/build/make/tools/releasetools/ |
D | ota_package_parser.py | 36 logging.info("already stashed {}: {}".format(SHA1, blocks)) 44 assert self.stash_map.has_key(SHA1), "stash {} not found".format(SHA1) 69 return "{} bytes".format(size) 72 return "{:.1f}{}".format(size / base, units) 78 logging.info("\nSimulating commands in '{}':".format(name)) 81 "4 lines, it has {}".format(name, len(lines)) 83 logging.info("(version: {})".format(lines[0])) 92 assert len(cmd_list) == 2, "command format error: {}".format(line) 98 assert len(cmd_list) >= 5, "command format error: {}".format(line) 110 assert len(cmd_list) >= 8, "command format error: {}".format(line) [all …]
|
D | build_super_image.py | 65 "{}:readonly:{}:{}".format(partition, image_size, group)] 67 cmd += ["--image", "{}={}".format(partition, image)] 98 size = info_dict["super_{}_device_size".format(device)] 99 cmd += ["--device", "{}:{}".format(device, size)] 104 group_size = info_dict["super_{}_group_size".format(group)] 106 cmd += ["--group", "{}_a:{}".format(group, group_size), 107 "--group", "{}_b:{}".format(group, group_size)] 109 cmd += ["--group", "{}:{}".format(group, group_size)] 112 info_dict["super_{}_partition_list".format(group)].strip()) 115 image = info_dict.get("{}_image".format(partition)) [all …]
|
D | check_partition_sizes.py | 60 msg = "{} is greater than {}:\n{} == {} > {} == {}".format(*format_args) 73 msg = "{} is greater than or equal to {}:\n{} == {} >= {} == {}".format( 86 raise RuntimeError("{} does not equal {}:\n{} == {} != {} == {}".format( 152 size_list = [int(info_dict.get("super_{}_device_size".format(b), "0")) 165 sum_size = Expression("sum of sizes of {}".format(partition_names), 218 "BOARD_SUPER_PARTITION_SIZE{}".format(size_limit_suffix), 221 "BOARD_SUPER_PARTITION_WARN_LIMIT{}".format(size_limit_suffix), 224 "BOARD_SUPER_PARTITION_ERROR_LIMIT{}".format(size_limit_suffix), 240 if "super_{}_group_size".format(group) in info_dict and \ 241 "super_{}_partition_list".format(group) in info_dict: [all …]
|
D | validate_target_files.py | 65 'SHA-1 mismatches for {}. actual {}, expected {}'.format( 187 assert len(lines) == 10, "Invalid line count: {}".format(lines) 192 "Failed to parse target line \"{}\"".format(lines[4]) 197 "Mismatching targets: {} vs {}".format(check_partition, flash_partition) 204 assert len(lines) == 11, "Invalid line count: {}".format(lines) 209 "Failed to parse source line \"{}\"".format(lines[4]) 214 "Invalid source partition: {}".format(source_partition) 222 "Failed to parse target line \"{}\"".format(lines[5]) 227 "Mismatching targets: {} vs {}".format( 232 "Invalid target partition: {}".format(target_partition) [all …]
|
D | edify_generator.py | 90 '{get_prop_command} + "\\".");').format( 126 '+ getprop("ro.build.thumbprint") + ".");').format(fp=fp, tp=tp) 176 source = '{}:{}:{}:{}'.format(tokens[0], tokens[1], tokens[2], tokens[3]) 177 target = '{}:{}:{}:{}'.format(tokens[0], tokens[1], tokens[4], tokens[5]) 207 'unexpected contents."));').format( 306 "Found mismatching values for source SHA-1: {} vs {}".format( 309 "Found mismatching values for target size: {} vs {}".format( 312 "Found mismatching values for target SHA-1: {} vs {}".format( 315 source = '{}:{}:{}:{}'.format(tokens[0], tokens[1], tokens[2], tokens[3]) 316 target = '{}:{}:{}:{}'.format(tokens[0], tokens[1], tokens[4], tokens[5]) [all …]
|
D | apex_utils.py | 79 "Path {} does not exist. ".format(self.debugfs_path) + 96 .format(entry, self.apex_path)) 115 "Path {} does not exist. ".format(self.debugfs_path) + 154 assert os.path.exists(filename), 'file {} not found'.format(filename) 178 ['--signing_args', '"{}"'.format(signing_args)]) 205 '--prop', 'apex.key:{}'.format(payload_key_name), 218 'Failed to sign APEX payload {} with {}:\n{}'.format( 236 'Failed to validate payload signing for {} with {}:\n{}'.format( 255 raise ApexInfoError('Failed to find image: {}'.format(payload_path)) 262 'Failed to get APEX payload info for {}:\n{}'.format( [all …]
|
D | ota_from_target_files.py | 354 cmd = ["delta_generator", "--out_maximum_signature_size_file={}".format( 355 out_signature_size_file), "--private_key={}".format(signing_key)] 560 return ['payload_metadata.bin:{}:{}'.format(offset, size)] 615 assert magic == 0x43724155, "Invalid magic: {:x}".format(magic) 661 output_list.append('{}={}'.format(key, ' '.join(partitions))) 718 if image_name not in ['{}.img'.format(partition) for partition in 797 image_path = '{}/{}.img'.format(prefix, partition_name) 800 map_path = '{}/{}.map'.format(prefix, partition_name) 805 raise ValueError("Cannot find {} in input zipfile".format(partition_name)) 827 cmd.extend(['{}:{}'.format(name, name) for name in copy_entries]) [all …]
|
D | common.py | 65 'executable -- build and run `{}` directly.'.format( 311 "Failed to run command '{}' (exit code {}):\n{}".format( 413 "3.2.2. Build Parameters.".format(fingerprint)) 477 prop_file = '{}.build.prop'.format( 493 prop = prop.replace("ro.product", "ro.product.{}".format(prop_partition)) 495 prop = prop.replace("ro.", "ro.{}.".format(prop_partition)) 534 "Invalid ro.product.property_source_order '{}'".format(source_order)) 538 "ro.product", "ro.product.{}".format(source_partition), 1) 543 raise ExternalError("couldn't resolve {}".format(prop)) 625 return "{}/{}/{}:{}/{}/{}:{}/{}".format( [all …]
|
D | img_from_target_files.py | 139 entries.append('{}:{}'.format(image_path, image)) 155 image = 'OTA/super_{}.img'.format(device) 156 assert image in namelist, 'Failed to find {}'.format(image) 157 entries.append('{}:{}'.format(image, os.path.basename(image)))
|
D | img_from_target_files | 139 entries.append('{}:{}'.format(image_path, image)) 155 image = 'OTA/super_{}.img'.format(device) 156 assert image in namelist, 'Failed to find {}'.format(image) 157 entries.append('{}:{}'.format(image, os.path.basename(image)))
|
D | sign_target_files_apks | 223 raise RuntimeError("Missing {} in AVB_FOOTER_ARGS".format(partition)) 303 "non-PRESIGNED payload key {}").format(apex, payload_override) 306 "Setting {} payload as PRESIGNED due to PRESIGNED container".format( 338 "Invalid compressed_extension arg: '{}'".format(compressed_extension) 343 "Invalid skipped_prefixes input type: {}".format(type(skipped_prefixes)) 398 "not sign this apk).".format("\n ".join(unknown_files))) 420 "{}: payload_key {}, container_key {}".format( 424 "Invalid APEX keys specified:\n {}\n".format( 784 "Found duplicate entries after cert replacement: {}".format(data) 965 assert p.returncode == 0, "Failed to dump certificate: {}".format(stderr) [all …]
|
D | check_target_files_vintf.py | 103 return ['--kernel', '{}:{}'.format(version_path, config_path)] 136 common_command += ['--dirmap', '{}:{}'.format(device_path, real_path)] 153 .format(' '.join(command), proc.returncode, out, err)) 218 raise ValueError('{} is not a valid directory or zip file'.format(inp))
|
D | verity_utils.py | 282 "Invalid partition size: {}".format(partition_size) 363 "{}".format(sparse_image_size, self.image_size)) 469 "Invalid partition size: {}".format(partition_size) 481 "Failed to calculate max image size:\n{}".format(output)) 485 "Invalid max image size: {}".format(output)) 514 raise BuildVerityImageError("Failed to add AVB footer: {}".format(output)) 536 info_dict.get("{}_verity_block_device".format(partition_name))): 537 partition_size = info_dict["{}_size".format(partition_name)] 606 " total_blocks: {}".format(self.partition_size, image.total_blocks) 650 assert len(table_entries) == 10, "Unexpected verity table size {}".format( [all …]
|
D | non_ab_ota.py | 37 "can't generate incremental that adds {}".format(name)) 107 "{} is not returning a list of BlockDifference objects".format( 212 script.Print("Target: {}".format(target_info.fingerprint)) 400 script.Print("Source: {}".format(source_info.fingerprint)) 401 script.Print("Target: {}".format(target_info.fingerprint)) 429 target_expr = 'concat("{}:",{},":{}:{}")'.format( 431 source_expr = 'concat("{}:",{},":{}:{}")'.format( 501 target_expr = 'concat("{}:",{},":{}:{}")'.format( 503 source_expr = 'concat("{}:",{},":{}:{}")'.format(
|
/build/soong/ui/terminal/ |
D | format.go | 26 format string member 35 func newFormatter(format string, quiet bool) formatter { 37 format: format, 55 if s.format == "" { 60 for i := 0; i < len(s.format); i++ { 61 c := s.format[i] 68 if i == len(s.format) { 73 c = s.format[i]
|
/build/soong/ui/logger/ |
D | logger.go | 49 Printf(format string, v ...interface{}) 56 Verbosef(format string, v ...interface{}) 63 Fatalf(format string, v ...interface{}) 68 Panicf(format string, v ...interface{}) 244 func (s *stdLogger) Printf(format string, v ...interface{}) { 245 output := fmt.Sprintf(format, v...) 265 func (s *stdLogger) Verbosef(format string, v ...interface{}) { 266 output := fmt.Sprintf(format, v...) 287 func (s *stdLogger) Fatalf(format string, v ...interface{}) { 288 output := fmt.Sprintf(format, v...) [all …]
|
/build/soong/scripts/ |
D | reverse-deps.sh | 218 diff "${oldDeps}" "${allDeps}" --old-line-format='' \ 219 --new-line-format='%L' --unchanged-line-format='' > "${newDeps}"
|
D | OWNERS | 1 per-file system-clang-format,system-clang-format-2 = enh@google.com,smoreland@google.com
|
/build/make/tools/ |
D | soong_to_convert.py | 98 extra = " ({})".format(problems[module]) 110 print("{} Module (potential problems)".format(count_header)) 112 print("{:>{}} {}".format(count, count_width, module))
|
D | extract_kernel.py | 182 "Cannot extract kernel {}".format(desc)) 248 "configs in {}".format(args.input.name)): 251 "version in {}".format(args.input.name)): 254 "kernel release in {}".format(args.input.name)): 258 "kernel compiler in {}".format(args.input.name)):
|
D | generate-self-extracting-archive.py | 150 header_for_size = _HEADER_TEMPLATE.format( 159 output.write(_HEADER_TEMPLATE.format(
|
/build/make/target/product/security/ |
D | README | 23 1. convert pk8 format key to pem format 26 2. create a signature using the pem format key 32 dumpkey.jar is a Java tool that takes an x.509 certificate in PEM format as
|
/build/blueprint/ |
D | singleton_ctx.go | 61 ModuleErrorf(module Module, format string, args ...interface{}) 64 Errorf(format string, args ...interface{}) 220 func (s *singletonContext) ModuleErrorf(logicModule Module, format string, 223 s.error(s.context.ModuleErrorf(logicModule, format, args...)) 226 func (s *singletonContext) Errorf(format string, args ...interface{}) { 228 s.error(fmt.Errorf(format, args...))
|
/build/make/tools/rbcrun/cmd/ |
D | rbcrun.go | 95 func quit(format string, s ...interface{}) { 96 fmt.Fprintln(os.Stderr, format, s)
|
/build/soong/linkerconfig/proto/ |
D | linker_config.proto | 17 // This format file defines configuration file for linkerconfig. Details on this 18 // format can be found from
|