Searched refs:firmware (Results 1 – 10 of 10) sorted by relevance
/system/core/init/ |
D | devices.cpp | 65 const char *firmware; member 370 uevent->firmware = ""; in parse_event() 390 uevent->firmware = msg; in parse_event() 416 uevent->firmware, uevent->major, uevent->minor); in parse_event() 810 uevent->firmware, uevent->path); in process_firmware_event() 835 l = asprintf(&file, "%s/%s", firmware_dirs[i], uevent->firmware); in process_firmware_event() 842 INFO("firmware: copy success { '%s', '%s' }\n", root, uevent->firmware); in process_firmware_event() 844 INFO("firmware: copy failure { '%s', '%s' }\n", root, uevent->firmware); in process_firmware_event() 857 INFO("firmware: could not open '%s': %s\n", uevent->firmware, strerror(errno)); in process_firmware_event()
|
/system/bt/doc/ |
D | properties.md | 9 Maximum amount of time Bluetooth can take to start-up, upload firmware etc.
|
/system/tpm/trunks/ |
D | README | 7 comply with the TSS specification. It is usable in firmware as well as in
|
/system/connectivity/shill/doc/ |
D | device-api.txt | 149 (Cellular only) Set the modem carrier firmware. For 357 (Cellular only) The revision of firmware that is
|
D | service-api.txt | 130 The correct carrier specific modem firmware
|
/system/tpm/trunks/generator/ |
D | raw_commands.txt | 915 firmware update), it is not possible to provide a compliant implementation. In those cases, any 1193 the platform firmware cannot know that the TPM is in Failure mode without accessing it, and 1195 platform firmware (the CRTM) will issue TPM2_Startup() and receive TPM_RC_FAILURE 12769 Each of the attestation structures contains a TPMS_CLOCK_INFO structure and a firmware version 14505 TPMS_ATTEST.clockInfo and again in TPMS_ATTEST.attested.time.clockInfo. The firmware version 27997 This clause contains the commands for managing field upgrade of the firmware in the TPM. The field 27998 upgrade scheme may be used for replacement or augmentation of the firmware installed in the TPM. 28001 …an algorithm is found to be flawed, a patch of that algorithm might be installed using the firmware 28003 replacement of the firmware. 28007 If an additional set of ECC parameters is needed, the firmware process may be used to add the [all …]
|
D | raw_commands_fixed.txt | 915 firmware update), it is not possible to provide a compliant implementation. In those cases, any 1193 the platform firmware cannot know that the TPM is in Failure mode without accessing it, and 1195 platform firmware (the CRTM) will issue TPM2_Startup() and receive TPM_RC_FAILURE 12780 Each of the attestation structures contains a TPMS_CLOCK_INFO structure and a firmware version 14516 TPMS_ATTEST.clockInfo and again in TPMS_ATTEST.attested.time.clockInfo. The firmware version 28008 This clause contains the commands for managing field upgrade of the firmware in the TPM. The field 28009 upgrade scheme may be used for replacement or augmentation of the firmware installed in the TPM. 28012 …an algorithm is found to be flawed, a patch of that algorithm might be installed using the firmware 28014 replacement of the firmware. 28018 If an additional set of ECC parameters is needed, the firmware process may be used to add the [all …]
|
D | raw_structures.txt | 6229 firmware update. The values in the variable group (PT_VAR) may be changed with TPM commands but 6263 firmware change in the TPM. 6361 indicating the version of the firmware 6366 indicating the version of the firmware 6628 Protected Capability other than a firmware update. The 11962 firmware 12285 TPM-vendor-specific field identifying the firmware on the TPM
|
D | raw_structures_fixed.txt | 6206 firmware update. The values in the variable group (PT_VAR) may be changed with TPM commands but 6241 firmware change in the TPM. 6351 indicating the version of the firmware 6357 indicating the version of the firmware 6653 Protected Capability other than a firmware update. The 11998 firmware 12323 TPM-vendor-specific field identifying the firmware on the TPM
|
/system/core/rootdir/ |
D | init.rc | 265 # Remove a file to wake up anything waiting for firmware.
|