Home
last modified time | relevance | path

Searched full:checks (Results 1 – 25 of 11438) sorted by relevance

12345678910>>...458

/external/accessibility-test-framework/src/main/java/com/google/android/apps/common/testing/accessibility/framework/
DAccessibilityCheckPreset.java20 import com.google.android.apps.common.testing.accessibility.framework.checks.ClassNameCheck;
21 import com.google.android.apps.common.testing.accessibility.framework.checks.ClickableSpanCheck;
22 import com.google.android.apps.common.testing.accessibility.framework.checks.DuplicateClickableBoun…
23 import com.google.android.apps.common.testing.accessibility.framework.checks.DuplicateSpeakableText…
24 import com.google.android.apps.common.testing.accessibility.framework.checks.EditableContentDescChe…
25 import com.google.android.apps.common.testing.accessibility.framework.checks.ImageContrastCheck;
26 import com.google.android.apps.common.testing.accessibility.framework.checks.LinkPurposeUnclearChec…
27 import com.google.android.apps.common.testing.accessibility.framework.checks.RedundantDescriptionCh…
28 import com.google.android.apps.common.testing.accessibility.framework.checks.SpeakableTextPresentCh…
29 import com.google.android.apps.common.testing.accessibility.framework.checks.TextContrastCheck;
[all …]
DAccessibilityCheckPresetAndroid.java22 import com.google.android.apps.common.testing.accessibility.framework.checks.ClassNameCheck;
32 * Retrieve checks for {@code View}s based on a desired preset.
35 * @return A set of all checks for {@code View}s with scopes for the preset
38 * for the most up to date set of accessibility checks.
44 // No View-based checks were added in version 3.0. The AccessibilityHierarchyChecks that were in getViewChecksForPreset()
50 ImmutableSet<AccessibilityHierarchyCheck> checks = in getViewChecksForPreset() local
58 checks = in getViewChecksForPreset()
60 checks, in getViewChecksForPreset()
69 for (AccessibilityHierarchyCheck check : checks) { in getViewChecksForPreset()
76 * Retrieve checks for {@code AccessibilityEvent}s based on a desired preset.
[all …]
/external/clang/test/CodeGen/
Dunsigned-promotion.c5 // RUN: -fsanitize=signed-integer-overflow | FileCheck %s --check-prefix=CHECKS
15 // CHECKS-LABEL: define void @testshortadd()
18 // CHECKS: load i16, i16* @sj in testshortadd()
19 // CHECKS: load i16, i16* @sk in testshortadd()
20 …// CHECKS: [[T1:%.*]] = call { i32, i1 } @llvm.sadd.with.overflow.i32(i32 [[T2:%.*]], i32 [… in testshortadd()
21 // CHECKS-NEXT: [[T4:%.*]] = extractvalue { i32, i1 } [[T1]], 0 in testshortadd()
22 // CHECKS-NEXT: [[T5:%.*]] = extractvalue { i32, i1 } [[T1]], 1 in testshortadd()
23 // CHECKS: call void @__ubsan_handle_add_overflow in testshortadd()
36 // CHECKS-LABEL: define void @testshortsub()
40 // CHECKS: load i16, i16* @sj in testshortsub()
[all …]
/external/crosvm/tools/
Dpresubmit43 # registered and configured in the CHECKS list below.
60 "Run mypy type checks on python dev tooling."
177 "Custom checks are written in python in tools/custom_checks. This is a wrapper to call them."
193 # Checks configuration
195 # Configures which checks are available and on which files they are run.
198 CHECKS: List[Check] = [ variable
344 # Configures pre-defined groups of checks. Some are configured for CI builders and others
351 doc="Checks run by default",
352 checks=[
363 doc="Runs a quick subset of presubmit checks.",
[all …]
/external/google-cloud-java/java-service-usage/proto-google-cloud-service-usage-v1beta1/src/main/java/com/google/api/serviceusage/v1beta1/
DDeleteAdminOverrideRequestOrBuilder.java60 * Setting the force parameter to 'true' ignores all quota safety checks that
74 * The list of quota safety checks to ignore before the override mutation.
75 * Unlike 'force' field that ignores all the quota safety checks, the
76 * 'force_only' field ignores only the specified checks; other checks are
89 * The list of quota safety checks to ignore before the override mutation.
90 * Unlike 'force' field that ignores all the quota safety checks, the
91 * 'force_only' field ignores only the specified checks; other checks are
104 * The list of quota safety checks to ignore before the override mutation.
105 * Unlike 'force' field that ignores all the quota safety checks, the
106 * 'force_only' field ignores only the specified checks; other checks are
[all …]
DDeleteConsumerOverrideRequestOrBuilder.java60 * Setting the force parameter to 'true' ignores all quota safety checks that
74 * The list of quota safety checks to ignore before the override mutation.
75 * Unlike 'force' field that ignores all the quota safety checks, the
76 * 'force_only' field ignores only the specified checks; other checks are
89 * The list of quota safety checks to ignore before the override mutation.
90 * Unlike 'force' field that ignores all the quota safety checks, the
91 * 'force_only' field ignores only the specified checks; other checks are
104 * The list of quota safety checks to ignore before the override mutation.
105 * Unlike 'force' field that ignores all the quota safety checks, the
106 * 'force_only' field ignores only the specified checks; other checks are
[all …]
DCreateConsumerOverrideRequestOrBuilder.java97 * Setting the force parameter to 'true' ignores all quota safety checks that
111 * The list of quota safety checks to ignore before the override mutation.
112 * Unlike 'force' field that ignores all the quota safety checks, the
113 * 'force_only' field ignores only the specified checks; other checks are
126 * The list of quota safety checks to ignore before the override mutation.
127 * Unlike 'force' field that ignores all the quota safety checks, the
128 * 'force_only' field ignores only the specified checks; other checks are
141 * The list of quota safety checks to ignore before the override mutation.
142 * Unlike 'force' field that ignores all the quota safety checks, the
143 * 'force_only' field ignores only the specified checks; other checks are
[all …]
DImportConsumerOverridesRequestOrBuilder.java95 * Setting the force parameter to 'true' ignores all quota safety checks that
109 * The list of quota safety checks to ignore before the override mutation.
110 * Unlike 'force' field that ignores all the quota safety checks, the
111 * 'force_only' field ignores only the specified checks; other checks are
124 * The list of quota safety checks to ignore before the override mutation.
125 * Unlike 'force' field that ignores all the quota safety checks, the
126 * 'force_only' field ignores only the specified checks; other checks are
139 * The list of quota safety checks to ignore before the override mutation.
140 * Unlike 'force' field that ignores all the quota safety checks, the
141 * 'force_only' field ignores only the specified checks; other checks are
[all …]
DCreateAdminOverrideRequestOrBuilder.java97 * Setting the force parameter to 'true' ignores all quota safety checks that
111 * The list of quota safety checks to ignore before the override mutation.
112 * Unlike 'force' field that ignores all the quota safety checks, the
113 * 'force_only' field ignores only the specified checks; other checks are
126 * The list of quota safety checks to ignore before the override mutation.
127 * Unlike 'force' field that ignores all the quota safety checks, the
128 * 'force_only' field ignores only the specified checks; other checks are
141 * The list of quota safety checks to ignore before the override mutation.
142 * Unlike 'force' field that ignores all the quota safety checks, the
143 * 'force_only' field ignores only the specified checks; other checks are
[all …]
DImportAdminOverridesRequestOrBuilder.java95 * Setting the force parameter to 'true' ignores all quota safety checks that
109 * The list of quota safety checks to ignore before the override mutation.
110 * Unlike 'force' field that ignores all the quota safety checks, the
111 * 'force_only' field ignores only the specified checks; other checks are
124 * The list of quota safety checks to ignore before the override mutation.
125 * Unlike 'force' field that ignores all the quota safety checks, the
126 * 'force_only' field ignores only the specified checks; other checks are
139 * The list of quota safety checks to ignore before the override mutation.
140 * Unlike 'force' field that ignores all the quota safety checks, the
141 * 'force_only' field ignores only the specified checks; other checks are
[all …]
DUpdateConsumerOverrideRequestOrBuilder.java98 * Setting the force parameter to 'true' ignores all quota safety checks that
150 * The list of quota safety checks to ignore before the override mutation.
151 * Unlike 'force' field that ignores all the quota safety checks, the
152 * 'force_only' field ignores only the specified checks; other checks are
165 * The list of quota safety checks to ignore before the override mutation.
166 * Unlike 'force' field that ignores all the quota safety checks, the
167 * 'force_only' field ignores only the specified checks; other checks are
180 * The list of quota safety checks to ignore before the override mutation.
181 * Unlike 'force' field that ignores all the quota safety checks, the
182 * 'force_only' field ignores only the specified checks; other checks are
[all …]
DUpdateAdminOverrideRequestOrBuilder.java98 * Setting the force parameter to 'true' ignores all quota safety checks that
150 * The list of quota safety checks to ignore before the override mutation.
151 * Unlike 'force' field that ignores all the quota safety checks, the
152 * 'force_only' field ignores only the specified checks; other checks are
165 * The list of quota safety checks to ignore before the override mutation.
166 * Unlike 'force' field that ignores all the quota safety checks, the
167 * 'force_only' field ignores only the specified checks; other checks are
180 * The list of quota safety checks to ignore before the override mutation.
181 * Unlike 'force' field that ignores all the quota safety checks, the
182 * 'force_only' field ignores only the specified checks; other checks are
[all …]
DDeleteConsumerOverrideRequest.java133 * Setting the force parameter to 'true' ignores all quota safety checks that
169 * The list of quota safety checks to ignore before the override mutation.
170 * Unlike 'force' field that ignores all the quota safety checks, the
171 * 'force_only' field ignores only the specified checks; other checks are
189 * The list of quota safety checks to ignore before the override mutation.
190 * Unlike 'force' field that ignores all the quota safety checks, the
191 * 'force_only' field ignores only the specified checks; other checks are
207 * The list of quota safety checks to ignore before the override mutation.
208 * Unlike 'force' field that ignores all the quota safety checks, the
209 * 'force_only' field ignores only the specified checks; other checks are
[all …]
DDeleteAdminOverrideRequest.java133 * Setting the force parameter to 'true' ignores all quota safety checks that
169 * The list of quota safety checks to ignore before the override mutation.
170 * Unlike 'force' field that ignores all the quota safety checks, the
171 * 'force_only' field ignores only the specified checks; other checks are
189 * The list of quota safety checks to ignore before the override mutation.
190 * Unlike 'force' field that ignores all the quota safety checks, the
191 * 'force_only' field ignores only the specified checks; other checks are
207 * The list of quota safety checks to ignore before the override mutation.
208 * Unlike 'force' field that ignores all the quota safety checks, the
209 * 'force_only' field ignores only the specified checks; other checks are
[all …]
/external/cronet/base/memory/
Dsafety_checks.h23 // additional CHECKS across variety of memory safety mechanisms such as
30 // Checks here are disabled by default because of their performance cost.
62 // Set of checks for ADVANCED_MEMORY_SAFETY_CHECKS() annotated objects.
71 constexpr bool ShouldUsePartitionAlloc(MemorySafetyCheck checks) { in ShouldUsePartitionAlloc() argument
73 return static_cast<bool>(checks & in ShouldUsePartitionAlloc()
82 // Returns |partition_alloc::AllocFlags| corresponding to |checks|.
83 constexpr partition_alloc::AllocFlags GetAllocFlags(MemorySafetyCheck checks) { in GetAllocFlags() argument
88 // Returns |partition_alloc::FreeFlags| corresponding to |checks|.
89 constexpr partition_alloc::FreeFlags GetFreeFlags(MemorySafetyCheck checks) { in GetFreeFlags() argument
91 if (static_cast<bool>(checks & MemorySafetyCheck::kSchedulerLoopQuarantine)) { in GetFreeFlags()
[all …]
/external/angle/build/android/docs/
Dstatic_analysis.md10 * [Useful checks include](https://googlesamples.github.io/android-custom-lint-rules/checks/index.md…
11 * `NewApi` (ensureing `Build.VERSION.SDK_INT` checks are in place).
12 * A list of disabled checks is found [within `lint.py`].
14 * Custom lint checks [are possible], but we don't have any.
15 * Checks run on the entire codebase, not only on changed lines.
26 * [Useful checks include](https://errorprone.info/bugpatterns):
29 * A list of enabled / disabled checks is found [within `compile_java.py`](https://cs.chromium.org/c…
30 * Many checks are currently disabled because there is work involved in fixing
32 * Chrome has [a few custom checks]:
33 * Checks run on the entire codebase, not only on changed lines.
[all …]
/external/cronet/build/android/docs/
Dstatic_analysis.md10 * [Useful checks include](https://googlesamples.github.io/android-custom-lint-rules/checks/index.md…
11 * `NewApi` (ensureing `Build.VERSION.SDK_INT` checks are in place).
12 * A list of disabled checks is found [within `lint.py`].
14 * Custom lint checks [are possible], but we don't have any.
15 * Checks run on the entire codebase, not only on changed lines.
26 * [Useful checks include](https://errorprone.info/bugpatterns):
29 * A list of enabled / disabled checks is found [within `compile_java.py`](https://cs.chromium.org/c…
30 * Many checks are currently disabled because there is work involved in fixing
32 * Chrome has [a few custom checks]:
33 * Checks run on the entire codebase, not only on changed lines.
[all …]
/external/nullaway/nullaway/src/main/java/com/uber/nullaway/
DConfig.java35 * Checks if Serialization feature is active.
52 * Checks if a class comes from an explicitly annotated package.
62 * Checks if a class comes from an explicitly unannotated (sub-)package.
72 * Checks if (tool) generated code should be considered always unannoatated.
80 * Checks if a class should be excluded.
89 * Checks if a class should be treated as unannotated.
107 * Checks if the annotation is an @Initializer annotation.
116 * Checks if the annotation is a custom @Nullable annotation.
124 * Checks if the annotation is a custom @Nonnull annotation.
132 * Checks if the annotation is an excluded field annotation.
[all …]
/external/python/cpython3/Tools/c-analyzer/c_analyzer/
D__main__.py123 # the checks
125 CHECKS = { variable
130 def add_checks_cli(parser, checks=None, *, add_flags=None): argument
132 if not checks:
133 checks = list(CHECKS)
135 elif isinstance(checks, str):
136 checks = [checks]
137 if (add_flags is None and len(checks) > 1) or default:
140 process_checks = add_sepval_cli(parser, '--check', 'checks', checks)
142 for check in checks:
[all …]
/external/tensorflow/tensorflow/compiler/xla/runtime/
Dcustom_call.h125 static constexpr bool CheckNames(RuntimeChecks checks) { in CheckNames() argument
126 return checks == RuntimeChecks::kDefault; in CheckNames()
129 static constexpr bool CheckTypes(RuntimeChecks checks) { in CheckTypes() argument
130 return checks != RuntimeChecks::kNone; in CheckTypes()
133 static constexpr bool CheckUserData(RuntimeChecks checks) { in CheckUserData() argument
134 return checks != RuntimeChecks::kNone; in CheckUserData()
138 static bool CheckType(RuntimeChecks checks, TypeID type_id) { in CheckType() argument
139 return !CheckTypes(checks) || type_id == TypeID::get<T>(); in CheckType()
181 template <CustomCall::RuntimeChecks checks, typename Fn, typename... Ts>
214 // Checks if remaining arguments are in the parameter pack.
[all …]
/external/nanohttpd/src/main/checkstyle/
Dcheckstyle-suppressions.xml9 <suppress files=".jpg" checks="NewlineAtEndOfFile|FileTabCharacter|FileLength" />
10 <suppress files=".png" checks="NewlineAtEndOfFile|FileTabCharacter|FileLength" />
11 <suppress files=".fxml" checks="FileTabCharacter" />
12 <suppress files=".css" checks="FileTabCharacter" />
13 <suppress files="META[\\-]INF[\\/]services[\\/]" checks="NewlineAtEndOfFile|FileTabCharacter" />
17 <suppress files=".*Test\.java" checks="VisibilityModifier" />
18 <suppress files="Test.*\.java" checks="VisibilityModifier" />
22 <suppress files=".*Test\.java" checks="JavadocPackage" />
23 <suppress files=".*Test\.java" checks="JavadocMethod" />
24 <suppress files=".*Test\.java" checks="JavadocType" />
[all …]
/external/autotest/client/site_tests/bluetooth_AVLHCI/
Dbluetooth_AVLHCI.py65 """Checks Bluetooth legacy specification."""
77 """Checks Bluetooth version 4.0 specification."""
83 """Checks Bluetooth version 4.1 specification."""
89 """Checks Bluetooth version 4.2 specification."""
104 """Checks Bluetooth version 5.0 specification."""
110 """Checks Microsoft Bluetooth HCI command execution."""
115 """Checks Android Bluetooth HCI command execution."""
180 """Checks the Bluetooth controller must support flushable data packets.
192 """Checks the Bluetooth controller supports Erroneous Data Reporting."""
199 """Checks the Bluetooth controller event filter entries count.
[all …]
/external/expat/expat/
Dapply-clang-tidy.sh53 checks="${checks_to_enable_flat// /,},-${checks_to_disable_flat// /,-}"
56 --checks="${checks}"
93 clang-tidy --checks="${checks}" --verify-config
95 clang-tidy --checks="${checks}" --list-checks
97 # These are the checks clang-tidy has *more* that so far we are missing out on,
99 clang-tidy --checks=\* --list-checks \
100 | grep -v -f <(clang-tidy --checks="${checks}" --list-checks | xargs -n1) \
103 | sed 's/^$/Disabled checks (simplified):/'
/external/rust/crates/pdl-compiler/scripts/
Dgenerate_cxx_backend_tests.py59 checks = []
67 checks.append(f"ASSERT_EQ({get_field(decl, var, id)}, {value});")
70 checks.append(f"ASSERT_EQ({get_field(decl, var, id)}, {value});")
76 checks.append(f"ASSERT_EQ({get_field(decl, var, id)}, {value});")
80 checks.append(f"ASSERT_EQ({get_field(decl, var, id)}, {field.type_id}({value}));")
83 checks.append(f"ASSERT_TRUE(!{get_field(decl, var, id)}.has_value());")
86checks.append(f"{field.type_id} const& {field_var} = {get_field(decl, var, id)}.value();")
87 checks.extend(check_members(field.type, field_var, value))
90 checks.append(f"{field.type_id} const& {field_var} = {get_field(decl, var, id)};")
91 checks.extend(check_members(field.type, field_var, value))
[all …]
/external/strace/tests-m32/
Ddev-yy.c52 } checks[] = { in main() local
58 for (unsigned int i = 0; i < ARRAY_SIZE(checks); i++) { in main()
64 long fd = syscall(__NR_openat, AT_FDCWD, checks[i].path, in main()
68 checks[i].path, sprintrc(fd)); in main()
71 checks[i].path, in main()
72 checks[i].blk ? "block" : "char", in main()
73 checks[i].major, checks[i].minor); in main()
77 if (checks[i].optional) in main()
81 checks[i].path); in main()
87 fd, checks[i].path, checks[i].blk ? "block" : "char", in main()
[all …]

12345678910>>...458