/build/make/tools/ |
D | buildinfo_common.sh | 3 partition="$1" 13 echo "ro.${partition}.build.date=`$DATE`" 14 echo "ro.${partition}.build.date.utc=`$DATE +%s`" 15 echo "ro.${partition}.build.fingerprint=$BUILD_FINGERPRINT" 16 echo "ro.${partition}.build.id=$BUILD_ID" 17 echo "ro.${partition}.build.tags=$BUILD_VERSION_TAGS" 18 echo "ro.${partition}.build.type=$TARGET_BUILD_TYPE" 19 echo "ro.${partition}.build.version.incremental=$BUILD_NUMBER" 20 echo "ro.${partition}.build.version.release=$PLATFORM_VERSION_LAST_STABLE" 21 echo "ro.${partition}.build.version.release_or_codename=$PLATFORM_VERSION" [all …]
|
D | generate-enforce-rro-android-manifest.py | 57 partition = args.partition 69 f.write(ANDROID_MANIFEST_TEMPLATE % (package_name, partition, package_name, priority))
|
/build/make/core/ |
D | build_rro_package.mk | 18 partition := 20 partition := $(TARGET_OUT_ODM) 22 partition := $(TARGET_OUT_VENDOR) 24 partition := $(TARGET_OUT_SYSTEM_EXT) 26 partition := $(TARGET_OUT_PRODUCT) 30 LOCAL_MODULE_PATH := $(partition)/overlay 32 LOCAL_MODULE_PATH := $(partition)/overlay/$(LOCAL_RRO_THEME) 41 partition :=
|
/build/make/tools/releasetools/testdata/ |
D | apkcerts_vendor.txt | 1 name="TestSystem1.apk" certificate="not_selected" private_key="not_selected" partition="system" 2 name="TestSystem2.apk" certificate="not_selected" private_key="not_selected" partition="system" 3 …y/testkey.x509.pem" private_key="build/make/target/product/security/testkey.pk8" partition="vendor" 4 …rity/testkey.x509.pem" private_key="build/make/target/product/security/testkey.pk8" partition="odm" 5 name="TestProduct.apk" certificate="not_selected" private_key="not_selected" partition="product" 6 name="TestSystemExt.apk" certificate="not_selected" private_key="not_selected" partition="system_ex…
|
D | apexkeys_vendor.txt | 1 …ected" container_certificate="not_selected" container_private_key="not_selected" partition="system" 2 …cted" container_certificate="not_selected" container_private_key="not_selected" partition="product" 3 …ected" container_certificate="not_selected" container_private_key="not_selected" partition="system" 4 … container_private_key="packages/modules/vndk/apex/com.android.vndk.current.pk8" partition="vendor" 5 …d" container_certificate="not_selected" container_private_key="not_selected" partition="system_ext" 6 …d" container_certificate="not_selected" container_private_key="not_selected" partition="system_ext" 7 …d" container_certificate="not_selected" container_private_key="not_selected" partition="system_ext"
|
D | apkcerts_framework.txt | 1 …y/testkey.x509.pem" private_key="build/make/target/product/security/testkey.pk8" partition="system" 2 …y/testkey.x509.pem" private_key="build/make/target/product/security/testkey.pk8" partition="system" 3 name="TestVendor.apk" certificate="not_selected" private_key="not_selected" partition="vendor" 4 name="TestOdm.apk" certificate="not_selected" private_key="not_selected" partition="odm" 5 …/testkey.x509.pem" private_key="build/make/target/product/security/testkey.pk8" partition="product" 6 …stkey.x509.pem" private_key="build/make/target/product/security/testkey.pk8" partition="system_ext"
|
D | apkcerts_merge.txt | 1 …rity/testkey.x509.pem" private_key="build/make/target/product/security/testkey.pk8" partition="odm" 2 …/testkey.x509.pem" private_key="build/make/target/product/security/testkey.pk8" partition="product" 3 …y/testkey.x509.pem" private_key="build/make/target/product/security/testkey.pk8" partition="system" 4 …y/testkey.x509.pem" private_key="build/make/target/product/security/testkey.pk8" partition="system" 5 …stkey.x509.pem" private_key="build/make/target/product/security/testkey.pk8" partition="system_ext" 6 …y/testkey.x509.pem" private_key="build/make/target/product/security/testkey.pk8" partition="vendor"
|
D | apexkeys_framework.txt | 1 …9.pem" container_private_key="external/conscrypt/apex/com.android.conscrypt.pk8" partition="system" 2 …ey="selected" container_certificate="selected" container_private_key="selected" partition="product" 3 …id.runtime.x509.pem" container_private_key="bionic/apex/com.android.runtime.pk8" partition="system" 4 …ected" container_certificate="not_selected" container_private_key="not_selected" partition="vendor" 5 … container_private_key="packages/modules/vndk/apex/com.android.vndk.v27.pk8" partition="system_ext" 6 … container_private_key="packages/modules/vndk/apex/com.android.vndk.v28.pk8" partition="system_ext" 7 … container_private_key="packages/modules/vndk/apex/com.android.vndk.v29.pk8" partition="system_ext"
|
D | apexkeys_merge.txt | 1 …9.pem" container_private_key="external/conscrypt/apex/com.android.conscrypt.pk8" partition="system" 2 …ey="selected" container_certificate="selected" container_private_key="selected" partition="product" 3 …id.runtime.x509.pem" container_private_key="bionic/apex/com.android.runtime.pk8" partition="system" 4 … container_private_key="packages/modules/vndk/apex/com.android.vndk.current.pk8" partition="vendor" 5 … container_private_key="packages/modules/vndk/apex/com.android.vndk.v27.pk8" partition="system_ext" 6 … container_private_key="packages/modules/vndk/apex/com.android.vndk.v28.pk8" partition="system_ext" 7 … container_private_key="packages/modules/vndk/apex/com.android.vndk.v29.pk8" partition="system_ext"
|
/build/make/tools/releasetools/ |
D | build_super_image.py | 61 def GetArgumentsForImage(partition, group, image=None): argument 65 "{}:readonly:{}:{}".format(partition, image_size, group)] 67 cmd += ["--image", "{}={}".format(partition, image)] 114 for partition in partition_list: 115 image = info_dict.get("{}_image".format(partition)) 120 cmd += GetArgumentsForImage(partition, group, image) 127 cmd += GetArgumentsForImage(partition + "_a", group + "_a", image) 130 if partition == "system" and "system_other_image" in info_dict: 134 cmd += GetArgumentsForImage(partition + "_b", group + "_b", other_image) 162 for partition in partition_list: [all …]
|
D | common.py | 379 for partition in PARTITIONS_WITH_CARE_MAP: 381 fingerprint = self.CalculatePartitionFingerprint(partition) 383 self._partition_fingerprints[partition] = fingerprint 425 def _GetRawBuildProp(self, prop, partition): argument 427 partition) if partition else 'build.prop' 433 def GetPartitionBuildProp(self, prop, partition): argument 438 prop = prop.replace("ro.product", "ro.product.{}".format(partition)) 440 prop = prop.replace("ro.", "ro.{}.".format(partition)) 442 prop_val = self._GetRawBuildProp(prop, partition) 446 (prop, partition)) [all …]
|
D | merge_builds.py | 119 for partition in common.AVB_PARTITIONS: 121 "%s.img" % partition) 123 partitions[partition] = partition_path 129 for partition in common.AVB_VBMETA_PARTITIONS: 130 chained_partitions = merged_dict.get("avb_%s" % partition, "").strip() 132 partitions[partition] = os.path.join(OPTIONS.product_out_vendor, 133 "%s.img" % partition) 138 vbmeta_partitions.append(partition)
|
D | ota_package_parser.py | 143 def PrintDataInfo(self, partition): argument 144 logging.info("\nReading data info for {} partition:".format(partition)) 145 new_data = self.package.getinfo(partition + ".new.dat") 146 patch_data = self.package.getinfo(partition + ".patch.dat") 163 def AnalyzePartition(self, partition): argument 164 assert partition in ("system", "vendor") 165 assert partition + ".new.dat" in self.package.namelist() 166 assert partition + ".patch.dat" in self.package.namelist() 167 assert partition + ".transfer.list" in self.package.namelist() 169 self.PrintDataInfo(partition) [all …]
|
D | edify_generator.py | 257 def TunePartition(self, partition, *options): argument 260 p = fstab[partition] 262 raise ValueError("Partition %s cannot be tuned\n" % (partition,)) 267 common.ErrorCode.TUNE_PARTITION_FAILURE, partition)) 269 def FormatPartition(self, partition): argument 275 p = fstab[partition] 281 def WipeBlockDevice(self, partition): argument 282 if partition not in ("/system", "/vendor"): 283 raise ValueError(("WipeBlockDevice doesn't work on %s\n") % (partition,)) 285 size = self.info.get(partition.lstrip("/") + "_size", None) [all …]
|
D | ota_from_target_files.py | 554 def HasPartition(target_files_zip, partition): argument 556 target_files_zip.getinfo(partition.upper() + "/") 670 for partition in partition_names: 671 if not HasPartition(target_zip, partition): 675 tgt = common.GetUserImage(partition, OPTIONS.input_tmp, target_zip, 678 block_diff_dict[partition] = common.BlockDifference(partition, tgt, 682 block_diff_dict[partition] = GetIncrementalBlockDifferenceForPartition( 683 partition) 702 if diff.partition in block_diff_dict: 705 " script.", diff.partition) [all …]
|
D | ota_from_target_files | 554 def HasPartition(target_files_zip, partition): argument 556 target_files_zip.getinfo(partition.upper() + "/") 670 for partition in partition_names: 671 if not HasPartition(target_zip, partition): 675 tgt = common.GetUserImage(partition, OPTIONS.input_tmp, target_zip, 678 block_diff_dict[partition] = common.BlockDifference(partition, tgt, 682 block_diff_dict[partition] = GetIncrementalBlockDifferenceForPartition( 683 partition) 702 if diff.partition in block_diff_dict: 705 " script.", diff.partition) [all …]
|
D | sign_target_files_apks | 953 def ReplaceAvbPartitionSigningKey(partition): argument 954 key = OPTIONS.avb_keys.get(partition) 958 algorithm = OPTIONS.avb_algorithms.get(partition) 959 assert algorithm, 'Missing AVB signing algorithm for %s' % (partition,) 962 partition, key, algorithm)) 963 misc_info['avb_' + partition + '_algorithm'] = algorithm 964 misc_info['avb_' + partition + '_key_path'] = key 966 extra_args = OPTIONS.avb_extra_args.get(partition) 969 partition, extra_args)) 970 if partition in AVB_FOOTER_ARGS_BY_PARTITION: [all …]
|
D | sign_target_files_apks.py | 953 def ReplaceAvbPartitionSigningKey(partition): argument 954 key = OPTIONS.avb_keys.get(partition) 958 algorithm = OPTIONS.avb_algorithms.get(partition) 959 assert algorithm, 'Missing AVB signing algorithm for %s' % (partition,) 962 partition, key, algorithm)) 963 misc_info['avb_' + partition + '_algorithm'] = algorithm 964 misc_info['avb_' + partition + '_key_path'] = key 966 extra_args = OPTIONS.avb_extra_args.get(partition) 969 partition, extra_args)) 970 if partition in AVB_FOOTER_ARGS_BY_PARTITION: [all …]
|
D | validate_target_files.py | 375 for partition in (common.AVB_PARTITIONS + common.AVB_VBMETA_PARTITIONS + 377 key_name = 'avb_' + partition + '_key_path' 379 if info_dict.get('ab_update') != 'true' and partition == 'recovery': 386 partition, info_dict, key_file) 439 for partition in common.AVB_PARTITIONS + common.AVB_VBMETA_PARTITIONS: 441 '--avb_' + partition + '_key_path', 443 'partition of {}'.format(partition))
|
/build/make/tools/fs_config/ |
D | Android.bp | 66 …cmd: "$(location fs_config_generator.py) passwd --partition=system --aid-header=$(location :androi… 83 …cmd: "$(location fs_config_generator.py) passwd --partition=vendor --aid-header=$(location :androi… 101 …cmd: "$(location fs_config_generator.py) passwd --partition=odm --aid-header=$(location :android_f… 119 …cmd: "$(location fs_config_generator.py) passwd --partition=product --aid-header=$(location :andro… 137 …cmd: "$(location fs_config_generator.py) passwd --partition=system_ext --aid-header=$(location :an… 158 …cmd: "$(location fs_config_generator.py) group --partition=system --aid-header=$(location :android… 175 …cmd: "$(location fs_config_generator.py) group --partition=vendor --aid-header=$(location :android… 193 …cmd: "$(location fs_config_generator.py) group --partition=odm --aid-header=$(location :android_fi… 211 …cmd: "$(location fs_config_generator.py) group --partition=product --aid-header=$(location :androi… 229 …cmd: "$(location fs_config_generator.py) group --partition=system_ext --aid-header=$(location :and…
|
D | Android.mk | 101 --partition system \ 126 --partition system \ 152 --partition vendor \ 176 --partition vendor \ 203 --partition oem \ 227 --partition oem \ 254 --partition odm \ 278 --partition odm \ 305 --partition product \ 329 --partition product \ [all …]
|
D | fs_config_generator.py | 359 partition = range_match.group(1).lower() 362 if partition == 'oem': 363 partition = 'vendor' 365 if partition in self._ranges: 366 if isinstance(self._ranges[partition][-1], int): 367 self._ranges[partition][-1] = ( 368 self._ranges[partition][-1], value) 370 self._ranges[partition].append(value) 372 self._ranges[partition] = [value] 595 for partition in partitions: [all …]
|
/build/make/tools/fs_config/end_to_end_test/ |
D | run_test.sh | 6 --partition system \ 18 --partition system \ 30 --partition vendor \ 41 --partition vendor \ 52 --partition product \ 63 --partition product \
|
/build/soong/apex/ |
D | key.go | 116 partition string 121 …return fmt.Sprintf(format, e.name, "PRESIGNED", "PRESIGNED", "PRESIGNED", "PRESIGNED", e.partition) 123 …e.name, e.public_key, e.private_key, e.container_certificate, e.container_private_key, e.partition) 137 partition: m.PartitionTag(ctx.DeviceConfig()), 149 partition: m.PartitionTag(ctx.DeviceConfig()), 161 partition: m.PartitionTag(ctx.DeviceConfig()),
|
/build/soong/cmd/extract_apks/ |
D | main.go | 359 writer Zip2ZipWriter, partition string) ([]string, error) { 412 if partition != "" { 414 `name="%s" certificate="PRESIGNED" private_key="" partition="%s"`, outName, partition)) 445 partition = flag.String("partition", "", "partition string. required when -apkcerts is used.") var 499 `[-apkcerts <apkcerts output file> -partition <partition>] <APK set>`) 513 (targetConfig.stem == "" && !*extractSingle) || (*apkcertsOutput != "" && *partition == "") { 551 apkcerts, err := apkSet.writeApks(sel, targetConfig, writer, *partition)
|