throw new RuntimeException("Failed to create X.509 CertificateFactory", e); in buildCertFactory()
74 } catch (IOException e) { in generateCertificate()
75 throw new CertificateException("Failed to parse certificate", e); in generateCertificate()
106 } catch (CertificateException e) { in generateCertificate()
138 } catch (Asn1DecodingException | Asn1EncodingException | CertificateException e) { in generateCertificate()
139 throw new CertificateException("Failed to parse certificate", e); in generateCertificate()
173 } catch (IOException e) { in generateCertificates()
174 throw new CertificateException("Failed to read the input stream", e); in generateCertificates()
178 } catch (CertificateException e) { in generateCertificates()
[all …]
/tools/test/connectivity/acts_tests/acts_contrib/test_utils/tel/
DTelephonyBaseTest.py120 except signals.TestFailure as e:
121 self.testsignal_details = e.details
122 self.testsignal_extras = e.extras
126 except Exception as e:
127 self.log.exception(e)
402 except Exception as e:
403 self.log.error("Failure with %s", e)
411 except Exception as e:
412 self.log.error("Failure with %s", e)
415 except Exception as e:
[all …]
/tools/apksig/src/main/java/com/android/apksig/internal/apk/v4/
DV4SchemeSigner.java104 } catch (IOException e) { in generateV4Signature()
106 throw e; in generateV4Signature()
145 } catch (InvalidKeyException | SignatureException | CertificateEncodingException e) { in generateV4Signature()
146 throw new InvalidKeyException("Signer failed", e); in generateV4Signature()
200 } catch (ZipFormatException e) { in getApkDigest()
201 throw new IOException("Malformed APK: not a ZIP archive", e); in getApkDigest()
207 } catch (SignatureException e) { in getApkDigest()
208 v3Exception = e; in getApkDigest()
214 } catch (SignatureException e) { in getApkDigest()
215 v2Exception = e; in getApkDigest()
[all …]
/tools/apksig/src/main/java/com/android/apksig/internal/apk/
DApkSigningBlockUtils.java180 } catch (DigestException e) { in verifyIntegrity()
181 throw new RuntimeException("Failed to compute content digests", e); in verifyIntegrity()
236 } catch (com.android.apksig.internal.apk.SignatureNotFoundException e) { in findApkSignatureSchemeBlock()
237 throw new SignatureNotFoundException(e.getMessage()); in findApkSignatureSchemeBlock()
353 } catch (IOException e) { in computeOneMbChunkContentDigests()
354 throw new IOException("Failed to read chunk #" + chunkIndex, e); in computeOneMbChunkContentDigests()
502 } catch (IOException | DigestException e) { in run()
503 throw new RuntimeException(e); in run()
573 } catch (IOException e) { in get()
574 throw new IllegalStateException("Failed to read chunk", e); in get()
[all …]
/tools/apksig/src/apksigner/java/com/android/apksigner/
DSignerParams.java217 } catch (NoSuchMethodException e) { in loadPrivateKeyAndCertsFromKeyStore()
328 } catch (UnrecoverableKeyException e) { in loadPrivateKeyAndCertsFromKeyStore()
335 e); in loadPrivateKeyAndCertsFromKeyStore()
368 } catch (Exception e) { in loadKeyStoreFromFile()
369 lastFailure = e; in loadKeyStoreFromFile()
385 } catch (UnrecoverableKeyException e) { in getKeyStoreKey()
386 lastFailure = e; in getKeyStoreKey()
422 } catch (IOException e) { in loadPrivateKeyAndCertsFromFiles()
430 "Failed to parse encrypted private key blob " + keyFile, e); in loadPrivateKeyAndCertsFromFiles()
437 } catch (InvalidKeySpecException e) { in loadPrivateKeyAndCertsFromFiles()
[all …]

12345678910>>...15