Home
last modified time | relevance | path

Searched refs:image (Results 1 – 25 of 233) sorted by relevance

12345678910

/device/sample/skins/WVGAMedDpi/
Dlayout4 image background_port.png
9 image background_land.png
24 image controls.png
28 image button.png
33 image button.png
38 image button.png
43 image arrow_up.png
48 image arrow_down.png
53 image arrow_left.png
58 image arrow_right.png
[all …]
/device/google/contexthub/util/nanoapp_encr/
Dnanoapp_encr.c60 struct ImageHeader *image; in handleEncrypt() local
82 if (bufUsed <= sizeof(*image)) { in handleEncrypt()
89 if (((bufUsed - sizeof(*image)) % AES_BLOCK_SIZE) != 0) in handleEncrypt()
90 padLen = AES_BLOCK_SIZE - ((bufUsed - sizeof(*image)) % AES_BLOCK_SIZE); in handleEncrypt()
100 image = (struct ImageHeader *)buf; in handleEncrypt()
102 if (bufUsed >= sizeof(*image) && image->aosp.magic == NANOAPP_AOSP_MAGIC && in handleEncrypt()
103 image->aosp.header_version == 1 && image->layout.magic == GOOGLE_LAYOUT_MAGIC) { in handleEncrypt()
110 if ((image->aosp.flags & NANOAPP_SIGNED_FLAG) != 0) { in handleEncrypt()
114 if ((image->aosp.flags & NANOAPP_ENCRYPTED_FLAG) != 0) { in handleEncrypt()
119 image->aosp.flags |= NANOAPP_ENCRYPTED_FLAG; in handleEncrypt()
[all …]
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/test/
Dtest_imageop.py80 image, width, height = getimage('test'+os.extsep+'rgb')
86 newimage = imageop.crop (image, 4, width, height, 0, 0, 1, 1)
94 scaleimage = imageop.scale(image, 4, width, height, 1, 1)
102 videoimage = imageop.tovideo (image, 4, width, height)
107 greyimage = imageop.rgb2rgb8(image, width, height)
112 image = imageop.rgb82rgb(greyimage, width, height)
117 greyimage = imageop.rgb2grey(image, width, height)
122 image = imageop.grey2rgb(greyimage, width, height)
174 image = imageop.grey22grey (grey2image, width, height)
192 image = imgfile.read(name)
[all …]
/device/generic/goldfish-opengl/system/GLESv1/
Dgl.cpp58 EGLImage_t *image = (EGLImage_t*)img; in glEGLImageTargetTexture2DOES() local
60 if (image->target == EGL_NATIVE_BUFFER_ANDROID) { in glEGLImageTargetTexture2DOES()
62 android_native_buffer_t* native_buffer = image->native_buffer; in glEGLImageTargetTexture2DOES()
80 else if (image->target == EGL_GL_TEXTURE_2D_KHR) { in glEGLImageTargetTexture2DOES()
83 GLeglImageOES hostImage = reinterpret_cast<GLeglImageOES>((intptr_t)image->host_egl_image); in glEGLImageTargetTexture2DOES()
89 void glEGLImageTargetRenderbufferStorageOES(void *self, GLenum target, GLeglImageOES image) in glEGLImageTargetRenderbufferStorageOES() argument
95 target, image); in glEGLImageTargetRenderbufferStorageOES()
97 android_native_buffer_t* native_buffer = (android_native_buffer_t*)image; in glEGLImageTargetRenderbufferStorageOES()
/device/generic/goldfish-opengl/system/GLESv2/
Dgl2.cpp59 EGLImage_t *image = (EGLImage_t*)img; in glEGLImageTargetTexture2DOES() local
60 GLeglImageOES hostImage = reinterpret_cast<GLeglImageOES>((intptr_t)image->host_egl_image); in glEGLImageTargetTexture2DOES()
62 if (image->target == EGL_NATIVE_BUFFER_ANDROID) { in glEGLImageTargetTexture2DOES()
64 android_native_buffer_t* native_buffer = image->native_buffer; in glEGLImageTargetTexture2DOES()
82 else if (image->target == EGL_GL_TEXTURE_2D_KHR) { in glEGLImageTargetTexture2DOES()
91 void glEGLImageTargetRenderbufferStorageOES(void *self, GLenum target, GLeglImageOES image) in glEGLImageTargetRenderbufferStorageOES() argument
96 DBG("glEGLImageTargetRenderbufferStorageOES v2 image=%p\n", image); in glEGLImageTargetRenderbufferStorageOES()
98 android_native_buffer_t* native_buffer = (android_native_buffer_t*)image; in glEGLImageTargetRenderbufferStorageOES()
/device/google/contexthub/util/nanoapp_sign/
Dnanoapp_sign.c234 struct ImageHeader *image = (struct ImageHeader *)buf; in handleVerify() local
235 struct AppSecSignHdr *secHdr = (struct AppSecSignHdr *)&image[1]; in handleVerify()
242 if (bufUsed < (sizeof(*image) + sizeof(*secHdr))) { in handleVerify()
251 if (!(image->aosp.flags & NANOAPP_SIGNED_FLAG)) { in handleVerify()
255 sigData = bufUsed - (secHdr->appDataLen + sizeof(*image) + sizeof(*secHdr)); in handleVerify()
326 struct ImageHeader *image = (struct ImageHeader *)buf; in handleSign() local
327 struct AppSecSignHdr *secHdr = (struct AppSecSignHdr *)&image[1]; in handleSign()
329 if (!(image->aosp.flags & NANOAPP_SIGNED_FLAG)) { in handleSign()
333 image = (struct ImageHeader *)buf; in handleSign()
334 secHdr = (struct AppSecSignHdr *)&image[1]; in handleSign()
[all …]
/device/linaro/bootloader/edk2/SecurityPkg/Library/DxeImageVerificationLib/
DDxeImageVerificationLib.uni2 // Provides security service of image verification
4 // This library hooks LoadImage() API to verify every image by the verification policy.
7 // This library will have external input - PE/COFF image.
23 #string STR_MODULE_ABSTRACT #language en-US "Provides security service of image verific…
25image by the verification policy. Caution: This module requires additional review when modified. …
/device/linaro/bootloader/edk2/MdeModulePkg/Library/ImageDecoderLib/
DImageDecoderLib.uni2 // This library provides image decoding service by managing the different
4 // image decoding libraries.
20 "This library provides image decoding service by managing the different"
24 "image decoding libraries."
/device/linaro/bootloader/edk2/MdeModulePkg/Library/BmpImageDecoderLib/
DBmpImageDecoderLib.uni2 // This library provides BMP image decoding capability.
4 // This library provides BMP image decoding capability.
20 "This library provides BMP image decoding capability."
24 "This library provides BMP image decoding capability."
/device/linaro/bootloader/OpenPlatformPkg/Platforms/TexasInstruments/BeagleBoard/
Dreadme.txt37 Installing Linaro image Creator:
39 wget http://launchpad.net/linaro-image-tools/trunk/0.4.8/+download/linaro-image-tools-0.4.8.tar.gz
40 tar xzf linaro-image-tools-0.4.8.tar.gz
41 cd $(WORKROOT)/linaro-image-tools-0.4.8/
44 Creating u-boot + Linux Linaro image:
49 sudo $(WORKROOT)/linaro-image-tools-0.4.8/linaro-media-create --image_file beagle_sd.img --dev beag…
52 Test u-boot + Linux Linaro image on qEmu:
66 …BUG_ARMGCC/FV/BeagleBoard_EFI_flashboot.fd -serial stdio -sd /work/linaro-image-tools-0.4.8/beagle…
/device/linaro/bootloader/arm-trusted-firmware/include/plat/common/
Dplatform.h90 void bl1_plat_set_bl2_ep_info(struct image_info *image,
131 void bl2_plat_set_bl31_ep_info(struct image_info *image,
134 void bl2_plat_set_bl33_ep_info(struct image_info *image,
157 void bl2_plat_set_bl32_ep_info(struct image_info *image,
/device/linaro/bootloader/arm-trusted-firmware/plat/juno/
Djuno_private.h179 void bl1_plat_set_bl2_ep_info(struct image_info *image,
188 void bl2_plat_set_bl31_ep_info(struct image_info *image,
197 void bl2_plat_set_bl32_ep_info(struct image_info *image,
206 void bl2_plat_set_bl33_ep_info(struct image_info *image,
/device/linaro/bootloader/edk2/SecurityPkg/Library/DxeDeferImageLoadLib/
DDxeDeferImageLoadLib.uni2 // Provides security service of deferred image load
4 // The platform may need to defer the execution of an image because of security
20 … STR_MODULE_ABSTRACT #language en-US "Provides security service of deferred image load"
22 … #language en-US "The platform may need to defer the execution of an image because of securit…
/device/linaro/bootloader/edk2/EmulatorPkg/Unix/Host/
DX11GraphicsWindow.c59 XImage *image; member
108 Drv->image = XShmCreateImage ( in TryCreateShmImage()
113 if (Drv->image == NULL) { in TryCreateShmImage()
117 switch (Drv->image->bitmap_unit) { in TryCreateShmImage()
130 IPC_PRIVATE, Drv->image->bytes_per_line * Drv->image->height, in TryCreateShmImage()
134 XDestroyImage(Drv->image); in TryCreateShmImage()
141 XDestroyImage(Drv->image); in TryCreateShmImage()
154 Drv->image->data = (char*)Drv->image_data; in TryCreateShmImage()
158 XDestroyImage(Drv->image); in TryCreateShmImage()
177 if (Drv->image != NULL) { in X11Size()
[all …]
/device/generic/goldfish/camera/
DJpegCompressor.cpp42 typedef int (*CompressFunc)(JpegStub* stub, const void* image,
69 status_t NV21JpegCompressor::compressRawImage(const void* image, in compressRawImage() argument
76 return (status_t)(*f)(&mStub, image, width, height, quality, exifData); in compressRawImage()
/device/linaro/bootloader/edk2/BaseTools/UserManuals/
DPatchPcdValue_Utility_Man_Page.rtf5 …tchPcdValue.exe or PatchPcdValue.py \endash Patch the specific value into the binary image.\f1\par
9image according to the input PCD offset and type. When PCD type is VOID*, MaxSize must be specifie…
10 …nPatchPcdTable tool to set the specific value of a patchable PCD into the binary EFI image. \f1\par
13 \pard\nowidctlpar\li360\sb200\b0\f0 Start offset to the image is used to store PCD value.\f1\par
15 \pard\nowidctlpar\li360\sb200\b0\f0 PCD value will be updated into the image. For VOID* type PCD va…
31 … PcdDebugPrintErrorLevel in the binary PeiCore image. This PCD type is UINT32. Its offset in PeiCo…
33 …g in the binary HelloWorld image. This PCD type is VOID*. Its max byte array size is 0x40, and its…
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Python/
Ddynload_next.c40 NSObjectFileImage image; in _PyImport_GetDynLoadFunc() local
55 rc = NSCreateObjectFileImageFromFile(pathname, &image); in _PyImport_GetDynLoadFunc()
77 newModule = NSLinkModule(image, pathname, LINKOPTIONS); in _PyImport_GetDynLoadFunc()
/device/linaro/bootloader/edk2/SecurityPkg/Library/DxeTpmMeasureBootLib/
DDxeTpmMeasureBootLib.uni4 // This library instance hooks LoadImage() API to measure every image that
8 // This library will have external input - PE/COFF image and GPT partition.
26image that is not measured in PEI phase. And, it will also measure GPT partition. Caution: This mo…
/device/linaro/bootloader/edk2/SecurityPkg/Library/DxeTpm2MeasureBootLib/
DDxeTpm2MeasureBootLib.uni4 // This library instance hooks LoadImage() API to measure every image that
8 // This library will have external input - PE/COFF image and GPT partition.
26image that is not measured in PEI phase. And, it will also measure GPT partition. Caution: This mo…
/device/linaro/bootloader/edk2/EmbeddedPkg/Scripts/LauterbachT32/
DEfiProcessPeImage.cmm17 print "PE32 image found at &imgstart"
26 print "no debug dir for image at &imgstart"
33 print "debug type is not dwarf for image at &imgstart, it's &debugtype"
52 print "debug signature not found for image at &imgstart, its &dwarfsig"
DEfiProcessTeImage.cmm17 print "TE image found at &imgstart"
26 print "no debug dir for image at &imgstart"
34 print "debug type is not dwarf for image at &imgstart, it's &debugtype"
53 print "debug signature not found for image at &imgstart, its &dwarfsig"
/device/linaro/bootloader/arm-trusted-firmware/docs/
Dtrusted-board-boot.md36 * The BL1 image, on the assumption that it resides in ROM so cannot be
55 image. An image can be authenticated by calculating its hash and matching it
76 non secure world image (BL3-3). The public part is stored in one of the
82 the content certificate for the BL3-X image. The public part is stored in
99 of the BL2 image.
114 It is self-signed with the BL3-0 key. It contains a hash of the BL3-0 image.
123 It is self-signed with the BL3-1 key. It contains a hash of the BL3-1 image.
132 It is self-signed with the BL3-2 key. It contains a hash of the BL3-2 image.
141 It is self-signed with the BL3-3 key. It contains a hash of the BL3-3 image.
161 * BL1 loads the BL2 image. Its hash is calculated and compared with the hash
[all …]
/device/linaro/hikey/factory-images/
DREADME9 # Package with an existing image
10 # First download the image to the android build top directory
/device/linaro/bootloader/edk2/UefiCpuPkg/ResetVector/Vtf0/
DReadMe.txt18 3. Locate SEC image
20 5. Call SEC image entry point
24 All inputs to SEC image are register based:
/device/google/contexthub/firmware/os/core/
DappSec.c220 struct ImageHeader *image; in appSecProcessIncomingHdr() local
229 image = (struct ImageHeader *)hdr; hdr += sizeof(*image); in appSecProcessIncomingHdr()
230 aosp = &image->aosp; in appSecProcessIncomingHdr()
234 image->layout.version != 1 || in appSecProcessIncomingHdr()
235 image->layout.magic != GOOGLE_LAYOUT_MAGIC) in appSecProcessIncomingHdr()
238 needBytes = sizeof(*image); in appSecProcessIncomingHdr()
310 .fwFlags = image->layout.flags, in appSecProcessIncomingHdr()
312 .payInfoType = image->layout.payload, in appSecProcessIncomingHdr()
317 switch(image->layout.payload) { in appSecProcessIncomingHdr()

12345678910