HomeSort by relevance Sort by last modified time
    Searched refs:IMAGE (Results 1 - 25 of 74) sorted by null

1 2 3

  /external/vboot_reference/scripts/image_signing/
ensure_no_password.sh 14 echo "Usage $0 <image>"
18 IMAGE=$1
20 mount_image_partition_ro "$IMAGE" 3 "$ROOTFS"
convert_recovery_to_ssd.sh 7 # Script to convert a recovery image into an SSD image. Changes are made in-
12 Usage: $PROG <image> [--force] [--cgpt=/path/to/cgpt]
14 In-place converts recovery <image> into an SSD image. With --force, does not
24 IMAGE=$1
52 echo "This will modify ${IMAGE} in-place and convert it into an SSD image."
58 kerna_offset=$(partoffset ${IMAGE} 2)
59 kernb_offset=$(partoffset ${IMAGE} 4
    [all...]
strip_boot_from_image.sh 7 # Script to remove /boot directory from an image.
15 DEFINE_string image "chromiumos_image.bin" \
16 "Input file name of Chrome OS image to strip /boot from."
26 die "Error: need a valid file by --image"
43 local image=$1
45 # Mount image so we can modify it.
47 mount_image_partition ${image} 3 ${rootfs_dir}
54 # done when the image was built, but needs to be repeated now that we've
60 IMAGE=$(readlink -f "${FLAGS_image}")
61 if [[ -z "${IMAGE}" || ! -f "${IMAGE}" ]]; the
    [all...]
make_dev_firmware.sh 8 # image or system live firmware (EEPROM), and assign proper HWID, FLAGS as well.
41 # the image we are (temporary) working with
42 IMAGE="$(make_temp_file)"
43 IMAGE="$(readlink -f "$IMAGE")"
66 # Reads $IMAGE from $FLAGS_from
71 flashrom -V -r "$IMAGE"
73 flashrom -r "$IMAGE" >"$EXEC_LOG" 2>&1
77 cp -f "$FLAGS_from" "$IMAGE"
81 # Writes $IMAGE to $FLAGS_t
    [all...]
tag_image.sh 16 "Input file name of Chrome OS image to tag/stamp."
50 # Global variable to track if the image is modified.
197 IMAGE=$(readlink -f "${FLAGS_from}")
198 if [[ -z "${IMAGE}" || ! -f "${IMAGE}" ]]; then
199 echo "Missing required argument: --from (image to update)"
206 mount_image_partition_ro "${IMAGE}" 3 "${rootfs}"
210 # mount_image_partition ${IMAGE} 1 ${stateful_dir}
218 mount_image_partition "${IMAGE}" 3 "${rootfs}"
220 # second round, apply the modification to image
    [all...]
  /external/e2fsprogs/tests/f_super_bad_csum/
script 4 IMAGE=$test_dir/image.bz2
6 bzip2 -d < $IMAGE > $TMPFILE
33 unset EXP1 OUT1 EXP2 OUT2 FSCK_OPT IMAGE
  /external/ltp/testcases/kernel/fs/quota_remount/
quota_remount_test01.sh 65 rm 2>/dev/null $IMAGE
72 IMAGE=ltp-$$-fs-image
73 dd if=/dev/zero of=$IMAGE bs=4096 count=8000 2>/dev/null || die 2 "Cannot create filesystem image"
74 mkfs.ext3 -q -F -b 4096 $IMAGE || die 2 "Could not create the filesystem"
76 mount -t ext3 -o loop,usrquota,grpquota $IMAGE $MNTDIR || die 2 "Could not mount the filesystem"
115 rm $IMAGE
  /external/e2fsprogs/tests/f_detect_junk/
script 6 IMAGE=$test_dir/image.bz2
8 bzip2 -d < $IMAGE > $TMPFILE
40 unset EXP OUT FSCK_OPT IMAGE
  /external/e2fsprogs/tests/f_detect_xfs/
script 4 IMAGE=$test_dir/image.bz2
6 bzip2 -d < $IMAGE > $TMPFILE
37 unset EXP OUT FSCK_OPT IMAGE
  /external/e2fsprogs/tests/f_uninit_cat/
script 5 IMAGE=$test_dir/image.gz
7 gzip -d < $IMAGE > $TMPFILE
34 unset EXP OUT FSCK_OPT IMAGE
  /external/e2fsprogs/tests/f_boundscheck/
script 4 IMAGE=$test_dir/image.bz2
6 bzip2 -d < $IMAGE > $TMPFILE
  /external/e2fsprogs/tests/f_itable_collision/
script 8 IMAGE=$test_dir/image.gz
12 gzip -d < $IMAGE > $TMPFILE
  /external/e2fsprogs/tests/j_recover_csum2_32bit/
script 4 IMAGE=$test_dir/image.bz2
6 bzip2 -d < $IMAGE > $TMPFILE
  /external/e2fsprogs/tests/j_recover_csum2_64bit/
script 4 IMAGE=$test_dir/image.bz2
6 bzip2 -d < $IMAGE > $TMPFILE
  /external/opencv/otherlibs/highgui/
cvcap_socket.cpp 65 #define IMAGE( i, x, y, n ) *(( unsigned char * )(( i )->imageData \
176 LOGV("Releasing Image");
196 IMAGE( img, x, y, 0 ) = pixels[pos + 3] & 0xFF;
198 IMAGE( img, x, y, 1 ) = pixels[pos + 2] & 0xFF;
200 IMAGE( img, x, y, 2 ) = pixels[pos + 1] & 0xFF;
207 // Grabs a frame (image) from a socket.
238 // Release the image if it hasn't been already because we are going to overwrite it.
  /external/syslinux/gpxe/src/include/gpxe/
isa.h 94 #define ISA_ROM( IMAGE, DESCRIPTION )
  /external/python/cpython2/Modules/
imgfile.c 5 ** an object of image file class, and have routines to manipulate these
6 ** image files in a neater way (so you can get rgb images off a greyscale
8 ** image bits into python, etc).
15 #include <gl/image.h>
30 /* The image library does not always call the error hander :-(,
48 /* Open an image file and return a pointer to it.
51 static IMAGE *
54 IMAGE *image; local
58 if ( (image = iopen(fname, "r")) == NULL )
95 IMAGE *image; local
253 IMAGE *image; local
380 IMAGE *image; local
395 IMAGE *image; local
    [all...]
  /external/pdfium/core/fpdfapi/page/
cpdf_imageobject.cpp 23 return IMAGE;
cpdf_pageobject.h 26 IMAGE,
  /frameworks/opt/telephony/src/java/com/android/internal/telephony/uicc/
UsimServiceTable.java 47 IMAGE,
  /external/r8/tools/
run-jdwp-tests.py 37 IMAGE='/system/non/existent/jdwp/image.art'
84 flags = ['-Ximage:%s' % IMAGE]
  /external/vboot_reference/utility/
vbutil_what_keys 9 Usage: vbutil_what_keys [-v|-V] IMAGE [IMAGE...]
11 Given a ChromiumOS disk (or BIOS) image, try to figure out how it's signed.
  /frameworks/support/samples/SupportLeanbackDemos/src/com/example/android/leanback/
CardPresenter.java 36 public static final String IMAGE = "ImageResourceId";
95 // Randomly makes image view crop as a square or just stretch to original
131 if (key.equals(IMAGE)) {
  /external/opencv/
cvjni.h 42 #define IMAGE( i, x, y, n ) *(( unsigned char * )(( i )->imageData \
154 IMAGE( img, x, y, 0 ) = pixels[x+y*width] & 0xFF;
156 IMAGE( img, x, y, 1 ) = pixels[x+y*width] >> 8 & 0xFF;
158 IMAGE( img, x, y, 2 ) = pixels[x+y*width] >> 16 & 0xFF;
  /packages/apps/Dialer/java/com/android/dialer/oem/
CequintCallerIdManager.java 71 private static final String IMAGE = "cid_pLogo";
181 String imageUrl = getString(cursor, cursor.getColumnIndex(IMAGE));

Completed in 566 milliseconds

1 2 3