/development/samples/SpellChecker/SampleSpellCheckerService/res/xml/ |
spellchecker.xml | 21 <!-- for the spell checker --> 23 <spell-checker xmlns:android="http://schemas.android.com/apk/res/android" 30 </spell-checker>
|
/external/clang/test/Analysis/inlining/ |
false-positive-suppression.m | 1 // RUN: %clang_cc1 -analyze -analyzer-checker=core -analyzer-config suppress-null-return-paths=false -verify %s 2 // RUN: %clang_cc1 -analyze -analyzer-checker=core -verify -DSUPPRESSED=1 %s 3 // RUN: %clang_cc1 -analyze -analyzer-checker=core -analyzer-config avoid-suppressing-null-argument-paths=true -DSUPPRESSED=1 -DNULL_ARGS=1 -verify %s
|
/external/clang/test/CodeGenCXX/ |
conditional-temporaries.cpp | 28 struct Checker { 29 Checker() { 35 Checker c;
|
/bionic/tests/ |
stack_protector_test.cpp | 68 stack_protector_checker checker; local 72 checker.Check(); 78 stack_protector_checker* checker = reinterpret_cast<stack_protector_checker*>(arg); 79 checker->Check(); 81 }, &checker)); 86 ASSERT_EQ(thread_count, checker.tids.size()); 89 ASSERT_EQ(1U, checker.guards.size());
|
/external/clang/include/clang/StaticAnalyzer/Core/BugReporter/ |
BugType.h | 19 #include "clang/StaticAnalyzer/Core/Checker.h" 42 BugType(const CheckerBase *checker, StringRef name, StringRef cat) 43 : Check(checker->getCheckName()), Name(name), Category(cat), 68 BuiltinBug(const CheckerBase *checker, const char *name, 70 : BugType(checker, name, categories::LogicError), desc(description) {} 72 BuiltinBug(const CheckerBase *checker, const char *name) 73 : BugType(checker, name, categories::LogicError), desc(name) {}
|
/external/clang/include/clang/StaticAnalyzer/Core/ |
CheckerManager.h | 1 //===--- CheckerManager.h - Static Analyzer Checker Manager -----*- C++ -*-===// 10 // Defines the Static Analyzer Checker Manager. 55 CheckerBase *Checker; 56 CheckerFn(CheckerBase *checker, Func fn) : Fn(fn), Checker(checker) { } 58 return Fn(Checker, ps...); 135 /// \returns a pointer to the checker object. 136 template <typename CHECKER> 137 CHECKER *registerChecker() [all...] |
/external/clang/lib/StaticAnalyzer/Checkers/ |
DirectIvarAssignment.cpp | 13 // Two versions of a checker exist: one that checks all methods and the other 17 // The checker does not warn about assignments to Ivars, annotated with 20 // checker. The annotation is allowed on properties and Ivars. 29 #include "clang/StaticAnalyzer/Core/Checker.h" 54 public Checker<check::ASTDecl<ObjCImplementationDecl> > { 66 const CheckerBase *Checker; 72 const CheckerBase *Checker, AnalysisDeclContext *InDCtx) 74 Checker(Checker), DCtx(InDCtx) {} 183 // as a false positive suppression mechanism for the checker. Th [all...] |
InterCheckerAPI.h | 9 // This file allows introduction of checker dependencies. It contains APIs for 10 // inter-checker communications. 20 /// Register the checker which evaluates CString API calls.
|
FixedAddressChecker.cpp | 1 //=== FixedAddressChecker.cpp - Fixed address usage checker ----*- C++ -*--===// 10 // This files defines FixedAddressChecker, a builtin checker that checks for 18 #include "clang/StaticAnalyzer/Core/Checker.h" 27 : public Checker< check::PreStmt<BinaryOperator> > {
|
/external/clang/www/analyzer/ |
checker_dev_manual.html | 5 <title>Checker Developer Manual</title> 19 <h1>Checker Developer Manual</h1> 24 checker, should check out the Building a Checker in 24 Hours talk 27 and refer to this page for additional information on writing a checker. The static analyzer is a 41 <li><a href="#idea">Idea for a Checker</a></li> 42 <li><a href="#registration">Checker Registration</a></li> 43 <li><a href="#events_callbacks">Events, Callbacks, and Checker Class Structure</a></li> 72 <li>Analyze a file with the specified checker: 74 $ <b>clang -cc1 -analyze -analyzer-checker=core.DivideZero test.c</b [all...] |
/libcore/ojluni/src/main/java/sun/security/provider/certpath/ |
ReverseState.java | 97 /* the checker used for revocation status */ 100 /* the algorithm checker */ 103 /* the untrusted certificates checker */ 200 * Initialize each user-defined checker 204 /* initialize each checker (just in case) */ 205 for (PKIXCertPathChecker checker : userCheckers) { 206 checker.init(false); 236 for (PKIXCertPathChecker checker : userCheckers) { 237 if (checker instanceof AlgorithmChecker) { 238 ((AlgorithmChecker)checker).trySetTrustAnchor(anchor) 385 PKIXCertPathChecker checker = li.next(); local [all...] |
/external/droiddriver/src/io/appium/droiddriver/ |
Poller.java | 125 * Polls until {@code checker} does not throw 128 * @return An object of type T returned by {@code checker} 130 <T> T pollFor(DroidDriver driver, Finder finder, ConditionChecker<T> checker); 133 * Polls until {@code checker} does not throw 136 * @return An object of type T returned by {@code checker} 138 <T> T pollFor(DroidDriver driver, Finder finder, ConditionChecker<T> checker, long timeoutMillis);
|
/external/clang/test/Analysis/ |
NewDelete+MismatchedDeallocator_intersections.cpp | 1 // RUN: %clang_cc1 -analyze -analyzer-checker=core,cplusplus.NewDelete,unix.MismatchedDeallocator -std=c++11 -verify %s 2 // RUN: %clang_cc1 -analyze -analyzer-checker=core,cplusplus.NewDelete,cplusplus.NewDeleteLeaks,unix.MismatchedDeallocator -DLEAKS -std=c++11 -verify %s 11 // does not enable warnings produced by the unix.Malloc checker.
|
PR2978.m | 1 // RUN: %clang_cc1 -analyze -analyzer-checker=core,alpha.core -analyzer-checker=alpha.osx.cocoa.Dealloc %s -verify 3 // Tests for the checker which checks missing/extra ivar 'release' calls
|
NewDelete-variadic.cpp | 1 // RUN: %clang_cc1 -analyze -analyzer-checker=core,cplusplus.NewDelete,cplusplus.NewDeleteLeaks,unix.Malloc -std=c++11 -fblocks -verify %s
|
ObjCProperties.m | 1 // RUN: %clang_cc1 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -analyzer-constraints=range -Wno-objc-root-class %s -verify
|
analyzer-stats.c | 1 // RUN: %clang_cc1 -analyze -analyzer-checker=core,deadcode.DeadStores,debug.Stats -verify -Wno-unreachable-code -analyzer-opt-analyze-nested-blocks %s
|
chroot.c | 1 // RUN: %clang_cc1 -analyze -analyzer-checker=alpha.unix.Chroot -analyzer-store region -verify %s
|
complex.c | 1 // RUN: %clang_cc1 -analyze -analyzer-checker=core -analyzer-store=region -analyzer-constraints=range -verify -Wno-unreachable-code -ffreestanding %s
|
conditional-operator.cpp | 1 // RUN: %clang_cc1 -analyze -analyzer-checker=core,debug.ExprInspection %s -analyzer-output=text -verify
|
/packages/inputmethods/LatinIME/java/res/values/ |
strings-appname.xml | 26 <!-- Name of Android spell checker service. AOSP(Android Open Source Project) should not be translated. 28 <string name="spell_checker_service_name">Android Spell Checker (AOSP)</string> 36 <string name="android_spell_checker_settings">Android Spell Checker Settings (AOSP)</string>
|
/packages/inputmethods/LatinIME/java/res/xml/ |
spellchecker.xml | 21 for the spell checker --> 23 <spell-checker xmlns:android="http://schemas.android.com/apk/res/android" 62 </spell-checker>
|
/device/generic/goldfish/ |
fstab.goldfish | 3 # The filesystem that contains the filesystem checker binary (typically /system) cannot
|
/external/chromium-trace/catapult/third_party/Paste/paste/auth/ |
multi.py | 56 def add_predicate(self, name, checker): 57 self.predicate.append((checker, self.binding[name])) 67 for (checker, binding) in self.predicate: 68 if checker(environ):
|
/external/chromium-trace/catapult/third_party/py_vulcanize/third_party/rcssmin/ |
README.chromium | 16 caused license checker to fail.
|