HomeSort by relevance Sort by last modified time
    Searched full:firmware (Results 126 - 150 of 628) sorted by null

1 2 3 4 56 7 8 91011>>

  /hardware/intel/img/psb_video/fw/topazsc/
fwinfo.c 37 #define TOPAZ_FW_FILE_NAME_ANDROID "/etc/firmware/topaz_fw.bin"
38 #define MSVDX_FW_FILE_NAME_ANDROID "/etc/firmware/msvdx_fw.bin"
40 #define TOPAZ_FW_FILE_NAME_MEEGO "/lib/firmware/topaz_fw.bin"
41 #define MSVDX_FW_FILE_NAME_MEEGO "/lib/firmware/msvdx_fw.bin"
207 printf("msvdx slice switch firmware: ver : 0x%04x\n", fw.ver);
208 printf("msvdx slice switch firmware: text_size : %d\n", fw.text_size);
209 printf("msvdx slice switch firmware: data_size : %d\n", fw.data_size);
210 printf("msvdx slice switch firmware: data_location : 0x%08x\n\n", fw.data_location);
218 printf("msvdx frame switch firmware: ver : 0x%04x\n", fw.ver);
219 printf("msvdx frame switch firmware: text_size : %d\n", fw.text_size)
    [all...]
  /external/vboot_reference/utility/
crossystem.c 5 * Chrome OS firmware/system interface utility
53 {"ecfw_act", IS_STRING, "Active EC firmware"},
54 {"fmap_base", 0, "Main firmware flashmap physical address", "0x%08x"},
55 {"fwb_tries", CAN_WRITE, "Try firmware B count (writable)"},
56 {"fw_vboot2", 0, "1 if firmware was selected by vboot2 or 0 otherwise"},
57 {"fwid", IS_STRING, "Active firmware ID"},
59 "Times to try OS firmware update (writable, inside kern_nv)"},
60 {"fw_tried", IS_STRING, "Firmware tried this boot (vboot2)"},
63 "Firmware to try next (vboot2,writable)"},
65 "Firmware result this boot (vboot2,writable)"}
    [all...]
  /device/lge/hammerhead/self-extractors/qcom/staging/
device-partial.mk 37 vendor/qcom/hammerhead/proprietary/cpp_firmware_v1_1_1.fw:system/etc/firmware/cpp_firmware_v1_1_1.fw:qcom \
38 vendor/qcom/hammerhead/proprietary/cpp_firmware_v1_1_6.fw:system/etc/firmware/cpp_firmware_v1_1_6.fw:qcom \
39 vendor/qcom/hammerhead/proprietary/cpp_firmware_v1_2_0.fw:system/etc/firmware/cpp_firmware_v1_2_0.fw:qcom \
73 vendor/qcom/hammerhead/proprietary/a330_pfp.fw:system/vendor/firmware/a330_pfp.fw:qcom \
74 vendor/qcom/hammerhead/proprietary/a330_pm4.fw:system/vendor/firmware/a330_pm4.fw:qcom \
75 vendor/qcom/hammerhead/proprietary/adsp.b00:system/vendor/firmware/adsp.b00:qcom \
76 vendor/qcom/hammerhead/proprietary/adsp.b01:system/vendor/firmware/adsp.b01:qcom \
77 vendor/qcom/hammerhead/proprietary/adsp.b02:system/vendor/firmware/adsp.b02:qcom \
78 vendor/qcom/hammerhead/proprietary/adsp.b03:system/vendor/firmware/adsp.b03:qcom \
79 vendor/qcom/hammerhead/proprietary/adsp.b04:system/vendor/firmware/adsp.b04:qcom
    [all...]
  /hardware/qcom/bt/msm8992/libbt-vendor/include/
hw_rome.h 151 #define ROME_FW_PATH "/system/etc/firmware/rampatch.img"
152 #define ROME_RAMPATCH_TLV_PATH "/system/etc/firmware/rampatch_tlv.img"
153 #define ROME_NVM_TLV_PATH "/system/etc/firmware/nvm_tlv.bin"
154 #define ROME_RAMPATCH_TLV_1_0_3_PATH "/system/etc/firmware/rampatch_tlv_1.3.tlv"
155 #define ROME_NVM_TLV_1_0_3_PATH "/system/etc/firmware/nvm_tlv_1.3.bin"
156 #define ROME_RAMPATCH_TLV_2_0_1_PATH "/system/etc/firmware/rampatch_tlv_2.1.tlv"
157 #define ROME_NVM_TLV_2_0_1_PATH "/system/etc/firmware/nvm_tlv_2.1.bin"
158 #define ROME_RAMPATCH_TLV_3_0_0_PATH "/vendor/firmware/btfw30.tlv"
159 #define ROME_NVM_TLV_3_0_0_PATH "/vendor/firmware/btnv30.bin"
160 //#define ROME_RAMPATCH_TLV_3_0_0_PATH "/system/etc/firmware/rampatch_tlv_3.0.tlv
    [all...]
  /external/vboot_reference/tests/
vb2_nvstorage_tests.c 5 * Tests for firmware NV storage library.
35 {VB2_NV_FW_TRIED, 0, 1, 0, "firmware tried"},
36 {VB2_NV_FW_RESULT, 0, 1, 2, "firmware result"},
37 {VB2_NV_FW_PREV_TRIED, 0, 1, 0, "firmware prev tried"},
38 {VB2_NV_FW_PREV_RESULT, 0, 1, 3, "firmware prev result"},
115 /* Clear the kernel and firmware flags */
118 1, "Firmware settings are reset");
121 0, "Firmware settings are clear");
138 1, "Firmware settings forced reset");
166 0, "Firmware settings are still clear")
    [all...]
gen_fuzz_test_cases.sh 27 # Firmware key block - RSA8192/SHA512 root key, RSA4096/SHA512 firmware
30 --pack ${TESTCASE_DIR}/firmware.keyblock \
42 echo "Generating signed firmware test image..."
44 --vblock ${TESTCASE_DIR}/firmware.vblock \
45 --keyblock ${TESTCASE_DIR}/firmware.keyblock\
68 # Generate a file to serve as random bytes for firmware/kernel contents.
vboot_nvstorage_test.c 5 * Tests for firmware NV storage library.
42 {VBNV_FW_TRIED, 0, 1, 0, "firmware tried"},
43 {VBNV_FW_RESULT, VBNV_FW_RESULT_UNKNOWN, 1, 2, "firmware result"},
44 {VBNV_FW_PREV_TRIED, 0, 1, 0, "firmware prev tried"},
45 {VBNV_FW_PREV_RESULT, VBNV_FW_RESULT_UNKNOWN, 1, 3, "firmware prev result"},
91 /* Clear the kernel and firmware flags */
94 "Get firmware settings reset");
95 TEST_EQ(data, 1, "Firmware settings are reset");
97 "Clear firmware settings reset");
99 TEST_EQ(data, 0, "Firmware settings are clear")
    [all...]
  /external/vboot_reference/firmware/lib/
vboot_api_firmware.c 5 * High-level firmware wrapper API - entry points for init, firmware selection
44 * checking the RW firmware.
68 /* Exit if we failed to find an acceptable firmware */
72 /* Translate the selected firmware path */
96 /* Lock firmware versions in TPM */
99 VBDEBUG(("Unable to lock firmware version in TPM.\n"));
  /external/vboot_reference/scripts/image_signing/
unpack_firmwarefd.sh 7 # Script that unpacks a firmware image (in .fd format) into its component
8 # pieces. Only outputs firmware A and B data, vblocks and the GBB.
18 echo "Outputs firmware.gbb, firmware[A|B].[data|vblock]"
36 # Grab Firmware A and B offset and size
59 dd if="${src_fd}" of="firmware.gbb" skip="${gbb_offset}" bs=1 \
61 echo "Extracting Firmware data and vblock(s)"
tofactory.sh 8 # * Firmware write protect disabled
10 # * Original EC firmware
24 DEFINE_string bios "" "Path of system firmware (BIOS) binary to write" "b"
30 DEFINE_boolean wipe_ssd $FLAGS_TRUE "Wipe SSD after firmware updates" ""
85 # Back up current firmware and partition table
87 debug_msg "Backing up current firmware to $FLAGS_backup_dir"
138 # Read the current firmware
147 # Find the RO VPD area in the current firmware
157 # Copy the RO VPD from the old firmware to the new firmware
    [all...]
make_dev_firmware.sh 7 # This script can change key (usually developer keys) in a firmware binary
8 # image or system live firmware (EEPROM), and assign proper HWID, FLAGS as well.
20 DEFINE_string from "" "Path of input file (empty for system live firmware)" "f"
21 DEFINE_string to "" "Path of output file (empty for system live firmware)" "t"
31 "$DEFAULT_BACKUP_FOLDER" "Path of directory to store firmware backups" ""
69 echo "Reading system live firmware..."
84 echo "Writing system live firmware..."
103 # NOTE: Some DEV firmware image files may put GUID in HWID.
120 local firmware_keyblock="$FLAGS_keys/firmware.keyblock"
163 debug_msg "Detecting developer firmware keyblock
    [all...]
  /external/vboot_reference/futility/
cmd_vbutil_firmware.c 5 * Verified boot firmware utility
58 " --version <number> Firmware version\n"
59 " --fv <file> Firmware volume to sign\n"
69 " --fv <file> Firmware volume to verify\n"
77 /* Create a firmware .vblock */
104 VbExError("Must specify firmware volume\n");
128 /* Read and sign the firmware volume */
133 VbExError("Empty firmware volume file\n");
208 /* Read firmware volume */
211 VbExError("Error reading firmware volume\n")
    [all...]
  /external/vboot_reference/tests/futility/
test_sign_firmware.sh 24 # We also want to test that we can sign an image without any valid firmware
26 # the valid firmware, so it'll have to sign the entire region.
67 #OLD ${KEYDIR}/firmware.keyblock \
78 -b ${KEYDIR}/firmware.keyblock \
88 # check the firmware version and preamble flags
90 | egrep 'Firmware version: +14$|Preamble flags: +8$' | wc -l)
102 "Firmware A Data":${loemdir}/fw_main_A \
103 "Firmware B Data":${loemdir}/fw_main_B
126 | awk '/Firmware body size:/ {print $4}' > ${TMP}.good.body
134 | awk '/Firmware body size:/ {print $4}' > ${TMP}.onemore.bod
    [all...]
test_show_vs_verify.sh 20 ${FUTILITY} show ${DEVKEYS}/firmware.keyblock
22 if ${FUTILITY} verify ${DEVKEYS}/firmware.keyblock ; then false; fi
24 ${FUTILITY} verify ${DEVKEYS}/firmware.keyblock \
28 #### firmware vblock
  /external/vboot_reference/firmware/lib20/include/
vb2_struct.h 120 /* Firmware preamble header */
130 /* Premable block for rewritable firmware, vboot1 version 2.1.
132 * The firmware preamble header should be followed by:
134 * 2) The signature data for the firmware body, pointed to by
157 /* Firmware version */
164 /* Signature for the firmware body */
  /device/asus/flo/conn_init/
Android.mk 50 mkdir -p $(TARGET_OUT_VENDOR)/firmware/wlan/prima/; \
52 $(TARGET_OUT_VENDOR)/firmware/wlan/prima/WCNSS_qcom_cfg.ini; \
54 $(TARGET_OUT_VENDOR)/firmware/wlan/prima/WCNSS_qcom_wlan_nv.bin
  /external/vboot_reference/firmware/include/
vboot_api.h 6 /* APIs provided by firmware to vboot_reference.
13 * Verified boot APIs to be implemented by the calling firmware and exported to
17 * entry points for the firmware to call vboot_reference, and a
19 * calling firmware and exported to vboot_reference.
56 /* VbSelectFirmware() failed to find a valid firmware */
58 /* Unable to write firmware versions to TPM */
60 /* Unable to lock firmware versions in TPM */
70 /* Attempt to load developer-only firmware with developer switch off */
76 /* Calling firmware requested shutdown via VbExIsShutdownRequested() */
124 /* Main entry points from firmware into vboot_reference *
    [all...]
  /device/asus/flo/sepolicy/
conn_init.te 15 # Allow /data/misc/wifi access for firmware files
  /device/moto/shamu/
init.mmi.touch.sh 53 3) err_msg="Error: No matching firmware file found";;
96 firmware_path=/system/vendor/firmware
177 debug "firmware file for upgrade $firmware_file"
181 debug "forcing firmware upgrade"
192 debug "firmware config ids: expected $str_cfg_id_latest, current $str_cfg_id_new"
194 notice "Touch firmware config id at boot time $str_cfg_id_boot"
195 notice "Touch firmware config id in the file $str_cfg_id_latest"
196 notice "Touch firmware config id currently programmed $str_cfg_id_new"
198 notice "Touch firmware is up to date"
  /external/vboot_reference/utility/include/
tpmextras.h 14 #define TPM_LARGE_ENOUGH_COMMAND_SIZE 256 /* saves space in the firmware */
  /hardware/intel/img/psb_video/src/hwdefs/
dxva_msg.h 31 @Title va Firmware Message Flags
66 /*! Sent by the VA driver on the host to the mtx firmware.
80 /*! Sent by the mtx firmware to itself.
89 /*! Sent by the VA firmware on the MTX to the host.
  /system/bt/doc/
properties.md 8 Maximum amount of time Bluetooth can take to start-up, upload firmware etc.
  /device/asus/fugu/
vendor_owner_info.txt 6 system/etc/firmware/IT8566_CEC.BIN:asus
7 system/etc/firmware/msvdx.bin.0008.0000.0000:intel
8 system/etc/firmware/msvdx.bin.0008.0000.0001:intel
9 system/etc/firmware/msvdx.bin.0008.0000.0002:intel
10 system/etc/firmware/msvdx.bin.0008.0002.0001:intel
11 system/etc/firmware/msvdx.bin.000c.0001.0001:intel
12 system/etc/firmware/topaz.bin.0008.0000.0000:intel
13 system/etc/firmware/topaz.bin.0008.0000.0001:intel
14 system/etc/firmware/topaz.bin.0008.0000.0002:intel
15 system/etc/firmware/topaz.bin.0008.0002.0001:inte
    [all...]
  /hardware/libhardware_legacy/include/hardware_legacy/
wifi_logger.h 56 u64 firmware_entry_timestamp; // TX: firmware timestamp (us) when packet is queued within
57 // firmware buffer for SDIO/HSIC or into PCIe buffer
58 // RX: firmware receive timestamp
59 u64 start_contention_timestamp; // firmware timestamp (us) when packet start contending for the
90 #define WIFI_EVENT_ROAM_SCAN_STARTED 15 // firmware has triggered a roam scan (not g-scan)
91 #define WIFI_EVENT_ROAM_SCAN_COMPLETE 16 // firmware has completed a roam scan (not g-scan)
92 #define WIFI_EVENT_ROAM_SEARCH_STARTED 17 // firmware has started searching for roam
94 #define WIFI_EVENT_ROAM_SEARCH_STOPPED 18 // firmware has stopped searching for roam
118 #define WIFI_EVENT_ROAM_ASSOC_STARTED 36 // firmware sends assoc/reassoc frame in
120 #define WIFI_EVENT_ROAM_ASSOC_COMPLETE 37 // firmware receive assoc/reassoc confirm from a
    [all...]
  /device/asus/deb/self-extractors/
files-by-owner.sh 72 if test "$auto_owner" = "" -a $file != system/etc/firmware/tzapps.b00 -a $file != system/etc/firmware/tzapps.b01 -a $file != system/etc/firmware/tzapps.b02 -a $file != system/etc/firmware/tzapps.b03 -a $file != system/etc/firmware/tzapps.mdt -a $file != system/etc/firmware/wcd9310/wcd9310_anc.bin -a $file != system/etc/firmware/wcd9310/wcd9310_mbhc.bin
79 if test $file != system/lib/libacdbloader.so -a $file != system/vendor/firmware/tzapps.mdt

Completed in 523 milliseconds

1 2 3 4 56 7 8 91011>>