/tools/test/connectivity/acts_tests/acts_contrib/test_utils/wifi/wifi_retail_ap/ |
D | netgear_rax200.py | 227 for key, value in self.config_page_fields.items(): 228 if 'status' in key: 232 self.ap_settings[key[0]][key[1]] = int( 238 if 'enable_ax' in key: 239 self.ap_settings[key] = int(config_item.first.checked) 240 elif 'bandwidth' in key: 241 self.ap_settings[key[0]][key[1]] = self.bw_mode_values[ 244 elif 'power' in key: 245 self.ap_settings[key[0]][ 246 key[1]] = self.power_mode_values[ [all …]
|
D | netgear_r7000.py | 145 for key, value in self.config_page_fields.items(): 146 if 'status' in key: 150 self.ap_settings[key[0]][key[1]] = int( 156 if 'bandwidth' in key: 157 self.ap_settings[key[0]][key[1]] = self.bw_mode_values[ 159 elif 'power' in key: 160 self.ap_settings[key[0]][ 161 key[1]] = self.power_mode_values[ 163 elif 'region' in key: 166 elif 'security_type' in key: [all …]
|
D | netgear_r7500.py | 159 for key, value in self.config_page_fields.items(): 160 if 'bandwidth' in key: 162 self.ap_settings[key[0]][key[1]] = self.bw_mode_values[ 164 elif 'region' in key: 168 elif 'password' in key: 171 self.ap_settings[key[0]][ 172 key[1]] = config_item.value 174 key[0]]['security_type'] = 'WPA2-PSK' 176 self.ap_settings[key[0]][ 177 key[1]] = 'defaultpassword' [all …]
|
D | netgear_rax120.py | 218 for key, value in self.config_page_fields.items(): 219 if 'bandwidth' in key: 221 self.ap_settings[key[0]][key[1]] = self.bw_mode_values[ 223 elif 'region' in key: 227 elif 'password' in key: 230 self.ap_settings[key[0]][ 231 key[1]] = config_item.value 233 key[0]]['security_type'] = 'WPA2-PSK' 235 self.ap_settings[key[0]][ 236 key[1]] = 'defaultpassword' [all …]
|
/tools/test/connectivity/acts_tests/tests/google/wifi/ |
D | WifiScannerTests.config | 4 …l": 1}, "wifi-iface" : [{"ssid": "Test_1", "key": "hahahaha", "encryption": "psk2"},{"ssid": "Test… 5 …{"ssid": "Test_1.2", "key": "hahahaha", "encryption": "psk2"},{"ssid": "Test_1.3", "key": "hahahah… 6 … 40}, "wifi-iface" : [{"ssid": "Test_40", "key": "hahahaha", "encryption": "psk2"},{"ssid": "Test_… 7 …{"ssid": "Test_40.2", "key": "hahahaha", "encryption": "psk2"},{"ssid": "Test_40.3", "key": "hahah… 10 …l": 6}, "wifi-iface" : [{"ssid": "Test_6", "key": "hahahaha", "encryption": "psk"}, {"ssid": "Test… 11 …{"ssid": "Test_6.2", "key": "hahahaha", "encryption": "psk2"}, {"ssid": "Test_6.3", "key": "hahah… 12 … 40}, "wifi-iface" : [{"ssid": "Test_40", "key": "hahahaha", "encryption": "psk"}, {"ssid": "Test_… 13 …{"ssid": "Test_40.3", "key": "hahahaha", "encryption": "psk2"}, {"ssid": "Test_40.2", "key": "haha… 16 … 10}, "wifi-iface" : [{"ssid": "Test_10", "key": "hahahaha", "encryption": "psk2"}, {"ssid": "Test… 17 …{"ssid": "Test_10.2", "key": "hahahaha", "encryption": "psk2"}, {"ssid": "Test_10.3", "key": "haha… [all …]
|
D | WifiRssiTest.py | 164 for key, val in postprocessed_results.items(): 167 if 'rssi' in key and 'predicted' not in key: 183 '{}_error'.format(key), avg_error) 185 '{}_shift'.format(key), avg_shift) 190 if rssi_failure and key in testcase_params['rssi_under_test']: 193 'shift = {:.2f} dB)\n').format(key, error_type, 199 'shift = {:.2f} dB)\n').format(key, error_type, 204 'shift = {:.2f} dB)\n').format(key, error_type, 235 for key, val in postprocessed_results.items(): 236 if 'scan_rssi' in key: [all …]
|
/tools/acloud/public/data/ |
D | default.config | 24 key: "camera_front" 29 key: "camera_back" 34 key: "cfg_sta_ephemeral_cache_size_mb" 39 key: "cfg_sta_ephemeral_data_size_mb" 44 key: "cfg_sta_persistent_data_device" 49 key: "gps_coordinates" 59 key: "local-phone" 64 key: "local-auto" 69 key: "local-wear" 74 key: "local-tablet" [all …]
|
/tools/test/connectivity/acts_tests/acts_contrib/test_utils/net/ |
D | connectivity_test_utils.py | 20 def _listen_for_keepalive_event(ad, key, msg, ka_event): argument 29 ad.droid.socketKeepaliveStartListeningForEvent(key, ka_event) 36 ad.droid.socketKeepaliveStopListeningForEvent(key, ka_event) 38 ad.droid.removeSocketKeepaliveReceiverKey(key) 54 key = ad.droid.startNattSocketKeepalive(udp_encap, src_ip, dst_ip, interval) 56 status = _listen_for_keepalive_event(ad, key, msg, "Started") 57 return key if status else None 68 key = ad.droid.startTcpSocketKeepalive(socket, time_interval) 70 status = _listen_for_keepalive_event(ad, key, msg, "Started") 71 return key if status else None [all …]
|
/tools/test/connectivity/acts_tests/acts_contrib/test_utils/gnss/ |
D | gnss_testlog_utils.py | 164 for key, regex_string in configs.items(): 165 configs_local[key] = { 183 for key, config in configs_local.items(): 184 parsed_data[key] = pds.DataFrame(config['datalist']) 185 if index_rownum and not parsed_data[key].empty: 186 parsed_data[key].set_index('rownumber', inplace=True) 187 elif parsed_data[key].empty: 189 'The parsed dataframe of "%s" is empty.', key) 273 for key in parsed_data: 274 if key != 'phone_time': [all …]
|
D | gnss_test_utils.py | 903 l5flag_list = [track_data[key].l5flag for key in time_list] 904 pe_list = [float(track_data[key].pe) for key in time_list] 905 ant_top4cn_list = [float(track_data[key].ant_top4cn) for key in time_list] 906 ant_cn_list = [float(track_data[key].ant_cn) for key in time_list] 907 base_top4cn_list = [float(track_data[key].base_top4cn) for key in time_list] 908 base_cn_list = [float(track_data[key].base_cn) for key in time_list] 1040 elif any(float(ttff_data[key].ttff_sec) == 0.0 for key in ttff_data.keys()): 1043 elif any(float(ttff_data[key].ttff_sec) >= criteria for key in 1063 sec_list = [float(ttff_data[key].ttff_sec) for key in ttff_data.keys()] 1064 pe_list = [float(ttff_data[key].ttff_pe) for key in ttff_data.keys()] [all …]
|
/tools/carrier_settings/python/ |
D | update_apn.py | 209 for key in ['protocol', 'roaming_protocol']: 210 if node.hasAttribute(key): 211 setattr(apn, key, APN_PROTOCOL_MAP[node.getAttribute(key).lower()]) 213 for key in node.attributes.keys(): 215 if key == 'bearer' and not node.hasAttribute('bearer_bitmask'): 216 setattr(apn, 'bearer_bitmask', node.getAttribute(key)) 218 if key == 'skip_464xlat': 219 setattr(apn, key, APN_SKIPXLAT_MAP[int(node.getAttribute(key))]) 221 if key in APN_STRING_KEYS: 222 setattr(apn, key, node.getAttribute(key)) [all …]
|
/tools/trebuchet/core/common/src/main/kotlin/trebuchet/collections/ |
D | SparseArray.kt | 42 operator fun get(key: Int): E? { in get() 43 return get(key, null) in get() 50 operator fun get(key: Int, valueIfKeyNotFound: E?): E? { in get() 51 val i = binarySearch(mKeys, mSize, key) in get() 63 fun delete(key: Int) { in delete() 64 val i = binarySearch(mKeys, mSize, key) in delete() 77 fun remove(key: Int) { in remove() 78 delete(key) in remove() 134 fun put(key: Int, value: E) { in put() 135 var i = binarySearch(mKeys, mSize, key) in put() [all …]
|
/tools/apksig/src/apksigner/java/com/android/apksigner/ |
D | help_lineage.txt | 35 private key and certificate must be specified. There are two ways to provide 36 the signer's private key and certificate: (1) Java KeyStore (see --ks), or 37 (2) private key file in PKCS #8 format and certificate file in X.509 format 38 (see --key and --cert). 48 --ks Load private key and certificate chain from the Java 53 --ks-key-alias Alias under which the private key and certificate are 73 signer, KeyStore password is read before the key password 76 --key-pass Password with which the private key is protected. 85 If --key-pass is not specified for a KeyStore key, this 86 tool will attempt to load the key using the KeyStore [all …]
|
D | help_sign.txt | 4 is performed using one or more signers, each represented by an asymmetric key 6 signer. For each signer, you need to provide the signer's private key and 101 share their private key. This option can also be used to 102 preserve existing key / value blocks that exist within the 117 KeyStore key alias or basename of key file is used. 123 There are two ways to provide the signer's private key and certificate: (1) Java 124 KeyStore (see --ks), or (2) private key file in PKCS #8 format and certificate 125 file in X.509 format (see --key and --cert). 127 --ks Load private key and certificate chain from the Java 132 --ks-key-alias Alias under which the private key and certificate are [all …]
|
D | help_rotate.txt | 4 new, for use in a key rotation scenario using APK Signature Scheme v3. 34 be the last key in the SigningCertificate object, signed by the old-signer. 37 There are two ways to provide the signer's private key and certificate: (1) Java 38 KeyStore (see --ks), or (2) private key file in PKCS #8 format and certificate 39 file in X.509 format (see --key and --cert). 51 --ks Load private key and certificate chain from the Java 56 --ks-key-alias Alias under which the private key and certificate are 76 signer, KeyStore password is read before the key password 79 --key-pass Password with which the private key is protected. 88 If --key-pass is not specified for a KeyStore key, this [all …]
|
/tools/test/connectivity/acts/framework/acts/controllers/relay_lib/ |
D | helpers.py | 24 def validate_key(key, dictionary, expected_type, source): argument 38 if key not in dictionary: 39 raise RelayConfigError(MISSING_KEY_ERR_MSG % (key, source, dictionary)) 41 if not isinstance(dictionary[key], string_types): 43 (key, dictionary[key], expected_type, 45 elif not isinstance(dictionary[key], expected_type): 47 (key, dictionary[key], expected_type, 49 return dictionary[key]
|
/tools/test/connectivity/acts/framework/acts/controllers/buds_lib/test_actions/ |
D | apollo_acts.py | 495 for key in output: 496 conn_devs[key.strip()] = output[key].strip() 497 for key in conn_devs: 498 self.logger.info('%s:%s' % (key, conn_devs[key])) 499 if 'XXXXXXXX' in conn_devs[key]: 500 profiles[key] = conn_devs[key] 502 profiles[key] = False 519 connected_status = {key: False for key in DEFAULT_BT_STATUS} 525 for key in DEFAULT_BT_STATUS: 526 if (not connected_status[key] and key in status [all …]
|
D | bt_utils.py | 250 for key in profiles: 251 expected[device.dut_type][key] = profiles[key] 281 for key in expected.keys(): 282 if expected[key] != actual[key]: 283 msg += mismatch_format.format(key, expected[key], actual[key]) 291 for key in expected.keys(): 292 if expected[key] != actual[key]:
|
/tools/test/connectivity/acts_tests/tests/google/wifi/aware/performance/ |
D | LatencyTest.py | 80 key = "%s_dw24_%d_dw5_%d_offset_%d" % ("unsolicited_passive" 84 results[key] = {} 85 results[key]["num_iterations"] = num_iterations 146 results=results[key], 151 results[key]["num_failed_discovery"] = failed_discoveries 164 key = "%s_dw24_%d_dw5_%d" % ("unsolicited_passive" 167 results[key] = {} 168 results[key]["num_iterations"] = num_iterations 229 results=results[key], 234 results[key]["num_failed_discovery"] = failed_discoveries [all …]
|
/tools/test/connectivity/acts_tests/tests/google/gnss/ |
D | AGNSSPerformanceTest.py | 148 for key, val in results.items(): 151 key in thresholds, 'Key {} is missing in ' 152 'the thresholds file.'.format(key)) 161 if thresholds[key]['min'] < metric < thresholds[key]['max']: 163 'values.'.format(key, metric)) 166 '{}).'.format(key, metric, 167 thresholds[key]['min'], 168 thresholds[key]['max'])) 172 if key == contest.Contest.TTFF_KEY: 174 elif key == contest.Contest.POS_ERROR_KEY: [all …]
|
/tools/asuite/aidegen/lib/ |
D | module_info_util.py | 188 for key in env_on: 189 if not env_on[key] == 'true' or key not in json_files_dict: 191 file_paths.append(json_files_dict[key]) 271 for key, b_modules in b_dict.items(): 272 m_dict[key] = sorted(list(set(m_dict.get(key, []) + b_modules))) 287 for key in mk_dict[module].keys(): 288 if key in _MERGE_NEEDED_ITEMS and mk_dict[module][key] != []: 289 merged_dict[module][key] = mk_dict[module][key]
|
/tools/test/connectivity/acts_tests/tests/google/bt/sar/ |
D | BtSarSanityTest.py | 43 for key in self.reg_domain_dict.keys(): 46 self.reg_domain_dict[key]) 62 for key in self.reg_domain_dict.keys(): 65 self.reg_domain_dict[key]) 97 for key in enforced_state.keys(): 98 key_regex = r'{}:\s*(\d)'.format(key) 105 if enforced_state[key] == propagated_value: 109 format(scenario, key, enforced_state[key], 114 format(scenario, key, enforced_state[key],
|
/tools/asuite/atest/ |
D | asuite_metrics.py | 54 key = str(_get_grouping_key()) 58 key = UNUSED_UUID 59 data = {'grouping_key': key, 83 key = _get_old_key() or uuid.uuid4() 93 f.write(str(key)) 94 return key 101 key = None 105 key = uuid.UUID(f.read(), version=4) 109 return key
|
/tools/asuite/atest-py2/ |
D | asuite_metrics.py | 56 key = str(_get_grouping_key()) 60 key = UNUSED_UUID 61 data = {'grouping_key': key, 85 key = _get_old_key() or uuid.uuid4() 95 f.write(str(key)) 96 return key 103 key = None 107 key = uuid.UUID(f.read(), version=4) 111 return key
|
/tools/acloud/public/ |
D | config_test.py | 155 {key: val for key, val in six.iteritems(cfg.metadata_variable)}, 227 key: val 228 for key, val in six.iteritems(cfg.default_usr_cfg.metadata_variable) 234 {key: val for key, val in six.iteritems(cfg.device_resolution_map)}, 237 key: val 238 for key, val in six.iteritems(cfg.device_default_orientation_map) 242 key: val 243 for key, val in six.iteritems(cfg.valid_branch_and_min_build_id) 269 {key: val for key, val in six.iteritems(cfg.common_hw_property_map)},
|