Home
last modified time | relevance | path

Searched refs:ReadFileToString (Results 1 – 25 of 32) sorted by relevance

12

/bootable/recovery/tests/unit/host/
Dimgdiff_test.cpp134 ASSERT_TRUE(android::base::ReadFileToString(patch_file.path, &patch)); in TEST()
179 ASSERT_TRUE(android::base::ReadFileToString(tgt_file.path, &tgt)); in TEST()
181 ASSERT_TRUE(android::base::ReadFileToString(src_file.path, &src)); in TEST()
183 ASSERT_TRUE(android::base::ReadFileToString(patch_file.path, &patch)); in TEST()
233 ASSERT_TRUE(android::base::ReadFileToString(tgt_file.path, &tgt)); in TEST()
235 ASSERT_TRUE(android::base::ReadFileToString(src_file.path, &src)); in TEST()
237 ASSERT_TRUE(android::base::ReadFileToString(patch_file.path, &patch)); in TEST()
281 ASSERT_TRUE(android::base::ReadFileToString(tgt_file.path, &tgt)); in TEST()
283 ASSERT_TRUE(android::base::ReadFileToString(src_file.path, &src)); in TEST()
285 ASSERT_TRUE(android::base::ReadFileToString(patch_file.path, &patch)); in TEST()
[all …]
Dupdate_simulator_test.cpp76 ASSERT_TRUE(android::base::ReadFileToString(patch_file.path, patch)); in CreateBsdiffPatch()
164 ASSERT_TRUE(android::base::ReadFileToString(raw_image.path, &content)); in TEST_F()
/bootable/recovery/tests/unit/
Dupdater_test.cpp186 ASSERT_TRUE(android::base::ReadFileToString(temp_pipe.path, &pipe_content)); in RunBlockImageUpdate()
257 ASSERT_TRUE(android::base::ReadFileToString(source_file, &source_content)); in TEST_F()
264 ASSERT_TRUE(android::base::ReadFileToString(target_file, &target_content)); in TEST_F()
362 ASSERT_TRUE(android::base::ReadFileToString(temp_file1.path, &data)); in TEST_F()
369 ASSERT_TRUE(android::base::ReadFileToString(temp_file1.path, &data)); in TEST_F()
445 ASSERT_TRUE(android::base::ReadFileToString(image_file_, &updated)); in TEST_F()
511 ASSERT_TRUE(android::base::ReadFileToString(temp_file.path, &content)); in TEST_F()
519 ASSERT_TRUE(android::base::ReadFileToString(temp_file.path, &content)); in TEST_F()
601 ASSERT_TRUE(android::base::ReadFileToString(tf.path, &cmd)); in TEST_F()
624 ASSERT_TRUE(android::base::ReadFileToString(tf.path, &cmd)); in TEST_F()
[all …]
Dapplypatch_modes_test.cpp42 if (!android::base::ReadFileToString(filename, &data)) { in GetEmmcTargetString()
136 ASSERT_TRUE(android::base::ReadFileToString(from_testdata_base("boot.img"), &src_content)); in TEST_F()
139 ASSERT_TRUE(android::base::ReadFileToString(from_testdata_base("recovery.img"), &tgt_content)); in TEST_F()
Dverifier_test.cpp46 ASSERT_TRUE(android::base::ReadFileToString(file_name, &testkey_string)); in LoadKeyFromFile()
81 ASSERT_TRUE(android::base::ReadFileToString(name, &content)); in BuildCertificateArchive()
101 android::base::ReadFileToString(from_testdata_base("testkey_v1.txt"), &testkey_string)); in TEST()
220 ASSERT_TRUE(android::base::ReadFileToString(from_testdata_base("testkey_v1.x509.pem"), &content)); in TEST()
283 ASSERT_TRUE(android::base::ReadFileToString(from_testdata_base("otasigned_v3.zip"), &package)); in TEST()
297 ASSERT_TRUE(android::base::ReadFileToString(from_testdata_base("otasigned_v3.zip"), &package)); in TEST()
Dfuse_sideload_test.cpp102 ASSERT_TRUE(android::base::ReadFileToString(package, &content_via_fuse)); in TEST()
Dpackage_test.cpp54 ASSERT_TRUE(android::base::ReadFileToString(temp_file_.path, &file_content_)); in SetUp()
/bootable/recovery/updater/
Dsimulator_runtime.cpp89 bool SimulatorRuntime::ReadFileToString(const std::string_view filename, in ReadFileToString() function in SimulatorRuntime
92 return android::base::ReadFileToString(source_->GetOemSettings(), content); in ReadFileToString()
Dupdater_runtime.cpp141 bool UpdaterRuntime::ReadFileToString(const std::string_view filename, std::string* content) const { in ReadFileToString() function in UpdaterRuntime
142 return android::base::ReadFileToString(std::string(filename), content); in ReadFileToString()
Dupdate_simulator_main.cpp116 if (!android::base::ReadFileToString(skip_function_file, &content)) { in main()
Dtarget_files.cpp125 return android::base::ReadFileToString(entry_path, content); in ReadEntryToString()
/bootable/recovery/applypatch/
Dapplypatch_modes.cpp74 if (!android::base::ReadFileToString(patch_file, &patch_contents)) { in PatchMode()
83 if (!android::base::ReadFileToString(bonus_file, &bonus_contents)) { in PatchMode()
/bootable/recovery/recovery_utils/
Dthermalutil.cpp66 if (!android::base::ReadFileToString(path, &content)) { in GetMaxValueFromThermalZone()
Dparse_install_logs.cpp94 if (!android::base::ReadFileToString(file_name, &content)) { in ParseLastInstall()
/bootable/recovery/edify/include/edify/
Dupdater_runtime_interface.h55 virtual bool ReadFileToString(const std::string_view filename, std::string* content) const = 0;
/bootable/recovery/updater/include/updater/
Dupdater_runtime.h48 bool ReadFileToString(const std::string_view filename, std::string* content) const override;
Dsimulator_runtime.h45 bool ReadFileToString(const std::string_view filename, std::string* content) const override;
/bootable/recovery/tests/manual/
Drecovery_test.cpp83 EXPECT_TRUE(android::base::ReadFileToString(kInjectTxtFilename, &buf)); in TEST()
/bootable/recovery/
Drecovery-persist.cpp96 android::base::ReadFileToString(destination, &content); in logsave()
Drecovery_main.cpp143 android::base::ReadFileToString(COMMAND_FILE, &content)) { in get_args()
181 if (!android::base::ReadFileToString(LOCALE_FILE, &content)) { in load_locale_from_cache()
/bootable/recovery/install/
Dwipe_device.cpp68 if (!android::base::ReadFileToString(RECOVERY_WIPE_ON_DEVICE, &partition_list_content)) { in GetWipePartitionList()
/bootable/recovery/recovery_ui/
Dui.cpp118 if (!android::base::ReadFileToString(max_brightness_file_, &content)) { in InitScreensaver()
157 if (android::base::ReadFileToString("/proc/cmdline", &cmdline)) { in Init()
/bootable/recovery/uncrypt/
Duncrypt.cpp213 if (!android::base::ReadFileToString(uncrypt_path_file, &uncrypt_path)) { in FindUncryptPackage()
589 if (!android::base::ReadFileToString(path, &wipe_package)) { in setup_bcb()
/bootable/recovery/otautil/
Dsysutil.cpp40 if (!android::base::ReadFileToString(block_map_path, &content)) { in ParseBlockMapFile()
/bootable/recovery/update_verifier/
Dupdate_verifier.cpp111 if (!android::base::ReadFileToString(path, &content)) { in FindDmPartitions()

12