HomeSort by relevance Sort by last modified time
    Searched full:bootloader (Results 51 - 75 of 520) sorted by null

1 23 4 5 6 7 8 91011>>

  /docs/source.android.com/src/security/verifiedboot/
verified-boot.jd 67 <td>The OEM key is a fixed, tamper-protected key available to the bootloader that
75 whether the bootloader allows new software to be flashed?verified boot introduces
92 <p>Bootloader integrity is always verified using a hardware root of trust. For
93 verifying boot and recovery partitions, the bootloader has a fixed OEM key
99 then LOCKED and verification using the OEM key fails, the bootloader tries
110 <li>GREEN, indicating a full chain of trust extending from the bootloader to
111 verified partitions, including the bootloader, boot partition, and all verified
115 embedded certificate, and the signature is valid. The bootloader
120 left to the user to verify out-of-band. The bootloader displays a warning
123 <li>RED, indicating the device has failed verification. The bootloader
    [all...]
  /external/autotest/client/deps/boottool/
boottool.py 25 tarball = os.path.join(pwd, 'Linux-Bootloader-1.2.tar.gz')
  /external/autotest/client/tests/kvm/unattended/
Fedora-10.ks 14 bootloader --location=mbr --append="console=tty0 console=ttyS0,115200"
Fedora-11.ks 13 bootloader --location=mbr --append="console=tty0 console=ttyS0,115200"
Fedora-12.ks 13 bootloader --location=mbr --append="console=tty0 console=ttyS0,115200"
Fedora-13.ks 13 bootloader --location=mbr --append="console=tty0 console=ttyS0,115200"
Fedora-14.ks 13 bootloader --location=mbr --append="rd_NO_PLYMOUTH console=tty0 console=ttyS0,115200"
Fedora-15.ks 13 bootloader --location=mbr --append="console=tty0 console=ttyS0,115200"
Fedora-8.ks 14 bootloader --location=mbr --append="console=tty0 console=ttyS0,115200"
Fedora-9.ks 14 bootloader --location=mbr --append="console=tty0 console=ttyS0,115200"
RHEL-4-series.ks 14 bootloader --location=mbr --append="console=tty0 console=ttyS0,115200"
RHEL-5-series.ks 14 bootloader --location=mbr --append="console=tty0 console=ttyS0,115200"
RHEL-6-series.ks 14 bootloader --location=mbr --append="console=tty0 console=ttyS0,115200"
  /external/vboot_reference/tests/
gen_fuzz_test_cases.sh 60 --bootloader ${TEST_BOOTLOADER_FILE} \
69 # NOTE: The kernel and config file can't really be random, but the bootloader
73 echo "Generating test bootloader file..."
74 # TODO(gauravsh): Use a valid bootloader here?
  /device/linaro/hikey/bootloader/
Makefile 2 EDK2_DIR=$(ANDROID_BUILD_TOP)/device/linaro/bootloader/edk2
4 ATF_DIR=$(ANDROID_BUILD_TOP)/device/linaro/bootloader/arm-trusted-firmware
  /external/autotest/server/
rpm_kernel.py 39 This will also invoke the guest's bootloader to set this
45 to Bootloader.add_kernel()
74 host.bootloader.remove_kernel(label)
75 host.bootloader.add_kernel(vmlinuz, label,
78 host.bootloader.add_args(label, kernel_args)
80 host.bootloader.boot_once(label)
  /external/autotest/client/common_lib/
boottool.py 31 Return the installed bootloader type.
33 return self._run_boottool('--bootloader-probe').strip()
38 Get the system architecture reported by the bootloader.
52 Return an int with the # of the default bootloader entry.
103 Get a single bootloader entry information.
105 NOTE: if entry is "fallback" and bootloader is grub
210 Add a kernel entry to the bootloader (or replace if one exists
214 @param title: title of this entry in the bootloader config
220 @param position: where to insert the new entry in the bootloader
258 Removes a specific entry from the bootloader configuration
    [all...]
  /development/tools/labpretest/
labpretest.sh 7 # session. It puts a device into bootloader mode, reboots into bootloader mode,
9 # updates the bootloader image, updates the radio image, updates the system
139 log_print "rebooting into bootloader and waiting for availability via fastboot"
140 $ADB -s $device reboot bootloader
157 log_print "rebooting into bootloader and waiting for availability via fastboot"
158 $FASTBOOT -s $device reboot-bootloader
283 log_print "getting bootloader file for $product"
286 log_print "bootloader file empty: $bootloaderfile"
290 log_print "bootloader file not found: ./$product/$bootloaderfile
    [all...]
README 4 session. It puts a device into bootloader mode, reboots into bootloader mode,
6 updates the bootloader image, updates the radio image, updates the system image
  /development/ide/emacs/
android-host.el 36 ;; C-x a b android-adb-shell-reboot-bootloader
59 (define-key map (kbd "b") 'android-adb-shell-reboot-bootloader)
78 (defun android-adb-shell-reboot-bootloader ()
79 "Execute 'adb shell reboot bootloader'."
81 (android-adb-shell-command "reboot bootloader"))
  /docs/source.android.com/src/source/
running.jd 64 which is a mode in the bootloader that can be used to flash the devices:</p>
156 <p>Also, the command <code>adb reboot bootloader</code> can be used to reboot from
157 Android directly into the bootloader with no key combinations.</p>
158 <h2 id="unlocking-the-bootloader">Unlocking the bootloader</h2>
159 <p>It's only possible to flash a custom system if the bootloader allows it.</p>
160 <p>The bootloader is locked by default. With the device in fastboot mode, the
161 bootloader is unlocked with</p>
169 unlocking the bootloader.</p>
170 <p>On Nexus 10, after unlocking the bootloader, the internal storage i
    [all...]
  /external/autotest/client/bin/
xen.py 131 """ add this kernel to bootloader, taking an
137 self.job.bootloader.enable_xen_mode()
140 self.job.bootloader.remove_kernel(tag)
143 self.job.bootloader.add_kernel(
153 self.job.bootloader.add_args(tag, a)
156 self.job.bootloader.disable_xen_mode()
  /device/google/contexthub/firmware/inc/platform/stm32f4xx/
bl.h 100 //for using outside of bootloader
105 //for code in bootloader to log things
  /bootable/recovery/
README.md 11 adb reboot bootloader
  /device/google/contexthub/firmware/inc/
hostIntf_priv.h 72 * Returns the platform's bootloader version (16-bit, host byte order)

Completed in 439 milliseconds

1 23 4 5 6 7 8 91011>>