/build/make/tools/releasetools/ |
D | ota_package_parser.py | 36 logging.info("already stashed {}: {}".format(SHA1, blocks)) 44 assert self.stash_map.has_key(SHA1), "stash {} not found".format(SHA1) 69 return "{} bytes".format(size) 72 return "{:.1f}{}".format(size / base, units) 78 logging.info("\nSimulating commands in '{}':".format(name)) 81 "4 lines, it has {}".format(name, len(lines)) 83 logging.info("(version: {})".format(lines[0])) 92 assert len(cmd_list) == 2, "command format error: {}".format(line) 98 assert len(cmd_list) >= 5, "command format error: {}".format(line) 110 assert len(cmd_list) >= 8, "command format error: {}".format(line) [all …]
|
D | build_super_image.py | 65 "{}:readonly:{}:{}".format(partition, image_size, group)] 67 cmd += ["--image", "{}={}".format(partition, image)] 98 size = info_dict["super_{}_device_size".format(device)] 99 cmd += ["--device", "{}:{}".format(device, size)] 104 group_size = info_dict["super_{}_group_size".format(group)] 106 cmd += ["--group", "{}_a:{}".format(group, group_size), 107 "--group", "{}_b:{}".format(group, group_size)] 109 cmd += ["--group", "{}:{}".format(group, group_size)] 112 info_dict["super_{}_partition_list".format(group)].strip()) 115 image = info_dict.get("{}_image".format(partition)) [all …]
|
D | check_partition_sizes.py | 59 msg = "{} is greater than {}:\n{} == {} > {} == {}".format(*format_args) 71 raise RuntimeError("{} does not equal {}:\n{} == {} != {} == {}".format( 140 size_list = [int(info_dict.get("super_{}_device_size".format(b), "0")) 153 sum_size = Expression("sum of sizes of {}".format(partition_names), 206 "BOARD_SUPER_PARTITION_SIZE{}".format(size_limit_suffix), 209 "BOARD_SUPER_PARTITION_WARN_LIMIT{}".format(size_limit_suffix), 212 "BOARD_SUPER_PARTITION_ERROR_LIMIT{}".format(size_limit_suffix), 222 if "super_{}_group_size".format(group) in info_dict and \ 223 "super_{}_partition_list".format(group) in info_dict: 225 "BOARD_{}_SIZE".format(group), [all …]
|
D | validate_target_files.py | 65 'SHA-1 mismatches for {}. actual {}, expected {}'.format( 187 assert len(lines) == 10, "Invalid line count: {}".format(lines) 192 "Failed to parse target line \"{}\"".format(lines[4]) 197 "Mismatching targets: {} vs {}".format(check_partition, flash_partition) 204 assert len(lines) == 11, "Invalid line count: {}".format(lines) 209 "Failed to parse source line \"{}\"".format(lines[4]) 214 "Invalid source partition: {}".format(source_partition) 222 "Failed to parse target line \"{}\"".format(lines[5]) 227 "Mismatching targets: {} vs {}".format( 232 "Invalid target partition: {}".format(target_partition) [all …]
|
D | edify_generator.py | 90 '{get_prop_command} + "\\".");').format( 126 '+ getprop("ro.build.thumbprint") + ".");').format(fp=fp, tp=tp) 176 source = '{}:{}:{}:{}'.format(tokens[0], tokens[1], tokens[2], tokens[3]) 177 target = '{}:{}:{}:{}'.format(tokens[0], tokens[1], tokens[4], tokens[5]) 207 'unexpected contents."));').format( 306 "Found mismatching values for source SHA-1: {} vs {}".format( 309 "Found mismatching values for target size: {} vs {}".format( 312 "Found mismatching values for target SHA-1: {} vs {}".format( 315 source = '{}:{}:{}:{}'.format(tokens[0], tokens[1], tokens[2], tokens[3]) 316 target = '{}:{}:{}:{}'.format(tokens[0], tokens[1], tokens[4], tokens[5]) [all …]
|
D | apex_utils.py | 78 .format(entry, self.apex_path)) 129 assert os.path.exists(filename), 'file {} not found'.format(filename) 152 generate_image_cmd.extend(['--signing_args', '"{}"'.format(signing_args)]) 179 '--prop', 'apex.key:{}'.format(payload_key_name), 192 'Failed to sign APEX payload {} with {}:\n{}'.format( 210 'Failed to validate payload signing for {} with {}:\n{}'.format( 229 raise ApexInfoError('Failed to find image: {}'.format(payload_path)) 236 'Failed to get APEX payload info for {}:\n{}'.format( 265 'Failed to parse prop string {}'.format(value)) 280 'Failed to find {} prop in {}'.format(key, payload_path))
|
D | common.py | 64 'executable -- build and run `{}` directly.'.format( 275 "Failed to run command '{}' (exit code {})".format( 305 "Failed to run command '{}' (exit code {}):\n{}".format( 400 "3.2.2. Build Parameters.".format(fingerprint)) 450 prop_file = '{}.build.prop'.format( 462 prop = prop.replace("ro.product", "ro.product.{}".format(partition)) 464 prop = prop.replace("ro.", "ro.{}.".format(partition)) 500 "Invalid ro.product.property_source_order '{}'".format(source_order)) 504 "ro.product", "ro.product.{}".format(source_partition), 1) 509 raise ExternalError("couldn't resolve {}".format(prop)) [all …]
|
D | check_target_files_vintf.py | 106 return ['--kernel', '{}:{}'.format(version, config_path)] 139 common_command += ['--dirmap', '{}:{}'.format(device_path, real_path)] 156 .format(' '.join(command), proc.returncode, out, err)) 221 raise ValueError('{} is not a valid directory or zip file'.format(inp))
|
D | img_from_target_files.py | 135 entries.append('{}:{}'.format(image_path, image)) 151 image = 'OTA/super_{}.img'.format(device) 152 assert image in namelist, 'Failed to find {}'.format(image) 153 entries.append('{}:{}'.format(image, os.path.basename(image)))
|
D | img_from_target_files | 135 entries.append('{}:{}'.format(image_path, image)) 151 image = 'OTA/super_{}.img'.format(device) 152 assert image in namelist, 'Failed to find {}'.format(image) 153 entries.append('{}:{}'.format(image, os.path.basename(image)))
|
D | sign_target_files_apks.py | 259 "non-PRESIGNED payload key {}").format(apex, payload_override) 262 "Setting {} payload as PRESIGNED due to PRESIGNED container".format( 294 "Invalid compressed_extension arg: '{}'".format(compressed_extension) 299 "Invalid skipped_prefixes input type: {}".format(type(skipped_prefixes)) 355 "not sign this apk).".format("\n ".join(unknown_files))) 377 "{}: payload_key {}, container_key {}".format( 381 "Invalid APEX keys specified:\n {}\n".format( 735 "Found duplicate entries after cert replacement: {}".format(data) 925 assert p.returncode == 0, "Failed to dump certificate: {}".format(stderr) 928 print("Replacing verity keyid with {}".format(keyid)) [all …]
|
D | sign_target_files_apks | 259 "non-PRESIGNED payload key {}").format(apex, payload_override) 262 "Setting {} payload as PRESIGNED due to PRESIGNED container".format( 294 "Invalid compressed_extension arg: '{}'".format(compressed_extension) 299 "Invalid skipped_prefixes input type: {}".format(type(skipped_prefixes)) 355 "not sign this apk).".format("\n ".join(unknown_files))) 377 "{}: payload_key {}, container_key {}".format( 381 "Invalid APEX keys specified:\n {}\n".format( 735 "Found duplicate entries after cert replacement: {}".format(data) 925 assert p.returncode == 0, "Failed to dump certificate: {}".format(stderr) 928 print("Replacing verity keyid with {}".format(keyid)) [all …]
|
D | verity_utils.py | 272 "Invalid partition size: {}".format(partition_size) 353 "{}".format(sparse_image_size, self.image_size)) 459 "Invalid partition size: {}".format(partition_size) 471 "Failed to calculate max image size:\n{}".format(output)) 475 "Invalid max image size: {}".format(output)) 504 raise BuildVerityImageError("Failed to add AVB footer: {}".format(output)) 526 info_dict.get("{}_verity_block_device".format(partition_name))): 527 partition_size = info_dict["{}_size".format(partition_name)] 596 " total_blocks: {}".format(self.partition_size, image.total_blocks) 640 assert len(table_entries) == 10, "Unexpected verity table size {}".format( [all …]
|
D | ota_from_target_files | 339 cmd = ["delta_generator", "--out_maximum_signature_size_file={}".format( 340 out_signature_size_file), "--private_key={}".format(signing_key)] 633 "can't generate incremental that adds {}".format(name)) 703 "{} is not returning a list of BlockDifference objects".format( 808 script.Print("Target: {}".format(target_info.fingerprint)) 1081 'Insufficient reserved space: reserved={}, actual={}'.format( 1099 "Mismatching streaming metadata: {} vs {}.".format(actual, expected) 1202 return ['payload_metadata.bin:{}:{}'.format(offset, size)] 1257 assert magic == 0x43724155, "Invalid magic: {:x}".format(magic) 1477 script.Print("Source: {}".format(source_info.fingerprint)) [all …]
|
D | ota_from_target_files.py | 339 cmd = ["delta_generator", "--out_maximum_signature_size_file={}".format( 340 out_signature_size_file), "--private_key={}".format(signing_key)] 633 "can't generate incremental that adds {}".format(name)) 703 "{} is not returning a list of BlockDifference objects".format( 808 script.Print("Target: {}".format(target_info.fingerprint)) 1081 'Insufficient reserved space: reserved={}, actual={}'.format( 1099 "Mismatching streaming metadata: {} vs {}.".format(actual, expected) 1202 return ['payload_metadata.bin:{}:{}'.format(offset, size)] 1257 assert magic == 0x43724155, "Invalid magic: {:x}".format(magic) 1477 script.Print("Source: {}".format(source_info.fingerprint)) [all …]
|
D | add_img_to_target_files.py | 131 assert image_blocks > 0, "blocks for {} must be positive".format(which) 138 rangelib.RangeSet("0-{}".format(image_blocks))) 143 care_map_ranges = rangelib.RangeSet("0-{}".format(image_blocks)) 362 "avb_{}_partition_size".format(partition_name)) 363 key_path = OPTIONS.info_dict.get("avb_{}_key_path".format(partition_name)) 364 algorithm = OPTIONS.info_dict.get("avb_{}_algorithm".format(partition_name)) 366 "avb_{}_add_hashtree_footer_args".format(partition_name)) 368 "avb_{}_partition_size".format(partition_name)) 375 "avb_{}_image_list".format(partition_name)).split(): 512 output_zip, OPTIONS.input_tmp, "IMAGES", "{}.img".format(name)) [all …]
|
/build/soong/ui/terminal/ |
D | format.go | 26 format string member 35 func newFormatter(format string, quiet bool) formatter { 37 format: format, 55 if s.format == "" { 60 for i := 0; i < len(s.format); i++ { 61 c := s.format[i] 68 if i == len(s.format) { 73 c = s.format[i]
|
/build/soong/ui/logger/ |
D | logger.go | 49 Printf(format string, v ...interface{}) 56 Verbosef(format string, v ...interface{}) 63 Fatalf(format string, v ...interface{}) 68 Panicf(format string, v ...interface{}) 244 func (s *stdLogger) Printf(format string, v ...interface{}) { 245 output := fmt.Sprintf(format, v...) 265 func (s *stdLogger) Verbosef(format string, v ...interface{}) { 266 output := fmt.Sprintf(format, v...) 287 func (s *stdLogger) Fatalf(format string, v ...interface{}) { 288 output := fmt.Sprintf(format, v...) [all …]
|
/build/make/target/product/security/ |
D | README | 22 1. convert pk8 format key to pem format 25 2. create a signature using the pem format key 31 dumpkey.jar is a Java tool that takes an x.509 certificate in PEM format as
|
/build/make/tools/ |
D | soong_to_convert.py | 98 extra = " ({})".format(problems[module]) 110 print("{} Module (potential problems)".format(count_header)) 112 print("{:>{}} {}".format(count, count_width, module))
|
D | extract_kernel.py | 174 "Cannot extract kernel {}".format(desc)) 228 "configs in {}".format(args.input.name)): 231 "version in {}".format(args.input.name)): 234 "kernel release in {}".format(args.input.name)):
|
D | check_elf_file.py | 362 self._error('Failed to open "{}".'.format(path)) 368 self._error('File "{}" must have a valid ELF magic word.'.format(path)) 371 self._error('An unknown error occurred while opening "{}".'.format(path)) 396 .format(self._file_under_test.dt_soname, soname)) 413 .format(lib.decode('utf-8'))) 474 self._error('Unresolved symbol: {}'.format(sym)) 480 .format(self._file_path))
|
/build/soong/scripts/ |
D | reverse-deps.sh | 218 diff "${oldDeps}" "${allDeps}" --old-line-format='' \ 219 --new-line-format='%L' --unchanged-line-format='' > "${newDeps}"
|
D | OWNERS | 1 per-file system-clang-format,system-clang-format-2 = enh@google.com,smoreland@google.com
|
/build/blueprint/ |
D | singleton_ctx.go | 51 ModuleErrorf(module Module, format string, args ...interface{}) 54 Errorf(format string, args ...interface{}) 201 func (s *singletonContext) ModuleErrorf(logicModule Module, format string, 204 s.error(s.context.ModuleErrorf(logicModule, format, args...)) 207 func (s *singletonContext) Errorf(format string, args ...interface{}) { 209 s.error(fmt.Errorf(format, args...))
|