/docs/source.android.com/src/security/verifiedboot/ |
verified-boot.jd | 67 <td>The OEM key is a fixed, tamper-protected key available to the bootloader that 75 whether the bootloader allows new software to be flashed?verified boot introduces 92 <p>Bootloader integrity is always verified using a hardware root of trust. For 93 verifying boot and recovery partitions, the bootloader has a fixed OEM key 99 then LOCKED and verification using the OEM key fails, the bootloader tries 110 <li>GREEN, indicating a full chain of trust extending from the bootloader to 111 verified partitions, including the bootloader, boot partition, and all verified 115 embedded certificate, and the signature is valid. The bootloader 120 left to the user to verify out-of-band. The bootloader displays a warning 123 <li>RED, indicating the device has failed verification. The bootloader [all...] |
/external/autotest/client/deps/boottool/ |
boottool.py | 25 tarball = os.path.join(pwd, 'Linux-Bootloader-1.2.tar.gz')
|
/external/autotest/client/tests/kvm/unattended/ |
Fedora-10.ks | 14 bootloader --location=mbr --append="console=tty0 console=ttyS0,115200"
|
Fedora-11.ks | 13 bootloader --location=mbr --append="console=tty0 console=ttyS0,115200"
|
Fedora-12.ks | 13 bootloader --location=mbr --append="console=tty0 console=ttyS0,115200"
|
Fedora-13.ks | 13 bootloader --location=mbr --append="console=tty0 console=ttyS0,115200"
|
Fedora-14.ks | 13 bootloader --location=mbr --append="rd_NO_PLYMOUTH console=tty0 console=ttyS0,115200"
|
Fedora-15.ks | 13 bootloader --location=mbr --append="console=tty0 console=ttyS0,115200"
|
Fedora-8.ks | 14 bootloader --location=mbr --append="console=tty0 console=ttyS0,115200"
|
Fedora-9.ks | 14 bootloader --location=mbr --append="console=tty0 console=ttyS0,115200"
|
RHEL-4-series.ks | 14 bootloader --location=mbr --append="console=tty0 console=ttyS0,115200"
|
RHEL-5-series.ks | 14 bootloader --location=mbr --append="console=tty0 console=ttyS0,115200"
|
RHEL-6-series.ks | 14 bootloader --location=mbr --append="console=tty0 console=ttyS0,115200"
|
/external/vboot_reference/tests/ |
gen_fuzz_test_cases.sh | 60 --bootloader ${TEST_BOOTLOADER_FILE} \ 69 # NOTE: The kernel and config file can't really be random, but the bootloader 73 echo "Generating test bootloader file..." 74 # TODO(gauravsh): Use a valid bootloader here?
|
/device/linaro/hikey/bootloader/ |
Makefile | 2 EDK2_DIR=$(ANDROID_BUILD_TOP)/device/linaro/bootloader/edk2 4 ATF_DIR=$(ANDROID_BUILD_TOP)/device/linaro/bootloader/arm-trusted-firmware
|
/external/autotest/server/ |
rpm_kernel.py | 39 This will also invoke the guest's bootloader to set this 45 to Bootloader.add_kernel() 74 host.bootloader.remove_kernel(label) 75 host.bootloader.add_kernel(vmlinuz, label, 78 host.bootloader.add_args(label, kernel_args) 80 host.bootloader.boot_once(label)
|
/external/autotest/client/common_lib/ |
boottool.py | 31 Return the installed bootloader type. 33 return self._run_boottool('--bootloader-probe').strip() 38 Get the system architecture reported by the bootloader. 52 Return an int with the # of the default bootloader entry. 103 Get a single bootloader entry information. 105 NOTE: if entry is "fallback" and bootloader is grub 210 Add a kernel entry to the bootloader (or replace if one exists 214 @param title: title of this entry in the bootloader config 220 @param position: where to insert the new entry in the bootloader 258 Removes a specific entry from the bootloader configuration [all...] |
/development/tools/labpretest/ |
labpretest.sh | 7 # session. It puts a device into bootloader mode, reboots into bootloader mode, 9 # updates the bootloader image, updates the radio image, updates the system 139 log_print "rebooting into bootloader and waiting for availability via fastboot" 140 $ADB -s $device reboot bootloader 157 log_print "rebooting into bootloader and waiting for availability via fastboot" 158 $FASTBOOT -s $device reboot-bootloader 283 log_print "getting bootloader file for $product" 286 log_print "bootloader file empty: $bootloaderfile" 290 log_print "bootloader file not found: ./$product/$bootloaderfile [all...] |
README | 4 session. It puts a device into bootloader mode, reboots into bootloader mode, 6 updates the bootloader image, updates the radio image, updates the system image
|
/development/ide/emacs/ |
android-host.el | 36 ;; C-x a b android-adb-shell-reboot-bootloader 59 (define-key map (kbd "b") 'android-adb-shell-reboot-bootloader) 78 (defun android-adb-shell-reboot-bootloader () 79 "Execute 'adb shell reboot bootloader'." 81 (android-adb-shell-command "reboot bootloader"))
|
/docs/source.android.com/src/source/ |
running.jd | 64 which is a mode in the bootloader that can be used to flash the devices:</p> 156 <p>Also, the command <code>adb reboot bootloader</code> can be used to reboot from 157 Android directly into the bootloader with no key combinations.</p> 158 <h2 id="unlocking-the-bootloader">Unlocking the bootloader</h2> 159 <p>It's only possible to flash a custom system if the bootloader allows it.</p> 160 <p>The bootloader is locked by default. With the device in fastboot mode, the 161 bootloader is unlocked with</p> 169 unlocking the bootloader.</p> 170 <p>On Nexus 10, after unlocking the bootloader, the internal storage i [all...] |
/external/autotest/client/bin/ |
xen.py | 131 """ add this kernel to bootloader, taking an 137 self.job.bootloader.enable_xen_mode() 140 self.job.bootloader.remove_kernel(tag) 143 self.job.bootloader.add_kernel( 153 self.job.bootloader.add_args(tag, a) 156 self.job.bootloader.disable_xen_mode()
|
/device/google/contexthub/firmware/inc/platform/stm32f4xx/ |
bl.h | 100 //for using outside of bootloader 105 //for code in bootloader to log things
|
/bootable/recovery/ |
README.md | 11 adb reboot bootloader
|
/device/google/contexthub/firmware/inc/ |
hostIntf_priv.h | 72 * Returns the platform's bootloader version (16-bit, host byte order)
|