File: minios.proto

package info (click to toggle)
chromium 138.0.7204.183-1
  • links: PTS, VCS
  • area: main
  • in suites: trixie
  • size: 6,071,908 kB
  • sloc: cpp: 34,937,088; ansic: 7,176,967; javascript: 4,110,704; python: 1,419,953; asm: 946,768; xml: 739,971; pascal: 187,324; sh: 89,623; perl: 88,663; objc: 79,944; sql: 50,304; cs: 41,786; fortran: 24,137; makefile: 21,806; php: 13,980; tcl: 13,166; yacc: 8,925; ruby: 7,485; awk: 3,720; lisp: 3,096; lex: 1,327; ada: 727; jsp: 228; sed: 36
file content (55 lines) | stat: -rw-r--r-- 1,507 bytes parent folder | download | duplicates (9)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
// Copyright 2021 The ChromiumOS Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.

syntax = "proto3";

option optimize_for = LITE_RUNTIME;

package minios;

// This is the message that is returned from MiniOs via `GetState` method
// and indicates what state MiniOs is in.
message State {
  // Indicates what state MiniOs is in.
  enum States {
    IDLE = 0;
    NETWORK_SCANNING = 1;
    NETWORK_SELECTION = 2;
    NETWORK_CREDENTIALS = 3;
    CONNECTING = 4;
    CONNECTED = 5;
    RECOVERING = 6;
    FINALIZING = 7;
    COMPLETED = 8;
    ERROR = 9;
    DEBUG_OPTIONS = 10;
    DEBUG_LOGS = 11;
    LANGUAGE_SELECTION = 12;
  }
  States state = 1;
}

// Format definition for log storage manifest.
message LogManifest {
  message Entry {
    // Number of bytes to skip to reach the start of this log blob from the
    // start of the partition.
    int32 offset = 1;
    // Count in bytes to read to fully extract this log.
    int64 count = 2;
  }
  // In the future this can be changed to repeated if need be without breakage.
  Entry entry = 1;
}

// Layout for storing encrypted contents of a file. `iv` and `tag` fields are
// expected by `libhwsec` AES Encrypt and Decrypt functions.
message EncryptedLogFile {
  // Initialization vector, randomly generated at encryption time.
  bytes iv = 1;
  // Authentication tag, used to verify integrity of data after decryption.
  bytes tag = 2;
  // Encrypted data.
  bytes ciphertext = 3;
}