Home
last modified time | relevance | path

Searched refs:from (Results 1 – 25 of 56) sorted by relevance

123

/bootable/libbootloader/gbl/libgbl/src/
Dslots.rs34 fn from(u: usize) -> Self { in from() method
39 fn from(u: u8) -> Self { in from() method
51 fn from(u: usize) -> Self { in from() method
56 fn from(u: u8) -> Self { in from() method
74 -i64::from(u32::from(self.0)) in rank()
79 fn from(c: char) -> Self { in from() method
104 fn from(val: Suffix) -> Self { in from() method
137 fn from(val: u8) -> Self { in from() method
149 fn from(reason: UnbootableReason) -> Self { in from() method
/bootable/libbootloader/gbl/libstorage/src/
Dlib.rs141 fn from(err: safemath::Error) -> Self { in from() method
147 fn from(_: core::num::TryFromIntError) -> Self { in from() method
153 fn from(val: BlockIoError) -> Self { in from() method
179 Ok((SafeNum::from(self.block_size) * self.num_blocks).try_into()?) in total_size()
267 (SafeNum::from(self.entry.blocks()?) * self.block_size) in size()
357 Ok((SafeNum::from(self.block_size()?) * self.num_blocks()?).try_into()?) in total_size()
559 let blk_count = SafeNum::from(buffer.len()) / block_size; in check_range()
585 let block_size = SafeNum::from(blk_io.block_size()); in read_aligned_offset_and_buffer()
589 let aligned_read: usize = SafeNum::from(out.len()).round_down(block_size).try_into()?; in read_aligned_offset_and_buffer()
600 let aligned_offset = SafeNum::from(offset) + aligned_read; in read_aligned_offset_and_buffer()
[all …]
Dgpt.rs73 u64::try_from((SafeNum::from(self.last) - self.first) + 1).map_err(|e| e.into()) in blocks()
194 let entries_size = SafeNum::from(info.max_entries) * GPT_ENTRY_SIZE; in from_existing()
195 let header_size: usize = SafeNum::from(GPT_HEADER_SIZE_PADDED).try_into()?; in from_existing()
212 let entries_size = SafeNum::from(max_entries) * GPT_ENTRY_SIZE; in required_buffer_size()
262 (SafeNum::from(blk_dev.num_blocks()) - 1) * blk_dev.block_size(), in validate_gpt()
275 let entries_size = SafeNum::from(header.entries_count) * GPT_ENTRY_SIZE; in validate_gpt()
276 let entries_offset = SafeNum::from(header.entries) * blk_dev.block_size(); in validate_gpt()
279 > ((SafeNum::from(blk_dev.num_blocks()) - 1) * blk_dev.block_size()).try_into()? in validate_gpt()
284 let crc32_offset = SafeNum::from(GPT_CRC32_OFFSET).try_into()?; in validate_gpt()
318 let primary_entries_pos = SafeNum::from(primary_entries_blk) * block_size; in load_and_sync()
[all …]
Dtestlib.rs179 let offset = (SafeNum::from(*blk_offset) * self.block_size).try_into().unwrap(); in check_status()
224 fn from(data: &[u8]) -> Self { in from() method
393 DiskDescription::Disk(BackingStore::Data(slice)) => Vec::from(slice), in build()
448 let entry_blocks: u64 = ((SafeNum::from(partitions.len()) * std::mem::size_of::<GptEntry>()) in partitions_to_disk_data()
475 let last = (SafeNum::from(v.size()).round_up(block_size) / block_size + block - 1) in partitions_to_disk_data()
/bootable/libbootloader/gbl/third_party/libzbi/
DREADME.md9 Currently [`sdk/lib/zbi-format`](sdk/lib/zbi-format) is not ready to provide Rust bindings from FID…
10 So we are using `buildgen` generated version from C headers: [`src/firmware/lib/zbi-rs/src/zbi_form…
22 To get just `zbi-rs` from Fuchsia following commands can be used:
/bootable/recovery/minadbd/
DAndroid.bp19 // all of the 'license_kinds' from "bootable_recovery_license"
101 "android.hardware.health-V3-ndk", // from librecovery_utils
133 "android.hardware.health-V3-ndk", // from librecovery_utils
/bootable/recovery/updater_sample/
DREADME.md27 In real-life update system the config files expected to be served from a server
32 SystemUpdaterSample app downloads OTA package from `url`. In this sample app
61 1. If sample app is unbound from update_engine (MainActivity is paused, destroyed),
68 `cancel` and `applyPayload` (which picks up from where it left).
92 - `Reload` - reloads update configs from device storage.
105 ## Sending HTTP headers from UpdateEngine
159 The commands are expected to be run from `$ANDROID_BUILD_TOP` and for demo
201 9. Push OTA packages to the device if there is no server to stream packages from;
221 - [x] Add UpdateManager; extract update logic from MainActivity
222 - [x] Add Sample app update state (separate from update_engine status)
[all …]
DAndroid.bp18 // all of the 'license_kinds' from "bootable_recovery_license"
/bootable/libbootloader/gbl/docs/
DEFI_ANDROID_BOOT_PROTOCOL.md174 USB interface started by `FastbootUsbInterfaceStart()` from the USB descriptors.
176 device from the host.
191 Receives a USB packet from the interface started by
222 packet from the Fastboot USB interface into the provided buffer.
231 | EFI_NOT_READY | No packet has been received from the interface.|
239 Sends a USB packet from the USB interface started by
/bootable/libbootloader/gbl/
Dbazel.MODULE.bazel17 Ideally, MODULE.bazel from Kleaf should be used instead because Kleaf is the
24 # TODO(b/328465178): Use MODULE.bazel from Kleaf instead.
DMODULE.bazel3 # Please consider migrating your external dependencies from WORKSPACE to MODULE.bazel.
DREADME.md5 can be loaded directly from the firmware.
9 The GBL project are intended to be built from the
/bootable/recovery/fonts/
DREADME3 from:
/bootable/libbootloader/gbl/libfastboot/src/
Dlib.rs193 fn from(val: T) -> Self { in from() method
1204 fastboot_impl.vars = BTreeMap::from(vars); in test_get_var()
1220 VecDeque::<Vec<u8>>::from([ in test_get_var()
1241 fastboot_impl.vars = BTreeMap::from(vars); in test_get_var_all()
1250 VecDeque::<Vec<u8>>::from([ in test_get_var_all()
1277 VecDeque::<Vec<u8>>::from([b"DATA0x400".into(), b"OKAY".into(),]) in test_download()
1312 assert_eq!(transport.out_queue, VecDeque::<Vec<u8>>::from([msg.as_bytes().into()])); in test_download_size()
1339 VecDeque::<Vec<u8>>::from([ in test_download_more_than_expected()
1371 VecDeque::<Vec<u8>>::from([ in test_oem_cmd()
1402 VecDeque::<Vec<u8>>::from([b"DATA0x400".into(), b"OKAY".into(), b"OKAY".into(),]) in test_flash()
[all …]
/bootable/libbootloader/gbl/libefi/src/
Dlib.rs102 fn from(efi_status: EfiStatus) -> EfiError { in from() method
1042 VecDeque::from([(as_efi_handle(&mut block_io), EFI_STATUS_SUCCESS)]); in test_open_close_protocol()
1099 VecDeque::from([(as_efi_handle(&mut block_io), EFI_STATUS_SUCCESS)]); in test_null_efi_method()
1126 VecDeque::from([(as_efi_handle(&mut block_io), EFI_STATUS_NOT_FOUND)]); in test_error_efi_method()
1148 VecDeque::from([(located_handles.len(), located_handles.as_mut_ptr())]); in test_locate_handle_buffer_by_protocol()
1182 VecDeque::from([(located_handles.len(), located_handles.as_mut_ptr())]); in test_find_first_and_open()
1189 VecDeque::from([(as_efi_handle(&mut block_io), EFI_STATUS_SUCCESS)]); in test_find_first_and_open()
1236 VecDeque::from([(map_key, 1 * size_of::<EfiMemoryDescriptor>())]); in test_exit_boot_services()
1301 VecDeque::from([(map_key, 2 * size_of::<EfiMemoryDescriptor>())]); in test_exit_boot_services_unaligned_buffer()
/bootable/libbootloader/gbl/libefi/src/protocol/
Dsimple_text_output.rs65 fn from(_: core::fmt::Error) -> EfiError { in from() method
/bootable/recovery/
DREADME.md16 # Manually choose `Recovery mode` from bootloader menu.
59 When running recovery image from debuggable builds (i.e. `-eng` or `-userdebug` build variants, or
68 Although `/system/bin/adbd` is built from the same code base as the one in the normal boot, only a
70 `adb pull` etc. Since Android Q, `adb shell` no longer requires manually mounting `/system` from
DNOTICE43 "Object" form shall mean any form resulting from mechanical
54 form, that is based on (or derived from) the Work and for which the
58 separable from, or merely link (or bind by name) to the interfaces of,
115 attribution notices from the Source form of the Work,
132 or as an addendum to the NOTICE text from the Work, provided
/bootable/libbootloader/gbl/toolchain/
Dgbl_workspace_util.bzl133 """Assemble a rust toolchain repo from the Android rust prebuilts repo.
135 The Android rust prebuilts repo is expected to be from
149 # Ignore native BUILD file as we'll use override from `ctx.attr.build_file` instead.
/bootable/recovery/tools/image_generator/
DAndroid.bp18 // all of the 'license_kinds' from "bootable_recovery_license"
/bootable/recovery/tools/recovery_l10n/
DAndroid.bp18 // all of the 'license_kinds' from "bootable_recovery_license"
/bootable/recovery/uncrypt/
DAndroid.bp18 // all of the 'license_kinds' from "bootable_recovery_license"
/bootable/recovery/fuse_sideload/
DAndroid.bp18 // all of the 'license_kinds' from "bootable_recovery_license"
/bootable/deprecated-ota/
DNOTICE43 "Object" form shall mean any form resulting from mechanical
54 form, that is based on (or derived from) the Work and for which the
58 separable from, or merely link (or bind by name) to the interfaces of,
115 attribution notices from the Source form of the Work,
132 or as an addendum to the NOTICE text from the Work, provided
/bootable/deprecated-ota/edify/
DAndroid.bp18 // all of the 'license_kinds' from "bootable_recovery_license"

123