/system/tpm/trunks/generator/ |
H A D | union_selectors.py | 187 return _SELECTORS[union_type]['selectors'].keys()
|
/system/connectivity/shill/test-scripts/ |
H A D | list-devices | 11 for key in obj_properties.keys():
|
H A D | list-profiles | 26 for key in obj_properties.keys():
|
H A D | list-services | 12 for key in properties.keys():
|
H A D | test-manager | 23 for key in properties.keys(): 40 if "Services" in properties.keys(): 47 for key in properties.keys():
|
H A D | test-flimflam | 39 for key in properties.keys(): 69 if "Name" in properties.keys(): 85 if "WiFi.Passphrase" in properties.keys(): 141 if "Name" in properties.keys(): 182 if "Name" in properties.keys(): 186 if "Passphrase" in properties.keys(): 212 if "Name" in properties.keys(): 217 if "AutoConnect" in properties.keys(): 335 if "Networks" in properties.keys(): 340 if "Networks" in properties.keys() [all...] |
H A D | get-profile-entry | 38 for key in properties.keys():
|
H A D | get-service | 35 for key in properties.keys():
|
H A D | list-active-service | 48 requested_keys = properties.keys()
|
H A D | list-ipconfigs | 27 for key in ipconfig_properties.keys():
|
/system/connectivity/shill/ |
H A D | property_store_unittest.cc | 337 const string keys[] = {"boolp1", "boolp2"}; local 339 store.RegisterWriteOnlyBool(keys[0], &values[0]); 340 store.RegisterBool(keys[1], &values[1]); 344 EXPECT_EQ(keys[1], it.Key()); 350 EXPECT_FALSE(store.GetBoolProperty(keys[0], nullptr, &errors[0])); 353 EXPECT_TRUE(store.GetBoolProperty(keys[1], &test_value, &errors[1])); 358 const string keys[] = {"int16p1", "int16p2"}; local 360 store.RegisterWriteOnlyInt16(keys[0], &values[0]); 361 store.RegisterInt16(keys[1], &values[1]); 365 EXPECT_EQ(keys[ 379 const string keys[] = {"int32p1", "int32p2"}; local 400 const string keys[] = {"stringp1", "stringp2"}; local 421 const string keys[] = {"stringmapp1", "stringmapp2"}; local 445 const string keys[] = {"stringmapsp1", "stringmapsp2"}; local 473 const string keys[] = {"stringsp1", "stringsp2"}; local 500 const string keys[] = {"uint8p1", "uint8p2"}; local 521 const string keys[] = {"uint16p", "uint16p1"}; local [all...] |
/system/bt/stack/btm/ |
H A D | btm_ble.c | 1078 p_dev_rec->ble.keys.local_counter++; 1080 p_dev_rec->ble.keys.counter++; 1083 p_dev_rec->ble.keys.local_counter, 1084 p_dev_rec->ble.keys.counter); 1134 if (p_dev_rec && p_dev_rec->ble.keys.div) 1137 *p_div = p_dev_rec->ble.keys.div; 1148 ** an BLE key. SMP is internal, whereas all the keys shall 1178 memcpy(p_rec->ble.keys.pltk, p_keys->penc_key.ltk, BT_OCTET16_LEN); 1179 memcpy(p_rec->ble.keys.rand, p_keys->penc_key.rand, BT_OCTET8_LEN); 1180 p_rec->ble.keys [all...] |
H A D | btm_ble_addr.c | 291 SMP_Encrypt(p_dev_rec->ble.keys.irk, BT_OCTET16_LEN, 342 SMP_Encrypt(p_dev_rec->ble.keys.irk, BT_OCTET16_LEN,
|
H A D | btm_ble_privacy.c | 797 UINT8 *peer_irk = p_dev_rec->ble.keys.irk; 817 ARRAY_TO_STREAM(p, p_dev_rec->ble.keys.irk, BT_OCTET16_LEN);
|
/system/media/camera/docs/ |
H A D | ACameraMetadata.mako | 54 // Skip check for vendor keys
|
/system/core/healthd/ |
H A D | healthd_mode_charger.cpp | 115 struct key_state keys[KEY_MAX + 1]; member in struct:charger 469 if (charger->keys[code].down == down) 475 charger->keys[code].timestamp = now; 476 charger->keys[code].down = down; 477 charger->keys[code].pending = true; 481 int64_t duration = now - charger->keys[code].timestamp; 511 struct key_state *key = &charger->keys[code];
|
/system/sepolicy/tools/ |
H A D | check_seapp.c | 584 * hdestroy() frees comparsion keys for non glibc 672 * @param keys 675 * The length of the keys array 677 * The line number the keys were extracted from 681 static rule_map *rule_map_new(kvp keys[], size_t num_of_keys, int lineno, argument 705 /* For all the keys in a rule line*/ 707 k = &(keys[i]); 736 log_info("Validating keys!\n"); 772 log_error("Strange, no keys found, input file corrupt perhaps?\n"); 784 k = &(keys[ 1047 kvp keys[KVP_NUM_OF_RULES]; local [all...] |
/system/extras/verity/ |
H A D | KeystoreSigner.java | 133 ASN1Sequence keys = (ASN1Sequence) sequence.getObjectAt(1); 134 Enumeration e = keys.getObjects();
|
/system/core/init/ |
H A D | perfboot.py | 263 keys = [key for key in record.keys() if key[0] == tag] 264 return [record[k] for k in sorted(keys)]
|
/system/core/libutils/tests/ |
H A D | LruCache_test.cpp | 131 void assertInstanceCount(ssize_t keys, ssize_t values) { argument 132 if (keys != ComplexKey::instanceCount || values != ComplexValue::instanceCount) { 133 FAIL() << "Expected " << keys << " keys and " << values << " values " 134 "but there were actually " << ComplexKey::instanceCount << " keys and "
|
/system/bt/audio_a2dp_hw/ |
H A D | audio_a2dp_hw.c | 787 static char * out_get_parameters(const struct audio_stream *stream, const char *keys) argument 790 UNUSED(keys); 974 const char *keys) 977 UNUSED(keys); 1207 const char *keys) 1213 hash_map_t *params = hash_map_utils_new_from_string_params(keys); 973 in_get_parameters(const struct audio_stream *stream, const char *keys) argument 1206 adev_get_parameters(const struct audio_hw_device *dev, const char *keys) argument
|
/system/sepolicy/ |
H A D | Android.mk | 457 # Build keys.conf 458 mac_perms_keys.tmp := $(intermediates)/keys.tmp 460 $(mac_perms_keys.tmp): $(call build_policy, keys.conf)
|
/system/extras/tests/net_test/ |
H A D | sock_diag_test.py | 361 netid = random.choice(self.tuns.keys()) 382 self.netid = random.choice(self.tuns.keys())
|
H A D | neighbour_test.py | 85 self.netid = random.choice(self.tuns.keys())
|
/system/update_engine/ |
H A D | Android.mk | 693 # Private and public keys for unittests. 699 define ue-unittest-keys 722 $(call ue-unittest-keys,unittest_key) 723 $(call ue-unittest-keys,unittest_key2)
|