HomeSort by relevance Sort by last modified time
    Searched full:checker (Results 101 - 125 of 1436) sorted by null

1 2 3 45 6 7 8 91011>>

  /development/samples/SpellChecker/SampleSpellCheckerService/res/xml/
spellchecker.xml 21 <!-- for the spell checker -->
23 <spell-checker xmlns:android="http://schemas.android.com/apk/res/android"
30 </spell-checker>
  /external/clang/test/Analysis/inlining/
false-positive-suppression.m 1 // RUN: %clang_cc1 -analyze -analyzer-checker=core -analyzer-config suppress-null-return-paths=false -verify %s
2 // RUN: %clang_cc1 -analyze -analyzer-checker=core -verify -DSUPPRESSED=1 %s
3 // RUN: %clang_cc1 -analyze -analyzer-checker=core -analyzer-config avoid-suppressing-null-argument-paths=true -DSUPPRESSED=1 -DNULL_ARGS=1 -verify %s
  /external/clang/test/CodeGenCXX/
conditional-temporaries.cpp 28 struct Checker {
29 Checker() {
35 Checker c;
  /bionic/tests/
stack_protector_test.cpp 68 stack_protector_checker checker; local
72 checker.Check();
78 stack_protector_checker* checker = reinterpret_cast<stack_protector_checker*>(arg);
79 checker->Check();
81 }, &checker));
86 ASSERT_EQ(thread_count, checker.tids.size());
89 ASSERT_EQ(1U, checker.guards.size());
  /external/clang/include/clang/StaticAnalyzer/Core/BugReporter/
BugType.h 19 #include "clang/StaticAnalyzer/Core/Checker.h"
42 BugType(const CheckerBase *checker, StringRef name, StringRef cat)
43 : Check(checker->getCheckName()), Name(name), Category(cat),
68 BuiltinBug(const CheckerBase *checker, const char *name,
70 : BugType(checker, name, categories::LogicError), desc(description) {}
72 BuiltinBug(const CheckerBase *checker, const char *name)
73 : BugType(checker, name, categories::LogicError), desc(name) {}
  /external/clang/include/clang/StaticAnalyzer/Core/
CheckerManager.h 1 //===--- CheckerManager.h - Static Analyzer Checker Manager -----*- C++ -*-===//
10 // Defines the Static Analyzer Checker Manager.
55 CheckerBase *Checker;
56 CheckerFn(CheckerBase *checker, Func fn) : Fn(fn), Checker(checker) { }
58 return Fn(Checker, ps...);
135 /// \returns a pointer to the checker object.
136 template <typename CHECKER>
137 CHECKER *registerChecker()
    [all...]
  /external/clang/lib/StaticAnalyzer/Checkers/
DirectIvarAssignment.cpp 13 // Two versions of a checker exist: one that checks all methods and the other
17 // The checker does not warn about assignments to Ivars, annotated with
20 // checker. The annotation is allowed on properties and Ivars.
29 #include "clang/StaticAnalyzer/Core/Checker.h"
54 public Checker<check::ASTDecl<ObjCImplementationDecl> > {
66 const CheckerBase *Checker;
72 const CheckerBase *Checker, AnalysisDeclContext *InDCtx)
74 Checker(Checker), DCtx(InDCtx) {}
183 // as a false positive suppression mechanism for the checker. Th
    [all...]
InterCheckerAPI.h 9 // This file allows introduction of checker dependencies. It contains APIs for
10 // inter-checker communications.
20 /// Register the checker which evaluates CString API calls.
FixedAddressChecker.cpp 1 //=== FixedAddressChecker.cpp - Fixed address usage checker ----*- C++ -*--===//
10 // This files defines FixedAddressChecker, a builtin checker that checks for
18 #include "clang/StaticAnalyzer/Core/Checker.h"
27 : public Checker< check::PreStmt<BinaryOperator> > {
  /external/clang/www/analyzer/
checker_dev_manual.html 5 <title>Checker Developer Manual</title>
19 <h1>Checker Developer Manual</h1>
24 checker, should check out the Building a Checker in 24 Hours talk
27 and refer to this page for additional information on writing a checker. The static analyzer is a
41 <li><a href="#idea">Idea for a Checker</a></li>
42 <li><a href="#registration">Checker Registration</a></li>
43 <li><a href="#events_callbacks">Events, Callbacks, and Checker Class Structure</a></li>
72 <li>Analyze a file with the specified checker:
74 $ <b>clang -cc1 -analyze -analyzer-checker=core.DivideZero test.c</b
    [all...]
  /libcore/ojluni/src/main/java/sun/security/provider/certpath/
ReverseState.java 97 /* the checker used for revocation status */
100 /* the algorithm checker */
103 /* the untrusted certificates checker */
200 * Initialize each user-defined checker
204 /* initialize each checker (just in case) */
205 for (PKIXCertPathChecker checker : userCheckers) {
206 checker.init(false);
236 for (PKIXCertPathChecker checker : userCheckers) {
237 if (checker instanceof AlgorithmChecker) {
238 ((AlgorithmChecker)checker).trySetTrustAnchor(anchor)
385 PKIXCertPathChecker checker = li.next(); local
    [all...]
  /external/droiddriver/src/io/appium/droiddriver/
Poller.java 125 * Polls until {@code checker} does not throw
128 * @return An object of type T returned by {@code checker}
130 <T> T pollFor(DroidDriver driver, Finder finder, ConditionChecker<T> checker);
133 * Polls until {@code checker} does not throw
136 * @return An object of type T returned by {@code checker}
138 <T> T pollFor(DroidDriver driver, Finder finder, ConditionChecker<T> checker, long timeoutMillis);
  /external/clang/test/Analysis/
NewDelete+MismatchedDeallocator_intersections.cpp 1 // RUN: %clang_cc1 -analyze -analyzer-checker=core,cplusplus.NewDelete,unix.MismatchedDeallocator -std=c++11 -verify %s
2 // RUN: %clang_cc1 -analyze -analyzer-checker=core,cplusplus.NewDelete,cplusplus.NewDeleteLeaks,unix.MismatchedDeallocator -DLEAKS -std=c++11 -verify %s
11 // does not enable warnings produced by the unix.Malloc checker.
PR2978.m 1 // RUN: %clang_cc1 -analyze -analyzer-checker=core,alpha.core -analyzer-checker=alpha.osx.cocoa.Dealloc %s -verify
3 // Tests for the checker which checks missing/extra ivar 'release' calls
NewDelete-variadic.cpp 1 // RUN: %clang_cc1 -analyze -analyzer-checker=core,cplusplus.NewDelete,cplusplus.NewDeleteLeaks,unix.Malloc -std=c++11 -fblocks -verify %s
ObjCProperties.m 1 // RUN: %clang_cc1 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -analyzer-constraints=range -Wno-objc-root-class %s -verify
analyzer-stats.c 1 // RUN: %clang_cc1 -analyze -analyzer-checker=core,deadcode.DeadStores,debug.Stats -verify -Wno-unreachable-code -analyzer-opt-analyze-nested-blocks %s
chroot.c 1 // RUN: %clang_cc1 -analyze -analyzer-checker=alpha.unix.Chroot -analyzer-store region -verify %s
complex.c 1 // RUN: %clang_cc1 -analyze -analyzer-checker=core -analyzer-store=region -analyzer-constraints=range -verify -Wno-unreachable-code -ffreestanding %s
conditional-operator.cpp 1 // RUN: %clang_cc1 -analyze -analyzer-checker=core,debug.ExprInspection %s -analyzer-output=text -verify
  /packages/inputmethods/LatinIME/java/res/values/
strings-appname.xml 26 <!-- Name of Android spell checker service. AOSP(Android Open Source Project) should not be translated.
28 <string name="spell_checker_service_name">Android Spell Checker (AOSP)</string>
36 <string name="android_spell_checker_settings">Android Spell Checker Settings (AOSP)</string>
  /packages/inputmethods/LatinIME/java/res/xml/
spellchecker.xml 21 for the spell checker -->
23 <spell-checker xmlns:android="http://schemas.android.com/apk/res/android"
62 </spell-checker>
  /device/generic/goldfish/
fstab.goldfish 3 # The filesystem that contains the filesystem checker binary (typically /system) cannot
  /external/chromium-trace/catapult/third_party/Paste/paste/auth/
multi.py 56 def add_predicate(self, name, checker):
57 self.predicate.append((checker, self.binding[name]))
67 for (checker, binding) in self.predicate:
68 if checker(environ):
  /external/chromium-trace/catapult/third_party/py_vulcanize/third_party/rcssmin/
README.chromium 16 caused license checker to fail.

Completed in 919 milliseconds

1 2 3 45 6 7 8 91011>>