Searched +full:- +full:- +full:boot +full:- +full:method (Results 1 – 25 of 492) sorted by relevance
12345678910>>...20
| /external/autotest/server/cros/faft/utils/ |
| D | mode_switcher.py | 3 # Use of this source code is governed by a BSD-style license that can be 36 """Bypass the dev mode firmware logic to boot internal image.""" 41 """Bypass the dev mode firmware logic to boot USB.""" 46 """Bypass the rec mode firmware logic to boot USB.""" 65 # This is used as a workaround of a bug in RO - DUT does not supply 80 # Despite the faft_config, make sure the issue occurs - 114 """Bypass the dev mode firmware logic to boot internal image. 116 Press Ctrl-D repeatedly. To obtain a low firmware boot time, pressing 120 logging.info("Pressing Ctrl-D.") 132 """Bypass the dev mode firmware logic to boot USB.""" [all …]
|
| D | menu_mode_switcher.py | 3 # Use of this source code is governed by a BSD-style license that can be 32 Trigger to-dev transition. 39 Boot from internal disk in developer mode. 45 """Boot from external disk in developer mode.""" 51 Trigger dev-to-norm transition. 60 This method should work in both developer and recovery screens. 69 The "legacy menu UI" is an old menu-based UI, which has been replaced 75 Trigger to-dev transition. 81 Boot from internal disk in developer mode. 90 Menu items in developer boot options screen: [all …]
|
| /external/jazzer-api/src/main/java/com/code_intelligence/jazzer/junit/ |
| D | FuzzTestExtensions.java | 7 // http://www.apache.org/licenses/LICENSE-2.0 19 import java.lang.reflect.Method; 34 private static final AtomicReference<Method> fuzzTestMethod = new AtomicReference<>(); 40 ReflectiveInvocationContext<Method> invocationContext, ExtensionContext extensionContext) in interceptTestTemplateMethod() 45 // Skip the invocation of the test method with the special arguments provided by in interceptTestTemplateMethod() 50 // Blocked by https://github.com/junit-team/junit5/issues/3282: in interceptTestTemplateMethod() 53 // TODO: Error out if there is a non-Jazzer ArgumentsProvider and the SeedSerializer does not in interceptTestTemplateMethod() 67 * finding, as stored in JazzerInternal#lastFinding, is reported. <li>If the fuzz target method 75 // method hook invocations that enables them only while a global variable managed by in runWithHooks() 79 // * Using a dedicated class loader for @FuzzTests: First-class support for this isn't in runWithHooks() [all …]
|
| /external/arm-trusted-firmware/docs/plat/ |
| D | socionext-uniphier.rst | 4 Socionext UniPhier Armv8-A SoCs use Trusted Firmware-A (TF-A) as the secure 7 UniPhier SoC family implements its internal boot ROM, which loads 64KB [1]_ 8 image from a non-volatile storage to the on-chip SRAM, and jumps over to it. 9 TF-A provides a special mode, BL2-AT-EL3, which enables BL2 to execute at EL3. 10 It is useful for platforms with non-TF-A boot ROM, like UniPhier. Here, a 12 :ref:`Trusted Board Boot (TBB) <Trusted Board Boot>` is enabled. 14 `UniPhier BL`_. This loader runs in the on-chip SRAM, initializes the DRAM, 16 of TF-A run in DRAM. 20 complies with the Trusted Board Boot Requirements (TBBR) specification. 24 the BL2 validity in a different way; BL2 is GZIP-compressed and appended to [all …]
|
| /external/trusty/arm-trusted-firmware/docs/plat/ |
| D | socionext-uniphier.rst | 4 Socionext UniPhier Armv8-A SoCs use Trusted Firmware-A (TF-A) as the secure 7 UniPhier SoC family implements its internal boot ROM, which loads 64KB [1]_ 8 image from a non-volatile storage to the on-chip SRAM, and jumps over to it. 9 TF-A provides a special mode, BL2-AT-EL3, which enables BL2 to execute at EL3. 10 It is useful for platforms with non-TF-A boot ROM, like UniPhier. Here, a 12 :ref:`Trusted Board Boot (TBB) <Trusted Board Boot>` is enabled. 14 `UniPhier BL`_. This loader runs in the on-chip SRAM, initializes the DRAM, 16 of TF-A run in DRAM. 20 complies with the Trusted Board Boot Requirements (TBBR) specification. 24 the BL2 validity in a different way; BL2 is GZIP-compressed and appended to [all …]
|
| /external/toolchain-utils/binary_search_tool/ |
| D | README.bisect.md | 7 method defines a default set of options to pass to 18 This method will bisect across all packages in a ChromeOS repository and find 19 the offending packages (according to your test script). This method takes the 25 By default the ChromeOS package method will do a simple interactive test that 28 1. Setup: The ChromeOS package method requires that you have three build trees: 31 /build/${board}.bad - The build tree for your "bad" build 32 /build/${board}.good - The build tree for your "good" build 33 /build/${board}.work - A full copy of /build/${board}.bad 43 --get_initial_items='cros_pkg/get_initial_items.sh' 44 --switch_to_good='cros_pkg/switch_to_good.sh' [all …]
|
| /external/autotest/server/site_tests/firmware_MenuDevBootUSB/ |
| D | firmware_MenuDevBootUSB.py | 2 # Use of this source code is governed by a BSD-style license that can be 13 Servo based test for USB boot in developer mode through the UI menu. 43 """Method which actually runs the test.""" 50 logging.info('Boot from USB in developer screen') 60 # For menu UI, boot from USB in external boot screen, a polling screen 63 logging.info('Boot from USB in external boot screen') 68 # Since there is no USB plugged-in, now the device should be in 69 # external boot screen 79 # After selecting "Boot from external disk" while no USB is plugged-in, 81 logging.info('Try to boot from USB without USB plugged-in') [all …]
|
| /external/python/google-api-python-client/docs/dyn/ |
| D | notebooks_v1.projects.locations.instances.html | 8 font-weight: inherit; 9 font-style: inherit; 10 font-size: 100%; 11 font-family: inherit; 12 vertical-align: baseline; 16 font-size: 13px; 21 font-size: 26px; 22 margin-bottom: 1em; 26 font-size: 24px; 27 margin-bottom: 1em; [all …]
|
| D | genomics_v1alpha2.pipelines.html | 8 font-weight: inherit; 9 font-style: inherit; 10 font-size: 100%; 11 font-family: inherit; 12 vertical-align: baseline; 16 font-size: 13px; 21 font-size: 26px; 22 margin-bottom: 1em; 26 font-size: 24px; 27 margin-bottom: 1em; [all …]
|
| D | notebooks_v1.projects.locations.runtimes.html | 8 font-weight: inherit; 9 font-style: inherit; 10 font-size: 100%; 11 font-family: inherit; 12 vertical-align: baseline; 16 font-size: 13px; 21 font-size: 26px; 22 margin-bottom: 1em; 26 font-size: 24px; 27 margin-bottom: 1em; [all …]
|
| D | vmmigration_v1alpha1.projects.locations.sources.migratingVms.cutoverJobs.html | 8 font-weight: inherit; 9 font-style: inherit; 10 font-size: 100%; 11 font-family: inherit; 12 vertical-align: baseline; 16 font-size: 13px; 21 font-size: 26px; 22 margin-bottom: 1em; 26 font-size: 24px; 27 margin-bottom: 1em; [all …]
|
| D | vmmigration_v1alpha1.projects.locations.sources.migratingVms.cloneJobs.html | 8 font-weight: inherit; 9 font-style: inherit; 10 font-size: 100%; 11 font-family: inherit; 12 vertical-align: baseline; 16 font-size: 13px; 21 font-size: 26px; 22 margin-bottom: 1em; 26 font-size: 24px; 27 margin-bottom: 1em; [all …]
|
| /external/autotest/server/site_tests/firmware_InvalidUSB/ |
| D | firmware_InvalidUSB.py | 2 # Use of this source code is governed by a BSD-style license that can be 17 This test requires a USB disk plugged-in, which contains a ChromeOS test 18 image (built by "build_image --test"). On runtime, this test corrupts the 19 USB image and tries to boot into it. A failure is expected. It then 26 """Restore the USB image. USB plugs/unplugs happen in this method.""" 52 logging.info("Turn on the recovery boot. Remove and insert the" 53 "corrupted USB stick, a boot failure is expected." 54 "Restore the USB image and boot it again.") 64 logging.info('Wait to ensure the USB image is unable to boot...') 68 raise error.TestFail('Should not boot from the invalid USB image.') [all …]
|
| /external/mesa3d/.gitlab-ci/lava/utils/ |
| D | uart_job_definition.py | 9 # Use the same image that is being used for the hardware enablement and health-checks. 12 # https://gitlab.collabora.com/lava/health-check-docker/-/blob/main/Dockerfile 13 # And the registry here: https://gitlab.collabora.com/lava/health-check-docker/container_registry/ 14 DOCKER_IMAGE = "registry.gitlab.collabora.com/lava/health-check-docker" 19 ) -> tuple[dict[str, Any], ...]: 41 "mkbootimg --kernel Image.gz+dtb" 42 …+ ' --cmdline "root=/dev/nfs rw nfsroot=$NFS_SERVER_IP:$NFS_ROOTFS,tcp,hard rootwait ip=dhcp init=… 43 + " --pagesize 4096 --base 0x80000000 -o boot.img", 56 "boot": {"url": "downloads://boot.img"}, 60 # URLs to our kernel rootfs to boot from, both generated by the base [all …]
|
| /external/arm-trusted-firmware/docs/design/ |
| D | alt-boot-flows.rst | 1 Alternative Boot Flows 4 EL3 payloads alternative boot flow 5 ---------------------------------- 7 On a pre-production system, the ability to execute arbitrary, bare-metal code at 15 Rather than booting a baremetal application, a possible compromise is to boot 16 ``EL3 payloads`` through TF-A instead. This is implemented as an alternative 17 boot flow, where a modified BL2 boots an EL3 payload, instead of loading the 21 - putting the system into a known architectural state; 22 - taking care of platform secure world initialization; 23 - loading the SCP_BL2 image if required by the platform. [all …]
|
| D | auth-framework.rst | 5 implemented in Trusted Firmware-A (TF-A). This framework fulfills the 14 - The mechanism used to encode and transport information, e.g. DER encoded 15 X.509v3 certificates to ferry Subject Public Keys, hashes and non-volatile 18 - The mechanism used to verify the transported information i.e. the 26 +---------------+---------------+------------+ 32 +---------------+---------------+------------+ 36 +-----------+ +-----------+ +-----------+ 39 | Module |<->| Module |<->| Module | 42 +-----------+ +-----------+ +-----------+ 46 +----------------+ +-----------------+ [all …]
|
| /external/trusty/arm-trusted-firmware/docs/design/ |
| D | alt-boot-flows.rst | 1 Alternative Boot Flows 4 EL3 payloads alternative boot flow 5 ---------------------------------- 7 On a pre-production system, the ability to execute arbitrary, bare-metal code at 15 Rather than booting a baremetal application, a possible compromise is to boot 16 ``EL3 payloads`` through TF-A instead. This is implemented as an alternative 17 boot flow, where a modified BL2 boots an EL3 payload, instead of loading the 21 - putting the system into a known architectural state; 22 - taking care of platform secure world initialization; 23 - loading the SCP_BL2 image if required by the platform. [all …]
|
| D | auth-framework.rst | 5 implemented in Trusted Firmware-A (TF-A). This framework fulfills the 14 - The mechanism used to encode and transport information, e.g. DER encoded 15 X.509v3 certificates to ferry Subject Public Keys, hashes and non-volatile 18 - The mechanism used to verify the transported information i.e. the 26 +---------------+---------------+------------+ 32 +---------------+---------------+------------+ 36 +-----------+ +-----------+ +-----------+ 39 | Module |<->| Module |<->| Module | 42 +-----------+ +-----------+ +-----------+ 46 +----------------+ +-----------------+ [all …]
|
| /external/libese/ready_se/google/keymint/KM200/Applet/AndroidSEProviderLib/src/com/android/javacard/seprovider/ |
| D | KMAttestationCert.java | 8 * http://www.apache.org/licenses/LICENSE-2.0 22 * certificate. This interface is designed based on builder pattern and hence each method returns 28 * Set verified boot hash. 36 * Set verified boot key received during booting up. 38 * @param obj This is a KMByteBlob containing verified boot key. 44 * Set verified boot state received during booting up. 46 * @param val This is a byte containing verified boot state value. 123 * extension. This method will called once for each tag. 165 * Build a fake signed certificate. After this method executes the certificate is ready with the
|
| /external/libese/ready_se/google/keymint/KM300/Applet/AndroidSEProviderLib/src/com/android/javacard/seprovider/ |
| D | KMAttestationCert.java | 8 * http://www.apache.org/licenses/LICENSE-2.0 22 * certificate. This interface is designed based on builder pattern and hence each method returns 28 * Set verified boot hash. 36 * Set verified boot key received during booting up. 38 * @param obj This is a KMByteBlob containing verified boot key. 44 * Set verified boot state received during booting up. 46 * @param val This is a byte containing verified boot state value. 123 * extension. This method will called once for each tag. 165 * Build a fake signed certificate. After this method executes the certificate is ready with the
|
| /external/googleapis/google/cloud/notebooks/v2/ |
| D | gce_setup.proto | 7 // http://www.apache.org/licenses/LICENSE-2.0 93 // Engine](https://cloud.google.com/compute/docs/gpus/#gpus-list) to find a 114 // Accelerator type is Nvidia Tesla A100 - 40GB. 117 // Accelerator type is Nvidia Tesla A100 - 80GB. 142 // features](https://cloud.google.com/compute/docs/instances/modifying-shielded-vm). 145 // Optional. Defines whether the VM instance has Secure Boot enabled. 147 // Secure Boot helps ensure that the system only runs authentic software by 148 // verifying the digital signature of all boot components, and halting the 149 // boot process if signature verification fails. Disabled by default. 158 // Enables monitoring and attestation of the boot integrity of the VM [all …]
|
| /external/trusty/arm-trusted-firmware/docs/design_documents/ |
| D | measured_boot.rst | 1 Measured Boot Design 4 This document briefly explains the Measured-Boot design implementation 5 in |TF-A|. 8 ------------ 10 Measured Boot is the process of computing and securely recording hashes of code 11 and critical data at each stage in the boot chain before the code/data is used. 17 after boot to attest to the state of the code and critical-data. 19 Measured Boot does not authenticate the code or critical-data, but simply 20 records what code/critical-data was present on the system during boot. 25 The Measured Boot implementation in TF-A supports multiple backends to securely [all …]
|
| /external/autotest/client/common_lib/hosts/ |
| D | base_classes.py | 46 should chain calls to super(). The criteria for fitting a new method into 53 then the method should raise NotImplementedError in Host, and 234 """ Get a unique ID associated with the current boot. 243 @return A string unique to this boot or None if not available.""" 246 cmd = 'if [ -f %r ]; then cat %r; else echo %r; fi' % ( 370 cmd = 'df -PB %d %s | tail -1' % (one_mb, path) 388 """Raises an error if a file system is short on i-nodes. 390 @param path The path to check for free i-nodes. 391 @param min_kilo_inodes Minimum number of i-nodes required, 392 in units of 1000 i-nodes. [all …]
|
| /external/mesa3d/.gitlab-ci/tests/data/ |
| D | FASTBOOT_force_uart=True_job_definition.yaml | 1 job_name: 'test-project: my_pipeline_info' 5 - my_visibility_group 13 depthcharge-retry: 15 depthcharge-start: 17 depthcharge-action: 20 - deploy: 25 url: None/lava-rootfs.tar.zst 27 - deploy: 39 image: registry.gitlab.collabora.com/lava/health-check-docker 41 - cat Image.gz my_dtb_filename.dtb > Image.gz+dtb [all …]
|
| /external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/ |
| D | Platform.java | 9 * http://www.apache.org/licenses/LICENSE-2.0 28 import java.lang.reflect.Method; 44 * Access to platform-specific features. 59 * Supported on OpenJDK 7 and 8 (via the JettyALPN-boot library). 99 * @param hostname non-null for client-side handshakes; null for 100 * server-side handshakes. 144 Method trafficStatsTagSocket = null; in findPlatform() 145 Method trafficStatsUntagSocket = null; in findPlatform() 183 Method putMethod = negoClass.getMethod("put", SSLSocket.class, providerClass); in findPlatform() 184 Method getMethod = negoClass.getMethod("get", SSLSocket.class); in findPlatform() [all …]
|
12345678910>>...20