/base/update/packaging_tools/test/ |
D | test_script_generator.py | 110 file_path = "./vendor.img" 111 create_file(file_path, get_target_vendor_data()) 112 with open(file_path) as wo_f: 121 if os.path.exists(file_path): 122 os.remove(file_path)
|
D | create_package_data.py | 194 def create_file(file_path, file_data): argument 201 with open(file_path, "wb") as w_f:
|
/base/security/code_signature/services/key_enable/src/ |
D | file_utils.rs | 19 pub fn load_bytes_from_file(file_path: &str) -> Vec<u8> in load_bytes_from_file() 21 let mut file = File::open(file_path).expect("Open file failed."); in load_bytes_from_file()
|
D | cert_utils.rs | 30 fn get_trusted_cert_from_file(certs: &mut Vec<Vec<u8>>, file_path: &str) in get_trusted_cert_from_file() 32 match cert_chain_utils::get_verifed_cert_from_chain(file_path) { in get_trusted_cert_from_file()
|
D | cert_chain_utils.rs | 38 fn load_certs_from_pem_file(file_path: &str) -> Option<Vec<X509>> in load_certs_from_pem_file() 40 let pem = file_utils::load_bytes_from_file(file_path); in load_certs_from_pem_file()
|
/base/update/packaging_tools/ |
D | update_package.py | 178 file_path = extend_path_list[idx] 180 file_path = \ 182 digest = get_hash_content(file_path, OPTIONS_MANAGER.hash_algorithm) 190 component_list[idx].file_path = file_path.encode("utf-8") 198 component_list[idx].size = os.path.getsize(file_path) 201 component_list[idx].original_size = os.path.getsize(file_path) 264 component_list[i].file_path = component.encode("utf-8") 503 def get_hash_content(file_path, hash_algorithm): argument 511 cmd = [LINUX_HASH_ALGORITHM_DICT[hash_algorithm], file_path] 517 if not os.path.exists(file_path): [all …]
|
D | utils.py | 560 def get_file_content(file_path, file_name=None): argument 567 if not os.path.exists(file_path): 569 "%s is not exist! path: %s" % (file_name, file_path), 572 with open(file_path, 'r') as r_f: 575 "%s file parsing complete! path: %s" % (file_name, file_path))
|
D | create_hashdata.py | 127 with open(component.file_path, "rb") as component_file: 128 component_len = os.path.getsize(component.file_path)
|
D | create_update_package.py | 180 with open(component.file_path, "rb") as component_file:
|
/base/hiviewdfx/hidumper/frameworks/native/src/util/zip/ |
D | zip_writer.cpp | 172 bool ZipWriter::AddFileContentToZip(zipFile zip_file, std::string &file_path) in AddFileContentToZip() argument 174 …DUMPER_HILOGD(MODULE_COMMON, "AddFileContentToZip enter|file_path=[%{public}s]", file_path.c_str()… in AddFileContentToZip() 176 if (!DumpUtils::PathIsValid(file_path)) { in AddFileContentToZip() 181 auto fp = fopen(file_path.c_str(), "rb"); in AddFileContentToZip()
|
/base/global/timezone/tool/update_tool/ |
D | download_iana.py | 87 file_path = os.path.abspath(__file__) 88 file_dir = os.path.dirname(file_path)
|
/base/msdp/device_status/rust/plugin_manager/src/ |
D | lib.rs | 65 let file_path = match intention { in instantiate_loader() localVariable 78 libloading::Library::new(file_path.as_os_str()) in instantiate_loader()
|
/base/hiviewdfx/hidumper/frameworks/native/include/util/zip/ |
D | zip_writer.h | 41 static bool AddFileContentToZip(zipFile zip_file, std::string &file_path);
|
/base/startup/init/services/modules/seccomp/scripts/tools/ |
D | merge_policy.py | 104 def parse_file(self, file_path): argument 105 with open(file_path) as fp:
|
/base/security/device_security_level/oem_property/ohos/standard/ |
D | dslm_cred_tool.py | 409 def _get_file_content(self, file_path: str): 410 if not os.path.isfile(file_path): 411 raise CredVerificationException('file {} is not existed'.format(file_path)) 413 with open(file_path, 'r') as fp:
|
/base/startup/init/services/modules/seccomp/scripts/ |
D | generate_code_from_policy.py | 916 def parse_file(self, file_path): argument 917 with open(file_path) as fp:
|
/base/request/request/services/service/rust/src/ |
D | request_task.rs | 981 let file_path = self.conf.file_specs[index].path.as_ptr() as *const c_char; in background_notify() localVariable 993 file_path, in background_notify()
|