| /external/cronet/third_party/googletest/src/googletest/test/ |
| D | gtest_environment_test.cc | 37 #include "src/gtest-internal-inl.h" 49 // generate a non-fatal failure, generate a fatal failure, or 56 ADD_FAILURE() << "Expected non-fatal failure in global set-up."; in SetUp() 59 FAIL() << "Expected fatal failure in global set-up."; in SetUp() 66 // Generates a non-fatal failure. 69 ADD_FAILURE() << "Expected non-fatal failure in global tear-down."; in TearDown() 80 // generate. 113 // be generated by the global set-up. 114 int RunAllTests(MyEnvironment* env, FailureType failure) { in RunAllTests() argument 115 env->Reset(); in RunAllTests() [all …]
|
| /external/cronet/third_party/boringssl/src/third_party/googletest/googletest/test/ |
| D | gtest_environment_test.cc | 37 #include "src/gtest-internal-inl.h" 49 // generate a non-fatal failure, generate a fatal failure, or 56 ADD_FAILURE() << "Expected non-fatal failure in global set-up."; in SetUp() 59 FAIL() << "Expected fatal failure in global set-up."; in SetUp() 66 // Generates a non-fatal failure. 69 ADD_FAILURE() << "Expected non-fatal failure in global tear-down."; in TearDown() 80 // generate. 113 // be generated by the global set-up. 114 int RunAllTests(MyEnvironment* env, FailureType failure) { in RunAllTests() argument 115 env->Reset(); in RunAllTests() [all …]
|
| /external/googletest/googletest/test/ |
| D | gtest_environment_test.cc | 37 #include "src/gtest-internal-inl.h" 49 // generate a non-fatal failure, generate a fatal failure, or 56 ADD_FAILURE() << "Expected non-fatal failure in global set-up."; in SetUp() 59 FAIL() << "Expected fatal failure in global set-up."; in SetUp() 66 // Generates a non-fatal failure. 69 ADD_FAILURE() << "Expected non-fatal failure in global tear-down."; in TearDown() 80 // generate. 113 // be generated by the global set-up. 114 int RunAllTests(MyEnvironment* env, FailureType failure) { in RunAllTests() argument 115 env->Reset(); in RunAllTests() [all …]
|
| /external/rust/crates/quiche/deps/boringssl/src/third_party/googletest/test/ |
| D | gtest_environment_test.cc | 36 #include "src/gtest-internal-inl.h" 54 // generate a non-fatal failure, generate a fatal failure, or 61 ADD_FAILURE() << "Expected non-fatal failure in global set-up."; in SetUp() 64 FAIL() << "Expected fatal failure in global set-up."; in SetUp() 71 // Generates a non-fatal failure. 74 ADD_FAILURE() << "Expected non-fatal failure in global tear-down."; in TearDown() 85 // generate. 122 // be generated by the global set-up. 123 int RunAllTests(MyEnvironment* env, FailureType failure) { in RunAllTests() argument 124 env->Reset(); in RunAllTests() [all …]
|
| /external/tensorflow/tensorflow/python/distribute/ |
| D | combinations_test.py | 7 # http://www.apache.org/licenses/LICENSE-2.0 34 # `generate` eats the cluster parameters. 39 @framework_combinations.generate( # pylint: disable=redundant-keyword-arg 49 @framework_combinations.generate( # pylint: disable=redundant-keyword-arg 58 @framework_combinations.generate( # pylint: disable=redundant-keyword-arg 65 @framework_combinations.generate( # pylint: disable=redundant-keyword-arg 76 @framework_combinations.generate( # pylint: disable=redundant-keyword-arg 90 @combinations.generate(combinations.combine(num_workers=2,)) 98 @combinations.generate(combinations.combine(num_workers=2)) 106 combinations.env().tf_data_service_dispatcher = "localhost" [all …]
|
| /external/cronet/net/data/ssl/scripts/ |
| D | ca.cnf | 13 # The default test root, used to generate certificates and CRLs. 15 dir = $ENV::CA_DIR 16 key_size = $ENV::KEY_SIZE 17 algo = $ENV::ALGO 18 cert_type = $ENV::CERT_TYPE 19 type = $key_size-$algo-$cert_type 20 database = $dir/$type-index.txt 22 serial = $dir/$type-serial 62 # The request section used to generate the root CA certificate. This should 63 # not be used to generate end-entity certificates. For certificates other [all …]
|
| D | redundant-ca.cnf | 7 # The default test root, used to generate certificates and CRLs. 9 dir = ${ENV::CA_DIR} 10 database = ${dir}/${ENV::CERTIFICATE}-index.txt 12 serial = ${dir}/${ENV::CERTIFICATE}-serial 13 certificate = ${dir}/${ENV::CERTIFICATE}.pem 14 private_key = ${dir}/${ENV::CERTIFICATE}.key 59 # The request section used to generate certificate requests. 68 CN = ${ENV::CA_COMMON_NAME}
|
| /external/cronet/net/tools/quic/certs/ |
| D | ca.cnf | 12 # The default test root, used to generate certificates and CRLs. 14 dir = $ENV::CA_DIR 15 key_size = $ENV::KEY_SIZE 16 algo = $ENV::ALGO 17 cert_type = $ENV::CERT_TYPE 18 type = $key_size-$algo-$cert_type 19 database = $dir/$type-index.txt 21 serial = $dir/$type-serial 60 # The request section used to generate the root CA certificate. This should 61 # not be used to generate end-entity certificates. For certificates other [all …]
|
| /external/bazelbuild-rules_cc/cc/private/toolchain/ |
| D | cc_configure.bzl | 7 # http://www.apache.org/licenses/LICENSE-2.0 25 """Generate BUILD file with 'toolchain' targets for the local host C++ toolchain. 30 env = repository_ctx.os.environ 32 …# Should we try to find C++ toolchain at all? If not, we don't have to generate toolchains for C++… 33 …should_detect_cpp_toolchain = "BAZEL_DO_NOT_DETECT_CPP_TOOLCHAIN" not in env or env["BAZEL_DO_NOT_… 45 …# C++ toolchain autoconfiguration was disabled by BAZEL_DO_NOT_DETECT_CPP_TOOLCHAIN env variable.") 57 """Generate BUILD file with 'cc_toolchain' targets for the local host C++ toolchain. 64 env = repository_ctx.os.environ 66 … if "BAZEL_DO_NOT_DETECT_CPP_TOOLCHAIN" in env and env["BAZEL_DO_NOT_DETECT_CPP_TOOLCHAIN"] == "1": 141 # buildifier: disable=unnamed-macro [all …]
|
| /external/bc/scripts/ |
| D | randmath.py | 1 #! /usr/bin/python3 -B 3 # SPDX-License-Identifier: BSD-2-Clause 5 # Copyright (c) 2018-2023 Gavin D. Howard and contributors. 37 env = { variable 43 # Generate a random integer between 0 and 2^limit. 58 return random.randint(0, 2 ** (4) - 1) == 0 61 # Generate a real portion of a number. 64 # Figure out if we should have a real portion. If so generate it. 69 n = ("0" * (length - len(n))) + n 79 # @param real Whether the number can be a non-integer. [all …]
|
| /external/pdfium/testing/tools/coverage/ |
| D | coverage_report.py | 1 #!/usr/bin/env vpython3 3 # Use of this source code is governed by a BSD-style license that can be 40 TestSpec('run_corpus_tests.py', True, ['--disable-javascript']), 42 TestSpec('run_corpus_tests.py', True, ['--disable-xfa']), 44 TestSpec('run_corpus_tests.py', True, ['--render-oneshot']), 46 TestSpec('run_corpus_tests.py', True, ['--reverse-byte-order']), 50 TestSpec('run_javascript_tests.py', True, ['--disable-javascript']), 52 TestSpec('run_javascript_tests.py', True, ['--disable-xfa']), 56 TestSpec('run_pixel_tests.py', True, ['--disable-javascript']), 58 TestSpec('run_pixel_tests.py', True, ['--disable-xfa']), [all …]
|
| /external/rust/crates/grpcio-sys/android/ |
| D | build_cmake.rs | 1 // Copyright 2019 TiKV Project Authors. Licensed under Apache-2.0. 3 use std::env; 4 use std::env::VarError; 10 // Platform-Specific Instructions: Regenerating gRPC Bindings for Windows 12 // If you need to manually update the 'android/grpc-bindings.rs' file on Windows, 16 // - Download and install the pre-built LLVM binaries from: 18 // - Update the `LIBCLANG_PATH` environment variable to point to the 'bin' 22 // - Set the `GRPCIO_SYS_GRPC_INCLUDE_PATH` environment variable to the 26 // - Run the following Cargo command to regenerate the bindings: 27 // `cargo build --features _gen-bindings` [all …]
|
| /external/mesa3d/.gitlab-ci/ |
| D | crosvm-runner.sh | 1 #!/usr/bin/env bash 3 set -e 5 # If run outside of a deqp-runner invoction (e.g. piglit trace replay), then act 7 THREAD=${DEQP_RUNNER_THREAD:-0} 10 # Helper to generate CIDs for virtio-vsock based communication with processes 13 # A CID is a 32-bit Context Identifier to be assigned to a crosvm instance 15 # the least significant 25 bits from CI_JOB_ID as a base and generate a 7-bit 19 # - VSOCK_CID: the crosvm unique CID to be passed as a run argument 21 # - VSOCK_STDOUT, VSOCK_STDERR: the port numbers the guest should accept 24 # - VM_TEMP_DIR: the temporary directory path used to pass additional [all …]
|
| /external/openthread/.github/workflows/ |
| D | simulation-1.1.yml | 33 branches-ignore: 34 - 'dependabot/**' 37 - 'main' 40 …group: ${{ github.workflow }}-${{ github.event.pull_request.number || (github.repository == 'opent… 41 cancel-in-progress: true 48 packet-verification: 49 runs-on: ubuntu-20.04 50 env: 57 - name: Harden Runner 58 uses: step-security/harden-runner@63c24ba6bd7ba022e95695ff85de572c04a18142 # v2.7.0 [all …]
|
| /external/rust/beto-rust/common/pourover_macro/src/call_method/ |
| D | codegen.rs | 7 // http://www.apache.org/licenses/LICENSE-2.0 15 //! Code generation for the `call_method!` series of proc-macros. This module is used by creating a 16 //! [`MethodCall`] instance and calling [`MethodCall::generate`]. The generated code will vary 18 //! [`MethodCall`] provided, then `generate` will return a [`CodegenError`] with information on 42 fn from(CodegenError(span, kind): CodegenError) -> syn::Error { in from() 59 /// Describes a method that will be generated. Create one with [`MethodCall::new`] and generate 60 /// code with [`MethodCall::generate`]. This should be given AST nodes from the macro input so that 63 env: Expr, field 71 pub fn new(env: Expr, method: MethodInfo, receiver: Receiver, arg_exprs: Vec<Expr>) -> Self { in new() 73 env, in new() [all …]
|
| /external/ltp/testcases/open_posix_testsuite/ |
| D | Makefile | 1 # SPDX-License-Identifier: GPL-2.0-or-later 10 include include/mk/env.mk 17 MAKE_ENV= LOGFILE=`if echo "$(LOGFILE)" | grep -q '^/'; then echo "$(LOGFILE)"; else echo "\`pwd\`… 24 BUILD_MAKE= env $(BUILD_MAKE_ENV) $(MAKE) 26 TEST_MAKE= env $(TEST_MAKE_ENV) $(MAKE) -k 28 all: conformance-all functional-all stress-all tools-all 32 .PHONY: ac-clean 33 ac-clean: clean 37 $(RM) -f $(LOGFILE)* 38 $(RM) -f config.log config.status [all …]
|
| /external/pigweed/third_party/emboss/ |
| D | emboss.cmake | 7 # https://www.apache.org/licenses/LICENSE-2.0 16 include($ENV{PW_ROOT}/pw_build/pigweed.cmake) 31 list(APPEND arg_IMPORT_DIRS $ENV{PW_ROOT} ${CMAKE_CURRENT_SOURCE_DIR}) 46 # Expose a list of our sources so that other generate steps can depend on 57 # Build up a list of other `emb` sources the generate step depends on. We 58 # use this rather than the full emboss_cc_library so that the generate steps 75 # python3 $runner $embossc --generate cc --output-path $out_dir \ 76 # --import-dir ... --import-dir ... $source 78 set(runner "$ENV{PW_ROOT}/third_party/emboss/embossc_runner.py") 81 "${runner}" "${embossc}" "--generate" "cc" "--no-cc-enum-traits" [all …]
|
| /external/nanopb-c/tests/site_scons/site_tools/ |
| D | nanopb.py | 4 This tool will locate the nanopb generator and use it to generate .pb.c and 8 ------------- 10 myproto = env.NanopbProto("myproto") 13 env.Append(CPPPATH = "$NANOB") 14 myprog = env.Program(["myprog.c", myproto, "$NANOPB/pb_encode.c", "$NANOPB/pb_decode.c"]) 17 --------------------- 22 env.SetDefault(NANOPB = "path/to/nanopb") 27 env.SetDefault(PROTOC = "path/to/protoc") 28 env.SetDefault(PROTOCFLAGS = "--plugin=protoc-gen-nanopb=path/to/protoc-gen-nanopb") 40 def _detect_nanopb(env): argument [all …]
|
| /external/bazelbuild-rules_rust/test/unit/force_all_deps_direct/ |
| D | force_all_deps_direct_test.bzl | 9 env = analysistest.begin(ctx) 10 tut = analysistest.target_under_test(env) 12 assert_action_mnemonic(env, action, "Rustc") 14 env, 16 "--extern=transitive", 18 return analysistest.end(env) 37 name = "generate", 40 "no-clippy", 41 "no-unpretty", 47 target_under_test = ":generate", [all …]
|
| /external/rust/beto-rust/common/pourover_macro/src/ |
| D | call_method.rs | 7 // http://www.apache.org/licenses/LICENSE-2.0 16 //! function-like macros and implement a statically type-safe way to call Java methods while also 30 pub fn call_method(args: TokenStream) -> syn::Result<TokenStream> { in call_method() 36 args.env, in call_method() 42 method_call.generate().map_err(syn::Error::from) in call_method() 46 pub fn call_static_method(args: TokenStream) -> syn::Result<TokenStream> { in call_static_method() 52 args.env, in call_static_method() 58 method_call.generate().map_err(syn::Error::from) in call_static_method() 62 pub fn call_constructor(args: TokenStream) -> syn::Result<TokenStream> { in call_constructor() 69 args.env, in call_constructor() [all …]
|
| D | jni_method.rs | 7 // http://www.apache.org/licenses/LICENSE-2.0 25 pub fn jni_method(meta: TokenStream, item: TokenStream) -> syn::Result<ItemFn> { in jni_method() 93 ::core::compile_error!("Cannot use `panic_returns` with non-unwinding panic handler"); in jni_method() 133 mut env: JNIEnv<'local>, in can_parse() 135 ) -> jint { in can_parse() 145 fn parse_example_output() -> syn::ItemFn { in parse_example_output() 154 mut env: JNIEnv<'local>, in parse_example_output() 156 ) -> jint { in parse_example_output() 161 jni_method(meta, func).expect("failed to generate example") in parse_example_output() 164 fn parse_example_output_method_name() -> syn::ItemFn { in parse_example_output_method_name() [all …]
|
| /external/bazelbuild-rules_rust/crate_universe/src/cli/ |
| D | vendor.rs | 4 use std::env; 25 #[clap(long, env = "CARGO")] 29 #[clap(long, env = "RUSTC")] 44 …/// The path to a [Cargo.lock](https://doc.rust-lang.org/cargo/guide/cargo-toml-vs-cargo-lock.html… 48 /// A [Cargo config](https://doc.rust-lang.org/cargo/reference/config.html#configuration) 54 /// [cargo update](https://doc.rust-lang.org/cargo/commands/cargo-update.html). See 56 #[clap(long, env = "CARGO_BAZEL_REPIN", num_args=0..=1, default_missing_value = "true")] 64 #[clap(long, env = "BAZEL_REAL", default_value = "bazel")] 69 #[clap(long, env = "BUILD_WORKSPACE_DIRECTORY")] 78 fn buildifier_format(bin: &Path, file: &Path) -> Result<ExitStatus> { in buildifier_format() [all …]
|
| /external/rust/crates/clap_complete/src/generator/ |
| D | mod.rs | 19 /// May panic when called outside of the context of [`generate`] or [`generate_to`] 31 /// fn file_name(&self, name: &str) -> String { 34 /// # fn generate(&self, cmd: &Command, buf: &mut dyn Write) {} 37 fn file_name(&self, name: &str) -> String; in file_name() 43 /// May panic when called outside of the context of [`generate`] or [`generate_to`] 58 /// # fn file_name(&self, name: &str) -> String { 61 /// fn generate(&self, cmd: &Command, buf: &mut dyn Write) { 66 fn generate(&self, cmd: &Command, buf: &mut dyn Write); in generate() method 69 /// Generate a completions file for a specified shell at compile-time. 71 /// **NOTE:** to generate the file at compile time you must use a `build.rs` "Build Script" or a [all …]
|
| /external/toolchain-utils/pgo_tools_rust/ |
| D | pgo_rust.py | 1 #!/usr/bin/env python3 3 # Use of this source code is governed by a BSD-style license that can be 6 # pylint: disable=line-too-long 13 gs://chromeos-localmirror/distfiles/rust-pgo-{rust_version}-frontend.profdata{s}.tz 15 gs://chromeos-localmirror/distfiles/rust-pgo-{rust_version}-llvm.profdata{s}.tz 22 you need to generate manifests for dev-lang/rust and dev-lang/rust-host before 25 variable SRC_URI in cros-rustc.eclass which refer to profdata files. 30 $ ./pgo_rust.py generate # generate profdata files 31 $ ./pgo_rust.py benchmark-pgo # benchmark with PGO 32 $ ./pgo_rust.py benchmark-nopgo # benchmark without PGO [all …]
|
| /external/libchrome/base/android/jni_generator/ |
| D | jni_registration_generator.py | 1 #!/usr/bin/env python 3 # Use of this source code is governed by a BSD-style license that can be 6 """Generate JNI registration entry points 33 """Generate a header file including two registration functions. 37 calls them in RegisterNonMainDexNatives() if they are non-main dex. 79 return header_generator.Generate() 87 // Use of this source code is governed by a BSD-style license that can be 115 // Step 4: Main dex and non-main dex registration functions. 117 bool RegisterMainDexNatives(JNIEnv* env) { 122 bool RegisterNonMainDexNatives(JNIEnv* env) { [all …]
|