/build/soong/android/ |
D | onceper.go | 28 func (once *OncePer) maybeWaitFor(key OnceKey, value interface{}) interface{} { 33 value, _ = once.values.Load(key) 45 func (once *OncePer) Once(key OnceKey, value func() interface{}) interface{} { 47 if v, ok := once.values.Load(key); ok { 48 return once.maybeWaitFor(key, v) 53 if v, loaded := once.values.LoadOrStore(key, waiter); loaded { 55 return once.maybeWaitFor(key, v) 62 once.values.Store(key, v) 73 func (once *OncePer) Get(key OnceKey) interface{} { 74 v, ok := once.values.Load(key) [all …]
|
D | onceper_test.go | 24 key := NewOnceKey("key") 26 a := once.Once(key, func() interface{} { return "a" }).(string) 27 b := once.Once(key, func() interface{} { return "b" }).(string) 34 t.Errorf(`second call to Once with the same key should return "a": %q`, b) 40 key := NewOnceKey("key") 44 …go once.Once(key, func() interface{} { close(ch); time.Sleep(100 * time.Millisecond); return "foo"… 46 a := once.Once(key, func() interface{} { return "bar" }).(string) 55 key := NewOnceKey("key") 57 a := once.Once(key, func() interface{} { return "a" }).(string) 58 b := once.Get(key).(string) [all …]
|
D | util_test.go | 177 key string 181 key: "a", 185 key: "b", 189 key: "c", 193 key: "X", 199 t.Run(testCase.key, func(t *testing.T) { 200 out := IndexList(testCase.key, input) 203 t.Errorf(" key: %#v", testCase.key) 216 key string 220 key: "a", [all …]
|
D | env.go | 91 func getenv(key string) string { 93 return os.Getenv(key) 95 return originalEnv[key]
|
/build/soong/ui/build/ |
D | environment.go | 39 func (e *Environment) Get(key string) (string, bool) { 41 if k, v, ok := decodeKeyValue(env); ok && k == key { 50 func (e *Environment) GetInt(key string) (int, bool) { 51 if v, ok := e.Get(key); ok { 61 func (e *Environment) Set(key, value string) { argument 62 e.Unset(key) 63 *e = append(*e, key+"="+value) 70 if key, _, ok := decodeKeyValue(env); ok && inList(key, keys) { 82 if key, _, ok := decodeKeyValue(env); ok && strings.HasPrefix(key, prefix) { 94 if key, _, ok := decodeKeyValue(env); ok && inList(key, keys) { [all …]
|
/build/soong/scripts/ |
D | jsonmodify.py | 26 for key in path.split('.'): 31 last_key = key 40 for key in path.split('.'): 45 last_key = key 51 cur, key = ensure_path(obj, self) 52 cur[key] = val 57 cur, key = follow_path(obj, self) 59 cur[key] = val 64 cur, key = follow_path(obj, self) 66 del cur[key] [all …]
|
/build/make/tools/ |
D | product_debug.py | 21 def break_lines(key, val): argument 23 if key in ("PRODUCT_MODEL"): 24 return (key,val) 25 return (key, "\n".join(val.split())) 48 + "\n".join([ "<tr><th>%(key)s</th><td>%(val)s</td></tr>" % { "key": key, "val": val } 49 for key,val in variables]) 83 variables = [break_lines(key,val) for key,val in variables] 95 for key in sorted_vars: 96 variables[key] = sort_lines(variables[key])
|
D | check_radio_versions.py | 33 key, value = line.split()[1].split("=", 1) variable 34 build_info[key] = value 40 key, fn = item.split(":", 1) variable 42 values = build_info.get(key, None) 56 print "*** Error opening \"%s.sha1\"; can't verify %s" % (fn, key) 74 fn, versions[digest], key, sys.argv[1])
|
D | findleaves.py | 61 key = (st.st_dev, st.st_ino) 62 if key in seen: 66 seen.add(key)
|
D | extract_kernel.py | 46 def get_from_release(input_bytes, start_idx, key): argument 56 return mo.group(key) 60 def dump_from_release(input_bytes, key): argument 70 value = get_from_release(input_bytes, idx, key)
|
/build/make/tools/releasetools/ |
D | sign_target_files_apks.py | 227 for apex, key in OPTIONS.extra_apex_payload_keys.items(): 228 if not key: 229 key = 'PRESIGNED' 233 keys_info[apex] = (key, keys_info[apex][1]) 240 for apex, key in OPTIONS.extra_apks.items(): 244 if not key: 245 key = 'PRESIGNED' 246 keys_info[apex] = (keys_info[apex][0], key_map.get(key, key)) 487 key = apk_keys[name] 488 if key not in common.SPECIAL_CERT_STRINGS: [all …]
|
D | sign_target_files_apks | 227 for apex, key in OPTIONS.extra_apex_payload_keys.items(): 228 if not key: 229 key = 'PRESIGNED' 233 keys_info[apex] = (key, keys_info[apex][1]) 240 for apex, key in OPTIONS.extra_apks.items(): 244 if not key: 245 key = 'PRESIGNED' 246 keys_info[apex] = (keys_info[apex][0], key_map.get(key, key)) 487 key = apk_keys[name] 488 if key not in common.SPECIAL_CERT_STRINGS: [all …]
|
D | validate_target_files.py | 359 key = options['verity_key'] 360 if key is None: 361 key = info_dict['avb_vbmeta_key_path'] 404 image, key, stdoutdata) 407 'Verified %s with avbtool (key: %s):\n%s', image, key, 414 key = info_dict['avb_recovery_key_path'] 416 '--key', key] 421 image, key, stdoutdata) 423 'Verified %s with avbtool (key: %s):\n%s', image, key, 431 key, value = line.split("=", 1) [all …]
|
D | sign_apex.py | 92 key, value = v.split(":") 95 options['codename_to_api_level_map'].update({key: value}) 97 names, key = a.split("=") 102 options['extra_apks'].update({n: key})
|
D | merge_target_files.py | 444 for key in framework_misc_info_keys: 445 merged_dict[key] = framework_dict[key] 463 for key in merged_dict: 464 if key.endswith('_selinux_fc'): 465 merged_dict[key] = 'vendor_file_contexts.bin' 466 for key in framework_dict: 467 if key.endswith('_selinux_fc'): 468 merged_dict[key] = 'framework_file_contexts.bin' 592 for key, value in item_dict.items(): 601 if key in merged_dict: [all …]
|
D | apex_utils.py | 146 for key, val in arguments_dict.items(): 147 generate_image_cmd.extend(['--' + key, val]) 252 key, value = line_info.group('key'), line_info.group('value') 254 if key == 'Prop': 274 payload_info[key] = value 277 for key in ('Algorithm', 'Salt', 'apex.key', 'Hash Algorithm'): 278 if key not in payload_info: 280 'Failed to find {} prop in {}'.format(key, payload_path))
|
D | common.py | 437 def __getitem__(self, key): argument 438 return self.info_dict[key] 440 def __setitem__(self, key, value): argument 441 self.info_dict[key] = value 443 def get(self, key, default=None): argument 444 return self.info_dict.get(key, default) 530 def GetOemProperty(self, key): argument 531 if self.oem_props is not None and key in self.oem_props: 532 return self.oem_dicts[0][key] 533 return self.GetBuildProp(key) [all …]
|
/build/blueprint/proptools/ |
D | tag.go | 37 func PropertyIndexesWithTag(ps interface{}, key, value string) [][]int { argument 44 return propertyIndexesWithTag(t, key, value) 46 func propertyIndexesWithTag(t reflect.Type, key, value string) [][]int { argument 56 subIndexes := propertyIndexesWithTag(ft, key, value) 61 } else if HasTag(field, key, value) {
|
/build/soong/env/ |
D | env.go | 32 for key, value := range envDeps { 33 contents = append(contents, envFileEntry{key, value}) 63 key := entry.Key 65 cur := os.Getenv(key) 67 changed = append(changed, fmt.Sprintf("%s (%q -> %q)", key, old, cur))
|
/build/soong/apex/ |
D | apex_test.go | 353 key: "myapex.key", 596 key: "myapex.key", 662 key: "myapex.key", 683 key: "myapex.key", 733 key: "myapex.key", 826 key: "myapex2.key", 921 key: "myapex.key", 983 key: "com.android.runtime.key", 1046 key: "com.android.runtime.key", 1127 key: "myapex.key", [all …]
|
/build/make/tools/droiddoc/templates-pdk/assets/ |
D | android-developer-resource-browser.js | 201 var key = p[0] ? decodeURIComponent(p[0]) : p[0]; 208 if (key in params) { 210 params[key] = makeArray(params[key]); 211 params[key].push(val); 213 params[key] = val;
|
/build/blueprint/bootstrap/bpdoc/ |
D | properties.go | 240 func (ps *PropertyStruct) ExcludeByTag(key, value string) { argument 241 filterPropsByTag(&ps.Properties, key, value, true) 244 func (ps *PropertyStruct) IncludeByTag(key, value string) { argument 245 filterPropsByTag(&ps.Properties, key, value, false) 248 func filterPropsByTag(props *[]Property, key, value string, exclude bool) { argument 253 if hasTag(x.Tag, key, value) == !exclude { 261 func hasTag(tag reflect.StructTag, key, value string) bool { argument 262 for _, entry := range strings.Split(tag.Get(key), ",") {
|
/build/make/target/product/security/ |
D | README | 1 For detailed information on key types and image signing, please see: 9 key generation 12 The following commands were used to generate the test key pairs: 22 1. convert pk8 format key to pem format 25 2. create a signature using the pem format key
|
/build/make/tools/signtos/ |
D | SignTos.java | 110 Key key = skFactory.generateSecret(new PBEKeySpec(password)); in decryptPrivateKey() local 113 cipher.init(Cipher.DECRYPT_MODE, key, epkInfo.getAlgParameters()); in decryptPrivateKey() 203 private static String getSignatureAlgorithm(Key key) { in getSignatureAlgorithm() argument 204 if ("EC".equals(key.getAlgorithm())) { in getSignatureAlgorithm() 205 ECKey ecKey = (ECKey) key; in getSignatureAlgorithm() 215 throw new IllegalArgumentException("Unsupported key type " + key.getAlgorithm()); in getSignatureAlgorithm()
|
/build/make/tools/signapk/test/ |
D | run | 22 umask 0077 && openssl req -new -x509 -key $@.pk -out $@ -days 1095 \ 30 -key $(cert).pk -cert $(cert) -tempdir out
|