Home
last modified time | relevance | path

Searched refs:hex (Results 1 – 25 of 27) sorted by relevance

12

/tools/test/connectivity/acts_tests/tests/google/bt/pts/instructions/
DMCAP_PTS_INSTRUCTIONS41 register ctrl_psm<hex>, data_psm<hex>, security_mask<0-10>
45 connect_mcl BD_ADDR<xx:xx:xx:xx:xx:xx>, ctrl_psm<hex>, security_mask<0-10>
47 …mdl BD_ADDR<xx:xx:xx:xx:xx:xx> mdep_handle<int> data_psm<hex>mdl_id <int> peer_dep_id<int> cfg<hex>
49 reconnect_mdl BD_ADDR<xx:xx:xx:xx:xx:xx> mdl_id<int> data_psm<hex>
/tools/test/connectivity/acts_tests/acts_contrib/test_utils/tel/
Danritsu_utils.py199 CMAS_MESSAGE_PRESIDENTIAL_ALERT = hex(0x1112)
200 CMAS_MESSAGE_EXTREME_IMMEDIATE_OBSERVED = hex(0x1113)
201 CMAS_MESSAGE_EXTREME_IMMEDIATE_LIKELY = hex(0x1114)
202 CMAS_MESSAGE_EXTREME_EXPECTED_OBSERVED = hex(0x1115)
203 CMAS_MESSAGE_EXTREME_EXPECTED_LIKELY = hex(0x1116)
204 CMAS_MESSAGE_SEVERE_IMMEDIATE_OBSERVED = hex(0x1117)
205 CMAS_MESSAGE_SEVERE_IMMEDIATE_LIKELY = hex(0x1118)
206 CMAS_MESSAGE_SEVERE_EXPECTED_OBSERVED = hex(0x1119)
207 CMAS_MESSAGE_SEVERE_EXPECTED_LIKELY = hex(0x111A)
208 CMAS_MESSAGE_CHILD_ABDUCTION_EMERGENCY = hex(0x111B)
[all …]
/tools/acloud/internal/lib/
Dandroid_compute_client.py173 return "image-" + uuid.uuid4().hex
177 uuid=uuid.uuid4().hex[:8])
207 uuid=uuid.uuid4().hex[:8])
Dutils.py313 name = uuid.uuid4().hex
/tools/test/connectivity/acts/framework/acts/controllers/ap_lib/
Dhostapd_utils.py20 def generate_random_password(security_mode=None, length=None, hex=None): argument
31 if hex:
/tools/acloud/public/
Ddevice_driver_test.py88 fake_uuid = mock.MagicMock(hex="1234")
90 fake_gs_object = fake_uuid.hex + "-" + cfg.disk_image_name
/tools/test/connectivity/acts_tests/acts_contrib/test_utils/net/
Dipsec_test_utils.py49 ad.log.info("In SPI: %s" % hex(in_spi))
53 ad.log.info("Out SPI: %s" % hex(out_spi))
/tools/acloud/public/actions/
Dcreate_goldfish_action_test.py106 fake_uuid = mock.MagicMock(hex="1234")
218 fake_uuid = mock.MagicMock(hex="1234")
339 fake_uuid = mock.MagicMock(hex="1234")
Dremote_instance_cf_device_factory_test.py129 fake_uuid = mock.MagicMock(hex="1234")
172 fake_uuid = mock.MagicMock(hex="1234")
Dcreate_cuttlefish_action_test.py108 fake_uuid = mock.MagicMock(hex="1234")
/tools/test/connectivity/acts/framework/acts/controllers/monsoon_lib/api/lvpm_stock/
Dmonsoon_proxy.py386 hex(checksum), hex(result[-1]))
/tools/test/connectivity/acts_tests/acts_contrib/test_utils/bt/
Dbt_gatt_utils.py407 hex(char_inst_id), characteristic_uuids[j]))
412 hex(desc_inst_id), descriptor_uuids[k]))
Dgattc_lib.py442 hex(char_inst_id), characteristic_uuids[j]))
491 hex(char_inst_id), characteristic_uuids[j]))
529 hex(desc_inst_id), descriptor_uuids[k]))
Dgatts_lib.py69 hex(instance_id), uuid))
/tools/test/connectivity/acts/framework/acts/controllers/monsoon_lib/sampling/lvpm_stock/
Dstock_transformers.py136 'got %s', hex(checksum), hex(result[-1]))
/tools/security/gdb/heap_print/
DREADME.md4 2) print_ptr : prints the memory pointed by raw pointer in hex format.
/tools/test/connectivity/acts/framework/acts/controllers/fuchsia_lib/bt/
Dble_lib.py39 hex_uuid_str = uuid.UUID(readable_uuid).hex
/tools/acloud/create/
Dcheeps_remote_image_remote_instance_test.py51 fake_uuid = mock.MagicMock(hex="1234")
/tools/test/connectivity/acts_tests/acts_contrib/test_utils/fuchsia/
Dbt_test_utils.py170 check = str(hex(int(item)))[2:]
/tools/security/gdb/gdb_json_printer/gdb_json_printer/
Dprinters.py102 self.address = hex(intptr(self.value.address))
/tools/dexter/slicer/
Ddex_bytecode.cc315 ss << "0x" << std::setw(2) << std::setfill('0') << std::hex << value; in HexByte()
Dcode_ir.cc648 ss << std::hex << std::setfill('0') << std::setw(2) << index_type; in GetIndexedOperand()
/tools/test/connectivity/acts/framework/acts/controllers/buds_lib/
Dapollo_lib.py752 masks = hex(
765 masks = hex(
/tools/test/connectivity/acts/framework/acts/controllers/
Daccess_point.py353 interface_mac_orig.stdout[:-1] + hex(last_octet)[-1:])
/tools/test/connectivity/acts/framework/acts/
Dutils.py1755 hex_octet = hex(octet)[2:]

12