/system/update_engine/scripts/update_payload/ |
H A D | __init__.py | 11 from payload import Payload
|
H A D | block_tracer.py | 5 """Tracing block data source through a Chrome OS update payload. 8 content through an update payload. This is a useful feature in debugging 9 payload applying functionality in this package. The interface for invoking the 12 tracer = PayloadBlockTracer(payload) 33 def __init__(self, payload): 34 assert payload.is_init, 'uninitialized update payload' 35 self.payload = payload 107 operations = self.payload [all...] |
H A D | applier.py | 5 """Applying a Chrome OS update payload. 8 payload. The interface for invoking the applier is as follows: 10 applier = PayloadApplier(payload) 191 """Applying an update payload. 194 applying an update payload. 197 def __init__(self, payload, bsdiff_in_place=True, bspatch_path=None, 202 payload: the payload object to check 208 payload (optional) 210 assert payload [all...] |
/system/core/trusty/gatekeeper/ |
H A D | gatekeeper_ipc.h | 34 * @payload: start of the serialized command specific payload 38 uint8_t payload[0]; member in struct:gatekeeper_message
|
/system/nvram/messages/ |
H A D | nvram_messages.cpp | 147 MakeOneOfField(1, &Request::payload, COMMAND_GET_INFO), 148 MakeOneOfField(2, &Request::payload, COMMAND_CREATE_SPACE), 149 MakeOneOfField(3, &Request::payload, COMMAND_GET_SPACE_INFO), 150 MakeOneOfField(4, &Request::payload, COMMAND_DELETE_SPACE), 151 MakeOneOfField(5, &Request::payload, COMMAND_DISABLE_CREATE), 152 MakeOneOfField(6, &Request::payload, COMMAND_WRITE_SPACE), 153 MakeOneOfField(7, &Request::payload, COMMAND_READ_SPACE), 154 MakeOneOfField(8, &Request::payload, COMMAND_LOCK_SPACE_WRITE), 155 MakeOneOfField(9, &Request::payload, COMMAND_LOCK_SPACE_READ), 156 MakeOneOfField(10, &Request::payload, COMMAND_WIPE_STORAG [all...] |
/system/nvram/messages/tests/ |
H A D | nvram_messages_test.cpp | 39 request.payload.Activate<COMMAND_GET_INFO>(); 44 EXPECT_EQ(COMMAND_GET_INFO, decoded.payload.which()); 45 EXPECT_TRUE(decoded.payload.get<COMMAND_GET_INFO>()); 51 response.payload.Activate<COMMAND_GET_INFO>(); 54 response.payload.Activate<COMMAND_GET_INFO>(); 69 EXPECT_EQ(COMMAND_GET_INFO, decoded.payload.which()); 71 decoded.payload.get<COMMAND_GET_INFO>(); 89 request.payload.Activate<COMMAND_CREATE_SPACE>(); 101 EXPECT_EQ(COMMAND_CREATE_SPACE, decoded.payload.which()); 103 decoded.payload [all...] |
/system/bt/vendor_libs/test_vendor_lib/src/ |
H A D | command_packet.cc | 36 CommandPacket::CommandPacket(vector<uint8_t> header, vector<uint8_t> payload) argument 38 AddPayloadOctets(payload.size(), std::move(payload));
|
/system/update_engine/payload_generator/ |
H A D | payload_signer.cc | 48 // The payload verifier will check all the signatures included in the payload 76 // Given an unsigned payload under |payload_path| and the |signature_blob| and 77 // |metadata_signature_blob| generates an updated payload that includes the 82 // if the payload major version supports metadata signature, 0 otherwise. 105 brillo::Blob payload; local 106 TEST_AND_RETURN_FALSE(utils::ReadFile(payload_path, &payload)); 112 memcpy(payload.data() + manifest_offset, &metadata_signature_size_be, 116 payload.erase(payload 184 CalculateHashFromPayload(const brillo::Blob& payload, const uint64_t metadata_size, const uint32_t metadata_signature_size, const uint64_t signatures_offset, brillo::Blob* out_hash_data, brillo::Blob* out_metadata_hash) argument 315 brillo::Blob payload; local 403 brillo::Blob payload; local 445 brillo::Blob payload; local 482 brillo::Blob payload; local [all...] |
H A D | delta_diff_generator.cc | 64 // Create empty payload file object. 65 PayloadFile payload; local 66 TEST_AND_RETURN_FALSE(payload.Init(config)); 93 // Select payload generation strategy based on the config. 122 TEST_AND_RETURN_FALSE(payload.AddPartition(old_part, new_part, aops)); 126 LOG(INFO) << "Writing payload file..."; 127 // Write payload file to disk. 128 TEST_AND_RETURN_FALSE(payload.WritePayload(output_path, temp_file_path,
|
H A D | payload_signer_unittest.cc | 128 PayloadFile payload; local 129 payload.Init(config); 131 EXPECT_TRUE(utils::MakeTempFile("payload.XXXXXX", &payload_path, nullptr)); 135 payload.WritePayload(payload_path, "/dev/null", "", &metadata_size)); 219 EXPECT_TRUE(utils::MakeTempFile("payload.XXXXXX", &payload_path, nullptr)); 224 PayloadFile payload; local 225 EXPECT_TRUE(payload.Init(config)); 228 payload.WritePayload(payload_path, "/dev/null", "", &metadata_size)); 234 payload.WritePayload(payload_path, 247 EXPECT_TRUE(utils::MakeTempFile("payload 252 PayloadFile payload; local [all...] |
/system/core/include/log/ |
H A D | log.h | 93 int __android_log_bwrite(int32_t tag, const void* payload, size_t len); 94 int __android_log_btwrite(int32_t tag, char type, const void* payload, 96 int __android_log_bswrite(int32_t tag, const char* payload); 98 #define android_bWriteLog(tag, payload, len) \ 99 __android_log_bwrite(tag, payload, len) 100 #define android_btWriteLog(tag, type, payload, len) \ 101 __android_log_btwrite(tag, type, payload, len)
|
/system/core/liblog/include/log/ |
H A D | log.h | 93 int __android_log_bwrite(int32_t tag, const void* payload, size_t len); 94 int __android_log_btwrite(int32_t tag, char type, const void* payload, 96 int __android_log_bswrite(int32_t tag, const char* payload); 98 #define android_bWriteLog(tag, payload, len) \ 99 __android_log_bwrite(tag, payload, len) 100 #define android_btWriteLog(tag, type, payload, len) \ 101 __android_log_btwrite(tag, type, payload, len)
|
/system/update_engine/payload_consumer/ |
H A D | install_plan.cc | 66 for (const auto& payload : payloads) { 68 ", payload: (size: %" PRIu64 ", metadata_size: %" PRIu64 69 ", metadata signature: %s, hash: %s, payload type: %s)", 70 payload.size, 71 payload.metadata_size, 72 payload.metadata_signature.c_str(), 73 base::HexEncode(payload.hash.data(), payload.hash.size()).c_str(), 74 InstallPayloadTypeToString(payload.type).c_str());
|
/system/gatekeeper/include/gatekeeper/ |
H A D | gatekeeper_messages.h | 89 * Expects payload to be allocated with GetSerializedSize bytes. 93 uint32_t Serialize(uint8_t *payload, const uint8_t *end) const; 98 gatekeeper_error_t Deserialize(const uint8_t *payload, const uint8_t *end); 126 * Deserializes subclass specific data from payload without reading past end. 148 virtual gatekeeper_error_t nonErrorDeserialize(const uint8_t *payload, const uint8_t *end); 164 virtual gatekeeper_error_t nonErrorDeserialize(const uint8_t *payload, const uint8_t *end); 178 virtual gatekeeper_error_t nonErrorDeserialize(const uint8_t *payload, const uint8_t *end); 205 virtual gatekeeper_error_t nonErrorDeserialize(const uint8_t *payload, const uint8_t *end);
|
/system/netd/server/ |
H A D | WakeupController.cpp | 54 const Slice payload) { 58 extract(payload, timespec); 65 prefix = toString(take(payload, payload.size() - 1)); 68 extract(payload, uid); 72 extract(payload, gid);
|
/system/gatekeeper/ |
H A D | gatekeeper_messages.cpp | 107 gatekeeper_error_t GateKeeperMessage::Deserialize(const uint8_t *payload, const uint8_t *end) { argument 108 if (payload + sizeof(uint32_t) > end) return ERROR_INVALID; 109 const serial_header_t *header = reinterpret_cast<const serial_header_t *>(payload); 111 if (payload == end) return ERROR_INVALID; 113 error = nonErrorDeserialize(payload + sizeof(*header), end); 118 if (payload + sizeof(serial_header_t) < end) { 119 memcpy(&retry_timeout, payload + sizeof(serial_header_t), sizeof(retry_timeout)); 172 gatekeeper_error_t VerifyRequest::nonErrorDeserialize(const uint8_t *payload, const uint8_t *end) { argument 184 memcpy(&challenge, payload, sizeof(challenge)); 185 payload 226 nonErrorDeserialize(const uint8_t *payload, const uint8_t *end) argument 297 nonErrorDeserialize(const uint8_t *payload, const uint8_t *end) argument 356 nonErrorDeserialize(const uint8_t *payload, const uint8_t *end) argument [all...] |
/system/bt/vendor_libs/test_vendor_lib/include/ |
H A D | command_packet.h | 34 // The header is followed by the payload, which contains command specific 38 // 0x0000 to 0x03FF. Note that the payload size is the size in octets of the 40 // parameters contained in the payload are command specific (including the size 47 CommandPacket(std::vector<uint8_t> header, std::vector<uint8_t> payload);
|
/system/core/include/private/ |
H A D | android_logger.h | 63 /* Event payload EVENT_TYPE_INT */ 72 android_event_int_t payload; member in struct:__anon1474 75 /* Event payload EVENT_TYPE_LONG */ 84 android_event_long_t payload; member in struct:__anon1476 88 * Event payload EVENT_TYPE_STRING 134 int __android_log_security_bwrite(int32_t tag, const void* payload, size_t len); 135 int __android_log_security_bswrite(int32_t tag, const char* payload);
|
/system/core/libkeyutils/include/ |
H A D | keyutils.h | 40 key_serial_t add_key(const char* type, const char* description, const void* payload,
|
/system/core/liblog/include/private/ |
H A D | android_logger.h | 63 /* Event payload EVENT_TYPE_INT */ 72 android_event_int_t payload; member in struct:__anon1566 75 /* Event payload EVENT_TYPE_LONG */ 84 android_event_long_t payload; member in struct:__anon1568 88 * Event payload EVENT_TYPE_STRING 134 int __android_log_security_bwrite(int32_t tag, const void* payload, size_t len); 135 int __android_log_security_bswrite(int32_t tag, const char* payload);
|
/system/core/trusty/keymaster/ |
H A D | keymaster_ipc.h | 55 * @payload: start of the serialized command specific payload 59 uint8_t payload[0]; member in struct:keymaster_message
|
/system/core/liblog/tests/ |
H A D | liblog_benchmark.cpp | 133 * char payload[]; 137 * char payload[]; 171 buffer.payload.type = EVENT_TYPE_INT; 173 buffer.payload.data = htole32(snapshot); 181 buffer.payload.data = htole32(snapshot); 209 * char payload[]; 213 * char payload[]; 225 android_log_event_int_t payload; member in struct:packet 245 buffer->payload.header.tag = 0; 246 buffer->payload 299 android_log_event_int_t payload; member in struct:packet 373 android_log_event_int_t payload; member in struct:packet 445 android_log_event_int_t payload; member in struct:packet [all...] |
/system/core/libkeyutils/ |
H A D | keyutils.cpp | 47 key_serial_t add_key(const char* type, const char* description, const void* payload, argument 49 return syscall(__NR_add_key, type, description, payload, payload_length, ring_id);
|
/system/tpm/trunks/ |
H A D | trunks_ftdi_spi.cc | 275 // First we read the FIFO payload header, to see how much data to expect. 276 // The header size is fixed to six bytes, the total payload size is stored 283 // Figure out the total payload size. 292 LOG(ERROR) << "Bad total payload size value: " << payload_size; 296 LOG(INFO) << "Total payload size " << payload_size; 304 uint8_t* payload = new uint8_t[payload_size + 1]; local 311 payload + handled_so_far); 320 delete[] payload; 324 // Now, read the last byte of the payload. 325 FtdiReadReg(TPM_DATA_FIFO_REG, sizeof(uint8_t), payload [all...] |
/system/update_engine/scripts/ |
H A D | paycheck.py | 33 A tuple (opts, payload, extra_args), where `opts' are the options 34 returned by the parser, `payload' is the name of the payload file 44 'When no partitions are provided, verifies the payload ' 46 epilog=('Note: a payload may verify correctly but fail to apply, and ' 48 'vs dynamic correctness. A payload that both verifies and ' 50 'Update Engine. Use --check to verify a payload prior to ' 53 check_opts = optparse.OptionGroup(parser, 'Checking payload integrity') 55 help=('force payload integrity check (e.g. before ' 58 help='Print a friendly description of the payload [all...] |