HomeSort by relevance Sort by last modified time
    Searched refs:IMAGE (Results 1 - 25 of 83) sorted by null

1 2 3 4

  /external/vboot_reference/scripts/image_signing/
ensure_no_password.sh 14 echo "Usage $0 <image>"
18 IMAGE=$1
20 mount_image_partition_ro "$IMAGE" 3 "$ROOTFS"
convert_recovery_to_ssd.sh 7 # Script to convert a recovery image into an SSD image. Changes are made in-
12 Usage: $PROG <image> [--force] [--cgpt=/path/to/cgpt]
14 In-place converts recovery <image> into an SSD image. With --force, does not
24 IMAGE=$1
52 echo "This will modify ${IMAGE} in-place and convert it into an SSD image."
58 kerna_offset=$(partoffset ${IMAGE} 2)
59 kernb_offset=$(partoffset ${IMAGE} 4
    [all...]
strip_boot_from_image.sh 7 # Script to remove /boot directory from an image.
15 DEFINE_string image "chromiumos_image.bin" \
16 "Input file name of Chrome OS image to strip /boot from."
26 die "Error: need a valid file by --image"
43 local image=$1
45 # Mount image so we can modify it.
47 mount_image_partition ${image} 3 ${rootfs_dir}
54 # done when the image was built, but needs to be repeated now that we've
60 IMAGE=$(readlink -f "${FLAGS_image}")
61 if [[ -z "${IMAGE}" || ! -f "${IMAGE}" ]]; the
    [all...]
make_dev_firmware.sh 8 # image or system live firmware (EEPROM), and assign proper HWID, FLAGS as well.
41 # the image we are (temporary) working with
42 IMAGE="$(make_temp_file)"
43 IMAGE="$(readlink -f "$IMAGE")"
66 # Reads $IMAGE from $FLAGS_from
71 flashrom -V -r "$IMAGE"
73 flashrom -r "$IMAGE" >"$EXEC_LOG" 2>&1
77 cp -f "$FLAGS_from" "$IMAGE"
81 # Writes $IMAGE to $FLAGS_t
    [all...]
tag_image.sh 16 "Input file name of Chrome OS image to tag/stamp."
50 # Global variable to track if the image is modified.
197 IMAGE=$(readlink -f "${FLAGS_from}")
198 if [[ -z "${IMAGE}" || ! -f "${IMAGE}" ]]; then
199 echo "Missing required argument: --from (image to update)"
206 mount_image_partition_ro "${IMAGE}" 3 "${rootfs}"
210 # mount_image_partition ${IMAGE} 1 ${stateful_dir}
218 mount_image_partition "${IMAGE}" 3 "${rootfs}"
220 # second round, apply the modification to image
    [all...]
  /external/e2fsprogs/tests/f_super_bad_csum/
script 4 IMAGE=$test_dir/image.bz2
6 bzip2 -d < $IMAGE > $TMPFILE
33 unset EXP1 OUT1 EXP2 OUT2 FSCK_OPT IMAGE
  /external/ltp/testcases/kernel/fs/quota_remount/
quota_remount_test01.sh 65 rm 2>/dev/null $IMAGE
72 IMAGE=ltp-$$-fs-image
73 dd if=/dev/zero of=$IMAGE bs=4096 count=8000 2>/dev/null || die 2 "Cannot create filesystem image"
74 mkfs.ext3 -q -F -b 4096 $IMAGE || die 2 "Could not create the filesystem"
76 mount -t ext3 -o loop,usrquota,grpquota $IMAGE $MNTDIR || die 2 "Could not mount the filesystem"
115 rm $IMAGE
  /external/e2fsprogs/tests/f_detect_junk/
script 6 IMAGE=$test_dir/image.bz2
8 bzip2 -d < $IMAGE > $TMPFILE
40 unset EXP OUT FSCK_OPT IMAGE
  /external/e2fsprogs/tests/f_detect_xfs/
script 4 IMAGE=$test_dir/image.bz2
6 bzip2 -d < $IMAGE > $TMPFILE
37 unset EXP OUT FSCK_OPT IMAGE
  /external/e2fsprogs/tests/f_uninit_cat/
script 5 IMAGE=$test_dir/image.gz
7 gzip -d < $IMAGE > $TMPFILE
34 unset EXP OUT FSCK_OPT IMAGE
  /external/e2fsprogs/tests/f_boundscheck/
script 4 IMAGE=$test_dir/image.bz2
6 bzip2 -d < $IMAGE > $TMPFILE
  /external/e2fsprogs/tests/f_itable_collision/
script 8 IMAGE=$test_dir/image.gz
12 gzip -d < $IMAGE > $TMPFILE
  /external/e2fsprogs/tests/j_recover_csum2_32bit/
script 4 IMAGE=$test_dir/image.bz2
6 bzip2 -d < $IMAGE > $TMPFILE
  /external/e2fsprogs/tests/j_recover_csum2_64bit/
script 4 IMAGE=$test_dir/image.bz2
6 bzip2 -d < $IMAGE > $TMPFILE
  /external/tensorflow/tensorflow/examples/android/jni/object_tracking/
image.h 29 #define CHECK_PIXEL(IMAGE, X, Y) {\
30 SCHECK((IMAGE)->ValidPixel((X), (Y)), \
31 "CHECK_PIXEL(%d,%d) in %dx%d image.", \
33 (IMAGE)->GetWidth(), (IMAGE)->GetHeight());\
36 #define CHECK_PIXEL_INTERP(IMAGE, X, Y) {\
37 SCHECK((IMAGE)->validInterpPixel((X), (Y)), \
38 "CHECK_PIXEL_INTERP(%.2f, %.2f) in %dx%d image.", \
40 (IMAGE)->GetWidth(), (IMAGE)->GetHeight());
332 stream << image[y][x] << " "; local
    [all...]
  /external/opencv/otherlibs/highgui/
cvcap_socket.cpp 65 #define IMAGE( i, x, y, n ) *(( unsigned char * )(( i )->imageData \
176 LOGV("Releasing Image");
196 IMAGE( img, x, y, 0 ) = pixels[pos + 3] & 0xFF;
198 IMAGE( img, x, y, 1 ) = pixels[pos + 2] & 0xFF;
200 IMAGE( img, x, y, 2 ) = pixels[pos + 1] & 0xFF;
207 // Grabs a frame (image) from a socket.
238 // Release the image if it hasn't been already because we are going to overwrite it.
  /external/pdfium/core/fpdfapi/page/
cpdf_imageobject.cpp 22 return IMAGE;
cpdf_pageobject.h 26 IMAGE,
  /external/syslinux/gpxe/src/include/gpxe/
isa.h 94 #define ISA_ROM( IMAGE, DESCRIPTION )
  /tools/acloud/internal/lib/
android_compute_client_test.py 37 IMAGE = "fake-image"
86 image_name = "image-gce-x86-userdebug-2345-abcd"
122 self.android_compute_client.CreateInstance(instance_name, self.IMAGE,
126 instance_name, self.IMAGE, self.MACHINE_TYPE,
gcompute_client_test.py 36 IMAGE = "fake-image"
37 IMAGE_URL = "http://fake-image-url"
159 "name": self.IMAGE,
165 image_name=self.IMAGE, source_uri=self.GS_IMAGE_SOURCE_URI)
190 "name": self.IMAGE,
199 image_name=self.IMAGE,
206 self.compute_client.CheckImageExists.assert_called_with(self.IMAGE)
207 self.compute_client.DeleteImage.assert_called_with(self.IMAGE)
216 mock_api.execute = mock.MagicMock(return_value={"name": self.IMAGE})
    [all...]
  /external/python/cpython2/Modules/
imgfile.c 5 ** an object of image file class, and have routines to manipulate these
6 ** image files in a neater way (so you can get rgb images off a greyscale
8 ** image bits into python, etc).
15 #include <gl/image.h>
30 /* The image library does not always call the error hander :-(,
48 /* Open an image file and return a pointer to it.
51 static IMAGE *
54 IMAGE *image; local
58 if ( (image = iopen(fname, "r")) == NULL )
95 IMAGE *image; local
253 IMAGE *image; local
380 IMAGE *image; local
395 IMAGE *image; local
    [all...]
  /device/linaro/bootloader/arm-trusted-firmware/make_helpers/
build_macros.mk 95 # IMG_BIN defines the default image file corresponding to a BL stage
120 # FIP_ADD_IMG allows the platform to specify an image to be packed in the FIP
121 # using a build option. It also adds a dependency on the image file, aborting
123 # $(1) = build option to specify the image filename (SCP_BL2, BL33, etc)
155 # FWU_FIP_ADD_IMG allows the platform to pack a binary image in the FWU FIP
156 # $(1) build option to specify the image filename (BL2U, NS_BL2U, etc)
183 $(eval IMAGE := IMAGE_BL$(call uppercase,$(3)))
187 $$(Q)$$(CC) $$(TF_CFLAGS) $$(CFLAGS) -D$(IMAGE) $(MAKE_DEP) -c $$< -o $$@
202 $(eval IMAGE := IMAGE_BL$(call uppercase,$(3)))
206 $$(Q)$$(AS) $$(ASFLAGS) -D$(IMAGE) $(MAKE_DEP) -c $$< -o $$
    [all...]
  /frameworks/opt/telephony/src/java/com/android/internal/telephony/uicc/
UsimServiceTable.java 47 IMAGE,
  /external/vboot_reference/utility/
vbutil_what_keys 9 Usage: vbutil_what_keys [-v|-V] IMAGE [IMAGE...]
11 Given a ChromiumOS disk (or BIOS) image, try to figure out how it's signed.

Completed in 2365 milliseconds

1 2 3 4