Home
last modified time | relevance | path

Searched refs:target (Results 1 – 15 of 15) sorted by relevance

/bootable/recovery/tests/component/
Dapplypatch_modes_test.cpp65 target = GetEmmcTargetString(recovery_file, patched_file_.path); in SetUp()
66 ASSERT_FALSE(target.empty()); in SetUp()
72 std::string target; member in ApplyPatchModesTest
85 static void VerifyPatchedTarget(const std::string& target) { in VerifyPatchedTarget() argument
86 std::vector<std::string> pieces = android::base::Split(target, ":"); in VerifyPatchedTarget()
92 ASSERT_EQ(target, patched_emmc); in VerifyPatchedTarget()
111 target, in TEST_F()
116 VerifyPatchedTarget(target); in TEST_F()
124 "--target", target, "--source", in TEST_F()
129 VerifyPatchedTarget(target); in TEST_F()
[all …]
Dupdater_test.cpp234 Partition target(target_file, target_size, target_hash); in TEST_F() local
238 expect(nullptr, "patch_partition_check(\"" + target.ToString() + "\")", kArgsParsingFailure); in TEST_F()
242 "patch_partition_check(\"" + source.ToString() + "\", \"" + target.ToString() + "\")"; in TEST_F()
252 cmd = "patch_partition_check(\"" + bad_source.ToString() + "\", \"" + target.ToString() + "\")"; in TEST_F()
625 static void GetEntriesForBsdiff(std::string_view source, std::string_view target, in GetEntriesForBsdiff() argument
630 reinterpret_cast<const uint8_t*>(target.data()), target.size(), in GetEntriesForBsdiff()
637 std::string tgt_hash = GetSha1(target); in GetEntriesForBsdiff()
664 std::string target = in TEST_F() local
670 std::string_view(target).substr(0, 4096 * 2), 2, &entries); in TEST_F()
676 ASSERT_EQ(target, updated); in TEST_F()
[all …]
/bootable/recovery/applypatch/
Dapplypatch_modes.cpp40 auto target = Partition::Parse(target_emmc, &err); in CheckMode() local
41 if (!target) { in CheckMode()
45 return CheckPartition(target) ? 0 : 1; in CheckMode()
50 auto target = Partition::Parse(target_emmc, &err); in FlashMode() local
51 if (!target) { in FlashMode()
55 return FlashPartition(target, source_file) ? 0 : 1; in FlashMode()
61 auto target = Partition::Parse(target_emmc, &err); in PatchMode() local
62 if (!target) { in PatchMode()
90 return PatchPartition(target, source, patch, bonus.get()) ? 0 : 1; in PatchMode()
127 std::string target; in applypatch_modes() local
[all …]
Dapplypatch.cpp49 static bool GenerateTarget(const Partition& target, const FileContents& source_file,
256 bool PatchPartitionCheck(const Partition& target, const Partition& source) { in PatchPartitionCheck() argument
259 return (ReadPartitionToBuffer(target, &target_file, false) || in PatchPartitionCheck()
268 bool PatchPartition(const Partition& target, const Partition& source, const Value& patch, in PatchPartition() argument
270 LOG(INFO) << "Patching " << target.name; in PatchPartition()
274 if (ReadPartitionToBuffer(target, &target_file, false)) { in PatchPartition()
277 LOG(INFO) << " already " << target.hash.substr(0, 8); in PatchPartition()
283 return GenerateTarget(target, source_file, patch, bonus); in PatchPartition()
328 static bool GenerateTarget(const Partition& target, const FileContents& source_file, in GenerateTarget() argument
331 if (ParseSha1(target.hash, expected_sha1) != 0) { in GenerateTarget()
[all …]
DAndroid.bp60 target: {
199 target: {
/bootable/recovery/tests/unit/
Dcommands_test.cpp51 TargetInfo target; in TEST() local
55 tokens, "1d74d1a60332fd38cf9405f1bae67917888da6cb", &target, in TEST()
59 target); in TEST()
73 TargetInfo target; in TEST() local
77 tokens, "6ebcf8cf1f6be0bc49e7d4a864214251925d1d15", &target, in TEST()
81 target); in TEST()
99 TargetInfo target; in TEST() local
103 tokens, "4734d1b241eb3d0f993714aaf7d665fae43772b6", &target, in TEST()
107 target); in TEST()
127 TargetInfo target; in TEST() local
[all …]
/bootable/recovery/applypatch/include/applypatch/
Dapplypatch.h78 bool PatchPartition(const Partition& target, const Partition& source, const Value& patch,
83 bool PatchPartitionCheck(const Partition& target, const Partition& source);
87 bool CheckPartition(const Partition& target);
93 bool FlashPartition(const Partition& target, const std::string& source_filename);
/bootable/recovery/minadbd/
Dminadbd_services.cpp189 static void RebootHostService(unique_fd /* sfd */, const std::string& target) { in RebootHostService() argument
191 if (target == "bootloader") { in RebootHostService()
193 } else if (target == "rescue") { in RebootHostService()
195 } else if (target == "recovery") { in RebootHostService()
197 } else if (target == "fastboot") { in RebootHostService()
/bootable/recovery/updater/
Dcommands.cpp78 const std::string& tgt_hash, TargetInfo* target, in ParseTargetInfoAndSourceInfo() argument
104 *target = TargetInfo(tgt_hash, tgt_ranges); in ParseTargetInfoAndSourceInfo()
312 bool SourceInfo::Overlaps(const TargetInfo& target) const { in Overlaps()
313 return ranges_.Overlaps(target.ranges()); in Overlaps()
381 std::ostream& operator<<(std::ostream& os, const TargetInfo& target) { in operator <<() argument
382 os << target.blocks() << " blocks (" << target.hash_ << "): " << target.ranges_.ToString(); in operator <<()
Dinstall.cpp220 auto target = Partition::Parse(args[0], &err); in PatchPartitionCheckFn() local
221 if (!target) { in PatchPartitionCheckFn()
232 bool result = PatchPartitionCheck(target, source); in PatchPartitionCheckFn()
256 auto target = Partition::Parse(args[0], &err); in PatchPartitionFn() local
257 if (!target) { in PatchPartitionFn()
273 bool result = PatchPartition(target, source, *values[0], nullptr); in PatchPartitionFn()
/bootable/recovery/updater/include/private/
Dcommands.h128 bool Overlaps(const TargetInfo& target) const;
305 Command(Type type, size_t index, std::string cmdline, PatchInfo patch, TargetInfo target, in Command() argument
311 target_(std::move(target)), in Command()
341 const TargetInfo& target() const { in target() function
380 const std::string& tgt_hash, TargetInfo* target,
/bootable/recovery/tests/
DAndroid.bp38 target: {
202 target: {
/bootable/recovery/updater_sample/tests/
DAndroid.bp28 "mockito-target-minus-junit4",
/bootable/recovery/otautil/
DAndroid.bp39 target: {
/bootable/recovery/updater_sample/
DREADME.md183 lunch target.