/device/sample/skins/WVGAMedDpi/ |
D | layout | 4 image background_port.png 9 image background_land.png 24 image controls.png 28 image button.png 33 image button.png 38 image button.png 43 image arrow_up.png 48 image arrow_down.png 53 image arrow_left.png 58 image arrow_right.png [all …]
|
/device/google/cuttlefish/tools/ |
D | create_base_image_gce.sh | 42 sudo mkdir /mnt/image 43 sudo mount /dev/sdb1 /mnt/image 44 cp "${debs[@]}" /mnt/image/tmp 45 sudo mount -t sysfs none /mnt/image/sys 46 sudo mount -t proc none /mnt/image/proc 47 sudo mount --bind /dev/ /mnt/image/dev 48 sudo mount --bind /dev/pts /mnt/image/dev/pts 49 sudo mount --bind /run /mnt/image/run 51 sudo cp /etc/resolv.conf /mnt/image/etc/ 52 sudo chroot /mnt/image /usr/bin/apt update [all …]
|
D | create_base_image_hostlib.sh | 101 --image-family="${FLAGS_source_image_family}" \ 102 --image-project="${FLAGS_source_image_project}" \ 110 --image-family="${FLAGS_source_image_family}" \ 111 --image-project="${FLAGS_source_image_project}" \ 142 --image-project="${FLAGS_build_project}" \ 143 --image="${FLAGS_dest_image}" \ 155 --source-image="${FLAGS_dest_image}" \ 156 --source-image-project="${FLAGS_build_project}" \
|
D | flash-blk-dev.sh | 26 if [ ! -e "${image}" ]; then 80 imgsize=`ls -lah ${image} | awk -F " " {'print $5'}` 85 pv ${image} > /dev/${blk_dev} 87 dd if=${image} of=/dev/${blk_dev} bs=1M conv=sync,noerror status=progress 125 image=$1 126 if [ "${image}" == "" ]; then
|
/device/google/sunfish/ |
D | init.qcom.modem_links.sh | 36 cd /firmware/image 74 ln -s /firmware/image/athwlan.bin /system/etc/firmware/athwlan.bin 75 ln -s /firmware/image/fakeboar.bin /system/etc/firmware/fakeBoardData_AR6004.bin 76 ln -s /firmware/image/otp.bin /system/etc/firmware/otp.bin 77 ln -s /firmware/image/utf.bin /system/etc/firmware/utf.bin 81 cd /firmware/image 86 ln -s /firmware/image/$imgfile /system/etc/firmware/$imgfile 2>/dev/null 92 log -p w -t PIL no modem image found;; 98 ln -s /firmware/image/$imgfile /system/etc/firmware/$imgfile 2>/dev/null 102 log -p w -t PIL no adsp image found;; [all …]
|
/device/google/redbull/ |
D | init.qcom.modem_links.sh | 36 cd /firmware/image 74 ln -s /firmware/image/athwlan.bin /system/etc/firmware/athwlan.bin 75 ln -s /firmware/image/fakeboar.bin /system/etc/firmware/fakeBoardData_AR6004.bin 76 ln -s /firmware/image/otp.bin /system/etc/firmware/otp.bin 77 ln -s /firmware/image/utf.bin /system/etc/firmware/utf.bin 81 cd /firmware/image 86 ln -s /firmware/image/$imgfile /system/etc/firmware/$imgfile 2>/dev/null 92 log -p w -t PIL no modem image found;; 98 ln -s /firmware/image/$imgfile /system/etc/firmware/$imgfile 2>/dev/null 102 log -p w -t PIL no adsp image found;; [all …]
|
/device/google/coral/ |
D | init.qcom.modem_links.sh | 36 cd /firmware/image 74 ln -s /firmware/image/athwlan.bin /system/etc/firmware/athwlan.bin 75 ln -s /firmware/image/fakeboar.bin /system/etc/firmware/fakeBoardData_AR6004.bin 76 ln -s /firmware/image/otp.bin /system/etc/firmware/otp.bin 77 ln -s /firmware/image/utf.bin /system/etc/firmware/utf.bin 81 cd /firmware/image 86 ln -s /firmware/image/$imgfile /system/etc/firmware/$imgfile 2>/dev/null 92 log -p w -t PIL no modem image found;; 98 ln -s /firmware/image/$imgfile /system/etc/firmware/$imgfile 2>/dev/null 102 log -p w -t PIL no adsp image found;; [all …]
|
/device/google/contexthub/util/nanoapp_encr/ |
D | nanoapp_encr.c | 60 struct ImageHeader *image; in handleEncrypt() local 82 if (bufUsed <= sizeof(*image)) { in handleEncrypt() 89 if (((bufUsed - sizeof(*image)) % AES_BLOCK_SIZE) != 0) in handleEncrypt() 90 padLen = AES_BLOCK_SIZE - ((bufUsed - sizeof(*image)) % AES_BLOCK_SIZE); in handleEncrypt() 100 image = (struct ImageHeader *)buf; in handleEncrypt() 102 if (bufUsed >= sizeof(*image) && image->aosp.magic == NANOAPP_AOSP_MAGIC && in handleEncrypt() 103 image->aosp.header_version == 1 && image->layout.magic == GOOGLE_LAYOUT_MAGIC) { in handleEncrypt() 110 if ((image->aosp.flags & NANOAPP_SIGNED_FLAG) != 0) { in handleEncrypt() 114 if ((image->aosp.flags & NANOAPP_ENCRYPTED_FLAG) != 0) { in handleEncrypt() 119 image->aosp.flags |= NANOAPP_ENCRYPTED_FLAG; in handleEncrypt() [all …]
|
/device/linaro/bootloader/arm-trusted-firmware/docs/ |
D | firmware-update.rst | 25 `Trusted Board Boot`_ design document, which describes the image authentication 49 - FWU image authentication 66 TF uses abbreviated image terminology for FWU images like for other TF images. 78 Each FWU image and certificate is identified by a unique ID, defined by the 79 platform, which BL1 uses to fetch an image descriptor (``image_desc_t``) via a 84 The image descriptor includes the following information: 86 - Executable or non-executable image. This indicates whether the normal world 87 is permitted to request execution of a secure world FWU image (after 90 - Secure or non-secure image. This indicates whether the image is 94 - FWU image state. [all …]
|
D | auth-framework.rst | 15 particular image/certificate. 80 a root of trust and culminates in a single data image. The following diagram 81 illustrates how this maps to a CoT for the BL31 image described in the 131 authentication image contains information to authenticate a data image or 132 another authentication image. A data image is usually a boot loader binary, but 138 For every image in a Chain of Trust, the following high level operations are 141 #. Allocate memory for the image either statically or at runtime. 143 #. Identify the image and load it in the allocated memory. 145 #. Check the integrity of the image as per its type. 147 #. Authenticate the image as per the cryptographic algorithms used. [all …]
|
/device/linaro/bootloader/arm-trusted-firmware/tools/fiptool/ |
D | fiptool.c | 172 free(desc->image); in free_image_desc() 310 image_t *image; in parse_fip() local 323 image = xzalloc(sizeof(*image), in parse_fip() 325 image->toc_e = *toc_entry; in parse_fip() 326 image->buffer = xmalloc(toc_entry->size, in parse_fip() 334 memcpy(image->buffer, buf + toc_entry->offset_address, in parse_fip() 352 assert(desc->image == NULL); in parse_fip() 353 desc->image = image; in parse_fip() 368 image_t *image; in read_image_from_file() local 381 image = xzalloc(sizeof(*image), "failed to allocate memory for image"); in read_image_from_file() [all …]
|
D | fiptool.h | 39 struct image *image; member 43 typedef struct image { struct
|
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/test/ |
D | test_imageop.py | 80 image, width, height = getimage('test'+os.extsep+'rgb') 86 newimage = imageop.crop (image, 4, width, height, 0, 0, 1, 1) 94 scaleimage = imageop.scale(image, 4, width, height, 1, 1) 102 videoimage = imageop.tovideo (image, 4, width, height) 107 greyimage = imageop.rgb2rgb8(image, width, height) 112 image = imageop.rgb82rgb(greyimage, width, height) 117 greyimage = imageop.rgb2grey(image, width, height) 122 image = imageop.grey2rgb(greyimage, width, height) 174 image = imageop.grey22grey (grey2image, width, height) 192 image = imgfile.read(name) [all …]
|
/device/google/cuttlefish/host/commands/assemble_cvd/ |
D | data_image.cc | 70 const std::string& image, int num_mb, const std::string& image_fmt) { in CreateBlankImage() argument 71 LOG(INFO) << "Creating " << image; in CreateBlankImage() 77 auto fd = cvd::SharedFD::Open(image, O_CREAT | O_TRUNC | O_RDWR, 0666); in CreateBlankImage() 79 LOG(ERROR) << "`truncate --size=" << num_mb << "M " << image in CreateBlankImage() 86 cvd::execute({"/sbin/mkfs.ext4", image}); in CreateBlankImage() 89 cvd::execute({make_f2fs_path, "-t", image_fmt, image, "-g", "android"}); in CreateBlankImage() 103 image}); in CreateBlankImage() 114 auto fd = cvd::SharedFD::Open(image, O_RDWR); in CreateBlankImage() 116 LOG(ERROR) << "Writing MBR to " << image << " failed:" << fd->StrError(); in CreateBlankImage() 121 << "' for " << image << ", treating as 'none'."; in CreateBlankImage()
|
/device/generic/goldfish-opengl/system/GLESv1/ |
D | gl.cpp | 62 EGLImage_t *image = (EGLImage_t*)img; in glEGLImageTargetTexture2DOES() local 64 if (image->target == EGL_NATIVE_BUFFER_ANDROID) { in glEGLImageTargetTexture2DOES() 66 android_native_buffer_t* native_buffer = image->native_buffer; in glEGLImageTargetTexture2DOES() 84 else if (image->target == EGL_GL_TEXTURE_2D_KHR) { in glEGLImageTargetTexture2DOES() 87 GLeglImageOES hostImage = reinterpret_cast<GLeglImageOES>((intptr_t)image->host_egl_image); in glEGLImageTargetTexture2DOES() 100 EGLImage_t *image = (EGLImage_t*)img; in glEGLImageTargetRenderbufferStorageOES() local 102 if (image->target == EGL_NATIVE_BUFFER_ANDROID) { in glEGLImageTargetRenderbufferStorageOES() 103 android_native_buffer_t* native_buffer = ((EGLImage_t*)image)->native_buffer; in glEGLImageTargetRenderbufferStorageOES()
|
/device/generic/goldfish-opengl/system/GLESv2/ |
D | gl2.cpp | 63 EGLImage_t *image = (EGLImage_t*)img; in glEGLImageTargetTexture2DOES() local 64 GLeglImageOES hostImage = reinterpret_cast<GLeglImageOES>((intptr_t)image->host_egl_image); in glEGLImageTargetTexture2DOES() 66 if (image->target == EGL_NATIVE_BUFFER_ANDROID) { in glEGLImageTargetTexture2DOES() 68 android_native_buffer_t* native_buffer = image->native_buffer; in glEGLImageTargetTexture2DOES() 87 else if (image->target == EGL_GL_TEXTURE_2D_KHR) { in glEGLImageTargetTexture2DOES() 103 EGLImage_t *image = (EGLImage_t*)img; in glEGLImageTargetRenderbufferStorageOES() local 105 if (image->target == EGL_NATIVE_BUFFER_ANDROID) { in glEGLImageTargetRenderbufferStorageOES() 106 android_native_buffer_t* native_buffer = ((EGLImage_t*)image)->native_buffer; in glEGLImageTargetRenderbufferStorageOES()
|
/device/google/contexthub/util/nanoapp_sign/ |
D | nanoapp_sign.c | 234 struct ImageHeader *image = (struct ImageHeader *)buf; in handleVerify() local 235 struct AppSecSignHdr *secHdr = (struct AppSecSignHdr *)&image[1]; in handleVerify() 242 if (bufUsed < (sizeof(*image) + sizeof(*secHdr))) { in handleVerify() 251 if (!(image->aosp.flags & NANOAPP_SIGNED_FLAG)) { in handleVerify() 255 sigData = bufUsed - (secHdr->appDataLen + sizeof(*image) + sizeof(*secHdr)); in handleVerify() 326 struct ImageHeader *image = (struct ImageHeader *)buf; in handleSign() local 327 struct AppSecSignHdr *secHdr = (struct AppSecSignHdr *)&image[1]; in handleSign() 329 if (!(image->aosp.flags & NANOAPP_SIGNED_FLAG)) { in handleSign() 333 image = (struct ImageHeader *)buf; in handleSign() 334 secHdr = (struct AppSecSignHdr *)&image[1]; in handleSign() [all …]
|
/device/linaro/bootloader/arm-trusted-firmware/plat/arm/css/drivers/scp/ |
D | css_bom_bootloader.c | 102 int css_scp_boot_image_xfer(void *image, unsigned int image_size) in css_scp_boot_image_xfer() argument 109 assert((uintptr_t) image == SCP_BL2_BASE); in css_scp_boot_image_xfer() 119 checksum = *(uint32_t *) image; in css_scp_boot_image_xfer() 120 image = (char *) image + sizeof(checksum); in css_scp_boot_image_xfer() 172 cmd_data_payload->offset = (uintptr_t) image - ARM_TRUSTED_SRAM_BASE; in css_scp_boot_image_xfer()
|
/device/linaro/bootloader/edk2/SecurityPkg/Library/DxeImageVerificationLib/ |
D | DxeImageVerificationLib.uni | 2 // Provides security service of image verification 4 // This library hooks LoadImage() API to verify every image by the verification policy. 7 // This library will have external input - PE/COFF image. 23 #string STR_MODULE_ABSTRACT #language en-US "Provides security service of image verific… 25 … image by the verification policy. Caution: This module requires additional review when modified. …
|
/device/linaro/bootloader/edk2/IntelFsp2Pkg/Tools/UserManuals/ |
D | SplitFspBinUserManual.md | 1 # SplitFspBin.py is a python script to support some operations on Intel FSP 2.0 image. 5 - Split Intel FSP 2.0 image into individual FSP-T/M/S/O component 13 ## Split Intel FSP 2.0 image 15 To split individual FSP component in Intel FSP 2.0 image, the following 28 To rebase one or multiple FSP components in Intel FSP 2.0 image, the following 38 rebased Intel FSP 2.0 image into file FSP_new.bin. 43 and 0xFEF80000 respectively, and save the rebased Intel FSP 2.0 image into file 56 It will create the C header file FSP.h containing the image ID, revision, offset
|
/device/generic/opengl-transport/host/libs/virglrenderer/ |
D | EglImage.h | 32 : pfnEglDestroyImageKHR(pfnEglDestroyImageKHR_), image(image_), dpy(dpy_), id(nextId++) { in EglImage() 37 pfnEglDestroyImageKHR(dpy, image); in ~EglImage() 42 EGLImageKHR image; member
|
/device/generic/goldfish/tools/ |
D | mk_vbmeta_boot_params.sh | 43 readonly VBMETA_DIGEST=$(${AVBTOOL:-avbtool} calculate_vbmeta_digest --image $VBMETAIMG) 46 readonly INFO_OUTPUT=$(${AVBTOOL:-avbtool} info_image --image $VBMETAIMG | grep "^Algorithm:") 63 MY_OUTPUT=$(${AVBTOOL:-avbtool} info_image --image $1 | grep "$2" )
|
/device/linaro/bootloader/arm-trusted-firmware/plat/xilinx/zynqmp/ |
D | plat_startup.c | 188 entry_point_info_t *image; in fsbl_atf_handover() local 221 image = bl32; in fsbl_atf_handover() 231 image = bl33; in fsbl_atf_handover() 257 image->pc = ATFHandoffParams->partition[i].entry_point; in fsbl_atf_handover() 260 EP_SET_EE(image->h.attr, EP_EE_BIG); in fsbl_atf_handover() 262 EP_SET_EE(image->h.attr, EP_EE_LITTLE); in fsbl_atf_handover()
|
/device/linaro/bootloader/edk2/Vlv2TbltDevicePkg/Feature/Capsule/SystemFirmwareUpdateConfig/ |
D | SystemFirmwareUpdateConfigGcc.ini | 30 ImageOffset = 0x00000000 # Image offset of this SystemFirmware image 38 ImageOffset = 0x00040000 # Image offset of this SystemFirmware image 46 ImageOffset = 0x000C0000 # Image offset of this SystemFirmware image 54 ImageOffset = 0x00110000 # Image offset of this SystemFirmware image 62 ImageOffset = 0x00325000 # Image offset of this SystemFirmware image 70 ImageOffset = 0x00390000 # Image offset of this SystemFirmware image
|
D | SystemFirmwareUpdateConfig.ini | 30 ImageOffset = 0x00000000 # Image offset of this SystemFirmware image 38 ImageOffset = 0x00040000 # Image offset of this SystemFirmware image 46 ImageOffset = 0x000C0000 # Image offset of this SystemFirmware image 54 ImageOffset = 0x00110000 # Image offset of this SystemFirmware image 62 ImageOffset = 0x00320000 # Image offset of this SystemFirmware image 70 ImageOffset = 0x00390000 # Image offset of this SystemFirmware image
|