Home
last modified time | relevance | path

Searched refs:s (Results 1 – 25 of 28) sorted by relevance

12

/bootable/recovery/updater/
Dupdate_simulator_main.cpp85 if (option_name == "oem_settings"s) { in main()
87 } else if (option_name == "skip_functions"s) { in main()
89 } else if (option_name == "source"s) { in main()
91 } else if (option_name == "ota_package"s) { in main()
93 } else if (option_name == "keep_images"s) { in main()
95 } else if (option_name == "work_dir"s) { in main()
Dcommands.cpp110 *err = "invalid src_block_count \""s + token + "\""; in ParseTargetInfoAndSourceInfo()
415 *err = "unexpected transfer list version ["s + lines[0] + "]"; in Parse()
421 *err = "unexpected block count ["s + lines[1] + "]"; in Parse()
432 *err = "unexpected maximum stash blocks ["s + lines[3] + "]"; in Parse()
/bootable/recovery/tests/testdata/
Drecovery_body198 …��������������������������������ERCP ��� �������������������������������������/fstab.U
211 …������������������������������ERCP ��� ������������������������������������/res��� �/U
225 …����������������������������ERCP ��� ������������������������������������/sbin��� �/U
307 …������������������������ERCP ��� ������������������������������������ /bus/usb����U
320 …��������������������ERCP ��� �������������������������� ����������$/fscklogs��� �/U
327 …��������������������ERCP ��� �������������������������� ����������$/graphics��� �/U
370 …���������������ERCP ��� �������������������������� �����������:/rpmsg-omxn���������…
380 …������������������������������ERCP ��� ������������������������������������/snd��� �/U
386 …������������������������ERCP ��� ������������������������������������ /socket��� �/U
392 …������ERCP ��� �������������������������������������R/socket/sap_uim_sock…
[all …]
/bootable/recovery/fonts/
DOFL.txt30 Holder(s) under this license and clearly marked as such. This may
34 copyright statement(s).
37 distributed by the Copyright Holder(s).
64 Name(s) unless explicit written permission is granted by the corresponding
68 4) The name(s) of the Copyright Holder(s) or the Author(s) of the Font
70 Modified Version, except to acknowledge the contribution(s) of the
71 Copyright Holder(s) and the Author(s) or with their explicit written
/bootable/recovery/tests/unit/host/
Dupdate_simulator_test.cpp271 R"(patch_partition_check("%s", "%s") || abort("check failed");)",
274 R"(patch_partition("%s", "%s", package_extract_file("patch.p")) || abort("patch failed");)",
331 { "META/misc_info.txt", "extfs_sparse_flag=-s" },
358 { "META/misc_info.txt", "extfs_sparse_flag=-s" },
372 "EMMC:/dev/block/by-name/boot:%zu:%s", boot_img_string.size(), boot_sha1.c_str());
374 "EMMC:/dev/block/by-name/recovery:%zu:%s", recovery_img_string.size(), recovery_sha1.c_str());
/bootable/recovery/edify/
Dparser.yy35 void yyerror(std::unique_ptr<Expr>* root, int* error_count, const char* s);
133 void yyerror(std::unique_ptr<Expr>* root, int* error_count, const char* s) {
134 if (strlen(s) == 0) {
135 s = "syntax error";
137 printf("line %d col %d: %s\n", gLine, gColumn, s);
DREADME.md46 - There's no distinction between quoted and unquoted strings; the
89 second argument only if it's needed to determine the truth of the
Dexpr.cpp41 static bool BooleanString(const std::string& s) { in BooleanString() argument
42 return !s.empty(); in BooleanString()
/bootable/recovery/update_verifier/
Dupdate_verifier_main.cpp27 std::string s = android::base::GetProperty("ro.boot.slot_suffix", ""); in main() local
29 if (s.empty()) { in main()
/bootable/recovery/minadbd/
Dminadbd.cpp39 if ((argc != 3 && argc != 4) || argv[1] != "--socket_fd"s || in main()
40 (argc == 4 && argv[3] != "--rescue"s)) { in main()
DREADME.md17 - When requested to start `minadbd`, `recovery` stops `adbd` first, if it's running; it then forks
/bootable/recovery/tests/unit/
Dupdate_verifier_test.cpp40 care_map_prefix_ = care_map_dir_.path + "/care_map"s; in SetUp()
41 care_map_pb_ = care_map_dir_.path + "/care_map.pb"s; in SetUp()
42 care_map_txt_ = care_map_dir_.path + "/care_map.txt"s; in SetUp()
Duncrypt_test.cpp195 message = "--wipe_ab\n--wipe_package="s + wipe_package.path + "\n--reason=wipePackage"s; in TEST_F()
Dapplypatch_modes_test.cpp50 return "EMMC:"s + (display_name.empty() ? filename : display_name) + ":" + in GetEmmcTargetString()
Dverifier_test.cpp316 std::string package = "\x50\x4b\x05\x06"s + std::string(12, '\0') + "\xff\xff\xff\xff\x00\x00"s; in TEST()
Dapplypatch_test.cpp241 std::string file1_path = mock_cache.path + "/file1"s; in TEST_F()
/bootable/recovery/minui/include/minui/
Dminui.h131 void gr_text(const GRFont* font, int x, int y, const char* s, bool bold);
133 int gr_measure(const GRFont* font, const char* s);
/bootable/recovery/bootloader_message/
Dbootloader_message.cpp215 for (const auto& s : options) { in update_bootloader_message_in_struct() local
216 recovery += s; in update_bootloader_message_in_struct()
217 if (s.back() != '\n') { in update_bootloader_message_in_struct()
/bootable/recovery/minui/
Dgraphics.cpp60 int gr_measure(const GRFont* font, const char* s) { in gr_measure() argument
65 return font->char_width * strlen(s); in gr_measure()
157 void gr_text(const GRFont* font, int x, int y, const char* s, bool bold) { in gr_text() argument
171 while ((ch = *s++)) { in gr_text()
/bootable/recovery/recovery_utils/
DAndroid.bp50 // A utility lib that's local to recovery (in contrast, libotautil is exposed to device-specific
/bootable/recovery/updater_sample/src/com/example/android/systemupdatersample/
DUpdateManager.java326 .ifPresent(s -> extraProperties.add("AUTHORIZATION=" + s)); in prepareExtraProperties()
/bootable/recovery/updater_sample/
DREADME.md67 2. This sample app demostrates suspend/resume using update_engins's
75 matches the update_engine's status (as onStatusUpdate is guaranteed to be called).
121 initialized, it's guaranteed to invoke callback onStatusUpdate.
178 privileged system app, so it's granted the required permissions to access
/bootable/recovery/
DNOTICE93 Contribution(s) alone or by combination of their Contribution(s)
94 with the Work to which such Contribution(s) was submitted. If You
/bootable/libbootloader/libxbc/
DCOPYING81 Contribution(s) alone or by combination of their Contribution(s)
82 with the Work to which such Contribution(s) was submitted. If You
/bootable/recovery/uncrypt/
Duncrypt.cpp276 std::string s = android::base::StringPrintf("%s\n%" PRId64 " %" PRId64 "\n", blk_dev.c_str(), in ProductBlockMap() local
279 if (!android::base::WriteStringToFd(s, mapfd)) { in ProductBlockMap()

12