Lines Matching refs:payload
132 def add(self, kind, payload): argument
143 buf = struct.pack(e + 'HH', kind, len(payload))
145 buf = struct.pack(e + 'BBH', TLV_VALUES[kind], 0, len(payload))
147 self.buf += payload
286 self.payload = []
334 len(self.payload))
343 self.payload = copy.copy(self.infile_data)
348 self.payload = copy.copy(self.infile_data)
351 self.image_size = len(self.payload)
358 self.payload = bytes([self.erased_val] * self.header_size) + \
359 self.payload
365 self.payload = compression_header + data
366 self.image_size = len(self.payload)
373 self.payload = bytes([self.erased_val] * self.header_size) + \
374 self.payload
389 h.frombytes(bytes=self.payload, offset=self.base_addr)
412 f.write(self.payload)
416 if any(v != 0 for v in self.payload[0:self.header_size]):
425 padding = self.slot_size - (len(self.payload) + tsize)
429 len(self.payload), tsize, self.slot_size)
545 pad_len = len(self.payload) % 16
548 if isinstance(self.payload, bytes):
549 self.payload += pad
551 self.payload.extend(pad)
575 payload = struct.pack(e + 'I', self.security_counter)
576 prot_tlv.add('SEC_CNT', payload)
583 payload = struct.pack(
591 prot_tlv.add('DEPENDENCY', payload)
600 protected_tlv_off = len(self.payload)
602 self.payload += prot_tlv.get()
611 sha.update(self.payload)
620 message = bytes(self.payload)
631 self.payload = digest
648 sig = key.sign(bytes(self.payload))
663 self.payload = self.payload[:protected_tlv_off]
694 img = bytes(self.payload[self.header_size:])
695 self.payload[self.header_size:] = \
698 self.payload += prot_tlv.get()
699 self.payload += tlv.get()
749 len(self.payload) - self.header_size, # ImageSz
756 self.payload = bytearray(self.payload)
757 self.payload[:len(header)] = header
788 padding = size - (len(self.payload) + tsize)
797 self.payload += pbytes
865 payload = b[:prot_tlv_size]
868 key.verify(tlv_sig, payload)