/bootable/recovery/tests/unit/ |
D | package_test.cpp | 65 for (const auto& package : packages_) { in TEST_F() local 67 ASSERT_TRUE(package->ReadFullyAtOffset(buffer.data(), file_content_.size(), 0)); in TEST_F() 70 ASSERT_TRUE(package->ReadFullyAtOffset(buffer.data(), file_content_.size() - 10, 10)); in TEST_F() 76 for (const auto& package : packages_) { in TEST_F() local 79 ASSERT_FALSE(package->ReadFullyAtOffset(buffer.data(), file_content_.size(), 10)); in TEST_F() 89 for (const auto& package : packages_) { in TEST_F() local 94 package->UpdateHashAtOffset(hashers, 0, hash_size); in TEST_F() 103 for (const auto& package : packages_) { in TEST_F() local 104 ZipArchiveHandle zip = package->GetZipArchiveHandle(); in TEST_F()
|
D | verifier_test.cpp | 53 auto package = in VerifyFile() local 55 ASSERT_NE(nullptr, package); in VerifyFile() 57 ASSERT_EQ(expected, verify_file(package.get(), keys)); in VerifyFile() 63 auto package = Package::CreateMemoryPackage(path, nullptr); in VerifyPackageWithCertificates() local 64 ASSERT_NE(nullptr, package); in VerifyPackageWithCertificates() 66 ASSERT_EQ(VERIFY_SUCCESS, verify_file(package.get(), certs)); in VerifyPackageWithCertificates() 282 std::string package; in TEST() local 283 ASSERT_TRUE(android::base::ReadFileToString(from_testdata_base("otasigned_v3.zip"), &package)); in TEST() 284 ASSERT_EQ(std::string("\xc0\x06\xff\xff\xd2\x06", 6), package.substr(package.size() - 6, 6)); in TEST() 287 package[package.size() - 5] = '\x05'; in TEST() [all …]
|
D | install_test.cpp | 101 auto package = Package::CreateMemoryPackage( in TEST() local 104 auto read_partition_list = GetWipePartitionList(package.get()); in TEST() 122 std::string package = "/path/to/update.zip"; in TEST() local 127 ASSERT_TRUE(SetUpNonAbUpdateCommands(package, zip, 0, status_fd, &cmd)); in TEST() 132 ASSERT_EQ(package, cmd[3]); in TEST() 139 ASSERT_TRUE(SetUpNonAbUpdateCommands(package, zip, 2, status_fd, &cmd)); in TEST() 144 ASSERT_EQ(package, cmd[3]); in TEST() 162 std::string package = "/path/to/update.zip"; in TEST() local 166 ASSERT_FALSE(SetUpNonAbUpdateCommands(package, zip, 0, status_fd, &cmd)); in TEST() 202 std::string package = "/path/to/update.zip"; in VerifyAbUpdateCommands() local [all …]
|
D | sysutil_test.cpp | 107 TemporaryFile package; in TEST() local 111 ASSERT_TRUE(android::base::WriteStringToFile(content, package.path)); in TEST() 118 std::string block_map_content = std::string(package.path) + "\n40960 4096\n1\n0 10\n"; in TEST() 126 block_map_content = std::string(package.path) + "\n40960 4096\n1\n0 10"; in TEST() 134 block_map_content = std::string(package.path) + "\n40960 4096\n1\n0 10\n\n\n"; in TEST() 142 block_map_content = std::string(package.path) + "\n40960 4096\n3\n0 3\n3 5\n5 10\n"; in TEST()
|
D | fuse_sideload_test.cpp | 83 std::string package = std::string(mount_point.path) + "/" + FUSE_SIDELOAD_HOST_FILENAME; in TEST() local 90 if (stat(package.c_str(), &sb) == 0) { in TEST() 102 ASSERT_TRUE(android::base::ReadFileToString(package, &content_via_fuse)); in TEST()
|
/bootable/recovery/updater_sample/tools/ |
D | gen_update_config.py | 50 package, argument 55 self.package = package 82 'name': self.ab_install_type[0] + ' ' + os.path.basename(self.package)[:-4], 90 with zipfile.ZipFile(self.package, 'r') as package_zip: 160 package=args.package,
|
D | test_gen_update_config.py | 34 config, package = self._generate_config() 37 with open(package, 'rb') as pkg_file:
|
/bootable/recovery/install/include/private/ |
D | setup_commands.h | 30 bool SetUpNonAbUpdateCommands(const std::string& package, ZipArchiveHandle zip, int retry_count, 38 bool SetUpAbUpdateCommands(const std::string& package, ZipArchiveHandle zip, int status_fd,
|
/bootable/recovery/tests/fuzz/ |
D | verify_package_fuzzer.cpp | 33 auto package = CreatePackage(package_contents); in LLVMFuzzerTestOneInput() local 35 verify_package(package.get(), &ui); in LLVMFuzzerTestOneInput()
|
/bootable/recovery/install/include/install/ |
D | install.h | 51 InstallResult InstallPackage(Package* package, const std::string_view package_id, 56 bool verify_package(Package* package, RecoveryUI* ui);
|
D | verifier.h | 83 int verify_file(VerifierInterface* package, const std::vector<Certificate>& keys);
|
/bootable/recovery/install/ |
D | install.cpp | 238 bool SetUpAbUpdateCommands(const std::string& package, ZipArchiveHandle zip, int status_fd, in SetUpAbUpdateCommands() argument 274 "--payload=file://" + package, in SetUpAbUpdateCommands() 282 bool SetUpNonAbUpdateCommands(const std::string& package, ZipArchiveHandle zip, int retry_count, in SetUpNonAbUpdateCommands() argument 317 package, in SetUpNonAbUpdateCommands() 336 static InstallResult TryUpdateBinary(Package* package, bool* wipe_cache, in TryUpdateBinary() argument 340 auto zip = package->GetZipArchiveHandle(); in TryUpdateBinary() 359 CHECK(package->GetType() == PackageType::kFile); in TryUpdateBinary() 416 std::string package_path = package->GetPath(); in TryUpdateBinary() 537 static InstallResult VerifyAndInstallPackage(Package* package, bool* wipe_cache, in VerifyAndInstallPackage() argument 546 if (!verify_package(package, ui)) { in VerifyAndInstallPackage() [all …]
|
D | verifier.cpp | 113 int verify_file(VerifierInterface* package, const std::vector<Certificate>& keys) { in verify_file() argument 114 CHECK(package); in verify_file() 115 package->SetProgress(0.0); in verify_file() 126 uint64_t length = package->GetPackageSize(); in verify_file() 134 if (!package->ReadFullyAtOffset(footer, FOOTER_SIZE, length - FOOTER_SIZE)) { in verify_file() 176 if (!package->ReadFullyAtOffset(eocd, eocd_size, length - eocd_size)) { in verify_file() 231 package->UpdateHashAtOffset(hashers, so_far, read_size); in verify_file() 236 package->SetProgress(f); in verify_file()
|
D | Android.bp | 15 package { 111 "package.cpp",
|
D | fuse_install.cpp | 183 auto package = in InstallWithFuseFromPath() local 187 InstallPackage(package.get(), FUSE_SIDELOAD_HOST_PATHNAME, false, 0 /* retry_count */, ui); in InstallWithFuseFromPath()
|
/bootable/recovery/updater_sample/ |
D | README.md | 32 SystemUpdaterSample app downloads OTA package from `url`. In this sample app 39 opposed to the entire package, to initiate a streaming update. The `payload.bin` 40 entry, which takes up the majority of the space in an OTA package, will be 41 streamed by `update_engine` directly. The ZIP entries in such a package need to be 107 Sometimes OTA package server might require some HTTP headers to be present, 179 `update_engine` service as well as OTA package files. Detailed steps are as follows: 189 <privapp-permissions package="com.example.android.systemupdatersample"> 215 - [x] Prepare streaming update (partially downloading package) 225 - [x] Verify system partition checksum for package
|
D | Android.bp | 15 package {
|
/bootable/libbootloader/vts/ |
D | Android.bp | 16 package {
|
/bootable/recovery/update_verifier/ |
D | care_map.proto | 19 package recovery_update_verifier;
|
/bootable/recovery/tools/recovery_l10n/ |
D | Android.bp | 15 package {
|
/bootable/recovery/tools/image_generator/ |
D | Android.bp | 15 package {
|
/bootable/recovery/uncrypt/ |
D | Android.bp | 15 package {
|
/bootable/recovery/minui/ |
D | Android.bp | 15 package {
|
/bootable/recovery/fuse_sideload/ |
D | Android.bp | 15 package {
|
/bootable/recovery/updater_sample/tests/ |
D | Android.bp | 15 package {
|