/external/vboot_reference/scripts/image_signing/ |
ensure_no_password.sh | 14 echo "Usage $0 <image>" 18 IMAGE=$1 20 mount_image_partition_ro "$IMAGE" 3 "$ROOTFS"
|
convert_recovery_to_ssd.sh | 7 # Script to convert a recovery image into an SSD image. Changes are made in- 12 Usage: $PROG <image> [--force] [--cgpt=/path/to/cgpt] 14 In-place converts recovery <image> into an SSD image. With --force, does not 24 IMAGE=$1 52 echo "This will modify ${IMAGE} in-place and convert it into an SSD image." 58 kerna_offset=$(partoffset ${IMAGE} 2) 59 kernb_offset=$(partoffset ${IMAGE} 4 [all...] |
strip_boot_from_image.sh | 7 # Script to remove /boot directory from an image. 15 DEFINE_string image "chromiumos_image.bin" \ 16 "Input file name of Chrome OS image to strip /boot from." 26 die "Error: need a valid file by --image" 43 local image=$1 45 # Mount image so we can modify it. 47 mount_image_partition ${image} 3 ${rootfs_dir} 54 # done when the image was built, but needs to be repeated now that we've 60 IMAGE=$(readlink -f "${FLAGS_image}") 61 if [[ -z "${IMAGE}" || ! -f "${IMAGE}" ]]; the [all...] |
make_dev_firmware.sh | 8 # image or system live firmware (EEPROM), and assign proper HWID, FLAGS as well. 41 # the image we are (temporary) working with 42 IMAGE="$(make_temp_file)" 43 IMAGE="$(readlink -f "$IMAGE")" 66 # Reads $IMAGE from $FLAGS_from 71 flashrom -V -r "$IMAGE" 73 flashrom -r "$IMAGE" >"$EXEC_LOG" 2>&1 77 cp -f "$FLAGS_from" "$IMAGE" 81 # Writes $IMAGE to $FLAGS_t [all...] |
tag_image.sh | 16 "Input file name of Chrome OS image to tag/stamp." 50 # Global variable to track if the image is modified. 197 IMAGE=$(readlink -f "${FLAGS_from}") 198 if [[ -z "${IMAGE}" || ! -f "${IMAGE}" ]]; then 199 echo "Missing required argument: --from (image to update)" 206 mount_image_partition_ro "${IMAGE}" 3 "${rootfs}" 210 # mount_image_partition ${IMAGE} 1 ${stateful_dir} 218 mount_image_partition "${IMAGE}" 3 "${rootfs}" 220 # second round, apply the modification to image [all...] |
/external/e2fsprogs/tests/f_super_bad_csum/ |
script | 4 IMAGE=$test_dir/image.bz2 6 bzip2 -d < $IMAGE > $TMPFILE 33 unset EXP1 OUT1 EXP2 OUT2 FSCK_OPT IMAGE
|
/external/ltp/testcases/kernel/fs/quota_remount/ |
quota_remount_test01.sh | 65 rm 2>/dev/null $IMAGE 72 IMAGE=ltp-$$-fs-image 73 dd if=/dev/zero of=$IMAGE bs=4096 count=8000 2>/dev/null || die 2 "Cannot create filesystem image" 74 mkfs.ext3 -q -F -b 4096 $IMAGE || die 2 "Could not create the filesystem" 76 mount -t ext3 -o loop,usrquota,grpquota $IMAGE $MNTDIR || die 2 "Could not mount the filesystem" 115 rm $IMAGE
|
/external/e2fsprogs/tests/f_detect_junk/ |
script | 6 IMAGE=$test_dir/image.bz2 8 bzip2 -d < $IMAGE > $TMPFILE 40 unset EXP OUT FSCK_OPT IMAGE
|
/external/e2fsprogs/tests/f_detect_xfs/ |
script | 4 IMAGE=$test_dir/image.bz2 6 bzip2 -d < $IMAGE > $TMPFILE 37 unset EXP OUT FSCK_OPT IMAGE
|
/external/e2fsprogs/tests/f_uninit_cat/ |
script | 5 IMAGE=$test_dir/image.gz 7 gzip -d < $IMAGE > $TMPFILE 34 unset EXP OUT FSCK_OPT IMAGE
|
/external/e2fsprogs/tests/f_boundscheck/ |
script | 4 IMAGE=$test_dir/image.bz2 6 bzip2 -d < $IMAGE > $TMPFILE
|
/external/e2fsprogs/tests/f_itable_collision/ |
script | 8 IMAGE=$test_dir/image.gz 12 gzip -d < $IMAGE > $TMPFILE
|
/external/e2fsprogs/tests/j_recover_csum2_32bit/ |
script | 4 IMAGE=$test_dir/image.bz2 6 bzip2 -d < $IMAGE > $TMPFILE
|
/external/e2fsprogs/tests/j_recover_csum2_64bit/ |
script | 4 IMAGE=$test_dir/image.bz2 6 bzip2 -d < $IMAGE > $TMPFILE
|
/external/opencv/otherlibs/highgui/ |
cvcap_socket.cpp | 65 #define IMAGE( i, x, y, n ) *(( unsigned char * )(( i )->imageData \ 176 LOGV("Releasing Image"); 196 IMAGE( img, x, y, 0 ) = pixels[pos + 3] & 0xFF; 198 IMAGE( img, x, y, 1 ) = pixels[pos + 2] & 0xFF; 200 IMAGE( img, x, y, 2 ) = pixels[pos + 1] & 0xFF; 207 // Grabs a frame (image) from a socket. 238 // Release the image if it hasn't been already because we are going to overwrite it.
|
/external/syslinux/gpxe/src/include/gpxe/ |
isa.h | 94 #define ISA_ROM( IMAGE, DESCRIPTION )
|
/external/python/cpython2/Modules/ |
imgfile.c | 5 ** an object of image file class, and have routines to manipulate these 6 ** image files in a neater way (so you can get rgb images off a greyscale 8 ** image bits into python, etc). 15 #include <gl/image.h> 30 /* The image library does not always call the error hander :-(, 48 /* Open an image file and return a pointer to it. 51 static IMAGE * 54 IMAGE *image; local 58 if ( (image = iopen(fname, "r")) == NULL ) 95 IMAGE *image; local 253 IMAGE *image; local 380 IMAGE *image; local 395 IMAGE *image; local [all...] |
/external/pdfium/core/fpdfapi/page/ |
cpdf_imageobject.cpp | 23 return IMAGE;
|
cpdf_pageobject.h | 26 IMAGE,
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/uicc/ |
UsimServiceTable.java | 47 IMAGE,
|
/external/r8/tools/ |
run-jdwp-tests.py | 37 IMAGE='/system/non/existent/jdwp/image.art' 84 flags = ['-Ximage:%s' % IMAGE]
|
/external/vboot_reference/utility/ |
vbutil_what_keys | 9 Usage: vbutil_what_keys [-v|-V] IMAGE [IMAGE...] 11 Given a ChromiumOS disk (or BIOS) image, try to figure out how it's signed.
|
/frameworks/support/samples/SupportLeanbackDemos/src/com/example/android/leanback/ |
CardPresenter.java | 36 public static final String IMAGE = "ImageResourceId"; 95 // Randomly makes image view crop as a square or just stretch to original 131 if (key.equals(IMAGE)) {
|
/external/opencv/ |
cvjni.h | 42 #define IMAGE( i, x, y, n ) *(( unsigned char * )(( i )->imageData \
154 IMAGE( img, x, y, 0 ) = pixels[x+y*width] & 0xFF;
156 IMAGE( img, x, y, 1 ) = pixels[x+y*width] >> 8 & 0xFF;
158 IMAGE( img, x, y, 2 ) = pixels[x+y*width] >> 16 & 0xFF;
|
/packages/apps/Dialer/java/com/android/dialer/oem/ |
CequintCallerIdManager.java | 71 private static final String IMAGE = "cid_pLogo"; 181 String imageUrl = getString(cursor, cursor.getColumnIndex(IMAGE));
|