| /external/accessibility-test-framework/src/main/java/com/google/android/apps/common/testing/accessibility/framework/ |
| D | AccessibilityCheckPreset.java | 20 import com.google.android.apps.common.testing.accessibility.framework.checks.ClassNameCheck; 21 import com.google.android.apps.common.testing.accessibility.framework.checks.ClickableSpanCheck; 22 import com.google.android.apps.common.testing.accessibility.framework.checks.DuplicateClickableBoun… 23 import com.google.android.apps.common.testing.accessibility.framework.checks.DuplicateSpeakableText… 24 import com.google.android.apps.common.testing.accessibility.framework.checks.EditableContentDescChe… 25 import com.google.android.apps.common.testing.accessibility.framework.checks.ImageContrastCheck; 26 import com.google.android.apps.common.testing.accessibility.framework.checks.LinkPurposeUnclearChec… 27 import com.google.android.apps.common.testing.accessibility.framework.checks.RedundantDescriptionCh… 28 import com.google.android.apps.common.testing.accessibility.framework.checks.SpeakableTextPresentCh… 29 import com.google.android.apps.common.testing.accessibility.framework.checks.TextContrastCheck; [all …]
|
| D | AccessibilityCheckPresetAndroid.java | 22 import com.google.android.apps.common.testing.accessibility.framework.checks.ClassNameCheck; 32 * Retrieve checks for {@code View}s based on a desired preset. 35 * @return A set of all checks for {@code View}s with scopes for the preset 38 * for the most up to date set of accessibility checks. 44 // No View-based checks were added in version 3.0. The AccessibilityHierarchyChecks that were in getViewChecksForPreset() 50 ImmutableSet<AccessibilityHierarchyCheck> checks = in getViewChecksForPreset() local 58 checks = in getViewChecksForPreset() 60 checks, in getViewChecksForPreset() 69 for (AccessibilityHierarchyCheck check : checks) { in getViewChecksForPreset() 76 * Retrieve checks for {@code AccessibilityEvent}s based on a desired preset. [all …]
|
| /external/clang/test/CodeGen/ |
| D | unsigned-promotion.c | 5 // RUN: -fsanitize=signed-integer-overflow | FileCheck %s --check-prefix=CHECKS 15 // CHECKS-LABEL: define void @testshortadd() 18 // CHECKS: load i16, i16* @sj in testshortadd() 19 // CHECKS: load i16, i16* @sk in testshortadd() 20 …// CHECKS: [[T1:%.*]] = call { i32, i1 } @llvm.sadd.with.overflow.i32(i32 [[T2:%.*]], i32 [… in testshortadd() 21 // CHECKS-NEXT: [[T4:%.*]] = extractvalue { i32, i1 } [[T1]], 0 in testshortadd() 22 // CHECKS-NEXT: [[T5:%.*]] = extractvalue { i32, i1 } [[T1]], 1 in testshortadd() 23 // CHECKS: call void @__ubsan_handle_add_overflow in testshortadd() 36 // CHECKS-LABEL: define void @testshortsub() 40 // CHECKS: load i16, i16* @sj in testshortsub() [all …]
|
| /external/crosvm/tools/ |
| D | presubmit | 43 # registered and configured in the CHECKS list below. 60 "Run mypy type checks on python dev tooling." 177 "Custom checks are written in python in tools/custom_checks. This is a wrapper to call them." 193 # Checks configuration 195 # Configures which checks are available and on which files they are run. 198 CHECKS: List[Check] = [ variable 344 # Configures pre-defined groups of checks. Some are configured for CI builders and others 351 doc="Checks run by default", 352 checks=[ 363 doc="Runs a quick subset of presubmit checks.", [all …]
|
| /external/google-cloud-java/java-service-usage/proto-google-cloud-service-usage-v1beta1/src/main/java/com/google/api/serviceusage/v1beta1/ |
| D | DeleteAdminOverrideRequestOrBuilder.java | 60 * Setting the force parameter to 'true' ignores all quota safety checks that 74 * The list of quota safety checks to ignore before the override mutation. 75 * Unlike 'force' field that ignores all the quota safety checks, the 76 * 'force_only' field ignores only the specified checks; other checks are 89 * The list of quota safety checks to ignore before the override mutation. 90 * Unlike 'force' field that ignores all the quota safety checks, the 91 * 'force_only' field ignores only the specified checks; other checks are 104 * The list of quota safety checks to ignore before the override mutation. 105 * Unlike 'force' field that ignores all the quota safety checks, the 106 * 'force_only' field ignores only the specified checks; other checks are [all …]
|
| D | DeleteConsumerOverrideRequestOrBuilder.java | 60 * Setting the force parameter to 'true' ignores all quota safety checks that 74 * The list of quota safety checks to ignore before the override mutation. 75 * Unlike 'force' field that ignores all the quota safety checks, the 76 * 'force_only' field ignores only the specified checks; other checks are 89 * The list of quota safety checks to ignore before the override mutation. 90 * Unlike 'force' field that ignores all the quota safety checks, the 91 * 'force_only' field ignores only the specified checks; other checks are 104 * The list of quota safety checks to ignore before the override mutation. 105 * Unlike 'force' field that ignores all the quota safety checks, the 106 * 'force_only' field ignores only the specified checks; other checks are [all …]
|
| D | CreateConsumerOverrideRequestOrBuilder.java | 97 * Setting the force parameter to 'true' ignores all quota safety checks that 111 * The list of quota safety checks to ignore before the override mutation. 112 * Unlike 'force' field that ignores all the quota safety checks, the 113 * 'force_only' field ignores only the specified checks; other checks are 126 * The list of quota safety checks to ignore before the override mutation. 127 * Unlike 'force' field that ignores all the quota safety checks, the 128 * 'force_only' field ignores only the specified checks; other checks are 141 * The list of quota safety checks to ignore before the override mutation. 142 * Unlike 'force' field that ignores all the quota safety checks, the 143 * 'force_only' field ignores only the specified checks; other checks are [all …]
|
| D | ImportConsumerOverridesRequestOrBuilder.java | 95 * Setting the force parameter to 'true' ignores all quota safety checks that 109 * The list of quota safety checks to ignore before the override mutation. 110 * Unlike 'force' field that ignores all the quota safety checks, the 111 * 'force_only' field ignores only the specified checks; other checks are 124 * The list of quota safety checks to ignore before the override mutation. 125 * Unlike 'force' field that ignores all the quota safety checks, the 126 * 'force_only' field ignores only the specified checks; other checks are 139 * The list of quota safety checks to ignore before the override mutation. 140 * Unlike 'force' field that ignores all the quota safety checks, the 141 * 'force_only' field ignores only the specified checks; other checks are [all …]
|
| D | CreateAdminOverrideRequestOrBuilder.java | 97 * Setting the force parameter to 'true' ignores all quota safety checks that 111 * The list of quota safety checks to ignore before the override mutation. 112 * Unlike 'force' field that ignores all the quota safety checks, the 113 * 'force_only' field ignores only the specified checks; other checks are 126 * The list of quota safety checks to ignore before the override mutation. 127 * Unlike 'force' field that ignores all the quota safety checks, the 128 * 'force_only' field ignores only the specified checks; other checks are 141 * The list of quota safety checks to ignore before the override mutation. 142 * Unlike 'force' field that ignores all the quota safety checks, the 143 * 'force_only' field ignores only the specified checks; other checks are [all …]
|
| D | ImportAdminOverridesRequestOrBuilder.java | 95 * Setting the force parameter to 'true' ignores all quota safety checks that 109 * The list of quota safety checks to ignore before the override mutation. 110 * Unlike 'force' field that ignores all the quota safety checks, the 111 * 'force_only' field ignores only the specified checks; other checks are 124 * The list of quota safety checks to ignore before the override mutation. 125 * Unlike 'force' field that ignores all the quota safety checks, the 126 * 'force_only' field ignores only the specified checks; other checks are 139 * The list of quota safety checks to ignore before the override mutation. 140 * Unlike 'force' field that ignores all the quota safety checks, the 141 * 'force_only' field ignores only the specified checks; other checks are [all …]
|
| D | UpdateConsumerOverrideRequestOrBuilder.java | 98 * Setting the force parameter to 'true' ignores all quota safety checks that 150 * The list of quota safety checks to ignore before the override mutation. 151 * Unlike 'force' field that ignores all the quota safety checks, the 152 * 'force_only' field ignores only the specified checks; other checks are 165 * The list of quota safety checks to ignore before the override mutation. 166 * Unlike 'force' field that ignores all the quota safety checks, the 167 * 'force_only' field ignores only the specified checks; other checks are 180 * The list of quota safety checks to ignore before the override mutation. 181 * Unlike 'force' field that ignores all the quota safety checks, the 182 * 'force_only' field ignores only the specified checks; other checks are [all …]
|
| D | UpdateAdminOverrideRequestOrBuilder.java | 98 * Setting the force parameter to 'true' ignores all quota safety checks that 150 * The list of quota safety checks to ignore before the override mutation. 151 * Unlike 'force' field that ignores all the quota safety checks, the 152 * 'force_only' field ignores only the specified checks; other checks are 165 * The list of quota safety checks to ignore before the override mutation. 166 * Unlike 'force' field that ignores all the quota safety checks, the 167 * 'force_only' field ignores only the specified checks; other checks are 180 * The list of quota safety checks to ignore before the override mutation. 181 * Unlike 'force' field that ignores all the quota safety checks, the 182 * 'force_only' field ignores only the specified checks; other checks are [all …]
|
| D | DeleteConsumerOverrideRequest.java | 133 * Setting the force parameter to 'true' ignores all quota safety checks that 169 * The list of quota safety checks to ignore before the override mutation. 170 * Unlike 'force' field that ignores all the quota safety checks, the 171 * 'force_only' field ignores only the specified checks; other checks are 189 * The list of quota safety checks to ignore before the override mutation. 190 * Unlike 'force' field that ignores all the quota safety checks, the 191 * 'force_only' field ignores only the specified checks; other checks are 207 * The list of quota safety checks to ignore before the override mutation. 208 * Unlike 'force' field that ignores all the quota safety checks, the 209 * 'force_only' field ignores only the specified checks; other checks are [all …]
|
| D | DeleteAdminOverrideRequest.java | 133 * Setting the force parameter to 'true' ignores all quota safety checks that 169 * The list of quota safety checks to ignore before the override mutation. 170 * Unlike 'force' field that ignores all the quota safety checks, the 171 * 'force_only' field ignores only the specified checks; other checks are 189 * The list of quota safety checks to ignore before the override mutation. 190 * Unlike 'force' field that ignores all the quota safety checks, the 191 * 'force_only' field ignores only the specified checks; other checks are 207 * The list of quota safety checks to ignore before the override mutation. 208 * Unlike 'force' field that ignores all the quota safety checks, the 209 * 'force_only' field ignores only the specified checks; other checks are [all …]
|
| /external/cronet/base/memory/ |
| D | safety_checks.h | 23 // additional CHECKS across variety of memory safety mechanisms such as 30 // Checks here are disabled by default because of their performance cost. 62 // Set of checks for ADVANCED_MEMORY_SAFETY_CHECKS() annotated objects. 71 constexpr bool ShouldUsePartitionAlloc(MemorySafetyCheck checks) { in ShouldUsePartitionAlloc() argument 73 return static_cast<bool>(checks & in ShouldUsePartitionAlloc() 82 // Returns |partition_alloc::AllocFlags| corresponding to |checks|. 83 constexpr partition_alloc::AllocFlags GetAllocFlags(MemorySafetyCheck checks) { in GetAllocFlags() argument 88 // Returns |partition_alloc::FreeFlags| corresponding to |checks|. 89 constexpr partition_alloc::FreeFlags GetFreeFlags(MemorySafetyCheck checks) { in GetFreeFlags() argument 91 if (static_cast<bool>(checks & MemorySafetyCheck::kSchedulerLoopQuarantine)) { in GetFreeFlags() [all …]
|
| /external/angle/build/android/docs/ |
| D | static_analysis.md | 10 * [Useful checks include](https://googlesamples.github.io/android-custom-lint-rules/checks/index.md… 11 * `NewApi` (ensureing `Build.VERSION.SDK_INT` checks are in place). 12 * A list of disabled checks is found [within `lint.py`]. 14 * Custom lint checks [are possible], but we don't have any. 15 * Checks run on the entire codebase, not only on changed lines. 26 * [Useful checks include](https://errorprone.info/bugpatterns): 29 * A list of enabled / disabled checks is found [within `compile_java.py`](https://cs.chromium.org/c… 30 * Many checks are currently disabled because there is work involved in fixing 32 * Chrome has [a few custom checks]: 33 * Checks run on the entire codebase, not only on changed lines. [all …]
|
| /external/cronet/build/android/docs/ |
| D | static_analysis.md | 10 * [Useful checks include](https://googlesamples.github.io/android-custom-lint-rules/checks/index.md… 11 * `NewApi` (ensureing `Build.VERSION.SDK_INT` checks are in place). 12 * A list of disabled checks is found [within `lint.py`]. 14 * Custom lint checks [are possible], but we don't have any. 15 * Checks run on the entire codebase, not only on changed lines. 26 * [Useful checks include](https://errorprone.info/bugpatterns): 29 * A list of enabled / disabled checks is found [within `compile_java.py`](https://cs.chromium.org/c… 30 * Many checks are currently disabled because there is work involved in fixing 32 * Chrome has [a few custom checks]: 33 * Checks run on the entire codebase, not only on changed lines. [all …]
|
| /external/nullaway/nullaway/src/main/java/com/uber/nullaway/ |
| D | Config.java | 35 * Checks if Serialization feature is active. 52 * Checks if a class comes from an explicitly annotated package. 62 * Checks if a class comes from an explicitly unannotated (sub-)package. 72 * Checks if (tool) generated code should be considered always unannoatated. 80 * Checks if a class should be excluded. 89 * Checks if a class should be treated as unannotated. 107 * Checks if the annotation is an @Initializer annotation. 116 * Checks if the annotation is a custom @Nullable annotation. 124 * Checks if the annotation is a custom @Nonnull annotation. 132 * Checks if the annotation is an excluded field annotation. [all …]
|
| /external/python/cpython3/Tools/c-analyzer/c_analyzer/ |
| D | __main__.py | 123 # the checks 125 CHECKS = { variable 130 def add_checks_cli(parser, checks=None, *, add_flags=None): argument 132 if not checks: 133 checks = list(CHECKS) 135 elif isinstance(checks, str): 136 checks = [checks] 137 if (add_flags is None and len(checks) > 1) or default: 140 process_checks = add_sepval_cli(parser, '--check', 'checks', checks) 142 for check in checks: [all …]
|
| /external/tensorflow/tensorflow/compiler/xla/runtime/ |
| D | custom_call.h | 125 static constexpr bool CheckNames(RuntimeChecks checks) { in CheckNames() argument 126 return checks == RuntimeChecks::kDefault; in CheckNames() 129 static constexpr bool CheckTypes(RuntimeChecks checks) { in CheckTypes() argument 130 return checks != RuntimeChecks::kNone; in CheckTypes() 133 static constexpr bool CheckUserData(RuntimeChecks checks) { in CheckUserData() argument 134 return checks != RuntimeChecks::kNone; in CheckUserData() 138 static bool CheckType(RuntimeChecks checks, TypeID type_id) { in CheckType() argument 139 return !CheckTypes(checks) || type_id == TypeID::get<T>(); in CheckType() 181 template <CustomCall::RuntimeChecks checks, typename Fn, typename... Ts> 214 // Checks if remaining arguments are in the parameter pack. [all …]
|
| /external/nanohttpd/src/main/checkstyle/ |
| D | checkstyle-suppressions.xml | 9 <suppress files=".jpg" checks="NewlineAtEndOfFile|FileTabCharacter|FileLength" /> 10 <suppress files=".png" checks="NewlineAtEndOfFile|FileTabCharacter|FileLength" /> 11 <suppress files=".fxml" checks="FileTabCharacter" /> 12 <suppress files=".css" checks="FileTabCharacter" /> 13 <suppress files="META[\\-]INF[\\/]services[\\/]" checks="NewlineAtEndOfFile|FileTabCharacter" /> 17 <suppress files=".*Test\.java" checks="VisibilityModifier" /> 18 <suppress files="Test.*\.java" checks="VisibilityModifier" /> 22 <suppress files=".*Test\.java" checks="JavadocPackage" /> 23 <suppress files=".*Test\.java" checks="JavadocMethod" /> 24 <suppress files=".*Test\.java" checks="JavadocType" /> [all …]
|
| /external/autotest/client/site_tests/bluetooth_AVLHCI/ |
| D | bluetooth_AVLHCI.py | 65 """Checks Bluetooth legacy specification.""" 77 """Checks Bluetooth version 4.0 specification.""" 83 """Checks Bluetooth version 4.1 specification.""" 89 """Checks Bluetooth version 4.2 specification.""" 104 """Checks Bluetooth version 5.0 specification.""" 110 """Checks Microsoft Bluetooth HCI command execution.""" 115 """Checks Android Bluetooth HCI command execution.""" 180 """Checks the Bluetooth controller must support flushable data packets. 192 """Checks the Bluetooth controller supports Erroneous Data Reporting.""" 199 """Checks the Bluetooth controller event filter entries count. [all …]
|
| /external/expat/expat/ |
| D | apply-clang-tidy.sh | 53 checks="${checks_to_enable_flat// /,},-${checks_to_disable_flat// /,-}" 56 --checks="${checks}" 93 clang-tidy --checks="${checks}" --verify-config 95 clang-tidy --checks="${checks}" --list-checks 97 # These are the checks clang-tidy has *more* that so far we are missing out on, 99 clang-tidy --checks=\* --list-checks \ 100 | grep -v -f <(clang-tidy --checks="${checks}" --list-checks | xargs -n1) \ 103 | sed 's/^$/Disabled checks (simplified):/'
|
| /external/rust/crates/pdl-compiler/scripts/ |
| D | generate_cxx_backend_tests.py | 59 checks = [] 67 checks.append(f"ASSERT_EQ({get_field(decl, var, id)}, {value});") 70 checks.append(f"ASSERT_EQ({get_field(decl, var, id)}, {value});") 76 checks.append(f"ASSERT_EQ({get_field(decl, var, id)}, {value});") 80 checks.append(f"ASSERT_EQ({get_field(decl, var, id)}, {field.type_id}({value}));") 83 checks.append(f"ASSERT_TRUE(!{get_field(decl, var, id)}.has_value());") 86 … checks.append(f"{field.type_id} const& {field_var} = {get_field(decl, var, id)}.value();") 87 checks.extend(check_members(field.type, field_var, value)) 90 checks.append(f"{field.type_id} const& {field_var} = {get_field(decl, var, id)};") 91 checks.extend(check_members(field.type, field_var, value)) [all …]
|
| /external/strace/tests-m32/ |
| D | dev-yy.c | 52 } checks[] = { in main() local 58 for (unsigned int i = 0; i < ARRAY_SIZE(checks); i++) { in main() 64 long fd = syscall(__NR_openat, AT_FDCWD, checks[i].path, in main() 68 checks[i].path, sprintrc(fd)); in main() 71 checks[i].path, in main() 72 checks[i].blk ? "block" : "char", in main() 73 checks[i].major, checks[i].minor); in main() 77 if (checks[i].optional) in main() 81 checks[i].path); in main() 87 fd, checks[i].path, checks[i].blk ? "block" : "char", in main() [all …]
|