/external/vboot_reference/scripts/image_signing/ |
ensure_no_password.sh | 14 echo "Usage $0 <image>" 18 IMAGE=$1 20 mount_image_partition_ro "$IMAGE" 3 "$ROOTFS"
|
convert_recovery_to_ssd.sh | 7 # Script to convert a recovery image into an SSD image. Changes are made in- 12 Usage: $PROG <image> [--force] [--cgpt=/path/to/cgpt] 14 In-place converts recovery <image> into an SSD image. With --force, does not 24 IMAGE=$1 52 echo "This will modify ${IMAGE} in-place and convert it into an SSD image." 58 kerna_offset=$(partoffset ${IMAGE} 2) 59 kernb_offset=$(partoffset ${IMAGE} 4 [all...] |
strip_boot_from_image.sh | 7 # Script to remove /boot directory from an image. 15 DEFINE_string image "chromiumos_image.bin" \ 16 "Input file name of Chrome OS image to strip /boot from." 26 die "Error: need a valid file by --image" 43 local image=$1 45 # Mount image so we can modify it. 47 mount_image_partition ${image} 3 ${rootfs_dir} 54 # done when the image was built, but needs to be repeated now that we've 60 IMAGE=$(readlink -f "${FLAGS_image}") 61 if [[ -z "${IMAGE}" || ! -f "${IMAGE}" ]]; the [all...] |
make_dev_firmware.sh | 8 # image or system live firmware (EEPROM), and assign proper HWID, FLAGS as well. 41 # the image we are (temporary) working with 42 IMAGE="$(make_temp_file)" 43 IMAGE="$(readlink -f "$IMAGE")" 66 # Reads $IMAGE from $FLAGS_from 71 flashrom -V -r "$IMAGE" 73 flashrom -r "$IMAGE" >"$EXEC_LOG" 2>&1 77 cp -f "$FLAGS_from" "$IMAGE" 81 # Writes $IMAGE to $FLAGS_t [all...] |
tag_image.sh | 16 "Input file name of Chrome OS image to tag/stamp." 50 # Global variable to track if the image is modified. 197 IMAGE=$(readlink -f "${FLAGS_from}") 198 if [[ -z "${IMAGE}" || ! -f "${IMAGE}" ]]; then 199 echo "Missing required argument: --from (image to update)" 206 mount_image_partition_ro "${IMAGE}" 3 "${rootfs}" 210 # mount_image_partition ${IMAGE} 1 ${stateful_dir} 218 mount_image_partition "${IMAGE}" 3 "${rootfs}" 220 # second round, apply the modification to image [all...] |
/external/e2fsprogs/tests/f_super_bad_csum/ |
script | 4 IMAGE=$test_dir/image.bz2 6 bzip2 -d < $IMAGE > $TMPFILE 33 unset EXP1 OUT1 EXP2 OUT2 FSCK_OPT IMAGE
|
/external/ltp/testcases/kernel/fs/quota_remount/ |
quota_remount_test01.sh | 65 rm 2>/dev/null $IMAGE 72 IMAGE=ltp-$$-fs-image 73 dd if=/dev/zero of=$IMAGE bs=4096 count=8000 2>/dev/null || die 2 "Cannot create filesystem image" 74 mkfs.ext3 -q -F -b 4096 $IMAGE || die 2 "Could not create the filesystem" 76 mount -t ext3 -o loop,usrquota,grpquota $IMAGE $MNTDIR || die 2 "Could not mount the filesystem" 115 rm $IMAGE
|
/external/e2fsprogs/tests/f_detect_junk/ |
script | 6 IMAGE=$test_dir/image.bz2 8 bzip2 -d < $IMAGE > $TMPFILE 40 unset EXP OUT FSCK_OPT IMAGE
|
/external/e2fsprogs/tests/f_detect_xfs/ |
script | 4 IMAGE=$test_dir/image.bz2 6 bzip2 -d < $IMAGE > $TMPFILE 37 unset EXP OUT FSCK_OPT IMAGE
|
/external/e2fsprogs/tests/f_uninit_cat/ |
script | 5 IMAGE=$test_dir/image.gz 7 gzip -d < $IMAGE > $TMPFILE 34 unset EXP OUT FSCK_OPT IMAGE
|
/external/e2fsprogs/tests/f_boundscheck/ |
script | 4 IMAGE=$test_dir/image.bz2 6 bzip2 -d < $IMAGE > $TMPFILE
|
/external/e2fsprogs/tests/f_itable_collision/ |
script | 8 IMAGE=$test_dir/image.gz 12 gzip -d < $IMAGE > $TMPFILE
|
/external/e2fsprogs/tests/j_recover_csum2_32bit/ |
script | 4 IMAGE=$test_dir/image.bz2 6 bzip2 -d < $IMAGE > $TMPFILE
|
/external/e2fsprogs/tests/j_recover_csum2_64bit/ |
script | 4 IMAGE=$test_dir/image.bz2 6 bzip2 -d < $IMAGE > $TMPFILE
|
/external/tensorflow/tensorflow/examples/android/jni/object_tracking/ |
image.h | 29 #define CHECK_PIXEL(IMAGE, X, Y) {\ 30 SCHECK((IMAGE)->ValidPixel((X), (Y)), \ 31 "CHECK_PIXEL(%d,%d) in %dx%d image.", \ 33 (IMAGE)->GetWidth(), (IMAGE)->GetHeight());\ 36 #define CHECK_PIXEL_INTERP(IMAGE, X, Y) {\ 37 SCHECK((IMAGE)->validInterpPixel((X), (Y)), \ 38 "CHECK_PIXEL_INTERP(%.2f, %.2f) in %dx%d image.", \ 40 (IMAGE)->GetWidth(), (IMAGE)->GetHeight()); 332 stream << image[y][x] << " "; local [all...] |
/external/opencv/otherlibs/highgui/ |
cvcap_socket.cpp | 65 #define IMAGE( i, x, y, n ) *(( unsigned char * )(( i )->imageData \ 176 LOGV("Releasing Image"); 196 IMAGE( img, x, y, 0 ) = pixels[pos + 3] & 0xFF; 198 IMAGE( img, x, y, 1 ) = pixels[pos + 2] & 0xFF; 200 IMAGE( img, x, y, 2 ) = pixels[pos + 1] & 0xFF; 207 // Grabs a frame (image) from a socket. 238 // Release the image if it hasn't been already because we are going to overwrite it.
|
/external/pdfium/core/fpdfapi/page/ |
cpdf_imageobject.cpp | 22 return IMAGE;
|
cpdf_pageobject.h | 26 IMAGE,
|
/external/syslinux/gpxe/src/include/gpxe/ |
isa.h | 94 #define ISA_ROM( IMAGE, DESCRIPTION )
|
/tools/acloud/internal/lib/ |
android_compute_client_test.py | 37 IMAGE = "fake-image" 86 image_name = "image-gce-x86-userdebug-2345-abcd" 122 self.android_compute_client.CreateInstance(instance_name, self.IMAGE, 126 instance_name, self.IMAGE, self.MACHINE_TYPE,
|
gcompute_client_test.py | 36 IMAGE = "fake-image" 37 IMAGE_URL = "http://fake-image-url" 159 "name": self.IMAGE, 165 image_name=self.IMAGE, source_uri=self.GS_IMAGE_SOURCE_URI) 190 "name": self.IMAGE, 199 image_name=self.IMAGE, 206 self.compute_client.CheckImageExists.assert_called_with(self.IMAGE) 207 self.compute_client.DeleteImage.assert_called_with(self.IMAGE) 216 mock_api.execute = mock.MagicMock(return_value={"name": self.IMAGE}) [all...] |
/external/python/cpython2/Modules/ |
imgfile.c | 5 ** an object of image file class, and have routines to manipulate these 6 ** image files in a neater way (so you can get rgb images off a greyscale 8 ** image bits into python, etc). 15 #include <gl/image.h> 30 /* The image library does not always call the error hander :-(, 48 /* Open an image file and return a pointer to it. 51 static IMAGE * 54 IMAGE *image; local 58 if ( (image = iopen(fname, "r")) == NULL ) 95 IMAGE *image; local 253 IMAGE *image; local 380 IMAGE *image; local 395 IMAGE *image; local [all...] |
/device/linaro/bootloader/arm-trusted-firmware/make_helpers/ |
build_macros.mk | 95 # IMG_BIN defines the default image file corresponding to a BL stage 120 # FIP_ADD_IMG allows the platform to specify an image to be packed in the FIP 121 # using a build option. It also adds a dependency on the image file, aborting 123 # $(1) = build option to specify the image filename (SCP_BL2, BL33, etc) 155 # FWU_FIP_ADD_IMG allows the platform to pack a binary image in the FWU FIP 156 # $(1) build option to specify the image filename (BL2U, NS_BL2U, etc) 183 $(eval IMAGE := IMAGE_BL$(call uppercase,$(3))) 187 $$(Q)$$(CC) $$(TF_CFLAGS) $$(CFLAGS) -D$(IMAGE) $(MAKE_DEP) -c $$< -o $$@ 202 $(eval IMAGE := IMAGE_BL$(call uppercase,$(3))) 206 $$(Q)$$(AS) $$(ASFLAGS) -D$(IMAGE) $(MAKE_DEP) -c $$< -o $$ [all...] |
/frameworks/opt/telephony/src/java/com/android/internal/telephony/uicc/ |
UsimServiceTable.java | 47 IMAGE,
|
/external/vboot_reference/utility/ |
vbutil_what_keys | 9 Usage: vbutil_what_keys [-v|-V] IMAGE [IMAGE...] 11 Given a ChromiumOS disk (or BIOS) image, try to figure out how it's signed.
|