Home
last modified time | relevance | path

Searched refs:format (Results 1 – 25 of 84) sorted by relevance

1234

/build/make/tools/releasetools/
Dota_package_parser.py36 logging.info("already stashed {}: {}".format(SHA1, blocks))
44 assert self.stash_map.has_key(SHA1), "stash {} not found".format(SHA1)
69 return "{} bytes".format(size)
72 return "{:.1f}{}".format(size / base, units)
78 logging.info("\nSimulating commands in '{}':".format(name))
81 "4 lines, it has {}".format(name, len(lines))
83 logging.info("(version: {})".format(lines[0]))
92 assert len(cmd_list) == 2, "command format error: {}".format(line)
98 assert len(cmd_list) >= 5, "command format error: {}".format(line)
110 assert len(cmd_list) >= 8, "command format error: {}".format(line)
[all …]
Dbuild_super_image.py65 "{}:readonly:{}:{}".format(partition, image_size, group)]
67 cmd += ["--image", "{}={}".format(partition, image)]
98 size = info_dict["super_{}_device_size".format(device)]
99 cmd += ["--device", "{}:{}".format(device, size)]
104 group_size = info_dict["super_{}_group_size".format(group)]
106 cmd += ["--group", "{}_a:{}".format(group, group_size),
107 "--group", "{}_b:{}".format(group, group_size)]
109 cmd += ["--group", "{}:{}".format(group, group_size)]
112 info_dict["super_{}_partition_list".format(group)].strip())
115 image = info_dict.get("{}_image".format(partition))
[all …]
Dcheck_partition_sizes.py59 msg = "{} is greater than {}:\n{} == {} > {} == {}".format(*format_args)
71 raise RuntimeError("{} does not equal {}:\n{} == {} != {} == {}".format(
140 size_list = [int(info_dict.get("super_{}_device_size".format(b), "0"))
153 sum_size = Expression("sum of sizes of {}".format(partition_names),
206 "BOARD_SUPER_PARTITION_SIZE{}".format(size_limit_suffix),
209 "BOARD_SUPER_PARTITION_WARN_LIMIT{}".format(size_limit_suffix),
212 "BOARD_SUPER_PARTITION_ERROR_LIMIT{}".format(size_limit_suffix),
222 if "super_{}_group_size".format(group) in info_dict and \
223 "super_{}_partition_list".format(group) in info_dict:
225 "BOARD_{}_SIZE".format(group),
[all …]
Dvalidate_target_files.py65 'SHA-1 mismatches for {}. actual {}, expected {}'.format(
187 assert len(lines) == 10, "Invalid line count: {}".format(lines)
192 "Failed to parse target line \"{}\"".format(lines[4])
197 "Mismatching targets: {} vs {}".format(check_partition, flash_partition)
204 assert len(lines) == 11, "Invalid line count: {}".format(lines)
209 "Failed to parse source line \"{}\"".format(lines[4])
214 "Invalid source partition: {}".format(source_partition)
222 "Failed to parse target line \"{}\"".format(lines[5])
227 "Mismatching targets: {} vs {}".format(
232 "Invalid target partition: {}".format(target_partition)
[all …]
Dedify_generator.py90 '{get_prop_command} + "\\".");').format(
126 '+ getprop("ro.build.thumbprint") + ".");').format(fp=fp, tp=tp)
176 source = '{}:{}:{}:{}'.format(tokens[0], tokens[1], tokens[2], tokens[3])
177 target = '{}:{}:{}:{}'.format(tokens[0], tokens[1], tokens[4], tokens[5])
207 'unexpected contents."));').format(
306 "Found mismatching values for source SHA-1: {} vs {}".format(
309 "Found mismatching values for target size: {} vs {}".format(
312 "Found mismatching values for target SHA-1: {} vs {}".format(
315 source = '{}:{}:{}:{}'.format(tokens[0], tokens[1], tokens[2], tokens[3])
316 target = '{}:{}:{}:{}'.format(tokens[0], tokens[1], tokens[4], tokens[5])
[all …]
Dapex_utils.py78 .format(entry, self.apex_path))
129 assert os.path.exists(filename), 'file {} not found'.format(filename)
152 generate_image_cmd.extend(['--signing_args', '"{}"'.format(signing_args)])
179 '--prop', 'apex.key:{}'.format(payload_key_name),
192 'Failed to sign APEX payload {} with {}:\n{}'.format(
210 'Failed to validate payload signing for {} with {}:\n{}'.format(
229 raise ApexInfoError('Failed to find image: {}'.format(payload_path))
236 'Failed to get APEX payload info for {}:\n{}'.format(
265 'Failed to parse prop string {}'.format(value))
280 'Failed to find {} prop in {}'.format(key, payload_path))
Dcommon.py64 'executable -- build and run `{}` directly.'.format(
275 "Failed to run command '{}' (exit code {})".format(
305 "Failed to run command '{}' (exit code {}):\n{}".format(
400 "3.2.2. Build Parameters.".format(fingerprint))
450 prop_file = '{}.build.prop'.format(
462 prop = prop.replace("ro.product", "ro.product.{}".format(partition))
464 prop = prop.replace("ro.", "ro.{}.".format(partition))
500 "Invalid ro.product.property_source_order '{}'".format(source_order))
504 "ro.product", "ro.product.{}".format(source_partition), 1)
509 raise ExternalError("couldn't resolve {}".format(prop))
[all …]
Dcheck_target_files_vintf.py106 return ['--kernel', '{}:{}'.format(version, config_path)]
139 common_command += ['--dirmap', '{}:{}'.format(device_path, real_path)]
156 .format(' '.join(command), proc.returncode, out, err))
221 raise ValueError('{} is not a valid directory or zip file'.format(inp))
Dimg_from_target_files.py135 entries.append('{}:{}'.format(image_path, image))
151 image = 'OTA/super_{}.img'.format(device)
152 assert image in namelist, 'Failed to find {}'.format(image)
153 entries.append('{}:{}'.format(image, os.path.basename(image)))
Dimg_from_target_files135 entries.append('{}:{}'.format(image_path, image))
151 image = 'OTA/super_{}.img'.format(device)
152 assert image in namelist, 'Failed to find {}'.format(image)
153 entries.append('{}:{}'.format(image, os.path.basename(image)))
Dsign_target_files_apks.py259 "non-PRESIGNED payload key {}").format(apex, payload_override)
262 "Setting {} payload as PRESIGNED due to PRESIGNED container".format(
294 "Invalid compressed_extension arg: '{}'".format(compressed_extension)
299 "Invalid skipped_prefixes input type: {}".format(type(skipped_prefixes))
355 "not sign this apk).".format("\n ".join(unknown_files)))
377 "{}: payload_key {}, container_key {}".format(
381 "Invalid APEX keys specified:\n {}\n".format(
735 "Found duplicate entries after cert replacement: {}".format(data)
925 assert p.returncode == 0, "Failed to dump certificate: {}".format(stderr)
928 print("Replacing verity keyid with {}".format(keyid))
[all …]
Dsign_target_files_apks259 "non-PRESIGNED payload key {}").format(apex, payload_override)
262 "Setting {} payload as PRESIGNED due to PRESIGNED container".format(
294 "Invalid compressed_extension arg: '{}'".format(compressed_extension)
299 "Invalid skipped_prefixes input type: {}".format(type(skipped_prefixes))
355 "not sign this apk).".format("\n ".join(unknown_files)))
377 "{}: payload_key {}, container_key {}".format(
381 "Invalid APEX keys specified:\n {}\n".format(
735 "Found duplicate entries after cert replacement: {}".format(data)
925 assert p.returncode == 0, "Failed to dump certificate: {}".format(stderr)
928 print("Replacing verity keyid with {}".format(keyid))
[all …]
Dverity_utils.py272 "Invalid partition size: {}".format(partition_size)
353 "{}".format(sparse_image_size, self.image_size))
459 "Invalid partition size: {}".format(partition_size)
471 "Failed to calculate max image size:\n{}".format(output))
475 "Invalid max image size: {}".format(output))
504 raise BuildVerityImageError("Failed to add AVB footer: {}".format(output))
526 info_dict.get("{}_verity_block_device".format(partition_name))):
527 partition_size = info_dict["{}_size".format(partition_name)]
596 " total_blocks: {}".format(self.partition_size, image.total_blocks)
640 assert len(table_entries) == 10, "Unexpected verity table size {}".format(
[all …]
Dota_from_target_files339 cmd = ["delta_generator", "--out_maximum_signature_size_file={}".format(
340 out_signature_size_file), "--private_key={}".format(signing_key)]
633 "can't generate incremental that adds {}".format(name))
703 "{} is not returning a list of BlockDifference objects".format(
808 script.Print("Target: {}".format(target_info.fingerprint))
1081 'Insufficient reserved space: reserved={}, actual={}'.format(
1099 "Mismatching streaming metadata: {} vs {}.".format(actual, expected)
1202 return ['payload_metadata.bin:{}:{}'.format(offset, size)]
1257 assert magic == 0x43724155, "Invalid magic: {:x}".format(magic)
1477 script.Print("Source: {}".format(source_info.fingerprint))
[all …]
Dota_from_target_files.py339 cmd = ["delta_generator", "--out_maximum_signature_size_file={}".format(
340 out_signature_size_file), "--private_key={}".format(signing_key)]
633 "can't generate incremental that adds {}".format(name))
703 "{} is not returning a list of BlockDifference objects".format(
808 script.Print("Target: {}".format(target_info.fingerprint))
1081 'Insufficient reserved space: reserved={}, actual={}'.format(
1099 "Mismatching streaming metadata: {} vs {}.".format(actual, expected)
1202 return ['payload_metadata.bin:{}:{}'.format(offset, size)]
1257 assert magic == 0x43724155, "Invalid magic: {:x}".format(magic)
1477 script.Print("Source: {}".format(source_info.fingerprint))
[all …]
Dadd_img_to_target_files.py131 assert image_blocks > 0, "blocks for {} must be positive".format(which)
138 rangelib.RangeSet("0-{}".format(image_blocks)))
143 care_map_ranges = rangelib.RangeSet("0-{}".format(image_blocks))
362 "avb_{}_partition_size".format(partition_name))
363 key_path = OPTIONS.info_dict.get("avb_{}_key_path".format(partition_name))
364 algorithm = OPTIONS.info_dict.get("avb_{}_algorithm".format(partition_name))
366 "avb_{}_add_hashtree_footer_args".format(partition_name))
368 "avb_{}_partition_size".format(partition_name))
375 "avb_{}_image_list".format(partition_name)).split():
512 output_zip, OPTIONS.input_tmp, "IMAGES", "{}.img".format(name))
[all …]
/build/soong/ui/terminal/
Dformat.go26 format string member
35 func newFormatter(format string, quiet bool) formatter {
37 format: format,
55 if s.format == "" {
60 for i := 0; i < len(s.format); i++ {
61 c := s.format[i]
68 if i == len(s.format) {
73 c = s.format[i]
/build/soong/ui/logger/
Dlogger.go49 Printf(format string, v ...interface{})
56 Verbosef(format string, v ...interface{})
63 Fatalf(format string, v ...interface{})
68 Panicf(format string, v ...interface{})
244 func (s *stdLogger) Printf(format string, v ...interface{}) {
245 output := fmt.Sprintf(format, v...)
265 func (s *stdLogger) Verbosef(format string, v ...interface{}) {
266 output := fmt.Sprintf(format, v...)
287 func (s *stdLogger) Fatalf(format string, v ...interface{}) {
288 output := fmt.Sprintf(format, v...)
[all …]
/build/make/target/product/security/
DREADME22 1. convert pk8 format key to pem format
25 2. create a signature using the pem format key
31 dumpkey.jar is a Java tool that takes an x.509 certificate in PEM format as
/build/make/tools/
Dsoong_to_convert.py98 extra = " ({})".format(problems[module])
110 print("{} Module (potential problems)".format(count_header))
112 print("{:>{}} {}".format(count, count_width, module))
Dextract_kernel.py174 "Cannot extract kernel {}".format(desc))
228 "configs in {}".format(args.input.name)):
231 "version in {}".format(args.input.name)):
234 "kernel release in {}".format(args.input.name)):
Dcheck_elf_file.py362 self._error('Failed to open "{}".'.format(path))
368 self._error('File "{}" must have a valid ELF magic word.'.format(path))
371 self._error('An unknown error occurred while opening "{}".'.format(path))
396 .format(self._file_under_test.dt_soname, soname))
413 .format(lib.decode('utf-8')))
474 self._error('Unresolved symbol: {}'.format(sym))
480 .format(self._file_path))
/build/soong/scripts/
Dreverse-deps.sh218 diff "${oldDeps}" "${allDeps}" --old-line-format='' \
219 --new-line-format='%L' --unchanged-line-format='' > "${newDeps}"
DOWNERS1 per-file system-clang-format,system-clang-format-2 = enh@google.com,smoreland@google.com
/build/blueprint/
Dsingleton_ctx.go51 ModuleErrorf(module Module, format string, args ...interface{})
54 Errorf(format string, args ...interface{})
201 func (s *singletonContext) ModuleErrorf(logicModule Module, format string,
204 s.error(s.context.ModuleErrorf(logicModule, format, args...))
207 func (s *singletonContext) Errorf(format string, args ...interface{}) {
209 s.error(fmt.Errorf(format, args...))

1234