| /tools/netsim/rust/netsim-cli/src/ |
| D | response.rs | 240 State::ON => "up".to_string(), in chip_state_to_string() 241 State::OFF => "down".to_string(), in chip_state_to_string() 242 _ => "unknown".to_string(), in chip_state_to_string() 248 State::ON => "on".to_string(), in capture_state_to_string() 249 State::OFF => "off".to_string(), in capture_state_to_string() 250 _ => "unknown".to_string(), in capture_state_to_string() 256 OnOffState::On => "on".to_string(), in on_off_state_to_string() 257 OnOffState::Off => "off".to_string(), in on_off_state_to_string() 311 .to_string() in print_list_capture_response() 339 capture.id.to_string(), in print_list_capture_response() [all …]
|
| /tools/security/gdb/heap_print/test/ |
| D | test_heap_print_script.py | 51 n_str = gdb.execute("print n", to_string=True) 54 "print_ptr malloc_ptr", to_string=True) 63 new_n = gdb.execute("print new_n", to_string=True) 65 malloc_ptr_str = gdb.execute("print_ptr malloc_ptr", to_string=True) 79 new_n = gdb.execute("print new_n", to_string=True) 82 "print_ptr malloc_ptr + {}".format(offset), to_string=True) 90 malloc_ptr_str = gdb.execute("print_ptr malloc_ptr", to_string=True) 98 n_str = gdb.execute("print n", to_string=True) 100 new_ptr_array_str = gdb.execute("print_ptr new_ptr", to_string=True) 107 new_ptr_array_str = gdb.execute("print_ptr new_ptr", to_string=True)
|
| /tools/netsim/rust/netsim-cxx/src/http_server/ |
| D | http_router.rs | 130 method: "GET".to_string(), in test_handle_request() 131 uri: "/".to_string(), in test_handle_request() 132 version: "HTTP/1.1".to_string(), in test_handle_request() 145 method: "GET".to_string(), in test_handle_request() 146 uri: "/user/1920".to_string(), in test_handle_request() 147 version: "HTTP/1.1".to_string(), in test_handle_request() 165 method: "GET".to_string(), in test_mismatch_uri() 166 uri: "/player/1920".to_string(), in test_mismatch_uri() 167 version: "HTTP/1.1".to_string(), in test_mismatch_uri()
|
| D | mod.rs | 84 valid_files.insert(entry.path().to_str().unwrap().to_string()); in create_filename_hash_set() 139 let body = "404 not found (netsim): pcap file not exists for the device".to_string(); in handle_pcap_file() 165 writer.put_ok("text/plain", response.to_string().as_str(), &[]); in handle_devices() 167 let body = format!("404 Not found (netsim): {:?}", error_message.to_string()); in handle_devices() 176 writer.put_ok("text/plain", response.to_string().as_str(), &[]); in handle_devices() 178 let body = format!("404 Not found (netsim): {:?}", error_message.to_string()); in handle_devices() 184 request.method.to_string() in handle_devices()
|
| D | http_request.rs | 51 return Some(value.to_string()); in get() 62 .map(|(key, value)| -> (String, String) { (key.to_string(), value.to_string()) }) in new_with_headers() 123 Ok((method.to_string(), uri.to_string(), version.to_string())) in parse_request_line()
|
| D | http_response.rs | 39 ("Content-Length", length.to_string().as_str()), in new_ok_with_length() 50 ("Content-Length", &body.len().to_string()), in new_ok() 61 ("Content-Length", &body.len().to_string()), in new_error()
|
| /tools/security/gdb/heap_print/ |
| D | heap_print_script.py | 6 'p/d {}'.format(address), to_string=True) 119 func_args_string = gdb.execute('info args', to_string=True) 137 func_args_string = gdb.execute('info args', to_string=True) 156 func_args_string = gdb.execute('info args', to_string=True) 203 'p/x {}'.format(value), to_string=True) 228 'x/1bx {}'.format(address), to_string=True)
|
| /tools/netsim/rust/netsim-cxx/src/devices/ |
| D | chip.rs | 68 name: name.to_string(), in new() 69 device_name: device_name.to_string(), in new() 70 manufacturer: manufacturer.to_string(), in new() 71 product_name: product_name.to_string(), in new()
|
| D | devices_handler.rs | 107 resource.devices.insert(new_id, Device::new(new_id, guid.to_string(), name.to_string())); in get_or_create_device()
|
| /tools/security/gdb/ |
| D | parameters_extract.py | 101 gdb.execute('r > init.log 2>&1',from_tty=True, to_string=True) 198 to_string=True).split(' = ')[1].strip() 201 to_string=True).strip().split(" ")[0], 16) 211 args = gdb.execute('info args -q', to_string=True).strip()
|
| /tools/netsim/src/frontend/ |
| D | frontend_server.cc | 48 err = std::to_string(error_code) + ": " + response; in put_error() 144 HandleCaptureCxx(writer, "PATCH", std::to_string(request->id()), in PatchCapture() 145 std::to_string(request->patch().state())); in PatchCapture() 156 HandleCaptureCxx(writer, "GET", std::to_string(request->id()), ""); in GetCapture()
|
| D | frontend_client.cc | 120 std::to_string(request_byte_vec.size())), in PatchDevice() 147 std::to_string(request_byte_vec.size())), in PatchCapture() 167 std::to_string(request_byte_vec.size())), in GetCapture()
|
| /tools/netsim/src/core/ |
| D | server.cc | 50 builder.AddListeningPort("0.0.0.0:" + std::to_string(netsim_grpc_port), in RunGrpcServer() 61 std::to_string(selected_port).c_str()); in RunGrpcServer() 67 iniFile.Set("grpc.port", std::to_string(selected_port)); in RunGrpcServer()
|
| /tools/security/fuzzing/system_fuzzers/libwatchdog_perf_service/ |
| D | libwatchdog_perf_service_fuzzer.cpp | 50 uidIoStatsSnapshot += (((count % 11) == 0 ? "" : " ") + std::to_string(val)); in LLVMFuzzerTestOneInput() 75 procStatsSnapshot += " " + std::to_string(val); in LLVMFuzzerTestOneInput()
|
| /tools/carrier_settings/python/ |
| D | update_apn.py | 51 def to_string(cid): function 76 return get_known_cname(to_string(cid), known_carriers) 100 ret[to_string(cid)] = carriermap.canonical_name
|
| D | update_carrier_data.py | 111 def to_string(cid): function 176 ret[to_string(cid)] = carriermap.canonical_name 330 carrier_id_str_of_mccmnc = to_string(carrier_id)
|
| /tools/security/remote_provisioning/hwtrust/src/dice/ |
| D | chain.rs | 59 payload.issuer().to_string(), in validate() 60 previous_subject.to_string(), in validate() 65 return Err(ValidationError::RepeatedSubject(n, payload.subject().to_string())); in validate()
|
| /tools/security/remote_provisioning/hwtrust/cxxbridge/ |
| D | lib.rs | 51 error: "invalid chain kind".to_string(), in verify_dice_chain() 65 ffi::VerifyDiceChainResult { error: "".to_string(), chain, len } in verify_dice_chain()
|
| /tools/netsim/rust/netsim-cxx/src/captures/ |
| D | handlers.rs | 214 writer.put_error(404, err.to_string().as_str()); in handle_capture_patch() 288 version: "1.1".to_string(), in handle_capture_cxx() 292 request.uri = "/v1/captures".to_string(); in handle_capture_cxx()
|
| /tools/netsim/src/backend/ |
| D | grpc_server.cc | 50 return std::to_string(chip_kind) + "/" + std::to_string(facade_id); in ChipFacade()
|
| D | fd_startup.cc | 215 name + ":" + std::to_string(fd_in) + ":" + std::to_string(fd_out); in Connect()
|
| /tools/netsim/rust/netsim-cxx/src/transport/ |
| D | fd.rs | 162 .name("fd_transport".to_string()) in run_fd_transport() 168 let_cxx_string!(guid = chip.fd_in.to_string()); in run_fd_transport()
|
| /tools/netsim/rust/netsim-common/src/util/ |
| D | time_display.rs | 57 "INVALID-TIMESTAMP".to_string() in utc_display()
|
| /tools/security/remote_provisioning/hwtrust/src/ |
| D | cbor.rs | 21 return Err(CiboriumError::Semantic(Some(0), "unexpected trailing data".to_string())); in value_from_bytes()
|
| /tools/netsim/rust/model/src/ |
| D | position.rs | 78 let s = serde_json::to_string(&data).unwrap(); in position_to_json()
|