/bootable/recovery/tests/unit/ |
D | package_test.cpp | 65 for (const auto& package : packages_) { in TEST_F() local 67 ASSERT_TRUE(package->ReadFullyAtOffset(buffer.data(), file_content_.size(), 0)); in TEST_F() 70 ASSERT_TRUE(package->ReadFullyAtOffset(buffer.data(), file_content_.size() - 10, 10)); in TEST_F() 76 for (const auto& package : packages_) { in TEST_F() local 79 ASSERT_FALSE(package->ReadFullyAtOffset(buffer.data(), file_content_.size(), 10)); in TEST_F() 89 for (const auto& package : packages_) { in TEST_F() local 94 package->UpdateHashAtOffset(hashers, 0, hash_size); in TEST_F() 103 for (const auto& package : packages_) { in TEST_F() local 104 ZipArchiveHandle zip = package->GetZipArchiveHandle(); in TEST_F()
|
D | sysutil_test.cpp | 107 TemporaryFile package; in TEST() local 111 ASSERT_TRUE(android::base::WriteStringToFile(content, package.path)); in TEST() 118 std::string block_map_content = std::string(package.path) + "\n40960 4096\n1\n0 10\n"; in TEST() 126 block_map_content = std::string(package.path) + "\n40960 4096\n1\n0 10"; in TEST() 134 block_map_content = std::string(package.path) + "\n40960 4096\n1\n0 10\n\n\n"; in TEST() 142 block_map_content = std::string(package.path) + "\n40960 4096\n3\n0 3\n3 5\n5 10\n"; in TEST()
|
/bootable/recovery/updater_sample/tools/ |
D | gen_update_config.py | 50 package, argument 55 self.package = package 82 'name': self.ab_install_type[0] + ' ' + os.path.basename(self.package)[:-4], 90 with zipfile.ZipFile(self.package, 'r') as package_zip: 160 package=args.package,
|
D | test_gen_update_config.py | 34 config, package = self._generate_config() 37 with open(package, 'rb') as pkg_file:
|
/bootable/recovery/tests/component/ |
D | verifier_test.cpp | 53 auto package = in VerifyFile() local 55 ASSERT_NE(nullptr, package); in VerifyFile() 57 ASSERT_EQ(expected, verify_file(package.get(), keys)); in VerifyFile() 63 auto package = Package::CreateMemoryPackage(path, nullptr); in VerifyPackageWithCertificates() local 64 ASSERT_NE(nullptr, package); in VerifyPackageWithCertificates() 66 ASSERT_EQ(VERIFY_SUCCESS, verify_file(package.get(), certs)); in VerifyPackageWithCertificates() 282 std::string package; in TEST() local 283 ASSERT_TRUE(android::base::ReadFileToString(from_testdata_base("otasigned_v3.zip"), &package)); in TEST() 284 ASSERT_EQ(std::string("\xc0\x06\xff\xff\xd2\x06", 6), package.substr(package.size() - 6, 6)); in TEST() 287 package[package.size() - 5] = '\x05'; in TEST() [all …]
|
D | install_test.cpp | 123 auto package = Package::CreateMemoryPackage( in TEST() local 126 auto read_partition_list = GetWipePartitionList(package.get()); in TEST() 202 std::string package = "/path/to/update.zip"; in TEST() local 207 ASSERT_EQ(0, SetUpNonAbUpdateCommands(package, zip, 0, status_fd, &cmd)); in TEST() 212 ASSERT_EQ(package, cmd[3]); in TEST() 219 ASSERT_EQ(0, SetUpNonAbUpdateCommands(package, zip, 2, status_fd, &cmd)); in TEST() 224 ASSERT_EQ(package, cmd[3]); in TEST() 242 std::string package = "/path/to/update.zip"; in TEST() local 246 ASSERT_EQ(INSTALL_CORRUPT, SetUpNonAbUpdateCommands(package, zip, 0, status_fd, &cmd)); in TEST() 283 std::string package = "/path/to/update.zip"; in VerifyAbUpdateCommands() local [all …]
|
D | sideload_test.cpp | 79 std::string package = std::string(mount_point.path) + "/" + FUSE_SIDELOAD_HOST_FILENAME; in TEST() local 86 if (stat(package.c_str(), &sb) == 0) { in TEST() 98 ASSERT_TRUE(android::base::ReadFileToString(package, &content_via_fuse)); in TEST()
|
/bootable/recovery/install/include/private/ |
D | setup_commands.h | 30 int SetUpNonAbUpdateCommands(const std::string& package, ZipArchiveHandle zip, int retry_count, 38 int SetUpAbUpdateCommands(const std::string& package, ZipArchiveHandle zip, int status_fd,
|
/bootable/recovery/install/include/install/ |
D | install.h | 50 int install_package(const std::string& package, bool should_wipe_cache, bool needs_mount, 55 bool verify_package(Package* package, RecoveryUI* ui);
|
D | verifier.h | 83 int verify_file(VerifierInterface* package, const std::vector<Certificate>& keys);
|
/bootable/recovery/install/ |
D | install.cpp | 232 int SetUpAbUpdateCommands(const std::string& package, ZipArchiveHandle zip, int status_fd, in SetUpAbUpdateCommands() argument 264 "--payload=file://" + package, in SetUpAbUpdateCommands() 272 int SetUpNonAbUpdateCommands(const std::string& package, ZipArchiveHandle zip, int retry_count, in SetUpNonAbUpdateCommands() argument 309 package, in SetUpNonAbUpdateCommands() 328 static int try_update_binary(const std::string& package, ZipArchiveHandle zip, bool* wipe_cache, in try_update_binary() argument 390 is_ab ? SetUpAbUpdateCommands(package, zip, pipe_write.get(), &args) in try_update_binary() 391 : SetUpNonAbUpdateCommands(package, zip, retry_count, pipe_write.get(), &args); in try_update_binary() 493 LOG(ERROR) << "Error in " << package << " (status " << WEXITSTATUS(status) << ")"; in try_update_binary() 497 LOG(ERROR) << "Error in " << package << " (killed by signal " << WTERMSIG(status) << ")"; in try_update_binary() 595 auto package = Package::CreateMemoryPackage( in really_install_package() local [all …]
|
D | verifier.cpp | 113 int verify_file(VerifierInterface* package, const std::vector<Certificate>& keys) { in verify_file() argument 114 CHECK(package); in verify_file() 115 package->SetProgress(0.0); in verify_file() 126 uint64_t length = package->GetPackageSize(); in verify_file() 134 if (!package->ReadFullyAtOffset(footer, FOOTER_SIZE, length - FOOTER_SIZE)) { in verify_file() 176 if (!package->ReadFullyAtOffset(eocd, eocd_size, length - eocd_size)) { in verify_file() 231 package->UpdateHashAtOffset(hashers, so_far, read_size); in verify_file() 236 package->SetProgress(f); in verify_file()
|
D | Android.bp | 67 "package.cpp",
|
/bootable/recovery/updater_sample/ |
D | README.md | 32 SystemUpdaterSample app downloads OTA package from `url`. In this sample app 39 opposed to the entire package, to initiate a streaming update. The `payload.bin` 40 entry, which takes up the majority of the space in an OTA package, will be 41 streamed by `update_engine` directly. The ZIP entries in such a package need to be 107 Sometimes OTA package server might require some HTTP headers to be present, 179 `update_engine` service as well as OTA package files. Detailed steps are as follows: 189 <privapp-permissions package="com.example.android.systemupdatersample"> 213 - [x] Prepare streaming update (partially downloading package) 223 - [x] Verify system partition checksum for package
|
/bootable/recovery/update_verifier/ |
D | care_map.proto | 19 package recovery_update_verifier;
|
/bootable/recovery/uncrypt/ |
D | uncrypt.cpp | 518 std::string package; in uncrypt_wrapper() local 520 if (!FindUncryptPackage(UNCRYPT_PATH_FILE, &package)) { in uncrypt_wrapper() 526 input_path = package.c_str(); in uncrypt_wrapper()
|