/external/android-mock/tests/com/google/android/testing/mocking/ |
AndroidMockTest.java | 462 MethodVerifier verifier = new MethodVerifier(method); local 469 method.instrument(verifier); 470 assertTrue(method.getLongName() + " not called.", verifier.expectedMethodCalled()); [all...] |
/art/runtime/base/ |
logging.h | 310 bool verifier; member in struct:art::LogVerbosity
|
/art/runtime/verifier/ |
method_verifier.h | 42 namespace verifier { namespace in namespace:art 67 * that can potentially be corrected, and the verifier will try again at runtime. 122 uint16_t registers_size, MethodVerifier* verifier); 138 // The verifier 183 // Dump the failures encountered by the verifier. 186 // Dump the state of the verifier, namely each instruction, what flags are set on it, register 197 // by using the check-cast elision peephole optimization in the verifier 634 // All the GC maps that the verifier has created 719 // Info message log use primarily for verifier diagnostics. 729 // running and the verifier is called from the class linker [all...] |
/cts/apps/CtsVerifier/src/com/android/cts/verifier/backup/ |
BackupTestActivity.java | 17 package com.android.cts.verifier.backup; 19 import com.android.cts.verifier.PassFailButtons; 20 import com.android.cts.verifier.R; 55 * running the backup manager and reinstalling the CTS verifier.
|
/cts/apps/CtsVerifier/src/com/android/cts/verifier/bluetooth/ |
BleServerService.java | 17 package com.android.cts.verifier.bluetooth; 53 "com.android.cts.verifier.bluetooth.BLE_SERVER_CONNECTED"; 55 "com.android.cts.verifier.bluetooth.BLE_SERVER_DISCONNECTED"; 57 "com.android.cts.verifier.bluetooth.BLE_SERVICE_ADDED"; 59 "com.android.cts.verifier.bluetooth.BLE_CHARACTERISTIC_READ_REQUEST"; 61 "com.android.cts.verifier.bluetooth.BLE_CHARACTERISTIC_WRITE_REQUEST"; 63 "com.android.cts.verifier.bluetooth.BLE_DESCRIPTOR_READ_REQUEST"; 65 "com.android.cts.verifier.bluetooth.BLE_DESCRIPTOR_WRITE_REQUEST"; 67 "com.android.cts.verifier.bluetooth.BLE_EXECUTE_WRITE";
|
MessageTestActivity.java | 17 package com.android.cts.verifier.bluetooth; 19 import com.android.cts.verifier.PassFailButtons; 20 import com.android.cts.verifier.R; 21 import com.android.cts.verifier.TestResult;
|
BleClientService.java | 17 package com.android.cts.verifier.bluetooth; 58 "com.android.cts.verifier.bluetooth.BLE_BLUETOOTH_CONNECTED"; 60 "com.android.cts.verifier.bluetooth.BLE_BLUETOOTH_DISCONNECTED"; 62 "com.android.cts.verifier.bluetooth.BLE_SERVICES_DISCOVERED"; 64 "com.android.cts.verifier.bluetooth.BLE_CHARACTERISTIC_READ"; 66 "com.android.cts.verifier.bluetooth.BLE_CHARACTERISTIC_WRITE"; 68 "com.android.cts.verifier.bluetooth.BLE_CHARACTERISTIC_CHANGED"; 70 "com.android.cts.verifier.bluetooth.BLE_DESCRIPTOR_READ"; 72 "com.android.cts.verifier.bluetooth.BLE_DESCRIPTOR_WRITE"; 74 "com.android.cts.verifier.bluetooth.BLE_RELIABLE_WRITE_COMPLETED" [all...] |
BluetoothChatService.java | 17 package com.android.cts.verifier.bluetooth;
|
/cts/apps/CtsVerifier/src/com/android/cts/verifier/camera/analyzer/ |
MeteringTest.java | 17 package com.android.cts.verifier.camera.analyzer;
|
CameraAnalyzerActivity.java | 16 package com.android.cts.verifier.camera.analyzer; 18 import com.android.cts.verifier.PassFailButtons; 19 import com.android.cts.verifier.R;
|
/cts/apps/CtsVerifier/src/com/android/cts/verifier/camera/fov/ |
DetermineFovActivity.java | 17 package com.android.cts.verifier.camera.fov; 19 import com.android.cts.verifier.R;
|
/cts/apps/CtsVerifier/src/com/android/cts/verifier/camera/intents/ |
CameraIntentsActivity.java | 16 package com.android.cts.verifier.camera.intents; 39 import com.android.cts.verifier.PassFailButtons; 40 import com.android.cts.verifier.R; 41 import com.android.cts.verifier.TestResult; 113 user returns to cts verifier, 114 user leaves cts verifier and tries to fake receiver intents
|
/cts/apps/CtsVerifier/src/com/android/cts/verifier/nfc/ |
TagVerifierActivity.java | 17 package com.android.cts.verifier.nfc; 19 import com.android.cts.verifier.PassFailButtons; 20 import com.android.cts.verifier.R; 21 import com.android.cts.verifier.nfc.tech.MifareUltralightTagTester; 22 import com.android.cts.verifier.nfc.tech.NdefTagTester; 23 import com.android.cts.verifier.nfc.tech.TagTester; 24 import com.android.cts.verifier.nfc.tech.TagVerifier; 25 import com.android.cts.verifier.nfc.tech.TagVerifier.Result;
|
/cts/apps/CtsVerifier/src/com/android/cts/verifier/nls/ |
MockListener.java | 16 package com.android.cts.verifier.nls;
|
/cts/apps/CtsVerifier/src/com/android/cts/verifier/security/ |
CAInstallNotificationVerifierActivity.java | 17 package com.android.cts.verifier.security; 33 import com.android.cts.verifier.PassFailButtons; 34 import com.android.cts.verifier.R;
|
/cts/apps/CtsVerifier/src/com/android/cts/verifier/sensors/ |
BaseSensorSemiAutomatedTestActivity.java | 17 package com.android.cts.verifier.sensors; 32 import com.android.cts.verifier.R; 33 import com.android.cts.verifier.TestResult;
|
GyroscopeTestActivity.java | 17 package com.android.cts.verifier.sensors; 19 import com.android.cts.verifier.PassFailButtons; 20 import com.android.cts.verifier.R;
|
/external/chromium/chrome/common/extensions/docs/examples/apps/hello-python/oauth2/ |
__init__.py | 160 verifier = None variable in class:Token 173 def set_verifier(self, verifier=None): 174 if verifier is not None: 175 self.verifier = verifier 177 self.verifier = generate_verifier() 180 if self.callback and self.verifier: 185 query = '%s&oauth_verifier=%s' % (query, self.verifier) 187 query = 'oauth_verifier=%s' % self.verifier 470 if token.verifier [all...] |
/external/chromium_org/chrome/common/extensions/docs/examples/apps/hello-python/oauth2/ |
__init__.py | 160 verifier = None variable in class:Token 173 def set_verifier(self, verifier=None): 174 if verifier is not None: 175 self.verifier = verifier 177 self.verifier = generate_verifier() 180 if self.callback and self.verifier: 185 query = '%s&oauth_verifier=%s' % (query, self.verifier) 187 query = 'oauth_verifier=%s' % self.verifier 470 if token.verifier [all...] |
/external/wpa_supplicant_8/src/common/ |
sae.c | 922 * verifier = CN(KCK, peer-send-confirm, peer-commit-scalar, 1010 u8 verifier[SHA256_MAC_LEN]; local 1024 verifier); 1030 verifier); 1032 if (os_memcmp(verifier, data + 2, SHA256_MAC_LEN) != 0) { 1036 wpa_hexdump(MSG_DEBUG, "SAE: Calculated verifier", 1037 verifier, SHA256_MAC_LEN);
|
/frameworks/opt/vcard/tests/src/com/android/vcard/tests/ |
VCardImporterTests.java | 998 ContentValuesVerifier verifier = new ContentValuesVerifier(); local [all...] |
/cts/apps/CtsVerifier/src/com/android/cts/verifier/ |
TestListAdapter.java | 17 package com.android.cts.verifier;
|
/cts/apps/CtsVerifier/src/com/android/cts/verifier/admin/ |
PolicySerializationTestActivity.java | 17 package com.android.cts.verifier.admin; 19 import com.android.cts.verifier.PassFailButtons; 20 import com.android.cts.verifier.R;
|
/cts/apps/CtsVerifier/src/com/android/cts/verifier/usb/ |
UsbAccessoryTestActivity.java | 17 package com.android.cts.verifier.usb; 19 import com.android.cts.verifier.PassFailButtons; 20 import com.android.cts.verifier.R; 62 "com.android.cts.verifier.usb.USB_PERMISSION";
|
/cts/apps/CtsVerifier/src/com/android/cts/verifier/widget/ |
WidgetCtsProvider.java | 17 package com.android.cts.verifier.widget; 33 import com.android.cts.verifier.R;
|