Home
last modified time | relevance | path

Searched refs:package (Results 1 – 25 of 40) sorted by relevance

12

/bootable/recovery/tests/unit/
Dpackage_test.cpp65 for (const auto& package : packages_) { in TEST_F() local
67 ASSERT_TRUE(package->ReadFullyAtOffset(buffer.data(), file_content_.size(), 0)); in TEST_F()
70 ASSERT_TRUE(package->ReadFullyAtOffset(buffer.data(), file_content_.size() - 10, 10)); in TEST_F()
76 for (const auto& package : packages_) { in TEST_F() local
79 ASSERT_FALSE(package->ReadFullyAtOffset(buffer.data(), file_content_.size(), 10)); in TEST_F()
89 for (const auto& package : packages_) { in TEST_F() local
94 package->UpdateHashAtOffset(hashers, 0, hash_size); in TEST_F()
103 for (const auto& package : packages_) { in TEST_F() local
104 ZipArchiveHandle zip = package->GetZipArchiveHandle(); in TEST_F()
Dverifier_test.cpp53 auto package = in VerifyFile() local
55 ASSERT_NE(nullptr, package); in VerifyFile()
57 ASSERT_EQ(expected, verify_file(package.get(), keys)); in VerifyFile()
63 auto package = Package::CreateMemoryPackage(path, nullptr); in VerifyPackageWithCertificates() local
64 ASSERT_NE(nullptr, package); in VerifyPackageWithCertificates()
66 ASSERT_EQ(VERIFY_SUCCESS, verify_file(package.get(), certs)); in VerifyPackageWithCertificates()
282 std::string package; in TEST() local
283 ASSERT_TRUE(android::base::ReadFileToString(from_testdata_base("otasigned_v3.zip"), &package)); in TEST()
284 ASSERT_EQ(std::string("\xc0\x06\xff\xff\xd2\x06", 6), package.substr(package.size() - 6, 6)); in TEST()
287 package[package.size() - 5] = '\x05'; in TEST()
[all …]
Dinstall_test.cpp101 auto package = Package::CreateMemoryPackage( in TEST() local
104 auto read_partition_list = GetWipePartitionList(package.get()); in TEST()
122 std::string package = "/path/to/update.zip"; in TEST() local
127 ASSERT_TRUE(SetUpNonAbUpdateCommands(package, zip, 0, status_fd, &cmd)); in TEST()
132 ASSERT_EQ(package, cmd[3]); in TEST()
139 ASSERT_TRUE(SetUpNonAbUpdateCommands(package, zip, 2, status_fd, &cmd)); in TEST()
144 ASSERT_EQ(package, cmd[3]); in TEST()
162 std::string package = "/path/to/update.zip"; in TEST() local
166 ASSERT_FALSE(SetUpNonAbUpdateCommands(package, zip, 0, status_fd, &cmd)); in TEST()
202 std::string package = "/path/to/update.zip"; in VerifyAbUpdateCommands() local
[all …]
Dsysutil_test.cpp107 TemporaryFile package; in TEST() local
111 ASSERT_TRUE(android::base::WriteStringToFile(content, package.path)); in TEST()
118 std::string block_map_content = std::string(package.path) + "\n40960 4096\n1\n0 10\n"; in TEST()
126 block_map_content = std::string(package.path) + "\n40960 4096\n1\n0 10"; in TEST()
134 block_map_content = std::string(package.path) + "\n40960 4096\n1\n0 10\n\n\n"; in TEST()
142 block_map_content = std::string(package.path) + "\n40960 4096\n3\n0 3\n3 5\n5 10\n"; in TEST()
Dfuse_sideload_test.cpp83 std::string package = std::string(mount_point.path) + "/" + FUSE_SIDELOAD_HOST_FILENAME; in TEST() local
90 if (stat(package.c_str(), &sb) == 0) { in TEST()
102 ASSERT_TRUE(android::base::ReadFileToString(package, &content_via_fuse)); in TEST()
/bootable/recovery/updater_sample/tools/
Dgen_update_config.py50 package, argument
55 self.package = package
82 'name': self.ab_install_type[0] + ' ' + os.path.basename(self.package)[:-4],
90 with zipfile.ZipFile(self.package, 'r') as package_zip:
160 package=args.package,
Dtest_gen_update_config.py34 config, package = self._generate_config()
37 with open(package, 'rb') as pkg_file:
/bootable/recovery/install/include/private/
Dsetup_commands.h30 bool SetUpNonAbUpdateCommands(const std::string& package, ZipArchiveHandle zip, int retry_count,
38 bool SetUpAbUpdateCommands(const std::string& package, ZipArchiveHandle zip, int status_fd,
/bootable/recovery/tests/fuzz/
Dverify_package_fuzzer.cpp33 auto package = CreatePackage(package_contents); in LLVMFuzzerTestOneInput() local
35 verify_package(package.get(), &ui); in LLVMFuzzerTestOneInput()
/bootable/recovery/install/include/install/
Dinstall.h51 InstallResult InstallPackage(Package* package, const std::string_view package_id,
56 bool verify_package(Package* package, RecoveryUI* ui);
Dverifier.h83 int verify_file(VerifierInterface* package, const std::vector<Certificate>& keys);
/bootable/recovery/install/
Dinstall.cpp238 bool SetUpAbUpdateCommands(const std::string& package, ZipArchiveHandle zip, int status_fd, in SetUpAbUpdateCommands() argument
274 "--payload=file://" + package, in SetUpAbUpdateCommands()
282 bool SetUpNonAbUpdateCommands(const std::string& package, ZipArchiveHandle zip, int retry_count, in SetUpNonAbUpdateCommands() argument
317 package, in SetUpNonAbUpdateCommands()
336 static InstallResult TryUpdateBinary(Package* package, bool* wipe_cache, in TryUpdateBinary() argument
340 auto zip = package->GetZipArchiveHandle(); in TryUpdateBinary()
359 CHECK(package->GetType() == PackageType::kFile); in TryUpdateBinary()
416 std::string package_path = package->GetPath(); in TryUpdateBinary()
537 static InstallResult VerifyAndInstallPackage(Package* package, bool* wipe_cache, in VerifyAndInstallPackage() argument
546 if (!verify_package(package, ui)) { in VerifyAndInstallPackage()
[all …]
Dverifier.cpp113 int verify_file(VerifierInterface* package, const std::vector<Certificate>& keys) { in verify_file() argument
114 CHECK(package); in verify_file()
115 package->SetProgress(0.0); in verify_file()
126 uint64_t length = package->GetPackageSize(); in verify_file()
134 if (!package->ReadFullyAtOffset(footer, FOOTER_SIZE, length - FOOTER_SIZE)) { in verify_file()
176 if (!package->ReadFullyAtOffset(eocd, eocd_size, length - eocd_size)) { in verify_file()
231 package->UpdateHashAtOffset(hashers, so_far, read_size); in verify_file()
236 package->SetProgress(f); in verify_file()
DAndroid.bp15 package {
111 "package.cpp",
Dfuse_install.cpp183 auto package = in InstallWithFuseFromPath() local
187 InstallPackage(package.get(), FUSE_SIDELOAD_HOST_PATHNAME, false, 0 /* retry_count */, ui); in InstallWithFuseFromPath()
/bootable/recovery/updater_sample/
DREADME.md32 SystemUpdaterSample app downloads OTA package from `url`. In this sample app
39 opposed to the entire package, to initiate a streaming update. The `payload.bin`
40 entry, which takes up the majority of the space in an OTA package, will be
41 streamed by `update_engine` directly. The ZIP entries in such a package need to be
107 Sometimes OTA package server might require some HTTP headers to be present,
179 `update_engine` service as well as OTA package files. Detailed steps are as follows:
189 <privapp-permissions package="com.example.android.systemupdatersample">
215 - [x] Prepare streaming update (partially downloading package)
225 - [x] Verify system partition checksum for package
DAndroid.bp15 package {
/bootable/libbootloader/vts/
DAndroid.bp16 package {
/bootable/recovery/update_verifier/
Dcare_map.proto19 package recovery_update_verifier;
/bootable/recovery/tools/recovery_l10n/
DAndroid.bp15 package {
/bootable/recovery/tools/image_generator/
DAndroid.bp15 package {
/bootable/recovery/uncrypt/
DAndroid.bp15 package {
/bootable/recovery/minui/
DAndroid.bp15 package {
/bootable/recovery/fuse_sideload/
DAndroid.bp15 package {
/bootable/recovery/updater_sample/tests/
DAndroid.bp15 package {

12