/build/soong/ui/terminal/ |
D | util.go | 60 read := input 67 advance := func(write, read []byte, count int) ([]byte, []byte) { 68 copy(write, read[:count]) 69 return write[count:], read[count:] 74 i := bytes.IndexByte(read, 0x1b) 76 if i == -1 || i+1 >= len(read) { 77 copy(write, read) 82 if read[i+1] != '[' { 83 write, read = advance(write, read, i+1) 88 write, read = advance(write, read, i) [all …]
|
/build/make/tools/ |
D | auto_gen_test_config_test.py | 141 self.assertEqual(config_file.read(), empty_config.read()) 155 self.assertEqual(config_file.read(), EXPECTED_JUNIT_TEST_CONFIG) 170 config_file.read(), EXPECTED_INSTRUMENTATION_TEST_CONFIG)
|
D | fat16copy.py | 44 return struct.unpack("<H", f.read(2))[0] 48 return struct.unpack("<L", f.read(4))[0] 52 return struct.unpack("B", f.read(1))[0] 118 def read(self, size): member in fat_file 235 data_file.write(data.read()) 399 record = f.read(32) 405 record = f.read(32) 427 def read(self, count): member in root_dentry_file 434 ret = f.read(count) 531 chars = f.read(10) [all …]
|
D | generate-notice-files.py | 55 block = f.read(MD5_BLOCKSIZE) 122 print >> output_file, html_escape(open(value[0]).read()) 146 print >> output_file, open(value[0]).read() 186 …tent contentId="%s"><![CDATA[%s]]></file-content>' % (file_key, html_escape(open(filename).read()))
|
D | generate-self-extracting-archive.py | 89 b = src.read(_PIPE_CHUNK_SIZE) 134 license = license_file.read()
|
D | generate-enforce-rro-android-manifest.py | 63 data = f.read()
|
D | check_radio_versions.py | 48 digest = sha1(f.read()).hexdigest()
|
D | auto_gen_test_config.py | 83 config = template.read()
|
/build/make/tools/releasetools/ |
D | test_sign_target_files_apks.py | 179 self.assertEqual(BOOT_CMDLINE1, output_zip.read('BOOT/cmdline').decode()) 189 self.assertEqual(BOOT_CMDLINE2, output_zip.read('BOOT/cmdline').decode()) 207 self.assertEqual(BOOT_CMDLINE, output_zip.read('BOOT/cmdline').decode()) 212 cert1 = cert1_fp.read() 215 cert2 = cert2_fp.read() 218 cert3 = cert3_fp.read() 238 cert1 = cert1_fp.read() 241 cert2 = cert2_fp.read() 256 cert1 = cert1_fp.read() 259 cert2 = cert2_fp.read() [all …]
|
D | sparse_img.py | 48 header_bin = f.read(28) 87 header_bin = f.read(12) 107 fill_data = f.read(4) 222 yield f.read(this_read * self.blocksize) 234 yield f.read(this_read * self.blocksize) 321 data = f.read(self.blocksize)
|
D | test_ota_from_target_files.py | 376 ab_partitions = verify_zip.read('META/ab_partitions.txt').decode() 456 updated_misc_info = verify_zip.read('META/misc_info.txt').decode() 457 updated_dynamic_partitions_info = verify_zip.read( 488 ab_partitions = verify_zip.read('META/ab_partitions.txt').decode() 534 ab_partitions = verify_zip.read('META/ab_partitions.txt').decode() 535 updated_misc_info = verify_zip.read('META/misc_info.txt').decode() 536 updated_dynamic_partitions_info = verify_zip.read( 586 ab_partitions = verify_zip.read('META/ab_partitions.txt').decode() 587 oem_image = verify_zip.read('IMAGES/oem.img').decode() 606 ab_partitions = verify_zip.read('META/ab_partitions.txt').decode() [all …]
|
D | sign_target_files_apks | 480 data = compressed.read() 483 data = signed.read() 531 data = input_tf_zip.read(filename) 759 common.ParseCertificate(old_fp.read())).decode().lower() 762 common.ParseCertificate(new_fp.read())).decode().lower() 874 keylist = input_tf_zip.read("META/otakeys.txt").split() 949 in_cmdline = input_zip.read("BOOT/cmdline").decode() 982 input_zip.read('META/misc_info.txt').decode().split('\n')) 1091 data = input_tf_zip.read("SYSTEM/build.prop").decode() 1113 data = input_tf_zip.read("SYSTEM/build.prop").decode() [all …]
|
D | test_merge_target_files.py | 162 merged_entries = f.read().split('\n') 168 output_entries = f.read().split('\n') 217 merged_entries = f.read().split('\n') 223 output_entries = f.read().split('\n')
|
D | ota_from_target_files.py | 358 signature_size = f.read().rstrip() 608 header_bin = payload_fp.read(24) 690 content = f.read() 731 partition_list = f.read().splitlines() 808 original_ab_partitions = input_zip.read( 839 content = input_zip.read(info_file).decode() 1001 return fp.read(4) == b'\x3A\xFF\x26\xED' 1097 target_info.info_dict['ab_partitions'] = zfp.read( 1165 care_map_data = target_zip.read("META/" + care_map_name) 1177 common.ZipWriteStr(output_zip, "apex_info.pb", zfp.read(),
|
D | sign_apex.py | 58 apex_data = input_fp.read()
|
/build/soong/scripts/ |
D | conv_linker_config.py | 44 pb.ParseFromString(f.read()) 51 pb.ParseFromString(f.read()) 70 pb.ParseFromString(f.read()) 85 pb.MergeFromString(f.read())
|
D | generate-notice-files.py | 55 block = f.read(MD5_BLOCKSIZE) 122 print >> output_file, html_escape(open(value[0]).read()) 146 print >> output_file, open(value[0]).read() 186 …tent contentId="%s"><![CDATA[%s]]></file-content>' % (file_key, html_escape(open(filename).read()))
|
D | mergenotice.py | 43 data = f.read().strip()
|
D | ninja_rsp.py | 35 c = f.read(1)
|
/build/make/ |
D | README.md | 18 are read by [Kati], and generate a ninja file instead of being executed 19 directly. That's combined with a ninja file read by Soong so that the build
|
/build/make/tools/signtos/ |
D | SignTos.java | 129 input.read(bytes); in readPrivateKey() 233 int bytesRead = input.read(buffer, 0, HEADER_SIZE - skippedBytes); in signWholeFile() 240 int bytesRead = input.read(buffer); in signWholeFile()
|
/build/make/tools/zipalign/ |
D | ZipEntry.h | 242 status_t read(FILE* fp); 300 status_t read(FILE* fp);
|
D | ZipEntry.cpp | 50 result = mCDE.read(fp); in initFromCDE() 66 result = mLFH.read(fp); in initFromCDE() 404 status_t ZipEntry::LocalFileHeader::read(FILE* fp) in read() function in android::ZipEntry::LocalFileHeader 538 status_t ZipEntry::CentralDirEntry::read(FILE* fp) in read() function in android::ZipEntry::CentralDirEntry
|
/build/soong/bloaty/ |
D | bloaty_merger_test.py | 61 metrics.ParseFromString(output.read())
|
/build/make/tools/signapk/src/com/android/signapk/ |
D | SignApk.java | 264 input.read(bytes); in readPrivateKey() 306 int read; in addOtacert() local 307 while ((read = input.read(b)) != -1) { in addOtacert() 308 outputJar.write(b, 0, read); in addOtacert() 485 while ((num = data.read(buffer)) > 0) { in copyFiles() 545 while ((num = data.read(buffer)) > 0) { in copyFiles() 597 pinMetaStream.read(patternBlob); in extractPinPatterns() 644 while ((chunkSize = in.read(tmpbuf)) > 0) { in provideJarEntry() 1014 while ((chunkSize = in.read(buf)) != -1) { in toByteArray()
|