/device/sample/skins/WVGAMedDpi/ |
D | layout | 4 image background_port.png 9 image background_land.png 24 image controls.png 28 image button.png 33 image button.png 38 image button.png 43 image arrow_up.png 48 image arrow_down.png 53 image arrow_left.png 58 image arrow_right.png [all …]
|
/device/google/contexthub/util/nanoapp_encr/ |
D | nanoapp_encr.c | 60 struct ImageHeader *image; in handleEncrypt() local 82 if (bufUsed <= sizeof(*image)) { in handleEncrypt() 89 if (((bufUsed - sizeof(*image)) % AES_BLOCK_SIZE) != 0) in handleEncrypt() 90 padLen = AES_BLOCK_SIZE - ((bufUsed - sizeof(*image)) % AES_BLOCK_SIZE); in handleEncrypt() 100 image = (struct ImageHeader *)buf; in handleEncrypt() 102 if (bufUsed >= sizeof(*image) && image->aosp.magic == NANOAPP_AOSP_MAGIC && in handleEncrypt() 103 image->aosp.header_version == 1 && image->layout.magic == GOOGLE_LAYOUT_MAGIC) { in handleEncrypt() 110 if ((image->aosp.flags & NANOAPP_SIGNED_FLAG) != 0) { in handleEncrypt() 114 if ((image->aosp.flags & NANOAPP_ENCRYPTED_FLAG) != 0) { in handleEncrypt() 119 image->aosp.flags |= NANOAPP_ENCRYPTED_FLAG; in handleEncrypt() [all …]
|
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/test/ |
D | test_imageop.py | 80 image, width, height = getimage('test'+os.extsep+'rgb') 86 newimage = imageop.crop (image, 4, width, height, 0, 0, 1, 1) 94 scaleimage = imageop.scale(image, 4, width, height, 1, 1) 102 videoimage = imageop.tovideo (image, 4, width, height) 107 greyimage = imageop.rgb2rgb8(image, width, height) 112 image = imageop.rgb82rgb(greyimage, width, height) 117 greyimage = imageop.rgb2grey(image, width, height) 122 image = imageop.grey2rgb(greyimage, width, height) 174 image = imageop.grey22grey (grey2image, width, height) 192 image = imgfile.read(name) [all …]
|
/device/generic/goldfish-opengl/system/GLESv1/ |
D | gl.cpp | 58 EGLImage_t *image = (EGLImage_t*)img; in glEGLImageTargetTexture2DOES() local 60 if (image->target == EGL_NATIVE_BUFFER_ANDROID) { in glEGLImageTargetTexture2DOES() 62 android_native_buffer_t* native_buffer = image->native_buffer; in glEGLImageTargetTexture2DOES() 80 else if (image->target == EGL_GL_TEXTURE_2D_KHR) { in glEGLImageTargetTexture2DOES() 83 GLeglImageOES hostImage = reinterpret_cast<GLeglImageOES>((intptr_t)image->host_egl_image); in glEGLImageTargetTexture2DOES() 89 void glEGLImageTargetRenderbufferStorageOES(void *self, GLenum target, GLeglImageOES image) in glEGLImageTargetRenderbufferStorageOES() argument 95 target, image); in glEGLImageTargetRenderbufferStorageOES() 97 android_native_buffer_t* native_buffer = (android_native_buffer_t*)image; in glEGLImageTargetRenderbufferStorageOES()
|
/device/generic/goldfish-opengl/system/GLESv2/ |
D | gl2.cpp | 59 EGLImage_t *image = (EGLImage_t*)img; in glEGLImageTargetTexture2DOES() local 60 GLeglImageOES hostImage = reinterpret_cast<GLeglImageOES>((intptr_t)image->host_egl_image); in glEGLImageTargetTexture2DOES() 62 if (image->target == EGL_NATIVE_BUFFER_ANDROID) { in glEGLImageTargetTexture2DOES() 64 android_native_buffer_t* native_buffer = image->native_buffer; in glEGLImageTargetTexture2DOES() 82 else if (image->target == EGL_GL_TEXTURE_2D_KHR) { in glEGLImageTargetTexture2DOES() 91 void glEGLImageTargetRenderbufferStorageOES(void *self, GLenum target, GLeglImageOES image) in glEGLImageTargetRenderbufferStorageOES() argument 96 DBG("glEGLImageTargetRenderbufferStorageOES v2 image=%p\n", image); in glEGLImageTargetRenderbufferStorageOES() 98 android_native_buffer_t* native_buffer = (android_native_buffer_t*)image; in glEGLImageTargetRenderbufferStorageOES()
|
/device/google/contexthub/util/nanoapp_sign/ |
D | nanoapp_sign.c | 234 struct ImageHeader *image = (struct ImageHeader *)buf; in handleVerify() local 235 struct AppSecSignHdr *secHdr = (struct AppSecSignHdr *)&image[1]; in handleVerify() 242 if (bufUsed < (sizeof(*image) + sizeof(*secHdr))) { in handleVerify() 251 if (!(image->aosp.flags & NANOAPP_SIGNED_FLAG)) { in handleVerify() 255 sigData = bufUsed - (secHdr->appDataLen + sizeof(*image) + sizeof(*secHdr)); in handleVerify() 326 struct ImageHeader *image = (struct ImageHeader *)buf; in handleSign() local 327 struct AppSecSignHdr *secHdr = (struct AppSecSignHdr *)&image[1]; in handleSign() 329 if (!(image->aosp.flags & NANOAPP_SIGNED_FLAG)) { in handleSign() 333 image = (struct ImageHeader *)buf; in handleSign() 334 secHdr = (struct AppSecSignHdr *)&image[1]; in handleSign() [all …]
|
/device/linaro/bootloader/edk2/SecurityPkg/Library/DxeImageVerificationLib/ |
D | DxeImageVerificationLib.uni | 2 // Provides security service of image verification 4 // This library hooks LoadImage() API to verify every image by the verification policy. 7 // This library will have external input - PE/COFF image. 23 #string STR_MODULE_ABSTRACT #language en-US "Provides security service of image verific… 25 … image by the verification policy. Caution: This module requires additional review when modified. …
|
/device/linaro/bootloader/edk2/MdeModulePkg/Library/ImageDecoderLib/ |
D | ImageDecoderLib.uni | 2 // This library provides image decoding service by managing the different 4 // image decoding libraries. 20 "This library provides image decoding service by managing the different" 24 "image decoding libraries."
|
/device/linaro/bootloader/edk2/MdeModulePkg/Library/BmpImageDecoderLib/ |
D | BmpImageDecoderLib.uni | 2 // This library provides BMP image decoding capability. 4 // This library provides BMP image decoding capability. 20 "This library provides BMP image decoding capability." 24 "This library provides BMP image decoding capability."
|
/device/linaro/bootloader/OpenPlatformPkg/Platforms/TexasInstruments/BeagleBoard/ |
D | readme.txt | 37 Installing Linaro image Creator: 39 wget http://launchpad.net/linaro-image-tools/trunk/0.4.8/+download/linaro-image-tools-0.4.8.tar.gz 40 tar xzf linaro-image-tools-0.4.8.tar.gz 41 cd $(WORKROOT)/linaro-image-tools-0.4.8/ 44 Creating u-boot + Linux Linaro image: 49 sudo $(WORKROOT)/linaro-image-tools-0.4.8/linaro-media-create --image_file beagle_sd.img --dev beag… 52 Test u-boot + Linux Linaro image on qEmu: 66 …BUG_ARMGCC/FV/BeagleBoard_EFI_flashboot.fd -serial stdio -sd /work/linaro-image-tools-0.4.8/beagle…
|
/device/linaro/bootloader/arm-trusted-firmware/include/plat/common/ |
D | platform.h | 90 void bl1_plat_set_bl2_ep_info(struct image_info *image, 131 void bl2_plat_set_bl31_ep_info(struct image_info *image, 134 void bl2_plat_set_bl33_ep_info(struct image_info *image, 157 void bl2_plat_set_bl32_ep_info(struct image_info *image,
|
/device/linaro/bootloader/arm-trusted-firmware/plat/juno/ |
D | juno_private.h | 179 void bl1_plat_set_bl2_ep_info(struct image_info *image, 188 void bl2_plat_set_bl31_ep_info(struct image_info *image, 197 void bl2_plat_set_bl32_ep_info(struct image_info *image, 206 void bl2_plat_set_bl33_ep_info(struct image_info *image,
|
/device/linaro/bootloader/edk2/SecurityPkg/Library/DxeDeferImageLoadLib/ |
D | DxeDeferImageLoadLib.uni | 2 // Provides security service of deferred image load 4 // The platform may need to defer the execution of an image because of security 20 … STR_MODULE_ABSTRACT #language en-US "Provides security service of deferred image load" 22 … #language en-US "The platform may need to defer the execution of an image because of securit…
|
/device/linaro/bootloader/edk2/EmulatorPkg/Unix/Host/ |
D | X11GraphicsWindow.c | 59 XImage *image; member 108 Drv->image = XShmCreateImage ( in TryCreateShmImage() 113 if (Drv->image == NULL) { in TryCreateShmImage() 117 switch (Drv->image->bitmap_unit) { in TryCreateShmImage() 130 IPC_PRIVATE, Drv->image->bytes_per_line * Drv->image->height, in TryCreateShmImage() 134 XDestroyImage(Drv->image); in TryCreateShmImage() 141 XDestroyImage(Drv->image); in TryCreateShmImage() 154 Drv->image->data = (char*)Drv->image_data; in TryCreateShmImage() 158 XDestroyImage(Drv->image); in TryCreateShmImage() 177 if (Drv->image != NULL) { in X11Size() [all …]
|
/device/generic/goldfish/camera/ |
D | JpegCompressor.cpp | 42 typedef int (*CompressFunc)(JpegStub* stub, const void* image, 69 status_t NV21JpegCompressor::compressRawImage(const void* image, in compressRawImage() argument 76 return (status_t)(*f)(&mStub, image, width, height, quality, exifData); in compressRawImage()
|
/device/linaro/bootloader/edk2/BaseTools/UserManuals/ |
D | PatchPcdValue_Utility_Man_Page.rtf | 5 …tchPcdValue.exe or PatchPcdValue.py \endash Patch the specific value into the binary image.\f1\par 9 …image according to the input PCD offset and type. When PCD type is VOID*, MaxSize must be specifie… 10 …nPatchPcdTable tool to set the specific value of a patchable PCD into the binary EFI image. \f1\par 13 \pard\nowidctlpar\li360\sb200\b0\f0 Start offset to the image is used to store PCD value.\f1\par 15 \pard\nowidctlpar\li360\sb200\b0\f0 PCD value will be updated into the image. For VOID* type PCD va… 31 … PcdDebugPrintErrorLevel in the binary PeiCore image. This PCD type is UINT32. Its offset in PeiCo… 33 …g in the binary HelloWorld image. This PCD type is VOID*. Its max byte array size is 0x40, and its…
|
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Python/ |
D | dynload_next.c | 40 NSObjectFileImage image; in _PyImport_GetDynLoadFunc() local 55 rc = NSCreateObjectFileImageFromFile(pathname, &image); in _PyImport_GetDynLoadFunc() 77 newModule = NSLinkModule(image, pathname, LINKOPTIONS); in _PyImport_GetDynLoadFunc()
|
/device/linaro/bootloader/edk2/SecurityPkg/Library/DxeTpmMeasureBootLib/ |
D | DxeTpmMeasureBootLib.uni | 4 // This library instance hooks LoadImage() API to measure every image that 8 // This library will have external input - PE/COFF image and GPT partition. 26 …image that is not measured in PEI phase. And, it will also measure GPT partition. Caution: This mo…
|
/device/linaro/bootloader/edk2/SecurityPkg/Library/DxeTpm2MeasureBootLib/ |
D | DxeTpm2MeasureBootLib.uni | 4 // This library instance hooks LoadImage() API to measure every image that 8 // This library will have external input - PE/COFF image and GPT partition. 26 …image that is not measured in PEI phase. And, it will also measure GPT partition. Caution: This mo…
|
/device/linaro/bootloader/edk2/EmbeddedPkg/Scripts/LauterbachT32/ |
D | EfiProcessPeImage.cmm | 17 print "PE32 image found at &imgstart" 26 print "no debug dir for image at &imgstart" 33 print "debug type is not dwarf for image at &imgstart, it's &debugtype" 52 print "debug signature not found for image at &imgstart, its &dwarfsig"
|
D | EfiProcessTeImage.cmm | 17 print "TE image found at &imgstart" 26 print "no debug dir for image at &imgstart" 34 print "debug type is not dwarf for image at &imgstart, it's &debugtype" 53 print "debug signature not found for image at &imgstart, its &dwarfsig"
|
/device/linaro/bootloader/arm-trusted-firmware/docs/ |
D | trusted-board-boot.md | 36 * The BL1 image, on the assumption that it resides in ROM so cannot be 55 image. An image can be authenticated by calculating its hash and matching it 76 non secure world image (BL3-3). The public part is stored in one of the 82 the content certificate for the BL3-X image. The public part is stored in 99 of the BL2 image. 114 It is self-signed with the BL3-0 key. It contains a hash of the BL3-0 image. 123 It is self-signed with the BL3-1 key. It contains a hash of the BL3-1 image. 132 It is self-signed with the BL3-2 key. It contains a hash of the BL3-2 image. 141 It is self-signed with the BL3-3 key. It contains a hash of the BL3-3 image. 161 * BL1 loads the BL2 image. Its hash is calculated and compared with the hash [all …]
|
/device/linaro/hikey/factory-images/ |
D | README | 9 # Package with an existing image 10 # First download the image to the android build top directory
|
/device/linaro/bootloader/edk2/UefiCpuPkg/ResetVector/Vtf0/ |
D | ReadMe.txt | 18 3. Locate SEC image 20 5. Call SEC image entry point 24 All inputs to SEC image are register based:
|
/device/google/contexthub/firmware/os/core/ |
D | appSec.c | 220 struct ImageHeader *image; in appSecProcessIncomingHdr() local 229 image = (struct ImageHeader *)hdr; hdr += sizeof(*image); in appSecProcessIncomingHdr() 230 aosp = &image->aosp; in appSecProcessIncomingHdr() 234 image->layout.version != 1 || in appSecProcessIncomingHdr() 235 image->layout.magic != GOOGLE_LAYOUT_MAGIC) in appSecProcessIncomingHdr() 238 needBytes = sizeof(*image); in appSecProcessIncomingHdr() 310 .fwFlags = image->layout.flags, in appSecProcessIncomingHdr() 312 .payInfoType = image->layout.payload, in appSecProcessIncomingHdr() 317 switch(image->layout.payload) { in appSecProcessIncomingHdr()
|