/test/vts/utils/python/common/ |
D | vts_spec_utils.py | 37 [hal_name, hal_version] = hal_package[len(prefix):].split('@') 38 return (hal_name, hal_version) 41 def HalNameDir(hal_name): argument 43 return hal_name.replace('.', '/') 66 def _VtsSpecDir(self, hal_name, hal_version): argument 78 hal_name.replace('.', '/'), hal_version, 'vts') 80 def IndirectImportedHals(self, hal_name, hal_version): argument 94 this_hal = (hal_name, hal_version) 97 for hal_name, hal_version in imported_hals: 98 for discovery in self.ImportedHals(hal_name, hal_version): [all …]
|
/test/vts-testcase/hal/script/build/ |
D | vts_spec_parser.py | 69 def ImportedPackagesList(self, hal_name, hal_version): argument 80 self.GenerateVtsSpecs(hal_name, hal_version) 81 vts_spec_protos = self.VtsSpecProtos(hal_name, hal_version) 96 def GenerateVtsSpecs(self, hal_name, hal_version): argument 106 if (hal_name, hal_version) in self._cache: 114 HAL_NAME=hal_name, 117 self._cache.add((hal_name, hal_version)) 142 hal_name = os.path.dirname(hal_dir).replace('/', '.') 143 result.add((hal_name, hal_version)) 146 def VtsSpecNames(self, hal_name, hal_version): argument [all …]
|
D | build_rule_gen.py | 91 hal_name = target[0] 96 utils.HalNameDir(hal_name), utils.HalVerDir(hal_version)) 100 self._VTS_BUILD_TEMPLATE, hal_name, hal_version)) 107 def _VtsBuildRuleFromTemplate(self, template_path, hal_name, hal_version): argument 122 return self._FillOutBuildRuleTemplate(hal_name, hal_version, 125 def _FillOutBuildRuleTemplate(self, hal_name, hal_version, template): argument 138 def GeneratedOutput(hal_name, hal_version, extension): argument 153 vts_spec_names = self._vts_spec_parser.VtsSpecNames(hal_name, 157 (package_root_dir, utils.HalNameDir(hal_name), 184 build_rule = build_rule.replace('{HAL_NAME}', hal_name) [all …]
|
D | build_rule_gen_utils.py | 20 def HalNameDir(hal_name): argument 22 return hal_name.replace('.', '/')
|
/test/vts-testcase/fuzz/script/config/ |
D | config_gen.py | 110 for hal_name, hal_version in hal_list: 111 if not self._IsTestable(hal_name, hal_version): 115 self._project_path, 'config', self._utils.HalNameDir(hal_name), 132 hal_name, hal_version, fuzzer_type, plan, bp_template) 135 hal_name, hal_version, fuzzer_type, plan, xml_template) 140 def _FuzzerTestName(self, hal_name, hal_version, fuzzer_type): argument 152 test_name += ''.join(map(lambda x: x.title(), hal_name.split('.'))) 187 def _FillOutTemplate(self, hal_name, hal_version, fuzzer_type, plan, argument 203 hal_name, hal_version, fuzzer_type)) 204 config = config.replace('{HAL_NAME}', hal_name) [all …]
|
/test/vts-testcase/fuzz/template/iface_fuzzer_test/ |
D | iface_fuzzer_test.py | 40 def _PushVtsResources(self, hal_name, hal_version): argument 48 hal_name_dir = vts_spec_utils.HalNameDir(hal_name) 55 driver_name = 'android.hardware.%s@%s-vts.driver.so' % (hal_name, 67 def _VtsSpecDirsTarget(self, hal_name, hal_version): argument 77 hal_name_dir = vts_spec_utils.HalNameDir(hal_name) 81 imported_hals = self._vts_spec_parser.ImportedHals(hal_name, 93 hal_name, hal_version = vts_spec_utils.HalPackageToNameAndVersion( 96 imported_hals = self._vts_spec_parser.IndirectImportedHals(hal_name, 98 self._PushVtsResources(hal_name, hal_version) 103 spec_dirs = ':'.join(self._VtsSpecDirsTarget(hal_name, hal_version))
|
/test/vts-testcase/hal/treble/vintf/ |
D | vts_treble_vintf_test_o_mr1.cpp | 70 string hal_name = fq_iface_name.package(); in IsExempt() local 72 return exempt_hals_.find(hal_name) != exempt_hals_.end() || in IsExempt() 126 string hal_name = fq_name.package(); in GetHalService() local 134 hal_name, version, iface_name, instance_name); in GetHalService() 147 string hal_name = fq_name.package(); in TEST_F() local 153 hal_name, version, iface_name, instance_name); in TEST_F() 156 << hal_name << " has no transport specified in VINTF."; in TEST_F() 159 EXPECT_NE(kPassthroughHals.find(hal_name), kPassthroughHals.end()) in TEST_F() 160 << hal_name << " can't be passthrough under Treble rules."; in TEST_F()
|
/test/vts-testcase/hal/script/ |
D | update_hal_adapter_tests.py | 47 for hal_name, hal_version in hal_list: 48 hal_package_name = 'android.hardware.' + hal_name + '@' + hal_version 52 if (hal_name, lower_version) in hal_list:
|
D | update_hal_tests.py | 87 for hal_name, hal_version in hal_list: 88 hal_package_name = 'android.hardware.' + hal_name + '@' + hal_version 90 hal_path = hal_name.replace(".", "/")
|
/test/vts/script/ |
D | update_hal_tests.py | 87 for hal_name, hal_version in hal_list: 88 hal_package_name = 'android.hardware.' + hal_name + '@' + hal_version 90 hal_path = hal_name.replace(".", "/")
|
/test/vts-testcase/fuzz/template/func_fuzzer_test/ |
D | func_fuzzer_test.py | 116 hal_name, hal_version = vts_spec_utils.HalPackageToNameAndVersion( 119 hal_name, hal_version) 126 hal_name, hal_version, vts_spec_name)
|
/test/vts-testcase/fuzz/iface_fuzzer/ |
D | ProtoFuzzerRunner.cpp | 50 string hal_name = comp_spec.package(); in GetServiceName() local 61 hal_name, Version(major_version, minor_version), iface_name); in GetServiceName()
|
/test/vts/compilation_tools/vtsc/test/ |
D | test_vtsc.py | 174 [hal_name, hal_version] = hal_package_name.split("@") 176 hal_name.replace(".", "/"), hal_version)
|
/test/vts/utils/native/trace_processor/ |
D | VtsTraceProcessor.cpp | 638 string hal_name = trace_summary.package + "@" + stream.str(); in GetHalTraceMapping() local 639 if (hal_trace_mapping->find(hal_name) != hal_trace_mapping->end()) { in GetHalTraceMapping() 640 (*hal_trace_mapping)[hal_name].push_back(trace_summary); in GetHalTraceMapping() 642 (*hal_trace_mapping)[hal_name] = vector<TraceSummary>{trace_summary}; in GetHalTraceMapping()
|