Home
last modified time | relevance | path

Searched refs:pkg (Results 1 – 24 of 24) sorted by relevance

/system/media/camera/docs/
Dmetadata-check-dependencies53 local pkg=""
62 pkg="$macports"
65 pkg="$aptget"
68 if [[ -n $pkg ]]
70 echo "Missing $bin binary; please install with '$(packager_install $pkg)'"
83 local pkg=""
92 pkg="$macports"
95 pkg="$aptget"
98 if [[ -n $pkg ]]
100 echo "Missing python module $mod, please install with '$(packager_install $pkg)'"
/system/tools/hidl/build/
DfqName.go32 var pkg = "(" + component + "(?:[.]" + component + ")*)" var
34 var re_package = regexp.MustCompile("^" + pkg + "@" + digits + "." + digits + "$")
52 func (f *fqName) inPackage(pkg string) bool {
53 components := strings.Split(pkg, ".")
68 func (f *fqName) pkg() string { func
78 return f.pkg() + "@" + f.version()
81 return f.pkg() + "-V" + f.version() // NOT sanitizedVersion
/system/chre/build/variant/
Dgoogle_x86_linux.mk36 TARGET_CFLAGS += $(shell pkg-config --cflags tclap)
37 TARGET_CFLAGS += $(shell pkg-config --cflags sndfile)
42 TARGET_BIN_LDFLAGS += $(shell pkg-config --libs sndfile)
Dgoogle_x86_googletest.mk55 TARGET_BIN_LDFLAGS += $(shell pkg-config --libs sndfile)
/system/apex/apexd/
Dapex_database.h200 for (const auto& pkg : mounted_apexes_) { in ForallMountedApexes() local
201 for (const auto& pair : pkg.second) { in ForallMountedApexes()
202 handler(pkg.first, pair.first, pair.second); in ForallMountedApexes()
Dapexservice.cpp393 for (const ApexFile& pkg : active) { in getAllPackages() local
394 ApexInfo apex_info = getApexInfo(pkg); in getAllPackages()
398 for (const ApexFile& pkg : factory) { in getAllPackages() local
399 const auto& same_path = [&pkg](const auto& o) { in getAllPackages()
400 return o.GetPath() == pkg.GetPath(); in getAllPackages()
403 aidl_return->push_back(getApexInfo(pkg)); in getAllPackages()
Dapexservice_test.cpp2224 for (const auto& pkg : pkgs) { in PrepareBackup() local
2225 PrepareTestApexForInstall installer(pkg); in PrepareBackup()
2226 ASSERT_TRUE(installer.Prepare()) << " failed to prepare " << pkg; in PrepareBackup()
2273 auto pkg = StringPrintf("%s/com.android.apex.test_package@1.apex", in TEST_F() local
2276 CheckRevertWasPerformed({pkg}); in TEST_F()
/system/bt/build/secondary/third_party/libchrome/
DBUILD.gn227 # paths to dbus headers, can be obtained by "pkg-config --cflags dbus-1"
228 #TODO(jpawlowski) use pkg-config script like build/config/linux/pkg_config.gni
240 # paths to dbus headers, can be obtained by "pkg-config --cflags dbus-1"
241 #TODO(jpawlowski) use pkg-config script like build/config/linux/pkg_config.gni
/system/gsid/tests/
DLockScreenAutomation.java149 mDevice.wait(Until.hasObject(By.pkg(SETTINGS_PACKAGE).depth(0)), TIMEOUT); in launchLockScreenSettings()
/system/core/libutils/
DREADME242 header := idmap-magic <crc32-original-pkg> <crc32-overlay-pkg>
/system/sepolicy/prebuilts/api/27.0/public/
Dinstalld.te85 # Read pkg.apk file for input during dexopt.
/system/sepolicy/prebuilts/api/28.0/public/
Dinstalld.te86 # Read pkg.apk file for input during dexopt.
/system/sepolicy/prebuilts/api/26.0/public/
Dinstalld.te85 # Read pkg.apk file for input during dexopt.
/system/sepolicy/prebuilts/api/29.0/public/
Dinstalld.te95 # Read pkg.apk file for input during dexopt.
/system/sepolicy/prebuilts/api/30.0/public/
Dinstalld.te102 # Read pkg.apk file for input during dexopt.
/system/sepolicy/public/
Dinstalld.te102 # Read pkg.apk file for input during dexopt.
/system/tools/mkbootimg/
Dpylintrc34 extension-pkg-whitelist=
/system/update_engine/
Dpylintrc48 extension-pkg-whitelist=
/system/sepolicy/prebuilts/api/26.0/private/
Dsystem_server.te387 # Read pkg.apk file before it has been relabeled by vold.
/system/sepolicy/prebuilts/api/27.0/private/
Dsystem_server.te415 # Read pkg.apk file before it has been relabeled by vold.
/system/sepolicy/prebuilts/api/28.0/private/
Dsystem_server.te449 # Read pkg.apk file before it has been relabeled by vold.
/system/sepolicy/prebuilts/api/29.0/private/
Dsystem_server.te506 # Read pkg.apk file before it has been relabeled by vold.
/system/sepolicy/private/
Dsystem_server.te535 # Read pkg.apk file before it has been relabeled by vold.
/system/sepolicy/prebuilts/api/30.0/private/
Dsystem_server.te535 # Read pkg.apk file before it has been relabeled by vold.