Lines Matching +full:test +full:- +full:nostd
7 // http://www.apache.org/licenses/LICENSE-2.0
17 // The auto-generated wrappers are Rust unsafe and somewhat difficult to work
19 // a safe higher-level Rust API.
33 "--constified-enum-module=AvbDescriptorTag",
34 "--bitfield-enum=Avb.*Flags",
35 "--default-enum-style rust",
36 "--with-derive-default",
37 "--with-derive-custom=Avb.*Descriptor=FromZeroes,FromBytes",
38 "--with-derive-custom=AvbCertPermanentAttributes=FromZeroes,FromBytes,AsBytes",
39 "--with-derive-custom=AvbCertCertificate.*=FromZeroes,FromBytes,AsBytes",
40 "--with-derive-custom=AvbCertUnlock.*=FromZeroes,FromBytes,AsBytes",
41 "--allowlist-type=AvbDescriptorTag",
42 "--allowlist-type=Avb.*Flags",
43 "--allowlist-function=.*",
44 "--allowlist-var=AVB.*",
45 "--use-core",
46 "--raw-line=#![no_std]",
47 "--raw-line=use zerocopy::{AsBytes, FromBytes, FromZeroes};",
48 "--ctypes-prefix=core::ffi",
50 cflags: ["-DBORINGSSL_NO_CXX"],
64 // Full bindgen default for nostd targets.
66 name: "libavb_bindgen.nostd.defaults",
75 // Internal source-only bindgen with std.
121 // Bindgen nostd.
123 // Nostd targets always use rlibs, so we don't need a `rust_library` wrapper in
124 // this case; the rlib-only bindgen target is sufficient.
127 defaults: ["libavb_bindgen.nostd.defaults"],
130 // Bindgen auto-generated tests.
136 test_suites: ["general-tests"],
158 // Only rlib can build without the required nostd hooks (eh_personality,
188 // Adds UUID feature for nostd.
256 // "libavb_rs.defaults" plus additional unit test defaults.
261 test_suites: ["general-tests"],
291 // Integration test defaults.
318 test_suites: ["general-tests"],
323 // Integration test: no features.
330 // Integration test: UUID feature.
340 // Test images for verification.
342 // Unsigned 16KiB test image.
347 cmd: "$(location avbtool) generate_test_image --image_size 16384 --output $(out)",
350 // Unsigned vbmeta blob containing the test image descriptor for partition name "test_part".
358 // Unsigned vbmeta blob containing the test image descriptor for partition name "test_part_2".
369 // Currently this is the only in-tree usage of persistent digests, but if anyone else needs it
376 …--image $(location :avbrs_test_image) --partition_name test_part_persistent_digest --dynamic_parti…
387 // not seems to be possible here. For now pass `--do_not_generate_fec`.
388 …--image $(location :avbrs_test_image) --partition_name test_part_hashtree --partition_size 0 --sal…
391 // Standalone vbmeta image signing the test image descriptor.
400 …mage --key $(location :avb_testkey_rsa4096) --algorithm SHA512_RSA4096 --include_descriptors_from_…
403 // Standalone vbmeta image signing the test image descriptor with
414 …--key $(location :avb_cert_testkey_psk) --public_key_metadata $(location :avb_cert_test_metadata) …
417 // Standalone vbmeta image signing the test image descriptors for "test_part" and "test_part_2".
427 …--key $(location :avb_testkey_rsa4096) --algorithm SHA512_RSA4096 --include_descriptors_from_image…
430 // Standalone vbmeta image signing the test image persistent digest descriptor.
439 …--key $(location :avb_testkey_rsa4096) --algorithm SHA512_RSA4096 --include_descriptors_from_image…
451 …--prop test_prop_key:test_prop_value --key $(location :avb_testkey_rsa4096) --algorithm SHA512_RSA…
454 // Standalone vbmeta image with the test image hashtree descriptor.
463 … --key $(location :avb_testkey_rsa4096) --algorithm SHA512_RSA4096 --include_descriptors_from_imag…
475 …--kernel_cmdline test_cmdline_key=test_cmdline_value --key $(location :avb_testkey_rsa4096) --algo…
489 …--chain_partition test_part_2:4:$(location :avb_testkey_rsa8192_pub_bin) --key $(location :avb_tes…
492 // Combined test image + signed vbmeta footer for "test_part".
501 // Combined test image + signed vbmeta footer for "boot".
510 // Combined test image + signed vbmeta footer for "test_part_2" signed by