HomeSort by relevance Sort by last modified time
    Searched full:vblock (Results 1 - 25 of 27) sorted by null

1 2

  /external/vboot_reference/tests/futility/
test_sign_fw_main.sh 18 ${FUTILITY} vbutil_firmware --vblock ${TMP}.vblock.old \
27 ${FUTILITY} vbutil_firmware --verify ${TMP}.vblock.old \
39 ${TMP}.vblock.new
42 cmp ${TMP}.vblock.old ${TMP}.vblock.new
test_sign_kernel.sh 142 # compare this new vblock with the one from the full pack
160 # compare this new vblock with the one from the full pack
166 # now repack the old way, again emitting just the vblock
178 # compare the full repacked vblock with the new repacked vblock
184 # and verify it using the new vblock (no way to do that with vbutil_kernel)
203 # compare the full repacked vblock with the new repacked vblock
209 # and verify it using the new vblock (no way to do that with vbutil_kernel)
test_show_vs_verify.sh 28 #### firmware vblock
  /external/vboot_reference/tests/
vboot_firmware_tests.c 24 static VbKeyBlockHeader vblock[2]; variable
53 fparams.verification_block_A = vblock;
55 fparams.verification_block_B = vblock + 1;
58 Memset(vblock, 0, sizeof(vblock));
62 vblock[i].key_block_flags = 0x0F;
63 vblock[i].data_key.key_version = 2;
65 vblock[i].key_block_size =
66 (uint8_t*)(mpreamble + i) - (uint8_t*)(vblock + i);
117 TEST_NEQ(block==vblock || block==vblock+1, 0, " Verify a valid key block")
    [all...]
run_preamble_tests.sh 43 echo -n "${what} fw_${d}_${r}.vblock with root_${rr}.vbpubk ... "
45 --verify "${V2DIR}/fw_${d}_${r}.vblock" \
71 echo -n "${what} kern_${d}_${r}.vblock with root_${rr}.vbpubk ... "
73 --verify "${V2DIR}/kern_${d}_${r}.vblock" \
90 echo -n "verify kern_${d}_${r}.vblock with hash only ... "
92 --verify "${V2DIR}/kern_${d}_${r}.vblock" >/dev/null 2>&1
vb2_firmware_tests.sh 46 --vblock vblock.test \
56 ${BUILD_RUN}/tests/vb20_verify_fw gbb.test vblock.test body.test
gen_fuzz_test_cases.sh 44 --vblock ${TESTCASE_DIR}/firmware.vblock \
55 --pack ${TESTCASE_DIR}/kernel.vblock.image \
gen_preamble_testdata.sh 67 vbutil_firmware --vblock "${V2DIR}/fw_${d}_${r}.vblock" \
73 vbutil_kernel --pack "${V2DIR}/kern_${d}_${r}.vblock" \
run_vbutil_kernel_arg_tests.sh 45 echo -n "pack kern_${k}_${b}.vblock ... "
48 --pack "${TMPDIR}/kern_${k}_${b}.vblock" \
68 for v in ${TMPDIR}/kern_*.vblock; do
155 # To verify it, we have to replace the vblock from the original image.
vb20_verify_fw.c 136 printf("Usage: %s <gbb> <vblock> <body>\n", progname);
  /external/vboot_reference/scripts/image_signing/
convert_recovery_to_full_ssd.sh 61 # Overwrite the kernel vblock on the created SSD image.
65 sudo cp ${stateful_dir}/vmlinuz_hd.vblock ${tmp_vblock}
66 echo "Overwriting kernel vblock with SSD kernel vblock"
convert_recovery_to_ssd.sh 69 # Overwrite the vblock.
73 sudo cp ${stateful_dir}/vmlinuz_hd.vblock ${tmp_vblock}
76 echo "Overwriting kernel partition A vblock with SSD vblock"
resign_kernel_partition.sh 7 # Script that just takes in a kernel partition and outputs a new vblock
45 echo "New kernel vblock was output to ${DST_VBLOCK}"
unpack_firmwarefd.sh 18 echo "Outputs firmware.gbb, firmware[A|B].[data|vblock]"
61 echo "Extracting Firmware data and vblock(s)"
64 dd if="${src_fd}" of="firmwareA.vblock" skip="${fwA_vblock_offset}" bs=1 \
68 dd if="${src_fd}" of="firmwareB.vblock" skip="${fwB_vblock_offset}" bs=1 \
resign_image.sh 52 # Create a copy of the input image and put in the new vblock
sign_official_build.sh 338 # Update the SSD install-able vblock file on stateful partition.
350 echo "Building vmlinuz_hd.vblock from legacy image partition 2."
354 # vblock should always use kernel keyblock.
361 # Copy the installer vblock to the stateful partition.
364 sudo cp ${temp_out_vb} ${stateful_dir}/vmlinuz_hd.vblock
  /external/vboot_reference/futility/
cmd_vbutil_firmware.c 36 {"vblock", 1, 0, OPT_MODE_VBLOCK},
51 printf("\nUsage: " MYNAME " %s <--vblock|--verify> <file> [OPTIONS]\n"
53 "For '--vblock <file>', required OPTIONS are:\n"
77 /* Create a firmware .vblock */
78 static int Vblock(const char *outfile, const char *keyblock_file,
377 return Vblock(filename, key_block_file, signprivate, version,
cmd_sign.c 87 VbKeyBlockHeader *vblock; local
92 vblock = KeyBlockCreate_external(
106 vblock = KeyBlockCreate(data_key, option.signprivate,
111 vblock = KeyBlockCreate(data_key, option.signprivate,
117 vblock, vblock->key_block_size,
125 * corresponding VBLOCK area, we'll have this to verify.
135 * We don't do any signing here. We just check to see if the VBLOCK
380 static int write_new_preamble(struct cb_area_s *vblock,
407 memcpy(vblock->buf, keyblock, more)
    [all...]
vb1_helper.c 24 * kernel vblock = keyblock + kernel preamble + padding to 64K (or whatever)
27 * kernel partition = kernel vblock + kernel blob
296 /* Split a kernel partition into separate vblock and blob parts. */
cmd_show.c 258 * corresponding VBLOCK area, we'll have this to verify.
560 " --pad NUM Kernel vblock padding size\n"
  /external/vboot_reference/
README 78 futility vbutil_firmware Create a .vblock with signature info for a
  /external/vboot_reference/firmware/2lib/include/
2struct.h 113 /* Offset of preamble from start of vblock */
  /external/vboot_reference/firmware/lib20/
misc.c 120 /* Preamble follows the keyblock in the vblock */
  /external/vboot_reference/firmware/lib21/
misc.c 112 /* Preamble follows the keyblock in the vblock */
  /frameworks/av/media/libstagefright/codecs/on2/h264dec/source/
h264bsd_deblocking.c 1551 u32 vblock; local
1634 u32 vblock; local
    [all...]

Completed in 373 milliseconds

1 2