Searched refs:payload (Results 1 - 25 of 63) sorted by relevance

123

/system/update_engine/scripts/update_payload/
H A D__init__.py11 from payload import Payload
H A Dblock_tracer.py5 """Tracing block data source through a Chrome OS update payload.
8 content through an update payload. This is a useful feature in debugging
9 payload applying functionality in this package. The interface for invoking the
12 tracer = PayloadBlockTracer(payload)
33 def __init__(self, payload):
34 assert payload.is_init, 'uninitialized update payload'
35 self.payload = payload
107 operations = self.payload
[all...]
H A Dapplier.py5 """Applying a Chrome OS update payload.
8 payload. The interface for invoking the applier is as follows:
10 applier = PayloadApplier(payload)
191 """Applying an update payload.
194 applying an update payload.
197 def __init__(self, payload, bsdiff_in_place=True, bspatch_path=None,
202 payload: the payload object to check
208 payload (optional)
210 assert payload
[all...]
/system/core/trusty/gatekeeper/
H A Dgatekeeper_ipc.h34 * @payload: start of the serialized command specific payload
38 uint8_t payload[0]; member in struct:gatekeeper_message
/system/nvram/messages/
H A Dnvram_messages.cpp147 MakeOneOfField(1, &Request::payload, COMMAND_GET_INFO),
148 MakeOneOfField(2, &Request::payload, COMMAND_CREATE_SPACE),
149 MakeOneOfField(3, &Request::payload, COMMAND_GET_SPACE_INFO),
150 MakeOneOfField(4, &Request::payload, COMMAND_DELETE_SPACE),
151 MakeOneOfField(5, &Request::payload, COMMAND_DISABLE_CREATE),
152 MakeOneOfField(6, &Request::payload, COMMAND_WRITE_SPACE),
153 MakeOneOfField(7, &Request::payload, COMMAND_READ_SPACE),
154 MakeOneOfField(8, &Request::payload, COMMAND_LOCK_SPACE_WRITE),
155 MakeOneOfField(9, &Request::payload, COMMAND_LOCK_SPACE_READ),
156 MakeOneOfField(10, &Request::payload, COMMAND_WIPE_STORAG
[all...]
/system/nvram/messages/tests/
H A Dnvram_messages_test.cpp39 request.payload.Activate<COMMAND_GET_INFO>();
44 EXPECT_EQ(COMMAND_GET_INFO, decoded.payload.which());
45 EXPECT_TRUE(decoded.payload.get<COMMAND_GET_INFO>());
51 response.payload.Activate<COMMAND_GET_INFO>();
54 response.payload.Activate<COMMAND_GET_INFO>();
69 EXPECT_EQ(COMMAND_GET_INFO, decoded.payload.which());
71 decoded.payload.get<COMMAND_GET_INFO>();
89 request.payload.Activate<COMMAND_CREATE_SPACE>();
101 EXPECT_EQ(COMMAND_CREATE_SPACE, decoded.payload.which());
103 decoded.payload
[all...]
/system/bt/vendor_libs/test_vendor_lib/src/
H A Dcommand_packet.cc36 CommandPacket::CommandPacket(vector<uint8_t> header, vector<uint8_t> payload) argument
38 AddPayloadOctets(payload.size(), std::move(payload));
/system/update_engine/payload_generator/
H A Dpayload_signer.cc48 // The payload verifier will check all the signatures included in the payload
76 // Given an unsigned payload under |payload_path| and the |signature_blob| and
77 // |metadata_signature_blob| generates an updated payload that includes the
82 // if the payload major version supports metadata signature, 0 otherwise.
105 brillo::Blob payload; local
106 TEST_AND_RETURN_FALSE(utils::ReadFile(payload_path, &payload));
112 memcpy(payload.data() + manifest_offset, &metadata_signature_size_be,
116 payload.erase(payload
184 CalculateHashFromPayload(const brillo::Blob& payload, const uint64_t metadata_size, const uint32_t metadata_signature_size, const uint64_t signatures_offset, brillo::Blob* out_hash_data, brillo::Blob* out_metadata_hash) argument
315 brillo::Blob payload; local
403 brillo::Blob payload; local
445 brillo::Blob payload; local
482 brillo::Blob payload; local
[all...]
H A Ddelta_diff_generator.cc64 // Create empty payload file object.
65 PayloadFile payload; local
66 TEST_AND_RETURN_FALSE(payload.Init(config));
93 // Select payload generation strategy based on the config.
122 TEST_AND_RETURN_FALSE(payload.AddPartition(old_part, new_part, aops));
126 LOG(INFO) << "Writing payload file...";
127 // Write payload file to disk.
128 TEST_AND_RETURN_FALSE(payload.WritePayload(output_path, temp_file_path,
H A Dpayload_signer_unittest.cc128 PayloadFile payload; local
129 payload.Init(config);
131 EXPECT_TRUE(utils::MakeTempFile("payload.XXXXXX", &payload_path, nullptr));
135 payload.WritePayload(payload_path, "/dev/null", "", &metadata_size));
219 EXPECT_TRUE(utils::MakeTempFile("payload.XXXXXX", &payload_path, nullptr));
224 PayloadFile payload; local
225 EXPECT_TRUE(payload.Init(config));
228 payload.WritePayload(payload_path, "/dev/null", "", &metadata_size));
234 payload.WritePayload(payload_path,
247 EXPECT_TRUE(utils::MakeTempFile("payload
252 PayloadFile payload; local
[all...]
/system/core/include/log/
H A Dlog.h93 int __android_log_bwrite(int32_t tag, const void* payload, size_t len);
94 int __android_log_btwrite(int32_t tag, char type, const void* payload,
96 int __android_log_bswrite(int32_t tag, const char* payload);
98 #define android_bWriteLog(tag, payload, len) \
99 __android_log_bwrite(tag, payload, len)
100 #define android_btWriteLog(tag, type, payload, len) \
101 __android_log_btwrite(tag, type, payload, len)
/system/core/liblog/include/log/
H A Dlog.h93 int __android_log_bwrite(int32_t tag, const void* payload, size_t len);
94 int __android_log_btwrite(int32_t tag, char type, const void* payload,
96 int __android_log_bswrite(int32_t tag, const char* payload);
98 #define android_bWriteLog(tag, payload, len) \
99 __android_log_bwrite(tag, payload, len)
100 #define android_btWriteLog(tag, type, payload, len) \
101 __android_log_btwrite(tag, type, payload, len)
/system/update_engine/payload_consumer/
H A Dinstall_plan.cc66 for (const auto& payload : payloads) {
68 ", payload: (size: %" PRIu64 ", metadata_size: %" PRIu64
69 ", metadata signature: %s, hash: %s, payload type: %s)",
70 payload.size,
71 payload.metadata_size,
72 payload.metadata_signature.c_str(),
73 base::HexEncode(payload.hash.data(), payload.hash.size()).c_str(),
74 InstallPayloadTypeToString(payload.type).c_str());
/system/gatekeeper/include/gatekeeper/
H A Dgatekeeper_messages.h89 * Expects payload to be allocated with GetSerializedSize bytes.
93 uint32_t Serialize(uint8_t *payload, const uint8_t *end) const;
98 gatekeeper_error_t Deserialize(const uint8_t *payload, const uint8_t *end);
126 * Deserializes subclass specific data from payload without reading past end.
148 virtual gatekeeper_error_t nonErrorDeserialize(const uint8_t *payload, const uint8_t *end);
164 virtual gatekeeper_error_t nonErrorDeserialize(const uint8_t *payload, const uint8_t *end);
178 virtual gatekeeper_error_t nonErrorDeserialize(const uint8_t *payload, const uint8_t *end);
205 virtual gatekeeper_error_t nonErrorDeserialize(const uint8_t *payload, const uint8_t *end);
/system/netd/server/
H A DWakeupController.cpp54 const Slice payload) {
58 extract(payload, timespec);
65 prefix = toString(take(payload, payload.size() - 1));
68 extract(payload, uid);
72 extract(payload, gid);
/system/gatekeeper/
H A Dgatekeeper_messages.cpp107 gatekeeper_error_t GateKeeperMessage::Deserialize(const uint8_t *payload, const uint8_t *end) { argument
108 if (payload + sizeof(uint32_t) > end) return ERROR_INVALID;
109 const serial_header_t *header = reinterpret_cast<const serial_header_t *>(payload);
111 if (payload == end) return ERROR_INVALID;
113 error = nonErrorDeserialize(payload + sizeof(*header), end);
118 if (payload + sizeof(serial_header_t) < end) {
119 memcpy(&retry_timeout, payload + sizeof(serial_header_t), sizeof(retry_timeout));
172 gatekeeper_error_t VerifyRequest::nonErrorDeserialize(const uint8_t *payload, const uint8_t *end) { argument
184 memcpy(&challenge, payload, sizeof(challenge));
185 payload
226 nonErrorDeserialize(const uint8_t *payload, const uint8_t *end) argument
297 nonErrorDeserialize(const uint8_t *payload, const uint8_t *end) argument
356 nonErrorDeserialize(const uint8_t *payload, const uint8_t *end) argument
[all...]
/system/bt/vendor_libs/test_vendor_lib/include/
H A Dcommand_packet.h34 // The header is followed by the payload, which contains command specific
38 // 0x0000 to 0x03FF. Note that the payload size is the size in octets of the
40 // parameters contained in the payload are command specific (including the size
47 CommandPacket(std::vector<uint8_t> header, std::vector<uint8_t> payload);
/system/core/include/private/
H A Dandroid_logger.h63 /* Event payload EVENT_TYPE_INT */
72 android_event_int_t payload; member in struct:__anon1474
75 /* Event payload EVENT_TYPE_LONG */
84 android_event_long_t payload; member in struct:__anon1476
88 * Event payload EVENT_TYPE_STRING
134 int __android_log_security_bwrite(int32_t tag, const void* payload, size_t len);
135 int __android_log_security_bswrite(int32_t tag, const char* payload);
/system/core/libkeyutils/include/
H A Dkeyutils.h40 key_serial_t add_key(const char* type, const char* description, const void* payload,
/system/core/liblog/include/private/
H A Dandroid_logger.h63 /* Event payload EVENT_TYPE_INT */
72 android_event_int_t payload; member in struct:__anon1566
75 /* Event payload EVENT_TYPE_LONG */
84 android_event_long_t payload; member in struct:__anon1568
88 * Event payload EVENT_TYPE_STRING
134 int __android_log_security_bwrite(int32_t tag, const void* payload, size_t len);
135 int __android_log_security_bswrite(int32_t tag, const char* payload);
/system/core/trusty/keymaster/
H A Dkeymaster_ipc.h55 * @payload: start of the serialized command specific payload
59 uint8_t payload[0]; member in struct:keymaster_message
/system/core/liblog/tests/
H A Dliblog_benchmark.cpp133 * char payload[];
137 * char payload[];
171 buffer.payload.type = EVENT_TYPE_INT;
173 buffer.payload.data = htole32(snapshot);
181 buffer.payload.data = htole32(snapshot);
209 * char payload[];
213 * char payload[];
225 android_log_event_int_t payload; member in struct:packet
245 buffer->payload.header.tag = 0;
246 buffer->payload
299 android_log_event_int_t payload; member in struct:packet
373 android_log_event_int_t payload; member in struct:packet
445 android_log_event_int_t payload; member in struct:packet
[all...]
/system/core/libkeyutils/
H A Dkeyutils.cpp47 key_serial_t add_key(const char* type, const char* description, const void* payload, argument
49 return syscall(__NR_add_key, type, description, payload, payload_length, ring_id);
/system/tpm/trunks/
H A Dtrunks_ftdi_spi.cc275 // First we read the FIFO payload header, to see how much data to expect.
276 // The header size is fixed to six bytes, the total payload size is stored
283 // Figure out the total payload size.
292 LOG(ERROR) << "Bad total payload size value: " << payload_size;
296 LOG(INFO) << "Total payload size " << payload_size;
304 uint8_t* payload = new uint8_t[payload_size + 1]; local
311 payload + handled_so_far);
320 delete[] payload;
324 // Now, read the last byte of the payload.
325 FtdiReadReg(TPM_DATA_FIFO_REG, sizeof(uint8_t), payload
[all...]
/system/update_engine/scripts/
H A Dpaycheck.py33 A tuple (opts, payload, extra_args), where `opts' are the options
34 returned by the parser, `payload' is the name of the payload file
44 'When no partitions are provided, verifies the payload '
46 epilog=('Note: a payload may verify correctly but fail to apply, and '
48 'vs dynamic correctness. A payload that both verifies and '
50 'Update Engine. Use --check to verify a payload prior to '
53 check_opts = optparse.OptionGroup(parser, 'Checking payload integrity')
55 help=('force payload integrity check (e.g. before '
58 help='Print a friendly description of the payload
[all...]

Completed in 639 milliseconds

123