/tools/loganalysis/src/com/android/loganalysis/item/ |
D | QtaguidItem.java | 69 for (int uid : getUids()) { in toJson() 72 user.put(UID_KEY, uid); in toJson() 73 user.put(RX_BYTES_KEY, getRxBytes(uid)); in toJson() 74 user.put(TX_BYTES_KEY, getTxBytes(uid)); in toJson() 103 public void addRow(int uid, int rxBytes, int txBytes) { in addRow() argument 107 mRows.put(uid, row); in addRow() 120 public void updateRow(int uid, int rxBytes, int txBytes) { in updateRow() argument 121 if (!mRows.containsKey(uid)) { in updateRow() 122 throw new IllegalArgumentException("Given UID " + uid + " is not added to QtaguidItem"); in updateRow() 125 Row row = mRows.get(uid); in updateRow() [all …]
|
D | ProcessUsageItem.java | 95 public ProcessUsageInfoItem(String uid, int alarmWakeups, in ProcessUsageInfoItem() argument 99 setAttribute(PROCESS_UID, uid); in ProcessUsageInfoItem()
|
/tools/test/connectivity/acts/framework/acts/controllers/sl4a_lib/ |
D | sl4a_session.py | 77 return '[SL4A Session|%s|%s] %s' % (self.adb.serial, self.uid, 83 self.uid = UNKNOWN_UID 89 self.uid, 96 def create_client(uid): argument 99 uid=uid) 138 def _create_rpc_connection(self, ports=None, uid=UNKNOWN_UID): argument 162 self.adb, ports, client_socket, fd, uid=uid) 164 if uid == UNKNOWN_UID: 165 self.uid = client.uid
|
D | rpc_connection.py | 51 def __init__(self, adb, ports, client_socket, socket_fd, uid=UNKNOWN_UID): argument 57 self.uid = uid 63 self.uid, message) 71 if self.uid != UNKNOWN_UID: 94 self.uid = result['uid'] 98 self.uid = UNKNOWN_UID 110 self.send_request(json.dumps({'cmd': command, 'uid': self.uid}))
|
D | rpc_client.py | 133 uid, argument 152 self._free_connections = [self._create_connection_func(uid)] 154 self.uid = self._free_connections[0].uid 159 return '[RPC Service|%s|%s] %s' % (self._serial, self.uid, message) 212 client = self._create_connection_func(self.uid)
|
D | error_reporter.py | 203 (session.uid, session.server_port))
|
D | sl4a_manager.py | 279 self.sessions[session.uid] = session
|
D | event_dispatcher.py | 69 self._rpc_client.uid, message)
|
/tools/test/connectivity/acts/framework/tests/controllers/sl4a_lib/ |
D | rpc_client_test.py | 38 client = rpc_client.RpcClient(session.uid, session.adb.serial, 55 client = rpc_client.RpcClient(session.uid, session.adb.serial, 82 client = rpc_client.RpcClient(session.uid, session.adb.serial, 115 client = rpc_client.RpcClient(session.uid, session.adb.serial, 143 client = rpc_client.RpcClient(session.uid, session.adb.serial, 173 client = rpc_client.RpcClient(session.uid, session.adb.serial, 190 client = rpc_client.RpcClient(session.uid, session.adb.serial, 202 client = rpc_client.RpcClient(session.uid, session.adb.serial,
|
D | rpc_connection_test.py | 48 uid=rpc_connection.UNKNOWN_UID): argument 57 adb, ports, fake_conn, fake_file, uid=uid) 85 connection = self.mock_rpc_connection(uid=1) 99 self.assertEqual(connection.uid, 1) 111 self.assertEqual(connection.uid, rpc_client.UNKNOWN_UID)
|
/tools/tradefederation/core/tests/src/com/android/tradefed/device/ |
D | TestDeviceTest.java | 1509 int uid = 123; in testinstallPackageForUser_default_runtimePermissionNotSupported() local 1520 EasyMock.eq(Integer.toString(uid))); in testinstallPackageForUser_default_runtimePermissionNotSupported() 1523 assertNull(mTestDevice.installPackageForUser(new File(apkFile), true, uid)); in testinstallPackageForUser_default_runtimePermissionNotSupported() 1542 int uid = 123; in testinstallPackageForUser_default_runtimePermissionSupported() local 1554 EasyMock.eq(Integer.toString(uid))); in testinstallPackageForUser_default_runtimePermissionSupported() 1557 assertNull(mTestDevice.installPackageForUser(new File(apkFile), true, uid)); in testinstallPackageForUser_default_runtimePermissionSupported() 1702 int uid = 123; in testInstallPackageForUser_grant_runtimePermissionSupported() local 1714 EasyMock.eq(Integer.toString(uid))); in testInstallPackageForUser_grant_runtimePermissionSupported() 1717 assertNull(mTestDevice.installPackageForUser(new File(apkFile), true, true, uid)); in testInstallPackageForUser_grant_runtimePermissionSupported() 1736 int uid = 123; in testInstallPackageForUser_noGrant_runtimePermissionSupported() local [all …]
|
/tools/loganalysis/src/com/android/loganalysis/parser/ |
D | QtaguidParser.java | 49 int uid = Integer.parseInt(columns[3]); in parse() local 53 if (item.contains(uid)) { in parse() 54 item.updateRow(uid, rxBytes, txBytes); in parse() 56 item.addRow(uid, rxBytes, txBytes); in parse()
|
/tools/tradefederation/core/tests/src/com/android/tradefed/proto/ |
D | PlatformProtosFuncTest.java | 73 for (UidProto uid : bs.getUidsList()) { in testDumpAndReadBatteryStatsProto() 74 if (uid.hasCpu()) { in testDumpAndReadBatteryStatsProto() 75 assertNotNull(uid.getCpu().getUserDurationMs()); in testDumpAndReadBatteryStatsProto()
|
/tools/test/connectivity/acts/framework/acts/controllers/ |
D | native_android_device.py | 129 if droid.uid in self._droid_sessions: 133 self._droid_sessions[droid.uid] = [droid]
|
D | android_device.py | 693 return self._sl4a_manager.sessions[droid.uid].get_event_dispatcher() 1122 self._sl4a_manager.sessions[session.uid] = session
|
/tools/test/connectivity/acts/framework/acts/test_utils/tel/ |
D | tel_test_utils.py | 4329 uid = ad.get_apk_uid(apk) 4330 ad.log.debug("apk %s uid = %s", apk, uid) 4335 begin_time, end_time, uid) 4339 begin_time, end_time, uid) 4360 uid = ad.get_apk_uid(apk) 4361 ad.log.debug("apk %s uid = %s", apk, uid) 4363 usage_info = ad.droid.getMobileDataUsageInfoForUid(uid, sid) 4364 ad.log.debug("Mobile data usage info for uid %s = %s", uid, 4372 begin_time, end_time, uid) 4376 begin_time, end_time, uid)
|
/tools/test/connectivity/acts_tests/tests/google/net/ |
D | DataUsageTest.py | 173 def _get_data_usage_for_uid_rx(self, ad, conn_type, uid): argument 187 conn_type, subscriber_id, 0, end_time, uid)
|
/tools/apksig/src/apksigner/java/com/android/apksigner/ |
D | help_lineage.txt | 149 --set-shared-uid Sets whether apps signed with this previous signing 180 --set-shared-uid false --set-permission false --set-rollback false \
|
D | help_rotate.txt | 152 --set-shared-uid Sets whether apps signed with this previous signing 208 --set-installed-data true --set-shared-uid true --set-permission true --set-rollback false \
|
/tools/tradefederation/core/src/com/android/tradefed/invoker/ |
D | RemoteInvocationExecution.java | 560 CommandResult uid = in collectAdbLogs() local 563 String uidString = uid.getStdout().trim(); in collectAdbLogs()
|
D | InvocationExecution.java | 900 String uid = uidRes.getStdout().trim(); 901 File adbLog = new File(tmpDir, String.format("adb.%s.log", uid));
|
/tools/test/connectivity/acts/framework/acts/ |
D | records.py | 129 d[TestResultEnums.RECORD_UID] = self.uid
|
/tools/test/connectivity/acts_tests/tests/google/bt/pts/instructions/ |
D | MCAP_PTS_INSTRUCTIONS | 32 set_aid_and_cap : pid 6794, uid 0 gid 0[0613/142107:INFO:mcap_tool.cc(935)] Fluoride MCAP test app …
|
/tools/test/connectivity/acts/framework/tests/ |
D | acts_records_test.py | 44 self.assertIsNone(record.uid)
|
/tools/dexter/testdata/expected/ |
D | large.rewrite | 6563 .params "permission", "pid", "uid" 6576 .params "permission", "pid", "uid", "callerToken" 6602 .params "uri", "pid", "uid", "modeFlags" 6615 .params "uri", "pid", "uid", "modeFlags", "callerToken" 6633 .params "uri", "readPermission", "writePermission", "pid", "uid", "modeFlags" 6856 .params "permission", "pid", "uid", "message" 6869 .params "uri", "pid", "uid", "modeFlags", "message" 6887 .params "uri", "readPermission", "writePermission", "pid", "uid", "modeFlags", "message" 17081 .local v1, "uid", int 17094 25| const-string/jumbo v4, "caller uid " [all …]
|