Home
last modified time | relevance | path

Searched refs:key (Results 1 – 25 of 78) sorted by relevance

1234

/build/soong/android/
Donceper.go28 func (once *OncePer) maybeWaitFor(key OnceKey, value interface{}) interface{} {
33 value, _ = once.values.Load(key)
45 func (once *OncePer) Once(key OnceKey, value func() interface{}) interface{} {
47 if v, ok := once.values.Load(key); ok {
48 return once.maybeWaitFor(key, v)
53 if v, loaded := once.values.LoadOrStore(key, waiter); loaded {
55 return once.maybeWaitFor(key, v)
62 once.values.Store(key, v)
73 func (once *OncePer) Get(key OnceKey) interface{} {
74 v, ok := once.values.Load(key)
[all …]
Donceper_test.go24 key := NewOnceKey("key")
26 a := once.Once(key, func() interface{} { return "a" }).(string)
27 b := once.Once(key, func() interface{} { return "b" }).(string)
34 t.Errorf(`second call to Once with the same key should return "a": %q`, b)
40 key := NewOnceKey("key")
44 …go once.Once(key, func() interface{} { close(ch); time.Sleep(100 * time.Millisecond); return "foo"…
46 a := once.Once(key, func() interface{} { return "bar" }).(string)
55 key := NewOnceKey("key")
57 a := once.Once(key, func() interface{} { return "a" }).(string)
58 b := once.Get(key).(string)
[all …]
Dutil_test.go177 key string
181 key: "a",
185 key: "b",
189 key: "c",
193 key: "X",
199 t.Run(testCase.key, func(t *testing.T) {
200 out := IndexList(testCase.key, input)
203 t.Errorf(" key: %#v", testCase.key)
216 key string
220 key: "a",
[all …]
Denv.go91 func getenv(key string) string {
93 return os.Getenv(key)
95 return originalEnv[key]
/build/soong/ui/build/
Denvironment.go39 func (e *Environment) Get(key string) (string, bool) {
41 if k, v, ok := decodeKeyValue(env); ok && k == key {
50 func (e *Environment) GetInt(key string) (int, bool) {
51 if v, ok := e.Get(key); ok {
61 func (e *Environment) Set(key, value string) { argument
62 e.Unset(key)
63 *e = append(*e, key+"="+value)
70 if key, _, ok := decodeKeyValue(env); ok && inList(key, keys) {
82 if key, _, ok := decodeKeyValue(env); ok && strings.HasPrefix(key, prefix) {
94 if key, _, ok := decodeKeyValue(env); ok && inList(key, keys) {
[all …]
/build/soong/scripts/
Djsonmodify.py26 for key in path.split('.'):
31 last_key = key
40 for key in path.split('.'):
45 last_key = key
51 cur, key = ensure_path(obj, self)
52 cur[key] = val
57 cur, key = follow_path(obj, self)
59 cur[key] = val
64 cur, key = follow_path(obj, self)
66 del cur[key]
[all …]
/build/make/tools/
Dproduct_debug.py21 def break_lines(key, val): argument
23 if key in ("PRODUCT_MODEL"):
24 return (key,val)
25 return (key, "\n".join(val.split()))
48 + "\n".join([ "<tr><th>%(key)s</th><td>%(val)s</td></tr>" % { "key": key, "val": val }
49 for key,val in variables])
83 variables = [break_lines(key,val) for key,val in variables]
95 for key in sorted_vars:
96 variables[key] = sort_lines(variables[key])
Dcheck_radio_versions.py33 key, value = line.split()[1].split("=", 1) variable
34 build_info[key] = value
40 key, fn = item.split(":", 1) variable
42 values = build_info.get(key, None)
56 print "*** Error opening \"%s.sha1\"; can't verify %s" % (fn, key)
74 fn, versions[digest], key, sys.argv[1])
Dfindleaves.py61 key = (st.st_dev, st.st_ino)
62 if key in seen:
66 seen.add(key)
Dextract_kernel.py46 def get_from_release(input_bytes, start_idx, key): argument
56 return mo.group(key)
60 def dump_from_release(input_bytes, key): argument
70 value = get_from_release(input_bytes, idx, key)
/build/make/tools/releasetools/
Dsign_target_files_apks.py227 for apex, key in OPTIONS.extra_apex_payload_keys.items():
228 if not key:
229 key = 'PRESIGNED'
233 keys_info[apex] = (key, keys_info[apex][1])
240 for apex, key in OPTIONS.extra_apks.items():
244 if not key:
245 key = 'PRESIGNED'
246 keys_info[apex] = (keys_info[apex][0], key_map.get(key, key))
487 key = apk_keys[name]
488 if key not in common.SPECIAL_CERT_STRINGS:
[all …]
Dsign_target_files_apks227 for apex, key in OPTIONS.extra_apex_payload_keys.items():
228 if not key:
229 key = 'PRESIGNED'
233 keys_info[apex] = (key, keys_info[apex][1])
240 for apex, key in OPTIONS.extra_apks.items():
244 if not key:
245 key = 'PRESIGNED'
246 keys_info[apex] = (keys_info[apex][0], key_map.get(key, key))
487 key = apk_keys[name]
488 if key not in common.SPECIAL_CERT_STRINGS:
[all …]
Dvalidate_target_files.py359 key = options['verity_key']
360 if key is None:
361 key = info_dict['avb_vbmeta_key_path']
404 image, key, stdoutdata)
407 'Verified %s with avbtool (key: %s):\n%s', image, key,
414 key = info_dict['avb_recovery_key_path']
416 '--key', key]
421 image, key, stdoutdata)
423 'Verified %s with avbtool (key: %s):\n%s', image, key,
431 key, value = line.split("=", 1)
[all …]
Dsign_apex.py92 key, value = v.split(":")
95 options['codename_to_api_level_map'].update({key: value})
97 names, key = a.split("=")
102 options['extra_apks'].update({n: key})
Dmerge_target_files.py444 for key in framework_misc_info_keys:
445 merged_dict[key] = framework_dict[key]
463 for key in merged_dict:
464 if key.endswith('_selinux_fc'):
465 merged_dict[key] = 'vendor_file_contexts.bin'
466 for key in framework_dict:
467 if key.endswith('_selinux_fc'):
468 merged_dict[key] = 'framework_file_contexts.bin'
592 for key, value in item_dict.items():
601 if key in merged_dict:
[all …]
Dapex_utils.py146 for key, val in arguments_dict.items():
147 generate_image_cmd.extend(['--' + key, val])
252 key, value = line_info.group('key'), line_info.group('value')
254 if key == 'Prop':
274 payload_info[key] = value
277 for key in ('Algorithm', 'Salt', 'apex.key', 'Hash Algorithm'):
278 if key not in payload_info:
280 'Failed to find {} prop in {}'.format(key, payload_path))
Dcommon.py437 def __getitem__(self, key): argument
438 return self.info_dict[key]
440 def __setitem__(self, key, value): argument
441 self.info_dict[key] = value
443 def get(self, key, default=None): argument
444 return self.info_dict.get(key, default)
530 def GetOemProperty(self, key): argument
531 if self.oem_props is not None and key in self.oem_props:
532 return self.oem_dicts[0][key]
533 return self.GetBuildProp(key)
[all …]
/build/blueprint/proptools/
Dtag.go37 func PropertyIndexesWithTag(ps interface{}, key, value string) [][]int { argument
44 return propertyIndexesWithTag(t, key, value)
46 func propertyIndexesWithTag(t reflect.Type, key, value string) [][]int { argument
56 subIndexes := propertyIndexesWithTag(ft, key, value)
61 } else if HasTag(field, key, value) {
/build/soong/env/
Denv.go32 for key, value := range envDeps {
33 contents = append(contents, envFileEntry{key, value})
63 key := entry.Key
65 cur := os.Getenv(key)
67 changed = append(changed, fmt.Sprintf("%s (%q -> %q)", key, old, cur))
/build/soong/apex/
Dapex_test.go353 key: "myapex.key",
596 key: "myapex.key",
662 key: "myapex.key",
683 key: "myapex.key",
733 key: "myapex.key",
826 key: "myapex2.key",
921 key: "myapex.key",
983 key: "com.android.runtime.key",
1046 key: "com.android.runtime.key",
1127 key: "myapex.key",
[all …]
/build/make/tools/droiddoc/templates-pdk/assets/
Dandroid-developer-resource-browser.js201 var key = p[0] ? decodeURIComponent(p[0]) : p[0];
208 if (key in params) {
210 params[key] = makeArray(params[key]);
211 params[key].push(val);
213 params[key] = val;
/build/blueprint/bootstrap/bpdoc/
Dproperties.go240 func (ps *PropertyStruct) ExcludeByTag(key, value string) { argument
241 filterPropsByTag(&ps.Properties, key, value, true)
244 func (ps *PropertyStruct) IncludeByTag(key, value string) { argument
245 filterPropsByTag(&ps.Properties, key, value, false)
248 func filterPropsByTag(props *[]Property, key, value string, exclude bool) { argument
253 if hasTag(x.Tag, key, value) == !exclude {
261 func hasTag(tag reflect.StructTag, key, value string) bool { argument
262 for _, entry := range strings.Split(tag.Get(key), ",") {
/build/make/target/product/security/
DREADME1 For detailed information on key types and image signing, please see:
9 key generation
12 The following commands were used to generate the test key pairs:
22 1. convert pk8 format key to pem format
25 2. create a signature using the pem format key
/build/make/tools/signtos/
DSignTos.java110 Key key = skFactory.generateSecret(new PBEKeySpec(password)); in decryptPrivateKey() local
113 cipher.init(Cipher.DECRYPT_MODE, key, epkInfo.getAlgParameters()); in decryptPrivateKey()
203 private static String getSignatureAlgorithm(Key key) { in getSignatureAlgorithm() argument
204 if ("EC".equals(key.getAlgorithm())) { in getSignatureAlgorithm()
205 ECKey ecKey = (ECKey) key; in getSignatureAlgorithm()
215 throw new IllegalArgumentException("Unsupported key type " + key.getAlgorithm()); in getSignatureAlgorithm()
/build/make/tools/signapk/test/
Drun22 umask 0077 && openssl req -new -x509 -key $@.pk -out $@ -days 1095 \
30 -key $(cert).pk -cert $(cert) -tempdir out

1234