Home
last modified time | relevance | path

Searched refs:image (Results 1 – 25 of 356) sorted by relevance

12345678910>>...15

/device/sample/skins/WVGAMedDpi/
Dlayout4 image background_port.png
9 image background_land.png
24 image controls.png
28 image button.png
33 image button.png
38 image button.png
43 image arrow_up.png
48 image arrow_down.png
53 image arrow_left.png
58 image arrow_right.png
[all …]
/device/google/cuttlefish/tools/
Dcreate_base_image_gce.sh42 sudo mkdir /mnt/image
43 sudo mount /dev/sdb1 /mnt/image
44 cp "${debs[@]}" /mnt/image/tmp
45 sudo mount -t sysfs none /mnt/image/sys
46 sudo mount -t proc none /mnt/image/proc
47 sudo mount --bind /dev/ /mnt/image/dev
48 sudo mount --bind /dev/pts /mnt/image/dev/pts
49 sudo mount --bind /run /mnt/image/run
51 sudo cp /etc/resolv.conf /mnt/image/etc/
52 sudo chroot /mnt/image /usr/bin/apt update
[all …]
Dcreate_base_image_hostlib.sh101 --image-family="${FLAGS_source_image_family}" \
102 --image-project="${FLAGS_source_image_project}" \
110 --image-family="${FLAGS_source_image_family}" \
111 --image-project="${FLAGS_source_image_project}" \
142 --image-project="${FLAGS_build_project}" \
143 --image="${FLAGS_dest_image}" \
155 --source-image="${FLAGS_dest_image}" \
156 --source-image-project="${FLAGS_build_project}" \
Dflash-blk-dev.sh26 if [ ! -e "${image}" ]; then
80 imgsize=`ls -lah ${image} | awk -F " " {'print $5'}`
85 pv ${image} > /dev/${blk_dev}
87 dd if=${image} of=/dev/${blk_dev} bs=1M conv=sync,noerror status=progress
125 image=$1
126 if [ "${image}" == "" ]; then
/device/google/sunfish/
Dinit.qcom.modem_links.sh36 cd /firmware/image
74 ln -s /firmware/image/athwlan.bin /system/etc/firmware/athwlan.bin
75 ln -s /firmware/image/fakeboar.bin /system/etc/firmware/fakeBoardData_AR6004.bin
76 ln -s /firmware/image/otp.bin /system/etc/firmware/otp.bin
77 ln -s /firmware/image/utf.bin /system/etc/firmware/utf.bin
81 cd /firmware/image
86 ln -s /firmware/image/$imgfile /system/etc/firmware/$imgfile 2>/dev/null
92 log -p w -t PIL no modem image found;;
98 ln -s /firmware/image/$imgfile /system/etc/firmware/$imgfile 2>/dev/null
102 log -p w -t PIL no adsp image found;;
[all …]
/device/google/redbull/
Dinit.qcom.modem_links.sh36 cd /firmware/image
74 ln -s /firmware/image/athwlan.bin /system/etc/firmware/athwlan.bin
75 ln -s /firmware/image/fakeboar.bin /system/etc/firmware/fakeBoardData_AR6004.bin
76 ln -s /firmware/image/otp.bin /system/etc/firmware/otp.bin
77 ln -s /firmware/image/utf.bin /system/etc/firmware/utf.bin
81 cd /firmware/image
86 ln -s /firmware/image/$imgfile /system/etc/firmware/$imgfile 2>/dev/null
92 log -p w -t PIL no modem image found;;
98 ln -s /firmware/image/$imgfile /system/etc/firmware/$imgfile 2>/dev/null
102 log -p w -t PIL no adsp image found;;
[all …]
/device/google/coral/
Dinit.qcom.modem_links.sh36 cd /firmware/image
74 ln -s /firmware/image/athwlan.bin /system/etc/firmware/athwlan.bin
75 ln -s /firmware/image/fakeboar.bin /system/etc/firmware/fakeBoardData_AR6004.bin
76 ln -s /firmware/image/otp.bin /system/etc/firmware/otp.bin
77 ln -s /firmware/image/utf.bin /system/etc/firmware/utf.bin
81 cd /firmware/image
86 ln -s /firmware/image/$imgfile /system/etc/firmware/$imgfile 2>/dev/null
92 log -p w -t PIL no modem image found;;
98 ln -s /firmware/image/$imgfile /system/etc/firmware/$imgfile 2>/dev/null
102 log -p w -t PIL no adsp image found;;
[all …]
/device/google/contexthub/util/nanoapp_encr/
Dnanoapp_encr.c60 struct ImageHeader *image; in handleEncrypt() local
82 if (bufUsed <= sizeof(*image)) { in handleEncrypt()
89 if (((bufUsed - sizeof(*image)) % AES_BLOCK_SIZE) != 0) in handleEncrypt()
90 padLen = AES_BLOCK_SIZE - ((bufUsed - sizeof(*image)) % AES_BLOCK_SIZE); in handleEncrypt()
100 image = (struct ImageHeader *)buf; in handleEncrypt()
102 if (bufUsed >= sizeof(*image) && image->aosp.magic == NANOAPP_AOSP_MAGIC && in handleEncrypt()
103 image->aosp.header_version == 1 && image->layout.magic == GOOGLE_LAYOUT_MAGIC) { in handleEncrypt()
110 if ((image->aosp.flags & NANOAPP_SIGNED_FLAG) != 0) { in handleEncrypt()
114 if ((image->aosp.flags & NANOAPP_ENCRYPTED_FLAG) != 0) { in handleEncrypt()
119 image->aosp.flags |= NANOAPP_ENCRYPTED_FLAG; in handleEncrypt()
[all …]
/device/linaro/bootloader/arm-trusted-firmware/docs/
Dfirmware-update.rst25 `Trusted Board Boot`_ design document, which describes the image authentication
49 - FWU image authentication
66 TF uses abbreviated image terminology for FWU images like for other TF images.
78 Each FWU image and certificate is identified by a unique ID, defined by the
79 platform, which BL1 uses to fetch an image descriptor (``image_desc_t``) via a
84 The image descriptor includes the following information:
86 - Executable or non-executable image. This indicates whether the normal world
87 is permitted to request execution of a secure world FWU image (after
90 - Secure or non-secure image. This indicates whether the image is
94 - FWU image state.
[all …]
Dauth-framework.rst15 particular image/certificate.
80 a root of trust and culminates in a single data image. The following diagram
81 illustrates how this maps to a CoT for the BL31 image described in the
131 authentication image contains information to authenticate a data image or
132 another authentication image. A data image is usually a boot loader binary, but
138 For every image in a Chain of Trust, the following high level operations are
141 #. Allocate memory for the image either statically or at runtime.
143 #. Identify the image and load it in the allocated memory.
145 #. Check the integrity of the image as per its type.
147 #. Authenticate the image as per the cryptographic algorithms used.
[all …]
/device/linaro/bootloader/arm-trusted-firmware/tools/fiptool/
Dfiptool.c172 free(desc->image); in free_image_desc()
310 image_t *image; in parse_fip() local
323 image = xzalloc(sizeof(*image), in parse_fip()
325 image->toc_e = *toc_entry; in parse_fip()
326 image->buffer = xmalloc(toc_entry->size, in parse_fip()
334 memcpy(image->buffer, buf + toc_entry->offset_address, in parse_fip()
352 assert(desc->image == NULL); in parse_fip()
353 desc->image = image; in parse_fip()
368 image_t *image; in read_image_from_file() local
381 image = xzalloc(sizeof(*image), "failed to allocate memory for image"); in read_image_from_file()
[all …]
Dfiptool.h39 struct image *image; member
43 typedef struct image { struct
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/test/
Dtest_imageop.py80 image, width, height = getimage('test'+os.extsep+'rgb')
86 newimage = imageop.crop (image, 4, width, height, 0, 0, 1, 1)
94 scaleimage = imageop.scale(image, 4, width, height, 1, 1)
102 videoimage = imageop.tovideo (image, 4, width, height)
107 greyimage = imageop.rgb2rgb8(image, width, height)
112 image = imageop.rgb82rgb(greyimage, width, height)
117 greyimage = imageop.rgb2grey(image, width, height)
122 image = imageop.grey2rgb(greyimage, width, height)
174 image = imageop.grey22grey (grey2image, width, height)
192 image = imgfile.read(name)
[all …]
/device/google/cuttlefish/host/commands/assemble_cvd/
Ddata_image.cc70 const std::string& image, int num_mb, const std::string& image_fmt) { in CreateBlankImage() argument
71 LOG(INFO) << "Creating " << image; in CreateBlankImage()
77 auto fd = cvd::SharedFD::Open(image, O_CREAT | O_TRUNC | O_RDWR, 0666); in CreateBlankImage()
79 LOG(ERROR) << "`truncate --size=" << num_mb << "M " << image in CreateBlankImage()
86 cvd::execute({"/sbin/mkfs.ext4", image}); in CreateBlankImage()
89 cvd::execute({make_f2fs_path, "-t", image_fmt, image, "-g", "android"}); in CreateBlankImage()
103 image}); in CreateBlankImage()
114 auto fd = cvd::SharedFD::Open(image, O_RDWR); in CreateBlankImage()
116 LOG(ERROR) << "Writing MBR to " << image << " failed:" << fd->StrError(); in CreateBlankImage()
121 << "' for " << image << ", treating as 'none'."; in CreateBlankImage()
/device/generic/goldfish-opengl/system/GLESv1/
Dgl.cpp62 EGLImage_t *image = (EGLImage_t*)img; in glEGLImageTargetTexture2DOES() local
64 if (image->target == EGL_NATIVE_BUFFER_ANDROID) { in glEGLImageTargetTexture2DOES()
66 android_native_buffer_t* native_buffer = image->native_buffer; in glEGLImageTargetTexture2DOES()
84 else if (image->target == EGL_GL_TEXTURE_2D_KHR) { in glEGLImageTargetTexture2DOES()
87 GLeglImageOES hostImage = reinterpret_cast<GLeglImageOES>((intptr_t)image->host_egl_image); in glEGLImageTargetTexture2DOES()
100 EGLImage_t *image = (EGLImage_t*)img; in glEGLImageTargetRenderbufferStorageOES() local
102 if (image->target == EGL_NATIVE_BUFFER_ANDROID) { in glEGLImageTargetRenderbufferStorageOES()
103 android_native_buffer_t* native_buffer = ((EGLImage_t*)image)->native_buffer; in glEGLImageTargetRenderbufferStorageOES()
/device/generic/goldfish-opengl/system/GLESv2/
Dgl2.cpp63 EGLImage_t *image = (EGLImage_t*)img; in glEGLImageTargetTexture2DOES() local
64 GLeglImageOES hostImage = reinterpret_cast<GLeglImageOES>((intptr_t)image->host_egl_image); in glEGLImageTargetTexture2DOES()
66 if (image->target == EGL_NATIVE_BUFFER_ANDROID) { in glEGLImageTargetTexture2DOES()
68 android_native_buffer_t* native_buffer = image->native_buffer; in glEGLImageTargetTexture2DOES()
87 else if (image->target == EGL_GL_TEXTURE_2D_KHR) { in glEGLImageTargetTexture2DOES()
103 EGLImage_t *image = (EGLImage_t*)img; in glEGLImageTargetRenderbufferStorageOES() local
105 if (image->target == EGL_NATIVE_BUFFER_ANDROID) { in glEGLImageTargetRenderbufferStorageOES()
106 android_native_buffer_t* native_buffer = ((EGLImage_t*)image)->native_buffer; in glEGLImageTargetRenderbufferStorageOES()
/device/google/contexthub/util/nanoapp_sign/
Dnanoapp_sign.c234 struct ImageHeader *image = (struct ImageHeader *)buf; in handleVerify() local
235 struct AppSecSignHdr *secHdr = (struct AppSecSignHdr *)&image[1]; in handleVerify()
242 if (bufUsed < (sizeof(*image) + sizeof(*secHdr))) { in handleVerify()
251 if (!(image->aosp.flags & NANOAPP_SIGNED_FLAG)) { in handleVerify()
255 sigData = bufUsed - (secHdr->appDataLen + sizeof(*image) + sizeof(*secHdr)); in handleVerify()
326 struct ImageHeader *image = (struct ImageHeader *)buf; in handleSign() local
327 struct AppSecSignHdr *secHdr = (struct AppSecSignHdr *)&image[1]; in handleSign()
329 if (!(image->aosp.flags & NANOAPP_SIGNED_FLAG)) { in handleSign()
333 image = (struct ImageHeader *)buf; in handleSign()
334 secHdr = (struct AppSecSignHdr *)&image[1]; in handleSign()
[all …]
/device/linaro/bootloader/arm-trusted-firmware/plat/arm/css/drivers/scp/
Dcss_bom_bootloader.c102 int css_scp_boot_image_xfer(void *image, unsigned int image_size) in css_scp_boot_image_xfer() argument
109 assert((uintptr_t) image == SCP_BL2_BASE); in css_scp_boot_image_xfer()
119 checksum = *(uint32_t *) image; in css_scp_boot_image_xfer()
120 image = (char *) image + sizeof(checksum); in css_scp_boot_image_xfer()
172 cmd_data_payload->offset = (uintptr_t) image - ARM_TRUSTED_SRAM_BASE; in css_scp_boot_image_xfer()
/device/linaro/bootloader/edk2/SecurityPkg/Library/DxeImageVerificationLib/
DDxeImageVerificationLib.uni2 // Provides security service of image verification
4 // This library hooks LoadImage() API to verify every image by the verification policy.
7 // This library will have external input - PE/COFF image.
23 #string STR_MODULE_ABSTRACT #language en-US "Provides security service of image verific…
25image by the verification policy. Caution: This module requires additional review when modified. …
/device/linaro/bootloader/edk2/IntelFsp2Pkg/Tools/UserManuals/
DSplitFspBinUserManual.md1 # SplitFspBin.py is a python script to support some operations on Intel FSP 2.0 image.
5 - Split Intel FSP 2.0 image into individual FSP-T/M/S/O component
13 ## Split Intel FSP 2.0 image
15 To split individual FSP component in Intel FSP 2.0 image, the following
28 To rebase one or multiple FSP components in Intel FSP 2.0 image, the following
38 rebased Intel FSP 2.0 image into file FSP_new.bin.
43 and 0xFEF80000 respectively, and save the rebased Intel FSP 2.0 image into file
56 It will create the C header file FSP.h containing the image ID, revision, offset
/device/generic/opengl-transport/host/libs/virglrenderer/
DEglImage.h32 : pfnEglDestroyImageKHR(pfnEglDestroyImageKHR_), image(image_), dpy(dpy_), id(nextId++) { in EglImage()
37 pfnEglDestroyImageKHR(dpy, image); in ~EglImage()
42 EGLImageKHR image; member
/device/generic/goldfish/tools/
Dmk_vbmeta_boot_params.sh43 readonly VBMETA_DIGEST=$(${AVBTOOL:-avbtool} calculate_vbmeta_digest --image $VBMETAIMG)
46 readonly INFO_OUTPUT=$(${AVBTOOL:-avbtool} info_image --image $VBMETAIMG | grep "^Algorithm:")
63 MY_OUTPUT=$(${AVBTOOL:-avbtool} info_image --image $1 | grep "$2" )
/device/linaro/bootloader/arm-trusted-firmware/plat/xilinx/zynqmp/
Dplat_startup.c188 entry_point_info_t *image; in fsbl_atf_handover() local
221 image = bl32; in fsbl_atf_handover()
231 image = bl33; in fsbl_atf_handover()
257 image->pc = ATFHandoffParams->partition[i].entry_point; in fsbl_atf_handover()
260 EP_SET_EE(image->h.attr, EP_EE_BIG); in fsbl_atf_handover()
262 EP_SET_EE(image->h.attr, EP_EE_LITTLE); in fsbl_atf_handover()
/device/linaro/bootloader/edk2/Vlv2TbltDevicePkg/Feature/Capsule/SystemFirmwareUpdateConfig/
DSystemFirmwareUpdateConfigGcc.ini30 ImageOffset = 0x00000000 # Image offset of this SystemFirmware image
38 ImageOffset = 0x00040000 # Image offset of this SystemFirmware image
46 ImageOffset = 0x000C0000 # Image offset of this SystemFirmware image
54 ImageOffset = 0x00110000 # Image offset of this SystemFirmware image
62 ImageOffset = 0x00325000 # Image offset of this SystemFirmware image
70 ImageOffset = 0x00390000 # Image offset of this SystemFirmware image
DSystemFirmwareUpdateConfig.ini30 ImageOffset = 0x00000000 # Image offset of this SystemFirmware image
38 ImageOffset = 0x00040000 # Image offset of this SystemFirmware image
46 ImageOffset = 0x000C0000 # Image offset of this SystemFirmware image
54 ImageOffset = 0x00110000 # Image offset of this SystemFirmware image
62 ImageOffset = 0x00320000 # Image offset of this SystemFirmware image
70 ImageOffset = 0x00390000 # Image offset of this SystemFirmware image

12345678910>>...15