Home
last modified time | relevance | path

Searched refs:firmware (Results 1 – 25 of 596) sorted by relevance

12345678910>>...24

/external/vboot_reference/
DAndroid.bp34 "firmware/include",
35 "firmware/lib/include",
36 "firmware/lib/cgptlib/include",
37 "firmware/lib/cryptolib/include",
38 "firmware/lib/tpm_lite/include",
39 "firmware/2lib/include",
46 "firmware/lib/crc8.c",
47 "firmware/lib/utility.c",
48 "firmware/lib/vboot_api_init.c",
49 "firmware/lib/vboot_common_init.c",
[all …]
DMakefile279 firmware/lib/crc8.c \
280 firmware/lib/utility.c \
281 firmware/lib/vboot_api_init.c \
282 firmware/lib/vboot_common_init.c \
283 firmware/lib/vboot_nvstorage.c \
284 firmware/lib/vboot_nvstorage_rollback.c \
285 firmware/lib/region-init.c \
289 firmware/lib/cryptolib/padding.c \
290 firmware/lib/cryptolib/rsa.c \
291 firmware/lib/cryptolib/rsa_utility.c \
[all …]
DREADME2 verified boot in firmware.
10 firmware/
15 Refer to firmware/README for futher details.
28 The "firmware utility" tool, used to create, sign, and validate Chrome OS
79 firmware image
92 Generating a signed firmware image:
124 firmware image.
140 --in <firmware blob file> \
143 Where <algoid> is based on the signature algorithm to use for firmware
155 --in <signed firmware image>
[all …]
/external/u-boot/drivers/qe/
Dqe.c380 int qe_upload_firmware(const struct qe_firmware *firmware) in qe_upload_firmware() argument
395 if (!firmware) { in qe_upload_firmware()
400 hdr = &firmware->header; in qe_upload_firmware()
420 if ((firmware->count < 1) || (firmware->count > MAX_QE_RISC)) { in qe_upload_firmware()
426 calc_size += (firmware->count - 1) * sizeof(struct qe_microcode); in qe_upload_firmware()
428 for (i = 0; i < firmware->count; i++) in qe_upload_firmware()
435 be32_to_cpu(firmware->microcode[i].count); in qe_upload_firmware()
447 crc = be32_to_cpu(*(u32 *)((void *)firmware + calc_size)); in qe_upload_firmware()
448 if (crc != (crc32(-1, (const void *) firmware, calc_size) ^ -1)) { in qe_upload_firmware()
456 if (!firmware->split) { in qe_upload_firmware()
[all …]
/external/vboot_reference/msc/
Dnmakefile22 CFLAGS = $(CFLAGS) /I $R\firmware\lib\include
23 CFLAGS = $(CFLAGS) /I $R\firmware\lib\cgptlib\include
24 CFLAGS = $(CFLAGS) /I $R\firmware\include
25 CFLAGS = $(CFLAGS) /I $R\firmware\stub\include
26 CFLAGS = $(CFLAGS) /I $R\firmware\lib\cryptolib\include
35 {$R\firmware\linktest}.c{$O}.obj:
38 {$R\firmware\lib}.c{$O}.obj:
41 {$R\firmware\lib\cgptlib}.c{$O}.obj:
44 {$R\firmware\lib\cryptolib}.c{$O}.obj:
47 {$R\firmware\stub}.c{$O}.obj:
[all …]
/external/autotest/server/site_tests/firmware_UpdateFirmwareVersion/
Dcontrol9 PURPOSE = "Servo based firmware update test which checks the firmware version."
19 2. After firmware update, device restart with firmware A.
20 3. Firmware version does not increase after firmware update.
26 TEST_CLASS = "firmware"
30 This test requires a USB test image plugged in. The firmware id
31 the current running firmware must matches the system shellball's, or user
34 firmware version of the shellball and runs autoupdate. Check firmware
35 version after boot with firmware B, and then recover firmware A and B to
/external/u-boot/doc/uImage.FIT/
Dsec_firmware_ppa.its6 * For booting PPA (SEC Firmware), "firmware" is searched and loaded.
9 * respective load offsets from firmware image address.
16 firmware@1 {
19 type = "firmware";
34 type = "firmware";
44 description = "PPA Secure firmware";
45 firmware = "firmware@1";
Dmulti_spl.its8 * For booting U-Boot, "firmware" is searched first. If not found, "loadables"
18 description = "multiple firmware blobs and U-Boot, loaded by SPL";
33 type = "firmware";
40 mgmt-firmware {
41 description = "arisc management processor firmware";
42 type = "firmware";
92 loadables = "uboot", "atf", "mgmt-firmware";
/external/autotest/
Dglobal_config.ini316 # Released RO builds for running FAFT to qualify an AU firmware in which the
319 RELEASED_RO_BUILDS_auron_paine: auron_paine-firmware/R39-6301.58.6
320 RELEASED_RO_BUILDS_auron_yuna: auron_yuna-firmware/R39-6301.59.5
321 RELEASED_RO_BUILDS_banjo: banjo-firmware/R34-5216.334.4
322 RELEASED_RO_BUILDS_buddy: buddy-firmware/R39-6301.202.5
323 RELEASED_RO_BUILDS_candy: candy-firmware/R34-5216.310.1
324 RELEASED_RO_BUILDS_celes: celes-firmware/R46-7287.92.3
325 RELEASED_RO_BUILDS_cyan: cyan-firmware/R46-7287.57.32,cyan-firmware/R46-7287.57.25
326 RELEASED_RO_BUILDS_gandof: gandof-firmware/R39-6301.155.9
327 RELEASED_RO_BUILDS_gnawty: gnawty-firmware/R34-5216.239.34,gnawty-firmware/R34-5216.239.16
[all …]
/external/autotest/server/site_tests/firmware_CorruptBothFwBodyAB/
Dcontrol9 PURPOSE = "Servo based both firmware body A and B corruption test"
10 CRITERIA = "This test will fail if firmware does not enter recovery mode"
14 TEST_CLASS = "firmware"
19 This test corrupts both firmware body A and B and checks the next boot results.
21 The expected behavior is different if the firmware preamble USE_RO_NORMAL
22 flag is enabled. In the case USE_RO_NORMAL ON, the firmware corruption
24 not load and verify the RW firmware body. In the case USE_RO_NORMAL OFF,
25 the firmware verification fails on loading RW firmware and enters recovery
Dcontrol.dev9 PURPOSE = "Servo based both firmware body A and B corruption test"
10 CRITERIA = "This test will fail if firmware does not enter recovery mode"
14 TEST_CLASS = "firmware"
19 This test corrupts both firmware body A and B and checks the next boot results.
21 The expected behavior is different if the firmware preamble USE_RO_NORMAL
22 flag is enabled. In the case USE_RO_NORMAL ON, the firmware corruption
24 not load and verify the RW firmware body. In the case USE_RO_NORMAL OFF,
25 the firmware verification fails on loading RW firmware and enters recovery
/external/u-boot/arch/arm/cpu/armv8/
DKconfig9 Say Y here if there is not any trust firmware to set
17 register may be controlled by EL3/EL2 firmware. To be more
18 precise, by default (if there is EL2/EL3 firmware running)
44 menu "ARMv8 secure monitor firmware"
46 bool "Enable ARMv8 secure monitor firmware framework support"
50 This framework is aimed at making secure monitor firmware load
54 - Address of secure firmware.
55 - Address to hold the return address from secure firmware.
56 - Secure firmware FIT image related information.
58 - The target exception level that secure monitor firmware will
[all …]
/external/autotest/server/site_tests/firmware_CorruptFwBodyA/
Dcontrol9 PURPOSE = "Servo based firmware A body corruption test"
10 CRITERIA = "This test will fail if firmware verification mis-behaved"
14 TEST_CLASS = "firmware"
19 This test corrupts firmware body A and checks the next boot results.
21 The expected behavior is different if the firmware preamble USE_RO_NORMAL
22 flag is enabled. In the case USE_RO_NORMAL ON, the firmware corruption
24 not load and verify the RW firmware body. In the case USE_RO_NORMAL OFF,
25 the RW firwmare A corruption will result booting the firmware B.
Dcontrol.dev9 PURPOSE = "Servo based firmware A body corruption test"
10 CRITERIA = "This test will fail if firmware verification mis-behaved"
14 TEST_CLASS = "firmware"
19 This test corrupts firmware body A and checks the next boot results.
21 The expected behavior is different if the firmware preamble USE_RO_NORMAL
22 flag is enabled. In the case USE_RO_NORMAL ON, the firmware corruption
24 not load and verify the RW firmware body. In the case USE_RO_NORMAL OFF,
25 the RW firwmare A corruption will result booting the firmware B.
/external/autotest/server/site_tests/firmware_CorruptFwBodyB/
Dcontrol9 PURPOSE = "Servo based firmware B body corruption test"
10 CRITERIA = "This test will fail if firmware verification mis-behaved"
14 TEST_CLASS = "firmware"
19 This test corrupts firmware body B and checks the next boot results.
21 The expected behavior is different if the firmware preamble USE_RO_NORMAL
22 flag is enabled. In the case USE_RO_NORMAL ON, the firmware corruption
24 not load and verify the RW firmware body. In the case USE_RO_NORMAL OFF,
25 the RW firwmare B corruption will result booting the firmware A.
Dcontrol.dev9 PURPOSE = "Servo based firmware B body corruption test"
10 CRITERIA = "This test will fail if firmware verification mis-behaved"
14 TEST_CLASS = "firmware"
19 This test corrupts firmware body B and checks the next boot results.
21 The expected behavior is different if the firmware preamble USE_RO_NORMAL
22 flag is enabled. In the case USE_RO_NORMAL ON, the firmware corruption
24 not load and verify the RW firmware body. In the case USE_RO_NORMAL OFF,
25 the RW firwmare B corruption will result booting the firmware A.
/external/ltp/testcases/kernel/firmware/fw_load_kernel/
DREADME1 The aim of the test is to check device firmware loading. Since kernel 3.7
2 firmware loading changed to direct loading (by-pass udev). The test consists
7 This is a kernel module, which is a part of the device firmware loading test.
9 Template firmware file name and expected firmware file's data size are passed
10 as the insmod command line parameters. Then, the number of firmware test files
12 will initiate request firmware procedure. In the end, results can be read from
/external/autotest/server/site_tests/firmware_Fingerprint/
Dcontrol.ro_can_update_rw10 Validates that the RO fingerprint firmware can update the RW firmware.
13 Fails if the RO fingerprint firmware cannot update the RW firmware.
18 TEST_CLASS = "firmware"
24 Flashes RW firmware with a version string that ends in '.rb0'
26 firmware with version string that ends in '.dev' (also has rollback ID '0')
/external/autotest/server/site_tests/hardware_DiskFirmwareUpgrade/
Dcontrol15 The test uses a list of firmware packages and applies them to the DUT.
17 Each directory normaly contains a rule file and bzipped firmware image.
21 1 - the expected return code of chromeos-disk-firmware-update.sh:
24 - True if the update script should upgrade the firmware on the SSD.
25 - False if the update script is not supposed to touch the firmware on the SSD.
32 'broken_firmware_liteon': [0, True], # revert to previous firmware
43 'test_firmware' : [0, True], # revert to previous firmware
47 'test_firmware' : [0, True], # revert to previous firmware
51 'test_firmware' : [0, True], # revert to previous firmware
/external/u-boot/drivers/net/fm/
Dfm.c110 const struct qe_firmware *firmware) in fman_upload_firmware() argument
118 if (!firmware) { in fman_upload_firmware()
123 hdr = &firmware->header; in fman_upload_firmware()
130 firmware); in fman_upload_firmware()
142 if ((firmware->count != 1)) { in fman_upload_firmware()
148 calc_size += (firmware->count - 1) * sizeof(struct qe_microcode); in fman_upload_firmware()
150 for (i = 0; i < firmware->count; i++) in fman_upload_firmware()
157 be32_to_cpu(firmware->microcode[i].count); in fman_upload_firmware()
170 crc = be32_to_cpu(*(u32 *)((void *)firmware + calc_size)); in fman_upload_firmware()
171 if (crc != (crc32(-1, (const void *)firmware, calc_size) ^ -1)) { in fman_upload_firmware()
[all …]
/external/ltp/testcases/kernel/firmware/fw_load_user/
DREADME1 The aim of the test is to check device firmware loading. Since kernel 3.7
2 firmware loading changed to direct loading (by-pass udev). The test consists
8 - create firmware files in the standard firmware paths
9 - load the module and initiate firmware request procedure
/external/autotest/server/site_tests/enterprise_CFM_LogitechMeetupUpdater/
Dcontrol19 This test verifies that the Logitech Meetup firmware updater is working
22 - Backup the original firmware.
23 - Copy older firmware bundled with test.
24 - Force upgrade the Meetup device to older firmware.
25 - Powercycle the usb port to trigger the firmware updater.
26 - Confirm firmware has been updated.
/external/autotest/server/site_tests/enterprise_CFM_Aver520Updater/
Dcontrol.vc52020 This test verifies that the Aver VC520 camera firmware updater is working
23 - Backup the original firmware.
24 - Copy older firmware bundled with test.
25 - Force upgrade the Aver device to older firmware.
26 - Powercycle the usb port to trigger the firmware updater.
27 - Confirm firmware has been updated.
Dcontrol.cam52019 This test verifies that the Aver CAM520 camera firmware updater is working
22 - Backup the original firmware.
23 - Copy older firmware bundled with test.
24 - Force upgrade the Aver device to older firmware.
25 - Powercycle the usb port to trigger the firmware updater.
26 - Confirm firmware has been updated.
/external/autotest/server/site_tests/firmware_RollbackFirmware/
Dcontrol9 PURPOSE = "Servo based firmware rollback test."
10 CRITERIA = "This test will fail if firmware rollback doesn't fail verification."
14 TEST_CLASS = "firmware"
21 firmware A and results firmware B boot. It then rollbacks firmware B and

12345678910>>...24