Home
last modified time | relevance | path

Searched refs:key (Results 1 – 25 of 186) sorted by relevance

12345678

/tools/test/connectivity/acts_tests/acts_contrib/test_utils/wifi/wifi_retail_ap/
Dnetgear_rax200.py227 for key, value in self.config_page_fields.items():
228 if 'status' in key:
232 self.ap_settings[key[0]][key[1]] = int(
238 if 'enable_ax' in key:
239 self.ap_settings[key] = int(config_item.first.checked)
240 elif 'bandwidth' in key:
241 self.ap_settings[key[0]][key[1]] = self.bw_mode_values[
244 elif 'power' in key:
245 self.ap_settings[key[0]][
246 key[1]] = self.power_mode_values[
[all …]
Dnetgear_r7000.py145 for key, value in self.config_page_fields.items():
146 if 'status' in key:
150 self.ap_settings[key[0]][key[1]] = int(
156 if 'bandwidth' in key:
157 self.ap_settings[key[0]][key[1]] = self.bw_mode_values[
159 elif 'power' in key:
160 self.ap_settings[key[0]][
161 key[1]] = self.power_mode_values[
163 elif 'region' in key:
166 elif 'security_type' in key:
[all …]
Dnetgear_r7500.py159 for key, value in self.config_page_fields.items():
160 if 'bandwidth' in key:
162 self.ap_settings[key[0]][key[1]] = self.bw_mode_values[
164 elif 'region' in key:
168 elif 'password' in key:
171 self.ap_settings[key[0]][
172 key[1]] = config_item.value
174 key[0]]['security_type'] = 'WPA2-PSK'
176 self.ap_settings[key[0]][
177 key[1]] = 'defaultpassword'
[all …]
Dnetgear_rax120.py218 for key, value in self.config_page_fields.items():
219 if 'bandwidth' in key:
221 self.ap_settings[key[0]][key[1]] = self.bw_mode_values[
223 elif 'region' in key:
227 elif 'password' in key:
230 self.ap_settings[key[0]][
231 key[1]] = config_item.value
233 key[0]]['security_type'] = 'WPA2-PSK'
235 self.ap_settings[key[0]][
236 key[1]] = 'defaultpassword'
[all …]
/tools/test/connectivity/acts_tests/tests/google/wifi/
DWifiScannerTests.config4 …l": 1}, "wifi-iface" : [{"ssid": "Test_1", "key": "hahahaha", "encryption": "psk2"},{"ssid": "Test…
5 …{"ssid": "Test_1.2", "key": "hahahaha", "encryption": "psk2"},{"ssid": "Test_1.3", "key": "hahahah…
6 … 40}, "wifi-iface" : [{"ssid": "Test_40", "key": "hahahaha", "encryption": "psk2"},{"ssid": "Test_…
7 …{"ssid": "Test_40.2", "key": "hahahaha", "encryption": "psk2"},{"ssid": "Test_40.3", "key": "hahah…
10 …l": 6}, "wifi-iface" : [{"ssid": "Test_6", "key": "hahahaha", "encryption": "psk"}, {"ssid": "Test…
11 …{"ssid": "Test_6.2", "key": "hahahaha", "encryption": "psk2"}, {"ssid": "Test_6.3", "key": "hahah…
12 … 40}, "wifi-iface" : [{"ssid": "Test_40", "key": "hahahaha", "encryption": "psk"}, {"ssid": "Test_…
13 …{"ssid": "Test_40.3", "key": "hahahaha", "encryption": "psk2"}, {"ssid": "Test_40.2", "key": "haha…
16 … 10}, "wifi-iface" : [{"ssid": "Test_10", "key": "hahahaha", "encryption": "psk2"}, {"ssid": "Test…
17 …{"ssid": "Test_10.2", "key": "hahahaha", "encryption": "psk2"}, {"ssid": "Test_10.3", "key": "haha…
[all …]
DWifiRssiTest.py164 for key, val in postprocessed_results.items():
167 if 'rssi' in key and 'predicted' not in key:
183 '{}_error'.format(key), avg_error)
185 '{}_shift'.format(key), avg_shift)
190 if rssi_failure and key in testcase_params['rssi_under_test']:
193 'shift = {:.2f} dB)\n').format(key, error_type,
199 'shift = {:.2f} dB)\n').format(key, error_type,
204 'shift = {:.2f} dB)\n').format(key, error_type,
235 for key, val in postprocessed_results.items():
236 if 'scan_rssi' in key:
[all …]
/tools/acloud/public/data/
Ddefault.config24 key: "camera_front"
29 key: "camera_back"
34 key: "cfg_sta_ephemeral_cache_size_mb"
39 key: "cfg_sta_ephemeral_data_size_mb"
44 key: "cfg_sta_persistent_data_device"
49 key: "gps_coordinates"
59 key: "local-phone"
64 key: "local-auto"
69 key: "local-wear"
74 key: "local-tablet"
[all …]
/tools/test/connectivity/acts_tests/acts_contrib/test_utils/net/
Dconnectivity_test_utils.py20 def _listen_for_keepalive_event(ad, key, msg, ka_event): argument
29 ad.droid.socketKeepaliveStartListeningForEvent(key, ka_event)
36 ad.droid.socketKeepaliveStopListeningForEvent(key, ka_event)
38 ad.droid.removeSocketKeepaliveReceiverKey(key)
54 key = ad.droid.startNattSocketKeepalive(udp_encap, src_ip, dst_ip, interval)
56 status = _listen_for_keepalive_event(ad, key, msg, "Started")
57 return key if status else None
68 key = ad.droid.startTcpSocketKeepalive(socket, time_interval)
70 status = _listen_for_keepalive_event(ad, key, msg, "Started")
71 return key if status else None
[all …]
/tools/test/connectivity/acts_tests/acts_contrib/test_utils/gnss/
Dgnss_testlog_utils.py164 for key, regex_string in configs.items():
165 configs_local[key] = {
183 for key, config in configs_local.items():
184 parsed_data[key] = pds.DataFrame(config['datalist'])
185 if index_rownum and not parsed_data[key].empty:
186 parsed_data[key].set_index('rownumber', inplace=True)
187 elif parsed_data[key].empty:
189 'The parsed dataframe of "%s" is empty.', key)
273 for key in parsed_data:
274 if key != 'phone_time':
[all …]
Dgnss_test_utils.py903 l5flag_list = [track_data[key].l5flag for key in time_list]
904 pe_list = [float(track_data[key].pe) for key in time_list]
905 ant_top4cn_list = [float(track_data[key].ant_top4cn) for key in time_list]
906 ant_cn_list = [float(track_data[key].ant_cn) for key in time_list]
907 base_top4cn_list = [float(track_data[key].base_top4cn) for key in time_list]
908 base_cn_list = [float(track_data[key].base_cn) for key in time_list]
1040 elif any(float(ttff_data[key].ttff_sec) == 0.0 for key in ttff_data.keys()):
1043 elif any(float(ttff_data[key].ttff_sec) >= criteria for key in
1063 sec_list = [float(ttff_data[key].ttff_sec) for key in ttff_data.keys()]
1064 pe_list = [float(ttff_data[key].ttff_pe) for key in ttff_data.keys()]
[all …]
/tools/carrier_settings/python/
Dupdate_apn.py209 for key in ['protocol', 'roaming_protocol']:
210 if node.hasAttribute(key):
211 setattr(apn, key, APN_PROTOCOL_MAP[node.getAttribute(key).lower()])
213 for key in node.attributes.keys():
215 if key == 'bearer' and not node.hasAttribute('bearer_bitmask'):
216 setattr(apn, 'bearer_bitmask', node.getAttribute(key))
218 if key == 'skip_464xlat':
219 setattr(apn, key, APN_SKIPXLAT_MAP[int(node.getAttribute(key))])
221 if key in APN_STRING_KEYS:
222 setattr(apn, key, node.getAttribute(key))
[all …]
/tools/trebuchet/core/common/src/main/kotlin/trebuchet/collections/
DSparseArray.kt42 operator fun get(key: Int): E? { in get()
43 return get(key, null) in get()
50 operator fun get(key: Int, valueIfKeyNotFound: E?): E? { in get()
51 val i = binarySearch(mKeys, mSize, key) in get()
63 fun delete(key: Int) { in delete()
64 val i = binarySearch(mKeys, mSize, key) in delete()
77 fun remove(key: Int) { in remove()
78 delete(key) in remove()
134 fun put(key: Int, value: E) { in put()
135 var i = binarySearch(mKeys, mSize, key) in put()
[all …]
/tools/apksig/src/apksigner/java/com/android/apksigner/
Dhelp_lineage.txt35 private key and certificate must be specified. There are two ways to provide
36 the signer's private key and certificate: (1) Java KeyStore (see --ks), or
37 (2) private key file in PKCS #8 format and certificate file in X.509 format
38 (see --key and --cert).
48 --ks Load private key and certificate chain from the Java
53 --ks-key-alias Alias under which the private key and certificate are
73 signer, KeyStore password is read before the key password
76 --key-pass Password with which the private key is protected.
85 If --key-pass is not specified for a KeyStore key, this
86 tool will attempt to load the key using the KeyStore
[all …]
Dhelp_sign.txt4 is performed using one or more signers, each represented by an asymmetric key
6 signer. For each signer, you need to provide the signer's private key and
101 share their private key. This option can also be used to
102 preserve existing key / value blocks that exist within the
117 KeyStore key alias or basename of key file is used.
123 There are two ways to provide the signer's private key and certificate: (1) Java
124 KeyStore (see --ks), or (2) private key file in PKCS #8 format and certificate
125 file in X.509 format (see --key and --cert).
127 --ks Load private key and certificate chain from the Java
132 --ks-key-alias Alias under which the private key and certificate are
[all …]
Dhelp_rotate.txt4 new, for use in a key rotation scenario using APK Signature Scheme v3.
34 be the last key in the SigningCertificate object, signed by the old-signer.
37 There are two ways to provide the signer's private key and certificate: (1) Java
38 KeyStore (see --ks), or (2) private key file in PKCS #8 format and certificate
39 file in X.509 format (see --key and --cert).
51 --ks Load private key and certificate chain from the Java
56 --ks-key-alias Alias under which the private key and certificate are
76 signer, KeyStore password is read before the key password
79 --key-pass Password with which the private key is protected.
88 If --key-pass is not specified for a KeyStore key, this
[all …]
/tools/test/connectivity/acts/framework/acts/controllers/relay_lib/
Dhelpers.py24 def validate_key(key, dictionary, expected_type, source): argument
38 if key not in dictionary:
39 raise RelayConfigError(MISSING_KEY_ERR_MSG % (key, source, dictionary))
41 if not isinstance(dictionary[key], string_types):
43 (key, dictionary[key], expected_type,
45 elif not isinstance(dictionary[key], expected_type):
47 (key, dictionary[key], expected_type,
49 return dictionary[key]
/tools/test/connectivity/acts/framework/acts/controllers/buds_lib/test_actions/
Dapollo_acts.py495 for key in output:
496 conn_devs[key.strip()] = output[key].strip()
497 for key in conn_devs:
498 self.logger.info('%s:%s' % (key, conn_devs[key]))
499 if 'XXXXXXXX' in conn_devs[key]:
500 profiles[key] = conn_devs[key]
502 profiles[key] = False
519 connected_status = {key: False for key in DEFAULT_BT_STATUS}
525 for key in DEFAULT_BT_STATUS:
526 if (not connected_status[key] and key in status
[all …]
Dbt_utils.py250 for key in profiles:
251 expected[device.dut_type][key] = profiles[key]
281 for key in expected.keys():
282 if expected[key] != actual[key]:
283 msg += mismatch_format.format(key, expected[key], actual[key])
291 for key in expected.keys():
292 if expected[key] != actual[key]:
/tools/test/connectivity/acts_tests/tests/google/wifi/aware/performance/
DLatencyTest.py80 key = "%s_dw24_%d_dw5_%d_offset_%d" % ("unsolicited_passive"
84 results[key] = {}
85 results[key]["num_iterations"] = num_iterations
146 results=results[key],
151 results[key]["num_failed_discovery"] = failed_discoveries
164 key = "%s_dw24_%d_dw5_%d" % ("unsolicited_passive"
167 results[key] = {}
168 results[key]["num_iterations"] = num_iterations
229 results=results[key],
234 results[key]["num_failed_discovery"] = failed_discoveries
[all …]
/tools/test/connectivity/acts_tests/tests/google/gnss/
DAGNSSPerformanceTest.py148 for key, val in results.items():
151 key in thresholds, 'Key {} is missing in '
152 'the thresholds file.'.format(key))
161 if thresholds[key]['min'] < metric < thresholds[key]['max']:
163 'values.'.format(key, metric))
166 '{}).'.format(key, metric,
167 thresholds[key]['min'],
168 thresholds[key]['max']))
172 if key == contest.Contest.TTFF_KEY:
174 elif key == contest.Contest.POS_ERROR_KEY:
[all …]
/tools/asuite/aidegen/lib/
Dmodule_info_util.py188 for key in env_on:
189 if not env_on[key] == 'true' or key not in json_files_dict:
191 file_paths.append(json_files_dict[key])
271 for key, b_modules in b_dict.items():
272 m_dict[key] = sorted(list(set(m_dict.get(key, []) + b_modules)))
287 for key in mk_dict[module].keys():
288 if key in _MERGE_NEEDED_ITEMS and mk_dict[module][key] != []:
289 merged_dict[module][key] = mk_dict[module][key]
/tools/test/connectivity/acts_tests/tests/google/bt/sar/
DBtSarSanityTest.py43 for key in self.reg_domain_dict.keys():
46 self.reg_domain_dict[key])
62 for key in self.reg_domain_dict.keys():
65 self.reg_domain_dict[key])
97 for key in enforced_state.keys():
98 key_regex = r'{}:\s*(\d)'.format(key)
105 if enforced_state[key] == propagated_value:
109 format(scenario, key, enforced_state[key],
114 format(scenario, key, enforced_state[key],
/tools/asuite/atest/
Dasuite_metrics.py54 key = str(_get_grouping_key())
58 key = UNUSED_UUID
59 data = {'grouping_key': key,
83 key = _get_old_key() or uuid.uuid4()
93 f.write(str(key))
94 return key
101 key = None
105 key = uuid.UUID(f.read(), version=4)
109 return key
/tools/asuite/atest-py2/
Dasuite_metrics.py56 key = str(_get_grouping_key())
60 key = UNUSED_UUID
61 data = {'grouping_key': key,
85 key = _get_old_key() or uuid.uuid4()
95 f.write(str(key))
96 return key
103 key = None
107 key = uuid.UUID(f.read(), version=4)
111 return key
/tools/acloud/public/
Dconfig_test.py155 {key: val for key, val in six.iteritems(cfg.metadata_variable)},
227 key: val
228 for key, val in six.iteritems(cfg.default_usr_cfg.metadata_variable)
234 {key: val for key, val in six.iteritems(cfg.device_resolution_map)},
237 key: val
238 for key, val in six.iteritems(cfg.device_default_orientation_map)
242 key: val
243 for key, val in six.iteritems(cfg.valid_branch_and_min_build_id)
269 {key: val for key, val in six.iteritems(cfg.common_hw_property_map)},

12345678