diff --git a/tools/releasetools/apex_utils.py b/tools/releasetools/apex_utils.py index 1c61938048..afebc40f1b 100644 --- a/tools/releasetools/apex_utils.py +++ b/tools/releasetools/apex_utils.py @@ -273,7 +273,7 @@ def ParseApexPayloadInfo(avbtool, payload_path): else: payload_info[key] = value - # Sanity check. + # Validation check. for key in ('Algorithm', 'Salt', 'apex.key', 'Hash Algorithm'): if key not in payload_info: raise ApexInfoError( diff --git a/tools/releasetools/blockimgdiff.py b/tools/releasetools/blockimgdiff.py index 8b6a6900d5..d33c2f79d5 100644 --- a/tools/releasetools/blockimgdiff.py +++ b/tools/releasetools/blockimgdiff.py @@ -521,7 +521,7 @@ class BlockImageDiff(object): stashed_blocks -= free_size if common.OPTIONS.cache_size is not None: - # Sanity check: abort if we're going to need more stash space than + # Validation check: abort if we're going to need more stash space than # the allowed size (cache_size * threshold). There are two purposes # of having a threshold here. a) Part of the cache may have been # occupied by some recovery logs. b) It will buy us some time to deal diff --git a/tools/releasetools/common.py b/tools/releasetools/common.py index 25ccea0a85..32864ab2c5 100644 --- a/tools/releasetools/common.py +++ b/tools/releasetools/common.py @@ -1177,7 +1177,7 @@ def BuildVBMeta(image_path, partitions, name, needed_partitions): if args and args.strip(): split_args = shlex.split(args) for index, arg in enumerate(split_args[:-1]): - # Sanity check that the image file exists. Some images might be defined + # Check that the image file exists. Some images might be defined # as a path relative to source tree, which may not be available at the # same location when running this script (we have the input target_files # zip only). For such cases, we additionally scan other locations (e.g. diff --git a/tools/releasetools/ota_from_target_files.py b/tools/releasetools/ota_from_target_files.py index c3dcf0d6c6..b70044e3f8 100755 --- a/tools/releasetools/ota_from_target_files.py +++ b/tools/releasetools/ota_from_target_files.py @@ -1940,7 +1940,7 @@ def GenerateAbOtaPackage(target_file, output_file, source_file=None): def GenerateNonAbOtaPackage(target_file, output_file, source_file=None): """Generates a non-A/B OTA package.""" - # Sanity check the loaded info dicts first. + # Check the loaded info dicts first. if OPTIONS.info_dict.get("no_recovery") == "true": raise common.ExternalError( "--- target build has specified no recovery ---") diff --git a/tools/releasetools/sign_target_files_apks.py b/tools/releasetools/sign_target_files_apks.py index 5d10c40be8..1cb9a4f470 100755 --- a/tools/releasetools/sign_target_files_apks.py +++ b/tools/releasetools/sign_target_files_apks.py @@ -1116,7 +1116,7 @@ def ReadApexKeysInfo(tf_zip): privkey.endswith(privkey_suffix) and pubkey[:-pubkey_suffix_len] == privkey[:-privkey_suffix_len]) - # Sanity check on the container key names, as we'll carry them without the + # Check the container key names, as we'll carry them without the # extensions. This doesn't apply to payload keys though, which we will use # full names only. container_cert = matches.group("CONTAINER_CERT")