/hardware/intel/img/psb_video/fw/topazsc/ |
fwinfo.c | 37 #define TOPAZ_FW_FILE_NAME_ANDROID "/etc/firmware/topaz_fw.bin" 38 #define MSVDX_FW_FILE_NAME_ANDROID "/etc/firmware/msvdx_fw.bin" 40 #define TOPAZ_FW_FILE_NAME_MEEGO "/lib/firmware/topaz_fw.bin" 41 #define MSVDX_FW_FILE_NAME_MEEGO "/lib/firmware/msvdx_fw.bin" 207 printf("msvdx slice switch firmware: ver : 0x%04x\n", fw.ver); 208 printf("msvdx slice switch firmware: text_size : %d\n", fw.text_size); 209 printf("msvdx slice switch firmware: data_size : %d\n", fw.data_size); 210 printf("msvdx slice switch firmware: data_location : 0x%08x\n\n", fw.data_location); 218 printf("msvdx frame switch firmware: ver : 0x%04x\n", fw.ver); 219 printf("msvdx frame switch firmware: text_size : %d\n", fw.text_size) [all...] |
/external/vboot_reference/utility/ |
crossystem.c | 5 * Chrome OS firmware/system interface utility 53 {"ecfw_act", IS_STRING, "Active EC firmware"}, 54 {"fmap_base", 0, "Main firmware flashmap physical address", "0x%08x"}, 55 {"fwb_tries", CAN_WRITE, "Try firmware B count (writable)"}, 56 {"fw_vboot2", 0, "1 if firmware was selected by vboot2 or 0 otherwise"}, 57 {"fwid", IS_STRING, "Active firmware ID"}, 59 "Times to try OS firmware update (writable, inside kern_nv)"}, 60 {"fw_tried", IS_STRING, "Firmware tried this boot (vboot2)"}, 63 "Firmware to try next (vboot2,writable)"}, 65 "Firmware result this boot (vboot2,writable)"} [all...] |
/device/lge/hammerhead/self-extractors/qcom/staging/ |
device-partial.mk | 37 vendor/qcom/hammerhead/proprietary/cpp_firmware_v1_1_1.fw:system/etc/firmware/cpp_firmware_v1_1_1.fw:qcom \ 38 vendor/qcom/hammerhead/proprietary/cpp_firmware_v1_1_6.fw:system/etc/firmware/cpp_firmware_v1_1_6.fw:qcom \ 39 vendor/qcom/hammerhead/proprietary/cpp_firmware_v1_2_0.fw:system/etc/firmware/cpp_firmware_v1_2_0.fw:qcom \ 73 vendor/qcom/hammerhead/proprietary/a330_pfp.fw:system/vendor/firmware/a330_pfp.fw:qcom \ 74 vendor/qcom/hammerhead/proprietary/a330_pm4.fw:system/vendor/firmware/a330_pm4.fw:qcom \ 75 vendor/qcom/hammerhead/proprietary/adsp.b00:system/vendor/firmware/adsp.b00:qcom \ 76 vendor/qcom/hammerhead/proprietary/adsp.b01:system/vendor/firmware/adsp.b01:qcom \ 77 vendor/qcom/hammerhead/proprietary/adsp.b02:system/vendor/firmware/adsp.b02:qcom \ 78 vendor/qcom/hammerhead/proprietary/adsp.b03:system/vendor/firmware/adsp.b03:qcom \ 79 vendor/qcom/hammerhead/proprietary/adsp.b04:system/vendor/firmware/adsp.b04:qcom [all...] |
/hardware/qcom/bt/msm8992/libbt-vendor/include/ |
hw_rome.h | 151 #define ROME_FW_PATH "/system/etc/firmware/rampatch.img" 152 #define ROME_RAMPATCH_TLV_PATH "/system/etc/firmware/rampatch_tlv.img" 153 #define ROME_NVM_TLV_PATH "/system/etc/firmware/nvm_tlv.bin" 154 #define ROME_RAMPATCH_TLV_1_0_3_PATH "/system/etc/firmware/rampatch_tlv_1.3.tlv" 155 #define ROME_NVM_TLV_1_0_3_PATH "/system/etc/firmware/nvm_tlv_1.3.bin" 156 #define ROME_RAMPATCH_TLV_2_0_1_PATH "/system/etc/firmware/rampatch_tlv_2.1.tlv" 157 #define ROME_NVM_TLV_2_0_1_PATH "/system/etc/firmware/nvm_tlv_2.1.bin" 158 #define ROME_RAMPATCH_TLV_3_0_0_PATH "/vendor/firmware/btfw30.tlv" 159 #define ROME_NVM_TLV_3_0_0_PATH "/vendor/firmware/btnv30.bin" 160 //#define ROME_RAMPATCH_TLV_3_0_0_PATH "/system/etc/firmware/rampatch_tlv_3.0.tlv [all...] |
/external/vboot_reference/tests/ |
vb2_nvstorage_tests.c | 5 * Tests for firmware NV storage library. 35 {VB2_NV_FW_TRIED, 0, 1, 0, "firmware tried"}, 36 {VB2_NV_FW_RESULT, 0, 1, 2, "firmware result"}, 37 {VB2_NV_FW_PREV_TRIED, 0, 1, 0, "firmware prev tried"}, 38 {VB2_NV_FW_PREV_RESULT, 0, 1, 3, "firmware prev result"}, 115 /* Clear the kernel and firmware flags */ 118 1, "Firmware settings are reset"); 121 0, "Firmware settings are clear"); 138 1, "Firmware settings forced reset"); 166 0, "Firmware settings are still clear") [all...] |
gen_fuzz_test_cases.sh | 27 # Firmware key block - RSA8192/SHA512 root key, RSA4096/SHA512 firmware 30 --pack ${TESTCASE_DIR}/firmware.keyblock \ 42 echo "Generating signed firmware test image..." 44 --vblock ${TESTCASE_DIR}/firmware.vblock \ 45 --keyblock ${TESTCASE_DIR}/firmware.keyblock\ 68 # Generate a file to serve as random bytes for firmware/kernel contents.
|
vboot_nvstorage_test.c | 5 * Tests for firmware NV storage library. 42 {VBNV_FW_TRIED, 0, 1, 0, "firmware tried"}, 43 {VBNV_FW_RESULT, VBNV_FW_RESULT_UNKNOWN, 1, 2, "firmware result"}, 44 {VBNV_FW_PREV_TRIED, 0, 1, 0, "firmware prev tried"}, 45 {VBNV_FW_PREV_RESULT, VBNV_FW_RESULT_UNKNOWN, 1, 3, "firmware prev result"}, 91 /* Clear the kernel and firmware flags */ 94 "Get firmware settings reset"); 95 TEST_EQ(data, 1, "Firmware settings are reset"); 97 "Clear firmware settings reset"); 99 TEST_EQ(data, 0, "Firmware settings are clear") [all...] |
/external/vboot_reference/firmware/lib/ |
vboot_api_firmware.c | 5 * High-level firmware wrapper API - entry points for init, firmware selection 44 * checking the RW firmware. 68 /* Exit if we failed to find an acceptable firmware */ 72 /* Translate the selected firmware path */ 96 /* Lock firmware versions in TPM */ 99 VBDEBUG(("Unable to lock firmware version in TPM.\n"));
|
/external/vboot_reference/scripts/image_signing/ |
unpack_firmwarefd.sh | 7 # Script that unpacks a firmware image (in .fd format) into its component 8 # pieces. Only outputs firmware A and B data, vblocks and the GBB. 18 echo "Outputs firmware.gbb, firmware[A|B].[data|vblock]" 36 # Grab Firmware A and B offset and size 59 dd if="${src_fd}" of="firmware.gbb" skip="${gbb_offset}" bs=1 \ 61 echo "Extracting Firmware data and vblock(s)"
|
tofactory.sh | 8 # * Firmware write protect disabled 10 # * Original EC firmware 24 DEFINE_string bios "" "Path of system firmware (BIOS) binary to write" "b" 30 DEFINE_boolean wipe_ssd $FLAGS_TRUE "Wipe SSD after firmware updates" "" 85 # Back up current firmware and partition table 87 debug_msg "Backing up current firmware to $FLAGS_backup_dir" 138 # Read the current firmware 147 # Find the RO VPD area in the current firmware 157 # Copy the RO VPD from the old firmware to the new firmware [all...] |
make_dev_firmware.sh | 7 # This script can change key (usually developer keys) in a firmware binary 8 # image or system live firmware (EEPROM), and assign proper HWID, FLAGS as well. 20 DEFINE_string from "" "Path of input file (empty for system live firmware)" "f" 21 DEFINE_string to "" "Path of output file (empty for system live firmware)" "t" 31 "$DEFAULT_BACKUP_FOLDER" "Path of directory to store firmware backups" "" 69 echo "Reading system live firmware..." 84 echo "Writing system live firmware..." 103 # NOTE: Some DEV firmware image files may put GUID in HWID. 120 local firmware_keyblock="$FLAGS_keys/firmware.keyblock" 163 debug_msg "Detecting developer firmware keyblock [all...] |
/external/vboot_reference/futility/ |
cmd_vbutil_firmware.c | 5 * Verified boot firmware utility 58 " --version <number> Firmware version\n" 59 " --fv <file> Firmware volume to sign\n" 69 " --fv <file> Firmware volume to verify\n" 77 /* Create a firmware .vblock */ 104 VbExError("Must specify firmware volume\n"); 128 /* Read and sign the firmware volume */ 133 VbExError("Empty firmware volume file\n"); 208 /* Read firmware volume */ 211 VbExError("Error reading firmware volume\n") [all...] |
/external/vboot_reference/tests/futility/ |
test_sign_firmware.sh | 24 # We also want to test that we can sign an image without any valid firmware 26 # the valid firmware, so it'll have to sign the entire region. 67 #OLD ${KEYDIR}/firmware.keyblock \ 78 -b ${KEYDIR}/firmware.keyblock \ 88 # check the firmware version and preamble flags 90 | egrep 'Firmware version: +14$|Preamble flags: +8$' | wc -l) 102 "Firmware A Data":${loemdir}/fw_main_A \ 103 "Firmware B Data":${loemdir}/fw_main_B 126 | awk '/Firmware body size:/ {print $4}' > ${TMP}.good.body 134 | awk '/Firmware body size:/ {print $4}' > ${TMP}.onemore.bod [all...] |
test_show_vs_verify.sh | 20 ${FUTILITY} show ${DEVKEYS}/firmware.keyblock 22 if ${FUTILITY} verify ${DEVKEYS}/firmware.keyblock ; then false; fi 24 ${FUTILITY} verify ${DEVKEYS}/firmware.keyblock \ 28 #### firmware vblock
|
/external/vboot_reference/firmware/lib20/include/ |
vb2_struct.h | 120 /* Firmware preamble header */ 130 /* Premable block for rewritable firmware, vboot1 version 2.1. 132 * The firmware preamble header should be followed by: 134 * 2) The signature data for the firmware body, pointed to by 157 /* Firmware version */ 164 /* Signature for the firmware body */
|
/device/asus/flo/conn_init/ |
Android.mk | 50 mkdir -p $(TARGET_OUT_VENDOR)/firmware/wlan/prima/; \ 52 $(TARGET_OUT_VENDOR)/firmware/wlan/prima/WCNSS_qcom_cfg.ini; \ 54 $(TARGET_OUT_VENDOR)/firmware/wlan/prima/WCNSS_qcom_wlan_nv.bin
|
/external/vboot_reference/firmware/include/ |
vboot_api.h | 6 /* APIs provided by firmware to vboot_reference. 13 * Verified boot APIs to be implemented by the calling firmware and exported to 17 * entry points for the firmware to call vboot_reference, and a 19 * calling firmware and exported to vboot_reference. 56 /* VbSelectFirmware() failed to find a valid firmware */ 58 /* Unable to write firmware versions to TPM */ 60 /* Unable to lock firmware versions in TPM */ 70 /* Attempt to load developer-only firmware with developer switch off */ 76 /* Calling firmware requested shutdown via VbExIsShutdownRequested() */ 124 /* Main entry points from firmware into vboot_reference * [all...] |
/device/asus/flo/sepolicy/ |
conn_init.te | 15 # Allow /data/misc/wifi access for firmware files
|
/device/moto/shamu/ |
init.mmi.touch.sh | 53 3) err_msg="Error: No matching firmware file found";; 96 firmware_path=/system/vendor/firmware 177 debug "firmware file for upgrade $firmware_file" 181 debug "forcing firmware upgrade" 192 debug "firmware config ids: expected $str_cfg_id_latest, current $str_cfg_id_new" 194 notice "Touch firmware config id at boot time $str_cfg_id_boot" 195 notice "Touch firmware config id in the file $str_cfg_id_latest" 196 notice "Touch firmware config id currently programmed $str_cfg_id_new" 198 notice "Touch firmware is up to date"
|
/external/vboot_reference/utility/include/ |
tpmextras.h | 14 #define TPM_LARGE_ENOUGH_COMMAND_SIZE 256 /* saves space in the firmware */
|
/hardware/intel/img/psb_video/src/hwdefs/ |
dxva_msg.h | 31 @Title va Firmware Message Flags 66 /*! Sent by the VA driver on the host to the mtx firmware. 80 /*! Sent by the mtx firmware to itself. 89 /*! Sent by the VA firmware on the MTX to the host.
|
/system/bt/doc/ |
properties.md | 8 Maximum amount of time Bluetooth can take to start-up, upload firmware etc.
|
/device/asus/fugu/ |
vendor_owner_info.txt | 6 system/etc/firmware/IT8566_CEC.BIN:asus 7 system/etc/firmware/msvdx.bin.0008.0000.0000:intel 8 system/etc/firmware/msvdx.bin.0008.0000.0001:intel 9 system/etc/firmware/msvdx.bin.0008.0000.0002:intel 10 system/etc/firmware/msvdx.bin.0008.0002.0001:intel 11 system/etc/firmware/msvdx.bin.000c.0001.0001:intel 12 system/etc/firmware/topaz.bin.0008.0000.0000:intel 13 system/etc/firmware/topaz.bin.0008.0000.0001:intel 14 system/etc/firmware/topaz.bin.0008.0000.0002:intel 15 system/etc/firmware/topaz.bin.0008.0002.0001:inte [all...] |
/hardware/libhardware_legacy/include/hardware_legacy/ |
wifi_logger.h | 56 u64 firmware_entry_timestamp; // TX: firmware timestamp (us) when packet is queued within 57 // firmware buffer for SDIO/HSIC or into PCIe buffer 58 // RX: firmware receive timestamp 59 u64 start_contention_timestamp; // firmware timestamp (us) when packet start contending for the 90 #define WIFI_EVENT_ROAM_SCAN_STARTED 15 // firmware has triggered a roam scan (not g-scan) 91 #define WIFI_EVENT_ROAM_SCAN_COMPLETE 16 // firmware has completed a roam scan (not g-scan) 92 #define WIFI_EVENT_ROAM_SEARCH_STARTED 17 // firmware has started searching for roam 94 #define WIFI_EVENT_ROAM_SEARCH_STOPPED 18 // firmware has stopped searching for roam 118 #define WIFI_EVENT_ROAM_ASSOC_STARTED 36 // firmware sends assoc/reassoc frame in 120 #define WIFI_EVENT_ROAM_ASSOC_COMPLETE 37 // firmware receive assoc/reassoc confirm from a [all...] |
/device/asus/deb/self-extractors/ |
files-by-owner.sh | 72 if test "$auto_owner" = "" -a $file != system/etc/firmware/tzapps.b00 -a $file != system/etc/firmware/tzapps.b01 -a $file != system/etc/firmware/tzapps.b02 -a $file != system/etc/firmware/tzapps.b03 -a $file != system/etc/firmware/tzapps.mdt -a $file != system/etc/firmware/wcd9310/wcd9310_anc.bin -a $file != system/etc/firmware/wcd9310/wcd9310_mbhc.bin 79 if test $file != system/lib/libacdbloader.so -a $file != system/vendor/firmware/tzapps.mdt
|