| /bootable/recovery/tests/unit/ |
| D | package_test.cpp | 65 for (const auto& package : packages_) { in TEST_F() local 67 ASSERT_TRUE(package->ReadFullyAtOffset(buffer.data(), file_content_.size(), 0)); in TEST_F() 70 ASSERT_TRUE(package->ReadFullyAtOffset(buffer.data(), file_content_.size() - 10, 10)); in TEST_F() 76 for (const auto& package : packages_) { in TEST_F() local 79 ASSERT_FALSE(package->ReadFullyAtOffset(buffer.data(), file_content_.size(), 10)); in TEST_F() 89 for (const auto& package : packages_) { in TEST_F() local 94 package->UpdateHashAtOffset(hashers, 0, hash_size); in TEST_F() 103 for (const auto& package : packages_) { in TEST_F() local 104 ZipArchiveHandle zip = package->GetZipArchiveHandle(); in TEST_F()
|
| D | verifier_test.cpp | 53 auto package = in VerifyFile() local 55 ASSERT_NE(nullptr, package); in VerifyFile() 57 ASSERT_EQ(expected, verify_file(package.get(), keys)); in VerifyFile() 63 auto package = Package::CreateMemoryPackage(path, nullptr); in VerifyPackageWithCertificates() local 64 ASSERT_NE(nullptr, package); in VerifyPackageWithCertificates() 66 ASSERT_EQ(VERIFY_SUCCESS, verify_file(package.get(), certs)); in VerifyPackageWithCertificates() 282 std::string package; in TEST() local 283 ASSERT_TRUE(android::base::ReadFileToString(from_testdata_base("otasigned_v3.zip"), &package)); in TEST() 284 ASSERT_EQ(std::string("\xc0\x06\xff\xff\xd2\x06", 6), package.substr(package.size() - 6, 6)); in TEST() 287 package[package.size() - 5] = '\x05'; in TEST() [all …]
|
| D | install_test.cpp | 101 auto package = Package::CreateMemoryPackage( in TEST() local 104 auto read_partition_list = GetWipePartitionList(package.get()); in TEST() 122 std::string package = "/path/to/update.zip"; in TEST() local 127 ASSERT_TRUE(SetUpNonAbUpdateCommands(package, zip, 0, status_fd, &cmd)); in TEST() 132 ASSERT_EQ(package, cmd[3]); in TEST() 139 ASSERT_TRUE(SetUpNonAbUpdateCommands(package, zip, 2, status_fd, &cmd)); in TEST() 144 ASSERT_EQ(package, cmd[3]); in TEST() 162 std::string package = "/path/to/update.zip"; in TEST() local 166 ASSERT_FALSE(SetUpNonAbUpdateCommands(package, zip, 0, status_fd, &cmd)); in TEST() 202 std::string package = "/path/to/update.zip"; in VerifyAbUpdateCommands() local [all …]
|
| D | sysutil_test.cpp | 107 TemporaryFile package; in TEST() local 111 ASSERT_TRUE(android::base::WriteStringToFile(content, package.path)); in TEST() 118 std::string block_map_content = std::string(package.path) + "\n40960 4096\n1\n0 10\n"; in TEST() 126 block_map_content = std::string(package.path) + "\n40960 4096\n1\n0 10"; in TEST() 134 block_map_content = std::string(package.path) + "\n40960 4096\n1\n0 10\n\n\n"; in TEST() 142 block_map_content = std::string(package.path) + "\n40960 4096\n3\n0 3\n3 5\n5 10\n"; in TEST()
|
| D | fuse_sideload_test.cpp | 83 std::string package = std::string(mount_point.path) + "/" + FUSE_SIDELOAD_HOST_FILENAME; in TEST() local 90 if (stat(package.c_str(), &sb) == 0) { in TEST() 102 ASSERT_TRUE(android::base::ReadFileToString(package, &content_via_fuse)); in TEST()
|
| /bootable/recovery/updater_sample/tools/ |
| D | gen_update_config.py | 50 package, argument 55 self.package = package 82 'name': self.ab_install_type[0] + ' ' + os.path.basename(self.package)[:-4], 90 with zipfile.ZipFile(self.package, 'r') as package_zip: 160 package=args.package,
|
| D | test_gen_update_config.py | 34 config, package = self._generate_config() 37 with open(package, 'rb') as pkg_file:
|
| /bootable/recovery/install/ |
| D | install.cpp | 265 bool SetUpAbUpdateCommands(const std::string& package, ZipArchiveHandle zip, int status_fd, in SetUpAbUpdateCommands() argument 285 "--payload=file://" + package, in SetUpAbUpdateCommands() 293 bool SetUpNonAbUpdateCommands(const std::string& package, ZipArchiveHandle zip, int retry_count, in SetUpNonAbUpdateCommands() argument 328 package, in SetUpNonAbUpdateCommands() 356 static InstallResult TryUpdateBinary(Package* package, bool* wipe_cache, in TryUpdateBinary() argument 361 auto zip = package->GetZipArchiveHandle(); in TryUpdateBinary() 380 CHECK(package->GetType() == PackageType::kFile); in TryUpdateBinary() 437 std::string package_path = package->GetPath(); in TryUpdateBinary() 559 static InstallResult VerifyAndInstallPackage(Package* package, bool* wipe_cache, in VerifyAndInstallPackage() argument 569 if (!verify_package(package, ui)) { in VerifyAndInstallPackage() [all …]
|
| D | fuse_install.cpp | 184 auto package = in InstallWithFuseFromPath() local 187 result = InstallPackage(package.get(), FUSE_SIDELOAD_HOST_PATHNAME, false, 0 /* retry_count */, in InstallWithFuseFromPath()
|
| /bootable/recovery/otautil/ |
| D | verifier.cpp | 113 int verify_file(VerifierInterface* package, const std::vector<Certificate>& keys) { in verify_file() argument 114 CHECK(package); in verify_file() 115 package->SetProgress(0.0); in verify_file() 126 uint64_t length = package->GetPackageSize(); in verify_file() 134 if (!package->ReadFullyAtOffset(footer, FOOTER_SIZE, length - FOOTER_SIZE)) { in verify_file() 176 if (!package->ReadFullyAtOffset(eocd, eocd_size, length - eocd_size)) { in verify_file() 231 package->UpdateHashAtOffset(hashers, so_far, read_size); in verify_file() 236 package->SetProgress(f); in verify_file()
|
| D | Android.bp | 15 package { 39 "package.cpp",
|
| /bootable/recovery/install/include/private/ |
| D | setup_commands.h | 30 bool SetUpNonAbUpdateCommands(const std::string& package, ZipArchiveHandle zip, int retry_count, 38 bool SetUpAbUpdateCommands(const std::string& package, ZipArchiveHandle zip, int status_fd,
|
| /bootable/recovery/tests/fuzz/ |
| D | verify_package_fuzzer.cpp | 33 auto package = CreatePackage(package_contents); in LLVMFuzzerTestOneInput() local 35 verify_package(package.get(), &ui); in LLVMFuzzerTestOneInput()
|
| /bootable/recovery/install/include/install/ |
| D | install.h | 52 InstallResult InstallPackage(Package* package, const std::string_view package_id, 58 bool verify_package(Package* package, RecoveryUI* ui);
|
| /bootable/recovery/updater_sample/ |
| D | README.md | 32 SystemUpdaterSample app downloads OTA package from `url`. In this sample app 39 opposed to the entire package, to initiate a streaming update. The `payload.bin` 40 entry, which takes up the majority of the space in an OTA package, will be 41 streamed by `update_engine` directly. The ZIP entries in such a package need to be 107 Sometimes OTA package server might require some HTTP headers to be present, 179 `update_engine` service as well as OTA package files. Detailed steps are as follows: 189 <privapp-permissions package="com.example.android.systemupdatersample"> 215 - [x] Prepare streaming update (partially downloading package) 225 - [x] Verify system partition checksum for package
|
| D | Android.bp | 15 package {
|
| /bootable/recovery/update_verifier/ |
| D | care_map.proto | 19 package recovery_update_verifier;
|
| /bootable/libbootloader/vts/ |
| D | Android.bp | 16 package {
|
| /bootable/recovery/otautil/include/otautil/ |
| D | verifier.h | 83 int verify_file(VerifierInterface* package, const std::vector<Certificate>& keys);
|
| /bootable/recovery/tools/recovery_l10n/ |
| D | Android.bp | 15 package {
|
| /bootable/recovery/tools/image_generator/ |
| D | Android.bp | 15 package {
|
| /bootable/recovery/uncrypt/ |
| D | Android.bp | 15 package {
|
| /bootable/recovery/fuse_sideload/ |
| D | Android.bp | 15 package {
|
| /bootable/recovery/edify/ |
| D | Android.bp | 15 package {
|
| /bootable/recovery/bootloader_message/ |
| D | Android.bp | 17 package {
|