/device/asus/fugu/ |
releasetools.py | 16 (installing the bootloader).""" 32 def WriteBootloader(info, bootloader): 36 header_fmt, bootloader[:header_size]) 38 assert magic == "BOOTLDR!", "bootloader.img bad magic value" 44 ifwi_size, droidboot_size = struct.unpack(header_v1_fmt, bootloader[offset:offset + header_v1_size]) 46 ifwi = bootloader[offset:offset + ifwi_size] 48 droidboot = bootloader[offset:] 56 while offset < len(bootloader): 59 c_magic, size, flags, _, _ , _ = struct.unpack(c_header_fmt, bootloader[offset:offset + c_header_size]) 60 buf = bootloader[offset + c_header_size: offset + c_header_size + size [all...] |
/external/devlib/devlib/platform/ |
arm.py | 48 bootloader=None, 57 uefi_entry=None, # only used if bootloader is "uefi" 74 self.bootloader = None 76 self._set_bootloader(bootloader) 131 def _set_bootloader(self, bootloader): 132 self.bootloader = bootloader 133 if self.bootloader == 'uefi': 141 elif self.bootloader == 'uefi-shell': 147 elif self.bootloader == 'u-boot' [all...] |
/device/google/dragon/ |
releasetools.py | 22 bootloader_img = info.input_zip.read("RADIO/bootloader.img") 28 common.ZipWriteStr(info.output_zip, "bootloader.img", bootloader_img) 33 """dragon.firmware_update(package_extract_file("bootloader.img"), package_extract_file("ec.bin"));""") 37 target_bootloader_img = info.target_zip.read("RADIO/bootloader.img") 46 common.ZipWriteStr(info.output_zip, "bootloader.img", target_bootloader_img) 51 """dragon.firmware_update(package_extract_file("bootloader.img"), package_extract_file("ec.bin"));""")
|
/device/common/ |
generate-factory-images-common.sh | 22 BOOTLOADERSRC=bootloader.img 37 # Extract the bootloader(s) and radio(s) as necessary 63 cp tmp/RADIO/$BOOTLOADERSRC tmp/$PRODUCT-$VERSION/bootloader-$DEVICE-$BOOTLOADER.img 65 cp $BOOTLOADERFILE tmp/$PRODUCT-$VERSION/bootloader-$DEVICE-$BOOTLOADER.img 128 fastboot flash bootloader bootloader-$DEVICE-$BOOTLOADER.img 133 fastboot flash bootloader2 bootloader-$DEVICE-$BOOTLOADER.im [all...] |
/external/vboot_reference/tests/futility/ |
test_sign_kernel.sh | 16 dd if=/dev/urandom bs=512 count=1 of=${TMP}.bootloader.bin 35 --bootloader ${TMP}.bootloader.bin \ 52 --bootloader ${TMP}.bootloader.bin \ 78 --bootloader ${TMP}.bootloader2.bin 92 --bootloader ${TMP}.bootloader2.bin \ 114 --bootloader ${TMP}.bootloader2.bin \ 136 --bootloader ${TMP}.bootloader.bin [all...] |
test_show_kernel.sh | 19 dd if=/dev/urandom bs=16384 count=1 of=${TMP}.bootloader.bin 41 --bootloader ${TMP}.bootloader.bin \
|
/system/update_engine/ |
hardware_android.cc | 25 #include <bootloader.h> 50 // parts of the bootloader (such as the bootloader version and the baseband 52 const char kPropBootBootloader[] = "ro.boot.bootloader"; 163 char bootloader[PROPERTY_VALUE_MAX]; local 164 property_get(kPropBootBootloader, bootloader, ""); 165 return bootloader;
|
/device/linaro/hikey/build/tasks/ |
boot_fat.mk | 10 $(FAT16COPY) $@ device/linaro/hikey/bootloader/*
|
/device/lge/bullhead/ |
releasetools.py | 30 bootloader_img = info.input_zip.read("RADIO/bootloader.img") 32 print "no bootloader.img in target_files; skipping install" 64 target_bootloader_img = info.target_zip.read("RADIO/bootloader.img") 66 source_bootloader_img = info.source_zip.read("RADIO/bootloader.img") 71 print "bootloader unchanged; skipping" 75 print "no bootloader.img in target target_files; skipping install" 126 # /* msm8992 bootloader.img format */ 142 def ParseBootloaderHeader(bootloader): 146 header_fmt, bootloader[:header_size]) 147 assert magic == "BOOTLDR!", "bootloader.img bad magic value [all...] |
/external/autotest/server/hosts/ |
base_classes.py | 51 bootloader = None variable in class:Host
|
/external/toolchain-utils/binary_search_tool/android/ |
test_setup.sh | 8 # bootloader mode and fastboot is used to flash the new image. The device is 61 echo " ${ADB_DEVICE}adb reboot bootloader" 62 adb reboot bootloader
|
/device/linaro/hikey/bootloader/ |
Makefile | 2 EDK2_DIR=$(ANDROID_BUILD_TOP)/device/linaro/bootloader/edk2 4 ATF_DIR=$(ANDROID_BUILD_TOP)/device/linaro/bootloader/arm-trusted-firmware
|
/external/vboot_reference/tests/ |
load_kernel_tests.sh | 48 --bootloader "dummy_bootloader.bin" \
|
gen_preamble_testdata.sh | 79 --bootloader "${DATADIR}/dummy_bootloader.bin" \
|
gen_fuzz_test_cases.sh | 60 --bootloader ${TEST_BOOTLOADER_FILE} \ 69 # NOTE: The kernel and config file can't really be random, but the bootloader 73 echo "Generating test bootloader file..." 74 # TODO(gauravsh): Use a valid bootloader here?
|
/prebuilts/misc/scripts/vboot_signer/ |
vboot_signer.sh | 54 ${futility} vbutil_kernel --pack ${output} --keyblock ${keyblock} --signprivate ${privkey} --version 1 --vmlinuz ${input} --config ${EMPTY} --arch arm --bootloader ${EMPTY} --flags 0x1
|
/development/python-packages/fastboot/ |
device.py | 32 INFO_PREFIX = '(bootloader) ' 118 # In addition to returning all variables the bootloader may 164 def reboot(self, bootloader=False): 165 """Calls `fastboot reboot [bootloader]`. 168 bootloader: True to reboot back to the bootloader. 171 if bootloader: 172 command.append('bootloader')
|
/external/autotest/client/bin/ |
local_host.py | 22 def _initialize(self, hostname=None, bootloader=None, *args, **dargs): 30 self.bootloader = bootloader
|
/external/chromium-trace/catapult/devil/devil/android/ |
fastboot_utils.py | 26 ('bootloader', {'image': 'bootloader*.img', 'restart': True}), 129 self, bootloader=False, wait_for_reboot=True, timeout=None, retries=None): 136 bootloader: If set to True, reboots back into bootloader. 138 if bootloader: 217 self.Reboot(bootloader=True) 239 Directory must contain bootloader, radio, boot, recovery, system, userdata,
|
fastboot_utils_test.py | 30 'bootloader', 'radio', 'boot', 'recovery', 'system', 'userdata', 'cache'] 32 ('bootloader', 'bootloader.img'), 100 parts = ['bootloader', 'radio', 'boot', 'recovery', 'system', 'userdata', 129 self.fastboot.Reboot(bootloader=True) 145 (self.call.fastboot.fastboot.Flash('bootloader', 'bootloader.img')), 146 (self.call.fastboot.Reboot(bootloader=True)), 148 (self.call.fastboot.Reboot(bootloader=True)), 161 (self.call.fastboot.fastboot.Flash('bootloader', 'bootloader.img')) [all...] |
/external/libmojo/third_party/catapult/devil/devil/android/ |
fastboot_utils.py | 24 ('bootloader', {'image': 'bootloader*.img', 'restart': True}), 127 self, bootloader=False, wait_for_reboot=True, timeout=None, retries=None): 134 bootloader: If set to True, reboots back into bootloader. 136 if bootloader: 215 self.Reboot(bootloader=True) 237 Directory must contain bootloader, radio, boot, recovery, system, userdata,
|
fastboot_utils_test.py | 30 'bootloader', 'radio', 'boot', 'recovery', 'system', 'userdata', 'cache'] 32 ('bootloader', 'bootloader.img'), 100 parts = ['bootloader', 'radio', 'boot', 'recovery', 'system', 'userdata', 129 self.fastboot.Reboot(bootloader=True) 145 (self.call.fastboot.fastboot.Flash('bootloader', 'bootloader.img')), 146 (self.call.fastboot.Reboot(bootloader=True)), 148 (self.call.fastboot.Reboot(bootloader=True)), 161 (self.call.fastboot.fastboot.Flash('bootloader', 'bootloader.img')) [all...] |
/system/extras/boot_control_copy/ |
bootinfo.c | 33 #include <bootloader.h> 114 // bootable/recovery/bootloader.h we can use the 32 bytes in the
|
/build/make/tools/releasetools/ |
edify_generator.py | 155 """Asert that the bootloader version is one of *bootloaders.""" 157 " ||\0".join(['getprop("ro.bootloader") == "%s"' % (b,)
|
/compatibility/cdd/9_security-model/ |
9_10_device-integrity.md | 7 `PersistentDataBlockManager.getFlashLockState()` whether their bootloader 35 bootloader is unlocked. Tamper-evident storage means that the boot loader can
|