/build/soong/ui/terminal/ |
D | util.go | 60 read := input 67 advance := func(write, read []byte, count int) ([]byte, []byte) { 68 copy(write, read[:count]) 69 return write[count:], read[count:] 74 i := bytes.IndexByte(read, 0x1b) 76 if i == -1 || i+1 >= len(read) { 77 copy(write, read) 82 if read[i+1] != '[' { 83 write, read = advance(write, read, i+1) 88 write, read = advance(write, read, i) [all …]
|
/build/make/tools/ |
D | auto_gen_test_config_test.py | 141 self.assertEqual(config_file.read(), empty_config.read()) 155 self.assertEqual(config_file.read(), EXPECTED_JUNIT_TEST_CONFIG) 170 config_file.read(), EXPECTED_INSTRUMENTATION_TEST_CONFIG)
|
D | fat16copy.py | 44 return struct.unpack("<H", f.read(2))[0] 48 return struct.unpack("<L", f.read(4))[0] 52 return struct.unpack("B", f.read(1))[0] 118 def read(self, size): member in fat_file 235 data_file.write(data.read()) 399 record = f.read(32) 405 record = f.read(32) 427 def read(self, count): member in root_dentry_file 434 ret = f.read(count) 531 chars = f.read(10) [all …]
|
D | generate-notice-files.py | 55 block = f.read(MD5_BLOCKSIZE) 122 print >> output_file, html_escape(open(value[0]).read()) 146 print >> output_file, open(value[0]).read() 186 …tent contentId="%s"><![CDATA[%s]]></file-content>' % (file_key, html_escape(open(filename).read()))
|
D | generate-self-extracting-archive.py | 89 b = src.read(_PIPE_CHUNK_SIZE) 134 license = license_file.read()
|
D | generate-enforce-rro-android-manifest.py | 63 data = f.read()
|
D | check_radio_versions.py | 48 digest = sha1(f.read()).hexdigest()
|
D | auto_gen_test_config.py | 83 config = template.read()
|
/build/make/tools/releasetools/ |
D | test_sign_target_files_apks.py | 179 self.assertEqual(BOOT_CMDLINE1, output_zip.read('BOOT/cmdline').decode()) 189 self.assertEqual(BOOT_CMDLINE2, output_zip.read('BOOT/cmdline').decode()) 207 self.assertEqual(BOOT_CMDLINE, output_zip.read('BOOT/cmdline').decode()) 212 cert1 = cert1_fp.read() 215 cert2 = cert2_fp.read() 218 cert3 = cert3_fp.read() 238 cert1 = cert1_fp.read() 241 cert2 = cert2_fp.read() 256 cert1 = cert1_fp.read() 259 cert2 = cert2_fp.read() [all …]
|
D | sparse_img.py | 48 header_bin = f.read(28) 87 header_bin = f.read(12) 107 fill_data = f.read(4) 222 yield f.read(this_read * self.blocksize) 234 yield f.read(this_read * self.blocksize) 321 data = f.read(self.blocksize)
|
D | test_merge_target_files.py | 154 merged_entries = f.read().split('\n') 160 output_entries = f.read().split('\n') 211 merged_entries = f.read().split('\n') 217 output_entries = f.read().split('\n')
|
D | sign_target_files_apks.py | 437 data = compressed.read() 440 data = signed.read() 469 data = input_tf_zip.read(filename) 711 common.ParseCertificate(old_fp.read())).decode().lower() 714 common.ParseCertificate(new_fp.read())).decode().lower() 825 keylist = input_tf_zip.read("META/otakeys.txt").split() 909 in_cmdline = input_zip.read("BOOT/cmdline").decode() 942 input_zip.read('META/misc_info.txt').decode().split('\n')) 1030 data = input_tf_zip.read("SYSTEM/build.prop").decode() 1052 data = input_tf_zip.read("SYSTEM/build.prop").decode() [all …]
|
D | sign_target_files_apks | 437 data = compressed.read() 440 data = signed.read() 469 data = input_tf_zip.read(filename) 711 common.ParseCertificate(old_fp.read())).decode().lower() 714 common.ParseCertificate(new_fp.read())).decode().lower() 825 keylist = input_tf_zip.read("META/otakeys.txt").split() 909 in_cmdline = input_zip.read("BOOT/cmdline").decode() 942 input_zip.read('META/misc_info.txt').decode().split('\n')) 1030 data = input_tf_zip.read("SYSTEM/build.prop").decode() 1052 data = input_tf_zip.read("SYSTEM/build.prop").decode() [all …]
|
D | test_ota_from_target_files.py | 347 ab_partitions = verify_zip.read('META/ab_partitions.txt').decode() 427 updated_misc_info = verify_zip.read('META/misc_info.txt').decode() 428 updated_dynamic_partitions_info = verify_zip.read( 635 self.assertEqual(expected, input_fp.read(size)) 909 metadata_signature_proto_tail = verify_fp.read(signature_tail_length) 934 self.assertEqual(verify_fp.read(), metadata_signature) 1073 self.assertEqual(fp1.read(), fp2.read()) 1244 self.assertIn("POWERWASH=1", properties_fp.read()) 1252 self.assertIn("SWITCH_SLOT_ON_REBOOT=0", properties_fp.read())
|
D | images.py | 178 d = self._file.read(self.blocksize) 206 yield self._file.read(self.blocksize)
|
D | sign_apex.py | 58 apex_data = input_fp.read()
|
D | ota_package_parser.py | 79 lines = self.package.read(name).strip().splitlines() 176 for line in self.package.read(metadata_path).strip().splitlines():
|
/build/soong/scripts/ |
D | generate-notice-files.py | 55 block = f.read(MD5_BLOCKSIZE) 122 print >> output_file, html_escape(open(value[0]).read()) 146 print >> output_file, open(value[0]).read() 186 …tent contentId="%s"><![CDATA[%s]]></file-content>' % (file_key, html_escape(open(filename).read()))
|
D | mergenotice.py | 43 data = f.read().strip()
|
D | ninja_rsp.py | 35 c = f.read(1)
|
/build/make/ |
D | README.md | 18 are read by [Kati], and generate a ninja file instead of being executed 19 directly. That's combined with a ninja file read by Soong so that the build
|
/build/make/tools/signtos/ |
D | SignTos.java | 129 input.read(bytes); in readPrivateKey() 233 int bytesRead = input.read(buffer, 0, HEADER_SIZE - skippedBytes); in signWholeFile() 240 int bytesRead = input.read(buffer); in signWholeFile()
|
/build/make/tools/zipalign/ |
D | ZipEntry.h | 242 status_t read(FILE* fp); 300 status_t read(FILE* fp);
|
D | ZipEntry.cpp | 50 result = mCDE.read(fp); in initFromCDE() 66 result = mLFH.read(fp); in initFromCDE() 404 status_t ZipEntry::LocalFileHeader::read(FILE* fp) in read() function in ZipEntry::LocalFileHeader 538 status_t ZipEntry::CentralDirEntry::read(FILE* fp) in read() function in ZipEntry::CentralDirEntry
|
/build/make/tools/signapk/src/com/android/signapk/ |
D | SignApk.java | 262 input.read(bytes); in readPrivateKey() 304 int read; in addOtacert() local 305 while ((read = input.read(b)) != -1) { in addOtacert() 306 outputJar.write(b, 0, read); in addOtacert() 483 while ((num = data.read(buffer)) > 0) { in copyFiles() 543 while ((num = data.read(buffer)) > 0) { in copyFiles() 595 pinMetaStream.read(patternBlob); in extractPinPatterns() 642 while ((chunkSize = in.read(tmpbuf)) > 0) { in provideJarEntry() 1012 while ((chunkSize = in.read(buf)) != -1) { in toByteArray()
|