/build/soong/android/ |
D | onceper.go | 28 func (once *OncePer) maybeWaitFor(key OnceKey, value interface{}) interface{} { 33 value, _ = once.values.Load(key) 45 func (once *OncePer) Once(key OnceKey, value func() interface{}) interface{} { 47 if v, ok := once.values.Load(key); ok { 48 return once.maybeWaitFor(key, v) 53 if v, loaded := once.values.LoadOrStore(key, waiter); loaded { 55 return once.maybeWaitFor(key, v) 62 once.values.Store(key, v) 73 func (once *OncePer) Get(key OnceKey) interface{} { 74 v, ok := once.values.Load(key) [all …]
|
D | onceper_test.go | 24 key := NewOnceKey("key") 26 a := once.Once(key, func() interface{} { return "a" }).(string) 27 b := once.Once(key, func() interface{} { return "b" }).(string) 34 t.Errorf(`second call to Once with the same key should return "a": %q`, b) 40 key := NewOnceKey("key") 44 …go once.Once(key, func() interface{} { close(ch); time.Sleep(100 * time.Millisecond); return "foo"… 46 a := once.Once(key, func() interface{} { return "bar" }).(string) 55 key := NewOnceKey("key") 57 a := once.Once(key, func() interface{} { return "a" }).(string) 58 b := once.Get(key).(string) [all …]
|
D | util_test.go | 178 key string 182 key: "a", 186 key: "b", 190 key: "c", 194 key: "X", 200 t.Run(testCase.key, func(t *testing.T) { 201 out := IndexList(testCase.key, input) 204 t.Errorf(" key: %#v", testCase.key) 217 key string 221 key: "a", [all …]
|
D | ninja_deps.go | 27 c.ninjaFileDepsSet.Range(func(key, value interface{}) bool { 28 deps = append(deps, key.(string))
|
/build/soong/ui/build/ |
D | environment.go | 52 func (e *Environment) Get(key string) (string, bool) { 54 if k, v, ok := decodeKeyValue(envVar); ok && k == key { 63 func (e *Environment) GetInt(key string) (int, bool) { 64 if v, ok := e.Get(key); ok { 74 func (e *Environment) Set(key, value string) { argument 75 e.Unset(key) 76 *e = append(*e, key+"="+value) 83 if key, _, ok := decodeKeyValue(envVar); ok && inList(key, keys) { 96 if key, _, ok := decodeKeyValue(envVar); ok && strings.HasPrefix(key, prefix) { 109 if key, _, ok := decodeKeyValue(envVar); ok && inList(key, keys) { [all …]
|
/build/bazel/json_module_graph/ |
D | distanceFromLeaves.jq | 12 map({key: .Name, value: .Deps}) | from_entries 21 map(.key as $key | {key: .key, value: .value | [.[] | select(. != $key)]}) | 29 key: .key, 31 .key as $key | 32 $m[.key] // [] | 41 map({key: ., value: -1}) | from_entries |
|
D | usedVariations.jq | 3 group_by(.key) | 5 {key: .[0].key, value: map(.value) | unique}] |
|
D | library.jq | 91 map({key: .Name, value: .Deps}) | from_entries 100 map(.key as $key | {key: .key, value: .value | [.[] | select(. != $key)]}) |
|
/build/soong/scripts/ |
D | jsonmodify.py | 26 for key in path.split('.'): 31 last_key = key 40 for key in path.split('.'): 45 last_key = key 51 cur, key = ensure_path(obj, self) 52 cur[key] = val 57 cur, key = follow_path(obj, self) 59 cur[key] = val 64 cur, key = follow_path(obj, self) 66 del cur[key] [all …]
|
/build/blueprint/ |
D | glob.go | 25 func verifyGlob(key globKey, pattern string, excludes []string, g pathtools.GlobResult) { 27 panic(fmt.Errorf("Mismatched patterns %q and %q for glob key %q", pattern, g.Pattern, key)) 30 panic(fmt.Errorf("Mismatched excludes %v and %v for glob key %q", excludes, g.Excludes, key)) 35 panic(fmt.Errorf("Mismatched excludes %v and %v for glob key %q", excludes, g.Excludes, key)) 46 key := globToKey(pattern, excludes) 50 g, exists := c.globs[key] 55 verifyGlob(key, pattern, excludes, g) 68 if g, exists = c.globs[key]; !exists { 69 c.globs[key] = result 75 verifyGlob(key, pattern, excludes, g) [all …]
|
/build/make/tools/ |
D | product_debug.py | 21 def break_lines(key, val): argument 23 if key in ("PRODUCT_MODEL"): 24 return (key,val) 25 return (key, "\n".join(val.split())) 48 + "\n".join([ "<tr><th>%(key)s</th><td>%(val)s</td></tr>" % { "key": key, "val": val } 49 for key,val in variables]) 83 variables = [break_lines(key,val) for key,val in variables] 95 for key in sorted_vars: 96 variables[key] = sort_lines(variables[key])
|
D | check_radio_versions.py | 33 key, value = line.split()[1].split("=", 1) variable 34 build_info[key] = value 40 key, fn = item.split(":", 1) variable 42 values = build_info.get(key, None) 56 print "*** Error opening \"%s.sha1\"; can't verify %s" % (fn, key) 74 fn, versions[digest], key, sys.argv[1])
|
/build/make/tools/releasetools/ |
D | sign_target_files_apks.py | 265 for apex, key in OPTIONS.extra_apex_payload_keys.items(): 266 if not key: 267 key = 'PRESIGNED' 271 keys_info[apex] = (key, keys_info[apex][1]) 278 for apex, key in OPTIONS.extra_apks.items(): 282 if not key: 283 key = 'PRESIGNED' 284 keys_info[apex] = (keys_info[apex][0], key_map.get(key, key)) 543 key = apk_keys[name] 544 if key not in common.SPECIAL_CERT_STRINGS: [all …]
|
D | sign_target_files_apks | 265 for apex, key in OPTIONS.extra_apex_payload_keys.items(): 266 if not key: 267 key = 'PRESIGNED' 271 keys_info[apex] = (key, keys_info[apex][1]) 278 for apex, key in OPTIONS.extra_apks.items(): 282 if not key: 283 key = 'PRESIGNED' 284 keys_info[apex] = (keys_info[apex][0], key_map.get(key, key)) 543 key = apk_keys[name] 544 if key not in common.SPECIAL_CERT_STRINGS: [all …]
|
D | validate_target_files.py | 361 key = options['verity_key'] 362 if key is None: 363 key = info_dict['avb_vbmeta_key_path'] 406 image, key, stdoutdata) 409 'Verified %s with avbtool (key: %s):\n%s', image, key, 416 key = info_dict['avb_recovery_key_path'] 418 '--key', key] 423 image, key, stdoutdata) 425 'Verified %s with avbtool (key: %s):\n%s', image, key, 437 key, value = line.rstrip().split("=", 1) [all …]
|
D | sign_apex.py | 92 key, value = v.split(":") 95 options['codename_to_api_level_map'].update({key: value}) 97 names, key = a.split("=") 102 options['extra_apks'].update({n: key})
|
D | merge_target_files.py | 453 for key in framework_misc_info_keys: 454 merged_dict[key] = framework_dict[key] 478 for key in merged_dict: 479 if key.endswith('_selinux_fc'): 480 merged_dict[key] = 'vendor_file_contexts.bin' 481 for key in framework_dict: 482 if key.endswith('_selinux_fc'): 483 merged_dict[key] = 'framework_file_contexts.bin' 607 for key, value in item_dict.items(): 616 if key in merged_dict: [all …]
|
/build/blueprint/proptools/ |
D | tag.go | 44 func PropertyIndexesWithTag(ps interface{}, key, value string) [][]int { argument 51 return propertyIndexesWithTag(t, key, value) 53 func propertyIndexesWithTag(t reflect.Type, key, value string) [][]int { argument 63 subIndexes := propertyIndexesWithTag(ft, key, value) 68 } else if HasTag(field, key, value) {
|
/build/soong/shared/ |
D | env.go | 41 for key, value := range envDeps { 42 contents = append(contents, envFileEntry{key, value}) 75 key := entry.Key 77 cur := getenv(key) 79 changed = append(changed, fmt.Sprintf("%s (%q -> %q)", key, old, cur))
|
/build/soong/apex/ |
D | apex_test.go | 306 key: "myapex.key", 430 key: "myapex.key", 619 key: "myapex.key", 694 key: "myapex.key", 716 key: "myapex.key", 767 key: "myapex.key", 862 key: "myapex.key", 969 key: "myapex.key", 990 key: "myapex.key", 1036 key: "myapex2.key", [all …]
|
D | systemserver_classpath_fragment_test.go | 36 key: "myapex.key", 75 `myapex.key`,
|
/build/make/tools/droiddoc/templates-pdk/assets/ |
D | android-developer-resource-browser.js | 201 var key = p[0] ? decodeURIComponent(p[0]) : p[0]; 208 if (key in params) { 210 params[key] = makeArray(params[key]); 211 params[key].push(val); 213 params[key] = val;
|
/build/blueprint/bootstrap/bpdoc/ |
D | properties.go | 262 func (ps *PropertyStruct) ExcludeByTag(key, value string) { argument 263 filterPropsByTag(&ps.Properties, key, value, true) 266 func (ps *PropertyStruct) IncludeByTag(key, value string) { argument 267 filterPropsByTag(&ps.Properties, key, value, false) 270 func filterPropsByTag(props *[]Property, key, value string, exclude bool) { argument 275 if hasTag(x.Tag, key, value) == !exclude { 276 filterPropsByTag(&x.Properties, key, value, exclude) 284 func hasTag(tag reflect.StructTag, key, value string) bool { argument 285 for _, entry := range strings.Split(tag.Get(key), ",") {
|
/build/make/target/product/security/ |
D | README | 1 For detailed information on key types and image signing, please see: 9 key generation 12 The following commands were used to generate the test key pairs: 23 1. convert pk8 format key to pem format 26 2. create a signature using the pem format key
|
/build/make/tools/signapk/test/ |
D | run | 22 umask 0077 && openssl req -new -x509 -key $@.pk -out $@ -days 1095 \ 30 -key $(cert).pk -cert $(cert) -tempdir out
|