| /external/mesa3d/.gitlab-ci/windows/ |
| D | mesa_deps.ps1 | 1 Get-Date 2 Write-Host "Installing Chocolatey" 3 Invoke-Expression ((New-Object System.Net.WebClient).DownloadString('https://chocolatey.org/install… 4 Import-Module "$env:ProgramData\chocolatey\helpers\chocolateyProfile.psm1" 5 Update-SessionEnvironment 6 Write-Host "Installing Chocolatey packages" 9 # loop of its own - so we give it a helping hand here 10 For ($i = 0; $i -lt 5; $i++) { 11 choco install -y python3 --params="/InstallDir:C:\python3" 13 …choco install --allow-empty-checksums -y cmake git git-lfs ninja pkgconfiglite winflexbison --inst… [all …]
|
| D | mesa_container.ps1 | 1 # Implements the equivalent of ci-templates container-ifnot-exists, using 3 # Windows, nor can we execute Docker-in-Docker 10 Set-Location -Path ".\.gitlab-ci\windows" 12 docker --config "windows-docker.conf" login -u "$registry_username" -p "$registry_password" "$regis… 14 Write-Host "docker login failed to $registry_uri" 19 docker --config "windows-docker.conf" pull "$registry_user_image" 21 Write-Host "User image $registry_user_image already exists; not rebuilding" 22 docker --config "windows-docker.conf" logout "$registry_uri" 27 docker --config "windows-docker.conf" pull "$registry_central_image" 29 Write-Host "Copying central image $registry_central_image to user image $registry_user_image" [all …]
|
| /external/python/cpython2/Lib/ |
| D | xmlrpclib.py | 2 # XML-RPC CLIENT LIBRARY 5 # an XML-RPC client interface for Python. 8 # implement XML-RPC servers. 14 # 1999-01-14 fl Created 15 # 1999-01-15 fl Changed dateTime to use localtime 16 # 1999-01-16 fl Added Binary/base64 element, default to RPC2 service 17 # 1999-01-19 fl Fixed array data element (from Skip Montanaro) 18 # 1999-01-21 fl Fixed dateTime constructor, etc. 19 # 1999-02-02 fl Added fault handling, handle empty sequences, etc. 20 # 1999-02-10 fl Fixed problem with empty responses (from Skip Montanaro) [all …]
|
| /external/autotest/server/site_tests/power_DeferForFlashrom/ |
| D | power_DeferForFlashrom.py | 2 # Use of this source code is governed by a BSD-style license that can be 12 # Timeout for commands run on the host. 19 # Time in seconds to perform a flashrom write and to wait for the system to 25 # Time in seconds to perform a flashrom write and to wait for the system to 36 def initialize(self, host): argument 40 @param host: Host/DUT object to use for test. 42 self.host = host 47 Create a temporary file on the host and returns its path. 52 @param size: Number of bytes to write to the file. 54 logging.info('Creating %d-byte temp file from %s', size, source_path) [all …]
|
| /external/autotest/site_utils/deployment/ |
| D | install.py | 3 # Use of this source code is governed by a BSD-style license that can be 30 * For the full deployment case, install dev-signed RO firmware 39 * Every servo host is up and running, and accessible via SSH. 84 _LOG_FORMAT = '%(asctime)s | %(levelname)-10s | %(message)s' 92 _LOG_BUCKET_NAME = 'chromeos-install-logs' 94 _OMAHA_STATUS = 'gs://chromeos-build-release-console/omaha_status.json' 97 # host's prior state. 98 _LOCK_REASON_EXISTING = 'Repairing or deploying an existing host' 99 _LOCK_REASON_NEW_HOST = 'Repairing or deploying a new host' 125 def write(self, s): member in _MultiFileWriter [all …]
|
| /external/python/cpython3/Lib/xmlrpc/ |
| D | client.py | 2 # XML-RPC CLIENT LIBRARY 5 # an XML-RPC client interface for Python. 8 # implement XML-RPC servers. 14 # 1999-01-14 fl Created 15 # 1999-01-15 fl Changed dateTime to use localtime 16 # 1999-01-16 fl Added Binary/base64 element, default to RPC2 service 17 # 1999-01-19 fl Fixed array data element (from Skip Montanaro) 18 # 1999-01-21 fl Fixed dateTime constructor, etc. 19 # 1999-02-02 fl Added fault handling, handle empty sequences, etc. 20 # 1999-02-10 fl Fixed problem with empty responses (from Skip Montanaro) [all …]
|
| /external/autotest/server/site_tests/firmware_SysfsVPD/ |
| D | firmware_SysfsVPD.py | 2 # Use of this source code is governed by a BSD-style license that can be 33 # Length of test string to generate and write to VPD 36 # Character set to use when generating string to write to VPD 39 # Name of key to write to RO section of VPD 42 # Name of key to write to RW section of VPD 45 def initialize(self, host, cmdline_args, dev_mode=False): argument 47 super(firmware_SysfsVPD, self).initialize(host, cmdline_args) 66 self.host = host 83 self.host.run("vpd -i RO_VPD -l") 84 self.host.run("vpd -i RW_VPD -l") [all …]
|
| /external/python/cpython3/.azure-pipelines/windows-release/ |
| D | build-steps.yml | 5 - template: ./checkout.yml 7 - powershell: | 8 …$d = (.\PCbuild\build.bat -V) | %{ if($_ -match '\s+(\w+):\s*(.+)\s*$') { @{$Matches[1] = $Matches… 9 Write-Host "##vso[task.setvariable variable=VersionText]$($d.PythonVersion)" 10 Write-Host "##vso[task.setvariable variable=VersionNumber]$($d.PythonVersionNumber)" 11 Write-Host "##vso[task.setvariable variable=VersionHex]$($d.PythonVersionHex)" 12 Write-Host "##vso[task.setvariable variable=VersionUnique]$($d.PythonVersionUnique)" 13 Write-Host "##vso[build.addbuildtag]$($d.PythonVersion)" 14 Write-Host "##vso[build.addbuildtag]$($d.PythonVersion)-$(Name)" 17 - ${{ if eq(parameters.ShouldPGO, 'false') }}: [all …]
|
| D | stage-pack-msix.yml | 2 - job: Pack_MSIX 6 vmImage: windows-2019 21 Suffix: -store 31 Suffix: -store 35 - template: ./checkout.yml 37 - task: DownloadPipelineArtifact@1 43 - task: DownloadBuildArtifacts@0 49 - powershell: | 50 …$d = (.\PCbuild\build.bat -V) | %{ if($_ -match '\s+(\w+):\s*(.+)\s*$') { @{$Matches[1] = $Matches… 51 Write-Host "##vso[task.setvariable variable=VersionText]$($d.PythonVersion)" [all …]
|
| /external/python/cpython2/Demo/threads/ |
| D | telnet.py | 6 # telnet commands, but can still be used to connect in line-by-line mode. 10 # Usage: telnet host [port] 32 sys.stderr.write('usage: telnet hostname [port]\n') 34 host = sys.argv[1] 36 hostaddr = gethostbyname(host) 38 sys.stderr.write(sys.argv[1] + ': bad host name\n') 52 sys.stderr.write(servname + ': bad tcp service name\n') 58 s.connect((host, port)) 60 sys.stderr.write('connect failed: %r\n' % (msg,)) 67 # read socket, write stdout [all …]
|
| /external/python/cpython2/Demo/sockets/ |
| D | telnet.py | 6 # telnet commands, but can still be used to connect in line-by-line mode. 10 # Usage: telnet host [port] 30 host = sys.argv[1] 32 hostaddr = gethostbyname(host) 34 sys.stderr.write(sys.argv[1] + ': bad host name\n') 48 sys.stderr.write(servname + ': bad tcp service name\n') 54 s.connect((host, port)) 56 sys.stderr.write('connect failed: ' + repr(msg) + '\n') 62 # child -- read stdin, write socket 67 # parent -- read socket, write stdout [all …]
|
| D | gopher.py | 5 # Usage: gopher [ [selector] host [port] ] 12 # Default selector, host and port 36 # Oft-used characters and strings 40 # Open a TCP connection to a given host and port 41 def open_socket(host, port): argument 47 s.connect((host, port)) 50 # Send a selector to a given host and port, return a file with the reply 51 def send_request(selector, host, port): argument 52 s = open_socket(host, port) 58 def get_menu(selector, host, port): argument [all …]
|
| /external/dng_sdk/source/ |
| D | dng_validate.cpp | 2 // Copyright 2006-2012 Adobe Systems Incorporated 15 // ------------------ 21 // DNG SDK error code - 100000 + 100 69 static int32 gMosaicPlane = -1; 99 dng_host host; in dng_validate() local 101 host.SetPreferredSize (gPreferredSize); in dng_validate() 102 host.SetMinimumSize (gMinimumSize ); in dng_validate() 103 host.SetMaximumSize (gMaximumSize ); in dng_validate() 105 host.ValidateSizes (); in dng_validate() 107 if (host.MinimumSize ()) in dng_validate() [all …]
|
| /external/python/cpython3/Tools/scripts/ |
| D | get-remote-certificate.py | 5 # args are HOST:PORT [, HOST:PORT...] 15 def fetch_server_certificate (host, port): argument 25 m = re.search(br"^([-]+BEGIN CERTIFICATE[-]+[\r]*\n" 26 br".*[\r]*^[-]+END CERTIFICATE[-]+)$", 33 fp.write(m.group(1) + b"\n") 36 status, output = subproc(r'openssl x509 -in "%s" -out "%s"' % 51 fp.write("quit\n") 54 'openssl s_client -connect "%s:%s" -showcerts < "%s"' % 55 (host, port, tfile)) 60 'openssl s_client -connect "%s:%s" -showcerts < /dev/null' % [all …]
|
| /external/python/cpython2/Tools/ssl/ |
| D | get-remote-certificate.py | 5 # args are HOST:PORT [, HOST:PORT...] 11 def fetch_server_certificate (host, port): argument 23 m = re.search(r"^([-]+BEGIN CERTIFICATE[-]+[\r]*\n" 24 r".*[\r]*^[-]+END CERTIFICATE[-]+)$", 31 fp.write(m.group(1) + "\n") 35 status, output = subproc(r'openssl x509 -in "%s" -out "%s"' % 50 fp.write("quit\n") 54 'openssl s_client -connect "%s:%s" -showcerts < "%s"' % 55 (host, port, tfile)) 60 'openssl s_client -connect "%s:%s" -showcerts < /dev/null' % [all …]
|
| /external/rust/crates/grpcio-sys/grpc/tools/internal_ci/helper_scripts/ |
| D | install_python_interpreters.ps1 | 4 Set-StrictMode -Version 2 9 Write-Error $_ 16 function Install-Python { in Install-Python() 27 Write-Host "Downloading the Python installer: $PythonInstallerUrl => $PythonInstallerPath" in Install-Python() 28 Invoke-WebRequest -Uri $PythonInstallerUrl -OutFile $PythonInstallerPath in Install-Python() 31 $HashFromDownload = Get-FileHash -Path $PythonInstallerPath -Algorithm MD5 in Install-Python() 32 if ($HashFromDownload.Hash -ne $PythonInstallerHash) { in Install-Python() 35 Write-Host "Python installer $PythonInstallerPath validated." in Install-Python() 39 if (-Not $?) { in Install-Python() 50 Wait-Process -Name $PythonInstaller -Timeout 300 in Install-Python() [all …]
|
| /external/python/cpython3/Lib/test/ |
| D | test_ssl.py | 46 HOST = socket_helper.HOST variable 114 (('commonName', 'our-ca-server'),)), 129 SIGNED_CERTFILE_ECC_HOSTNAME = 'localhost-ecc' 139 REMOTE_HOST = "self-signed.pythontest.net" 147 TALOS_INVALID_CRLDP = data_file("talos-2019-0758.pem") 164 # Assume that any references of "ubuntu" implies Ubuntu-like distro 166 with open("/etc/os-release", encoding="utf-8") as f: 200 # auto-negotiate protocols are always available 225 # bpo43791: 3.0.0-alpha14 fails with TLSV1_ALERT_INTERNAL_ERROR 267 sys.stdout.write(prefix + exc_format) [all …]
|
| /external/ltp/testcases/kernel/fs/doio/include/ |
| D | write_log.h | 20 * with this program; if not, write the Free Software Foundation, Inc., 21 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. 47 * User view of a write log record. Note that this is not necessiliary 49 * don't expect to od the write log file and see things formatted this way. 53 int w_pid; /* pid doing the write */ 56 int w_oflags; /* low-order open() flags */ 58 int w_async; /* 1 if async write (writea) */ 60 char w_host[WLOG_MAX_HOST+1]; /* host doing write - */ 62 int w_hostlen; /* host name length */ 63 char w_path[WLOG_MAX_PATH+1]; /* file written to - */ [all …]
|
| /external/crosvm/devices/src/pci/pcie/ |
| D | pcie_host.rs | 2 // Use of this source code is governed by a BSD-style license that can be 7 use std::fs::{read, write, File, OpenOptions}; 37 // Host Pci device's sysfs config file 43 // Create a new host pci device's sysfs config file 44 fn new(host_sysfs_path: &Path) -> Result<Self> { in new() 49 .write(true) in new() 56 // Read host pci device's config register 57 fn read_config<T: DataInit>(&self, offset: u64) -> T { in read_config() 66 error!("failed to read host sysfs config: {}", e); in read_config() 71 .expect("failed to convert host sysfs config data from slice") in read_config() [all …]
|
| D | pcie_rp.rs | 2 // Use of this source code is governed by a BSD-style license that can be 51 pub fn new(secondary_bus_num: u8, slot_implemented: bool) -> Self { in new() 81 /// Constructs a new PCIE root port which associated with the host physical pcie RP 82 pub fn new_from_host(pcie_host: PcieHostRootPort, slot_implemented: bool) -> Result<Self> { in new_from_host() 116 fn get_slot_control(&self) -> u16 { in get_slot_control() 140 warn!("write SLTCTL isn't word, len: {}", data.len()); in write_pcie_cap() 178 warn!("write SLTSTA isn't word, len: {}", data.len()); in write_pcie_cap() 200 None => warn!("write root control isn't word, len: {}", data.len()), in write_pcie_cap() 224 None => warn!("write root status isn't dword, len: {}", data.len()), in write_pcie_cap() 294 fn get_device_id(&self) -> u16 { in get_device_id() [all …]
|
| /external/autotest/server/site_tests/firmware_WriteProtectFunc/ |
| D | control | 2 # Use of this source code is governed by a BSD-style license that can be 9 PURPOSE = "Servo based SPI flash write protect functional test" 10 CRITERIA = "This test will fail if SPI flash write-protection does not work correctly" 20 This test verifies the function of SPI flash write-protection. 21 After we enable hardware write-protection and then software write-protection, 23 hardware write-protection and then software write-protection, SPI flash RO 31 host = hosts.create_host(machine, servo_args=servo_args) 32 job.run_test("firmware_WriteProtectFunc", host=host, cmdline_args=args,
|
| /external/python/cpython3/.azure-pipelines/ |
| D | windows-steps.yml | 2 - checkout: self 6 - powershell: | 8 Write-Host '##vso[task.setvariable variable=Py_IntDir]$(Build.BinariesDirectory)\obj' 10 Write-Host '##vso[task.setvariable variable=Py_OutDir]$(Build.SourcesDirectory)\PCbuild' 11 #Write-Host '##vso[task.setvariable variable=Py_OutDir]$(Build.BinariesDirectory)\bin' 12 Write-Host '##vso[task.setvariable variable=EXTERNALS_DIR]$(Build.BinariesDirectory)\externals' 15 - script: PCbuild\build.bat -e $(buildOpt) 20 - script: python.bat -m test.pythoninfo 24 - script: PCbuild\rt.bat -q -uall -u-cpu -rwW --slowest --timeout=1200 -j0 --junit-xml="$(Build.Bin… 30 - task: PublishTestResults@2 [all …]
|
| /external/autotest/server/site_tests/firmware_Fingerprint/ |
| D | control.sw_write_protect | 2 # Use of this source code is governed by a BSD-style license that can be 10 Verify that software write protect cannot be disabled when hardware write 14 Fails if we can disable software write protect from RO or RW." 25 Reboots to RO, attempts to disable software write protect while hardware write 27 disable software write protect while hardware write protect is enabled and 35 host = hosts.create_host(machine, servo_args=servo_args) 36 job.run_test("firmware_Fingerprint", host=host,
|
| /external/autotest/server/ |
| D | crashcollect.py | 32 """Context manager for temporary directory on remote host.""" 34 def __init__(self, host): argument 35 self.host = host 39 return '<{cls} host={this.host!r}, tmpdir={this.tmpdir!r}>'.format( 43 self.tmpdir = (self.host 44 .run('mktemp -d', stdout_tee=None) 49 self.host.run('rm -rf %s' % (pipes.quote(self.tmpdir),)) 52 def _collect_log_file_with_summary(host, source_path, dest_path): argument 55 @param host: The RemoteHost to collect logs from. 57 @param dest_path: A path (file or directory) to write the copies logs into. [all …]
|
| /external/python/cpython3/Doc/library/ |
| D | telnetlib.rst | 1 :mod:`telnetlib` --- Telnet client 13 -------------- 29 .. class:: Telnet(host=None, port=0[, timeout]) 33 establish a connection. Alternatively, the host name and optional port 60 :rfc:`854` - Telnet Protocol Specification 64 .. _telnet-objects: 67 -------------- 135 .. method:: Telnet.open(host, port=0[, timeout]) 137 Connect to a host. The optional second argument is the port number, which 144 .. audit-event:: telnetlib.Telnet.open self,host,port telnetlib.Telnet.open [all …]
|