/external/bison/ |
H A D | cfg.mk | 43 local-checks-to-skip = \
|
H A D | maint.mk | 155 ## Sanity checks. ## 166 local-checks-available += $(syntax-check-rules) 168 local-checks-available += no-vc-detected 172 .PHONY: $(local-checks-available) 196 $(filter-out $(local-checks-to-skip), $(local-checks-available))) 1203 # This is useful because help-version cross-checks prog --version 1384 submodule-checks ?= no-submodule-changes public-submodule-commit 1412 alpha beta stable: $(local-check) writable-files $(submodule-checks) 1601 # The second nm|grep checks fo [all...] |
/external/libexif/test/nls/ |
H A D | test-codeset.c | 133 static int checks() function 197 int ret = checks();
|
/external/v8/src/compiler/ |
H A D | redundancy-elimination.cc | 54 EffectPathChecks const* checks) { 55 return new (zone->New(sizeof(EffectPathChecks))) EffectPathChecks(*checks); 144 Node* node, EffectPathChecks const* checks) { 147 info_for_node_[id] = checks; 152 EffectPathChecks const* checks = node_checks_.Get(effect); local 155 if (checks == nullptr) return NoChange(); 157 if (Node* check = checks->LookupCheck(node)) { 162 return UpdateChecks(node, checks->AddCheck(zone(), node)); 182 // Make a copy of the first input's checks and merge with the checks 53 Copy(Zone* zone, EffectPathChecks const* checks) argument 143 Set( Node* node, EffectPathChecks const* checks) argument 184 EffectPathChecks* checks = EffectPathChecks::Copy( local 214 EffectPathChecks const* checks = node_checks_.Get(effect); local 223 UpdateChecks(Node* node, EffectPathChecks const* checks) argument [all...] |
/external/boringssl/src/crypto/bn/ |
H A D | prime.c | 361 int checks = BN_prime_checks_for_size(bits); local 407 i = BN_is_prime_fasttest_ex(ret, checks, ctx, 0, cb); 420 for (i = 0; i < checks; i++) { 455 int checks, BN_CTX *ctx, int do_trial_division, 457 switch (BN_is_prime_fasttest_ex(candidate, checks, ctx, do_trial_division, cb)) { 470 int BN_is_prime_ex(const BIGNUM *candidate, int checks, BN_CTX *ctx, BN_GENCB *cb) { argument 471 return BN_is_prime_fasttest_ex(candidate, checks, ctx, 0, cb); 474 int BN_is_prime_fasttest_ex(const BIGNUM *a, int checks, BN_CTX *ctx_passed, argument 487 if (checks == BN_prime_checks) { 488 checks 454 BN_primality_test(int *is_probably_prime, const BIGNUM *candidate, int checks, BN_CTX *ctx, int do_trial_division, BN_GENCB *cb) argument [all...] |
/external/clang/utils/check_cfc/ |
H A D | check_cfc.py | 6 different compilation processes. It checks that code is not unduly affected by 15 -Enable the desired checks in check_cfc.cfg (in the same directory as the 253 checks.""" 310 # Create configuration defaults from list of checks 316 checks = [cls.__name__ for cls in vars()['WrapperCheck'].__subclasses__()] variable in class:dash_s_no_change 318 for c in checks: 341 for check_name in checks 357 # Bail out here if we can't apply checks in this case. 373 # Run checks, if they are enabled in config and if they are appropriate for 376 for check_name in checks [all...] |
/external/google-benchmark/test/ |
H A D | output_test_helper.cc | 100 void CheckCases(TestCaseList const& checks, std::stringstream& output) { argument 102 for (size_t i = 0; i < checks.size(); ++i) { 103 const auto& TC = checks[i];
|
/external/icu/icu4c/source/test/cintltst/ |
H A D | spooftest.c | 329 int32_t checks; local 333 checks = uspoof_getChecks(sc, &status); 335 TEST_ASSERT_EQ(USPOOF_ALL_CHECKS, checks); 337 checks &= ~(USPOOF_SINGLE_SCRIPT | USPOOF_MIXED_SCRIPT_CONFUSABLE); 338 uspoof_setChecks(sc, checks, &status); 341 TEST_ASSERT_EQ(checks, checks2); 343 /* The checks that were disabled just above are the same ones that the "scMixed" test fails. 371 /* Limit checks to USPOOF_CHAR_LIMIT. Some of the test data has whole script confusables also,
|
/external/icu/icu4c/source/test/intltest/ |
H A D | itutil.cpp | 186 : checks(countChecks), dests(countDests) {} 194 ++checks; 196 int32_t &checks; member in class:MyErrorCode
|
H A D | itspoof.cpp | 649 int32_t checks = uspoof_getChecks(sc.getAlias(), &status); local 650 TEST_ASSERT((checks & USPOOF_RESTRICTION_LEVEL) != 0); 651 checks &= ~USPOOF_RESTRICTION_LEVEL; 652 uspoof_setChecks(sc.getAlias(), checks, &status); 653 checks = uspoof_getChecks(sc.getAlias(), &status); 654 TEST_ASSERT((checks & USPOOF_RESTRICTION_LEVEL) == 0); 657 checks = uspoof_getChecks(sc.getAlias(), &status); 658 TEST_ASSERT((checks & USPOOF_RESTRICTION_LEVEL) != 0);
|
/external/libcxx/utils/google-benchmark/test/ |
H A D | output_test_helper.cc | 100 void CheckCases(TestCaseList const& checks, std::stringstream& output) { argument 102 for (size_t i = 0; i < checks.size(); ++i) { 103 const auto& TC = checks[i];
|
/external/libunwind/tests/ |
H A D | Gia64-test-nat.c | 94 static check_func_t *checks[MAX_CHECKS]; variable 565 vals = (*checks[num_checks - 1 - i]) (&c, vals); 594 checks[i] = all_funcs[index].check;
|
/external/icu/icu4c/source/i18n/ |
H A D | uspoof.cpp | 206 uspoof_setChecks(USpoofChecker *sc, int32_t checks, UErrorCode *status) { argument 212 // Verify that the requested checks are all ones (bits) that 214 if (checks & ~(USPOOF_ALL_CHECKS | USPOOF_AUX_INFO)) { 219 This->fChecks = checks;
|
/external/jsoncpp/src/test_lib_json/ |
H A D | main.cpp | 70 /// Initialize all checks to \c false by default. 165 IsCheck checks; local 166 checks.isObject_ = true; 167 JSONTEST_ASSERT_PRED(checkIs(emptyObject_, checks)); 168 JSONTEST_ASSERT_PRED(checkIs(object1_, checks)); 207 IsCheck checks; local 208 checks.isArray_ = true; 209 JSONTEST_ASSERT_PRED(checkIs(emptyArray_, checks)); 210 JSONTEST_ASSERT_PRED(checkIs(array1_, checks)); 248 IsCheck checks; local 273 IsCheck checks; local 302 IsCheck checks; local 342 IsCheck checks; local 1074 IsCheck checks; local [all...] |
/external/autotest/client/deps/iwcap/src/ |
H A D | iwcap.c | 163 static const struct check checks[] = { variable in typeref:struct:check 203 for (p = checks; p->name != NULL; p++) 214 for (p = checks; p->name != NULL; p++) 275 uintptr_t checks = (uintptr_t) arg; local 363 if (checks & CHECK_FREQS) 401 #define PBOOL(c, b, name) if (checks & (c)) pbool(name, phy_caps & (b)) 411 if (checks & CHECK_IS_SMPS) 430 if (checks & CHECK_AMSDU_LEN) 432 if (checks & CHECK_AMPDU_FACT) 434 if (checks 460 int checks = 0; local [all...] |
/external/icu/android_icu4j/src/main/java/android/icu/text/ |
H A D | SpoofChecker.java | 142 * third line, the CONFUSABLE checks are disabled. It is good practice to disable them if you won't be using the 146 * To get more details on why a string failed the checks, use a {@link SpoofChecker.CheckResult}: 157 * System.out.println(checkResult.checks); // 16 162 * The return value is a bitmask of the checks that failed. In this case, there was one check that failed: 163 * {@link SpoofChecker#RESTRICTION_LEVEL}, corresponding to the fifth bit (16). The possible checks are: 177 * These checks can be enabled independently of each other. For example, if you were interested in checking for only the 191 * <b>Note:</b> The Restriction Level is the most powerful of the checks. The full logic is documented in 205 * A <code>SpoofChecker</code> instance may be used repeatedly to perform checks on any number of identifiers. 337 * Constants for the kinds of checks that USpoofChecker can perform. These values are used both to select the set of 338 * checks tha 585 setChecks(int checks) argument 1136 public int checks; field in class:SpoofChecker.CheckResult [all...] |
/external/icu/icu4j/main/classes/core/src/com/ibm/icu/text/ |
H A D | SpoofChecker.java | 141 * third line, the CONFUSABLE checks are disabled. It is good practice to disable them if you won't be using the 145 * To get more details on why a string failed the checks, use a {@link SpoofChecker.CheckResult}: 156 * System.out.println(checkResult.checks); // 16 161 * The return value is a bitmask of the checks that failed. In this case, there was one check that failed: 162 * {@link SpoofChecker#RESTRICTION_LEVEL}, corresponding to the fifth bit (16). The possible checks are: 176 * These checks can be enabled independently of each other. For example, if you were interested in checking for only the 190 * <b>Note:</b> The Restriction Level is the most powerful of the checks. The full logic is documented in 204 * A <code>SpoofChecker</code> instance may be used repeatedly to perform checks on any number of identifiers. 352 * Constants for the kinds of checks that USpoofChecker can perform. These values are used both to select the set of 353 * checks tha 623 setChecks(int checks) argument 1186 public int checks; field in class:SpoofChecker.CheckResult [all...] |
/external/fio/ |
H A D | goptions.c | 61 GtkWidget *checks[PARSE_MAX_VP]; member in struct:gopt_str_multi 444 m->checks[i] = gtk_check_button_new_with_label(vp->ival); 445 gtk_widget_set_tooltip_text(m->checks[i], vp->help); 446 gtk_box_pack_start(GTK_BOX(hbox), m->checks[i], FALSE, FALSE, 3); 447 g_signal_connect(G_OBJECT(m->checks[i]), "toggled", G_CALLBACK(gopt_str_multi_toggled), m); 1215 if (!m->checks[i]) 1217 set = gtk_toggle_button_get_active(GTK_TOGGLE_BUTTON(m->checks[i]));
|
/external/v8/src/inspector/build/closure-compiler/ |
H A D | closure-compiler.jar | META-INF/MANIFEST.MF META-INF/ com/ com/google/ com/google/debugging/ com/google/debugging/sourcemap/ ... |