Home
last modified time | relevance | path

Searched refs:package (Results 1 – 16 of 16) sorted by relevance

/bootable/recovery/tests/unit/
Dpackage_test.cpp65 for (const auto& package : packages_) { in TEST_F() local
67 ASSERT_TRUE(package->ReadFullyAtOffset(buffer.data(), file_content_.size(), 0)); in TEST_F()
70 ASSERT_TRUE(package->ReadFullyAtOffset(buffer.data(), file_content_.size() - 10, 10)); in TEST_F()
76 for (const auto& package : packages_) { in TEST_F() local
79 ASSERT_FALSE(package->ReadFullyAtOffset(buffer.data(), file_content_.size(), 10)); in TEST_F()
89 for (const auto& package : packages_) { in TEST_F() local
94 package->UpdateHashAtOffset(hashers, 0, hash_size); in TEST_F()
103 for (const auto& package : packages_) { in TEST_F() local
104 ZipArchiveHandle zip = package->GetZipArchiveHandle(); in TEST_F()
Dsysutil_test.cpp107 TemporaryFile package; in TEST() local
111 ASSERT_TRUE(android::base::WriteStringToFile(content, package.path)); in TEST()
118 std::string block_map_content = std::string(package.path) + "\n40960 4096\n1\n0 10\n"; in TEST()
126 block_map_content = std::string(package.path) + "\n40960 4096\n1\n0 10"; in TEST()
134 block_map_content = std::string(package.path) + "\n40960 4096\n1\n0 10\n\n\n"; in TEST()
142 block_map_content = std::string(package.path) + "\n40960 4096\n3\n0 3\n3 5\n5 10\n"; in TEST()
/bootable/recovery/updater_sample/tools/
Dgen_update_config.py50 package, argument
55 self.package = package
82 'name': self.ab_install_type[0] + ' ' + os.path.basename(self.package)[:-4],
90 with zipfile.ZipFile(self.package, 'r') as package_zip:
160 package=args.package,
Dtest_gen_update_config.py34 config, package = self._generate_config()
37 with open(package, 'rb') as pkg_file:
/bootable/recovery/tests/component/
Dverifier_test.cpp53 auto package = in VerifyFile() local
55 ASSERT_NE(nullptr, package); in VerifyFile()
57 ASSERT_EQ(expected, verify_file(package.get(), keys)); in VerifyFile()
63 auto package = Package::CreateMemoryPackage(path, nullptr); in VerifyPackageWithCertificates() local
64 ASSERT_NE(nullptr, package); in VerifyPackageWithCertificates()
66 ASSERT_EQ(VERIFY_SUCCESS, verify_file(package.get(), certs)); in VerifyPackageWithCertificates()
282 std::string package; in TEST() local
283 ASSERT_TRUE(android::base::ReadFileToString(from_testdata_base("otasigned_v3.zip"), &package)); in TEST()
284 ASSERT_EQ(std::string("\xc0\x06\xff\xff\xd2\x06", 6), package.substr(package.size() - 6, 6)); in TEST()
287 package[package.size() - 5] = '\x05'; in TEST()
[all …]
Dinstall_test.cpp123 auto package = Package::CreateMemoryPackage( in TEST() local
126 auto read_partition_list = GetWipePartitionList(package.get()); in TEST()
202 std::string package = "/path/to/update.zip"; in TEST() local
207 ASSERT_EQ(0, SetUpNonAbUpdateCommands(package, zip, 0, status_fd, &cmd)); in TEST()
212 ASSERT_EQ(package, cmd[3]); in TEST()
219 ASSERT_EQ(0, SetUpNonAbUpdateCommands(package, zip, 2, status_fd, &cmd)); in TEST()
224 ASSERT_EQ(package, cmd[3]); in TEST()
242 std::string package = "/path/to/update.zip"; in TEST() local
246 ASSERT_EQ(INSTALL_CORRUPT, SetUpNonAbUpdateCommands(package, zip, 0, status_fd, &cmd)); in TEST()
283 std::string package = "/path/to/update.zip"; in VerifyAbUpdateCommands() local
[all …]
Dsideload_test.cpp79 std::string package = std::string(mount_point.path) + "/" + FUSE_SIDELOAD_HOST_FILENAME; in TEST() local
86 if (stat(package.c_str(), &sb) == 0) { in TEST()
98 ASSERT_TRUE(android::base::ReadFileToString(package, &content_via_fuse)); in TEST()
/bootable/recovery/install/include/private/
Dsetup_commands.h30 int SetUpNonAbUpdateCommands(const std::string& package, ZipArchiveHandle zip, int retry_count,
38 int SetUpAbUpdateCommands(const std::string& package, ZipArchiveHandle zip, int status_fd,
/bootable/recovery/install/include/install/
Dinstall.h50 int install_package(const std::string& package, bool should_wipe_cache, bool needs_mount,
55 bool verify_package(Package* package, RecoveryUI* ui);
Dverifier.h83 int verify_file(VerifierInterface* package, const std::vector<Certificate>& keys);
/bootable/recovery/install/
Dinstall.cpp232 int SetUpAbUpdateCommands(const std::string& package, ZipArchiveHandle zip, int status_fd, in SetUpAbUpdateCommands() argument
264 "--payload=file://" + package, in SetUpAbUpdateCommands()
272 int SetUpNonAbUpdateCommands(const std::string& package, ZipArchiveHandle zip, int retry_count, in SetUpNonAbUpdateCommands() argument
309 package, in SetUpNonAbUpdateCommands()
328 static int try_update_binary(const std::string& package, ZipArchiveHandle zip, bool* wipe_cache, in try_update_binary() argument
390 is_ab ? SetUpAbUpdateCommands(package, zip, pipe_write.get(), &args) in try_update_binary()
391 : SetUpNonAbUpdateCommands(package, zip, retry_count, pipe_write.get(), &args); in try_update_binary()
493 LOG(ERROR) << "Error in " << package << " (status " << WEXITSTATUS(status) << ")"; in try_update_binary()
497 LOG(ERROR) << "Error in " << package << " (killed by signal " << WTERMSIG(status) << ")"; in try_update_binary()
595 auto package = Package::CreateMemoryPackage( in really_install_package() local
[all …]
Dverifier.cpp113 int verify_file(VerifierInterface* package, const std::vector<Certificate>& keys) { in verify_file() argument
114 CHECK(package); in verify_file()
115 package->SetProgress(0.0); in verify_file()
126 uint64_t length = package->GetPackageSize(); in verify_file()
134 if (!package->ReadFullyAtOffset(footer, FOOTER_SIZE, length - FOOTER_SIZE)) { in verify_file()
176 if (!package->ReadFullyAtOffset(eocd, eocd_size, length - eocd_size)) { in verify_file()
231 package->UpdateHashAtOffset(hashers, so_far, read_size); in verify_file()
236 package->SetProgress(f); in verify_file()
DAndroid.bp67 "package.cpp",
/bootable/recovery/updater_sample/
DREADME.md32 SystemUpdaterSample app downloads OTA package from `url`. In this sample app
39 opposed to the entire package, to initiate a streaming update. The `payload.bin`
40 entry, which takes up the majority of the space in an OTA package, will be
41 streamed by `update_engine` directly. The ZIP entries in such a package need to be
107 Sometimes OTA package server might require some HTTP headers to be present,
179 `update_engine` service as well as OTA package files. Detailed steps are as follows:
189 <privapp-permissions package="com.example.android.systemupdatersample">
213 - [x] Prepare streaming update (partially downloading package)
223 - [x] Verify system partition checksum for package
/bootable/recovery/update_verifier/
Dcare_map.proto19 package recovery_update_verifier;
/bootable/recovery/uncrypt/
Duncrypt.cpp518 std::string package; in uncrypt_wrapper() local
520 if (!FindUncryptPackage(UNCRYPT_PATH_FILE, &package)) { in uncrypt_wrapper()
526 input_path = package.c_str(); in uncrypt_wrapper()