/u-boot/scripts/ |
H A D | build-cb.sh | 10 # qemu-system-i386 -bios coreboot.rom -drive file=disk.img,if=virtio 12 qemu-img create -f raw disk.img 120M 13 mkfs.ext2 -F disk.img 15 sudo mount -o loop disk.img /mnt/rootfs 18 sudo cp /boot/initrd.img /mnt/rootfs/boot/.
|
/u-boot/board/freescale/common/ |
H A D | fsl_validate.c | 67 static u32 check_ie(struct fsl_secboot_img_priv *img) argument 69 if (img->hdr.ie_flag & IE_FLAG_MASK) 187 static u32 check_srk(struct fsl_secboot_img_priv *img) argument 192 return !check_ie(img); 196 if (img->hdr.len_kr.srk_table_flag & SRK_FLAG) 224 static u32 read_validate_srk_tbl(struct fsl_secboot_img_priv *img) argument 228 struct fsl_secboot_img_hdr *hdr = &img->hdr; 229 void *esbc = (u8 *)(uintptr_t)img->ehdrloc; 247 memcpy(&img->srk_tbl, esbc + hdr->srk_tbl_off, size); 250 if (!CHECK_KEY_LEN(img 264 read_validate_single_key(struct fsl_secboot_img_priv *img) argument 283 install_ie_tbl(uintptr_t ie_tbl_addr, struct fsl_secboot_img_priv *img) argument 292 read_validate_ie_tbl(struct fsl_secboot_img_priv *img) argument 332 get_key_len(struct fsl_secboot_img_priv *img) argument 490 calc_img_key_hash(struct fsl_secboot_img_priv *img) argument 537 calc_esbchdr_esbc_hash(struct fsl_secboot_img_priv *img) argument 613 construct_img_encoded_hash_second(struct fsl_secboot_img_priv *img) argument 669 read_validate_esbc_client_header(struct fsl_secboot_img_priv *img) argument 788 calculate_cmp_img_sig(struct fsl_secboot_img_priv *img) argument 848 struct fsl_secboot_img_priv *img = *img_ptr; local 877 struct fsl_secboot_img_priv *img; local [all...] |
/u-boot/arch/arm/include/asm/mach-imx/ |
H A D | ahab.h | 13 int ahab_verify_cntr_image(struct boot_img_t *img, int image_index);
|
/u-boot/tools/ |
H A D | mksunxiboot.c | 67 struct boot_img img; local 74 if ((sizeof(img.header) % 32) != 0) { 113 memset(&img, 0, sizeof(img)); 131 count = read(fd_in, img.code, file_size); 138 img.header.b_instruction = /* b instruction */ 142 memcpy(img.header.magic, BOOT0_MAGIC, 8); /* no '0' termination */ 143 img.header.length = 145 img.header.b_instruction = cpu_to_le32(img [all...] |
H A D | kwbimage.h | 273 static inline struct ext_hdr_v0 *ext_hdr_v0_first(void *img) argument 277 if (kwbimage_version(img) != 0) 280 mhdr = img; 292 static inline struct ext_hdr_v0 *ext_hdr_v0_next(void *img, struct ext_hdr_v0 *cur) argument 294 if ((void *)(cur + 1) < _ext_hdr_v0_end(img)) 300 #define for_each_ext_hdr_v0(ehdr, img) \ 301 for ((ehdr) = ext_hdr_v0_first((img)); \ 303 (ehdr) = ext_hdr_v0_next((img), (ehdr))) 305 static inline struct bin_hdr_v0 *bin_hdr_v0_first(void *img) argument 309 if (kwbimage_version(img) ! 344 opt_hdr_v1_first(void *img) argument [all...] |
H A D | imx8image.c | 479 static void set_image_hash(boot_img_t *img, char *filename, uint32_t hash_type) argument 486 if (img->size == 0) 492 img->size, filename, hash_type); 496 img->hab_flags |= IMG_FLAG_HASH_SHA256; 499 img->hab_flags |= IMG_FLAG_HASH_SHA384; 502 img->hab_flags |= IMG_FLAG_HASH_SHA512; 510 memset(img->hash, 0, HASH_MAX_LEN); 524 ret = sscanf(hash + 2 * i, "%02hhx", &img->hash[i]); 544 boot_img_t *img = &container->img[containe local [all...] |
H A D | kwboot.c | 1458 const uint8_t *img = _img; local 1462 hdrsz = kwbheader_size(img); 1476 rc = kwboot_xmodem_one(tty, &pnum, 1, img, hdrsz, baudrate); 1485 img += hdrsz; 1487 rc = kwboot_xmodem_one(tty, &pnum, 0, img, size, 0); 1690 void *img; local 1695 img = NULL; 1708 img = malloc(len + reserve); 1709 if (!img) 1714 ssize_t rd = read(fd, img 1756 kwboot_img_csum32_ptr(void *img) argument 1767 kwboot_img_csum32(const void *img) argument 1787 kwboot_img_is_secure(void *img) argument 1799 kwboot_img_has_ddr_init(void *img) argument 1840 kwboot_img_grow_data_right(void *img, size_t *size, size_t grow) argument 1859 kwboot_img_grow_hdr(void *img, size_t *size, size_t grow) argument 1901 kwboot_add_bin_ohdr_v1(void *img, size_t *size, uint32_t binsz) argument 1947 _inject_baudrate_change_code(void *img, size_t *size, int for_data, int old_baud, int new_baud) argument 1995 kwboot_img_guess_sata_blksz(void *img, uint32_t blkoff, uint32_t data_size, size_t total_size) argument 2043 kwboot_img_patch(void *img, size_t *size, int baudrate) argument 2286 void *img; local [all...] |
/u-boot/lib/efi_selftest/ |
H A D | efi_selftest_startimage_return.c | 37 static struct compressed_file_image img = EFI_ST_DISK_IMG; variable in typeref:struct:compressed_file_image 56 ret = boottime->allocate_pool(EFI_LOADER_DATA, img.length, 62 boottime->set_mem(buf, img.length, 0); 65 if (!img.lines[i].line) 67 addr = img.lines[i].addr; 69 if (addr + len > img.length) 70 len = img.length - addr; 71 boottime->copy_mem(buf + addr, img.lines[i].line, len); 128 img.length, &handle);
|
H A D | efi_selftest_exception.c | 57 static struct compressed_file_image img = EFI_ST_DISK_IMG; variable in typeref:struct:compressed_file_image 76 ret = boottime->allocate_pool(EFI_LOADER_DATA, img.length, 82 boottime->set_mem(buf, img.length, 0); 85 if (!img.lines[i].line) 87 addr = img.lines[i].addr; 89 if (addr + len > img.length) 90 len = img.length - addr; 91 boottime->copy_mem(buf + addr, img.lines[i].line, len); 129 img.length, &handle);
|
H A D | efi_selftest_startimage_exit.c | 37 static struct compressed_file_image img = EFI_ST_DISK_IMG; variable in typeref:struct:compressed_file_image 56 ret = boottime->allocate_pool(EFI_LOADER_DATA, img.length, 62 boottime->set_mem(buf, img.length, 0); 65 if (!img.lines[i].line) 67 addr = img.lines[i].addr; 69 if (addr + len > img.length) 70 len = img.length - addr; 71 boottime->copy_mem(buf + addr, img.lines[i].line, len); 131 img.length, &handle);
|
H A D | efi_selftest_load_file.c | 55 static struct compressed_file_image img = EFI_ST_DISK_IMG; variable in typeref:struct:compressed_file_image 179 ret = boottime->allocate_pool(EFI_LOADER_DATA, img.length, 185 boottime->set_mem(buf, img.length, 0); 188 if (!img.lines[i].line) 190 addr = img.lines[i].addr; 192 if (addr + len > img.length) 193 len = img.length - addr; 194 boottime->copy_mem(buf + addr, img.lines[i].line, len); 227 if (*buffer_size < img.length) { 228 *buffer_size = img [all...] |
H A D | efi_selftest_loadimage.c | 61 static struct compressed_file_image img = EFI_ST_DISK_IMG; variable in typeref:struct:compressed_file_image 281 if (priv.file_pos >= img.length) 283 else if (priv.file_pos + *buffer_size > img.length) 284 *buffer_size = img.length - priv.file_pos; 384 ret = boottime->allocate_pool(EFI_LOADER_DATA, img.length, 390 boottime->set_mem(buf, img.length, 0); 393 if (!img.lines[i].line) 395 addr = img.lines[i].addr; 397 if (addr + len > img.length) 398 len = img [all...] |
H A D | efi_selftest_block_device.c | 53 static const struct compressed_disk_image img = EFI_ST_DISK_IMG; variable in typeref:struct:compressed_disk_image 87 if ((lba << LB_BLOCK_SIZE) + buffer_size > img.length) 112 if ((lba << LB_BLOCK_SIZE) + buffer_size > img.length) 146 ret = boottime->allocate_pool(EFI_LOADER_DATA, img.length, 152 boottime->set_mem(buf, img.length, 0); 155 if (!img.lines[i].line) 157 addr = img.lines[i].addr; 159 if (addr + len > img.length) 160 len = img.length - addr; 161 boottime->copy_mem(buf + addr, img [all...] |
/u-boot/test/fs/ |
H A D | fat-noncontig-test.sh | 38 # => host bind 0 sandbox/fat-noncontig.img 39 # => load host 0:0 1000 noncontig.img 56 img=${odir}/fat-noncontig.img 59 testfn=noncontig.img 74 if [ ! -f ${img} ]; then 75 fallocate -l 40M ${img} 78 dd if=/dev/zero of=${img} bs=1024 count=$((40 * 1024)) 84 mkfs.fat ${img} 90 sudo mount -o loop,uid=$(id -u) ${img} [all...] |
/u-boot/test/dm/ |
H A D | fwu_mdata.c | 40 static const struct compressed_disk_image img = FWU_MDATA_DISK_IMG; variable in typeref:struct:compressed_disk_image 60 buf = malloc(img.length); 64 memset(buf, 0, img.length); 67 if (!img.lines[i].line) 69 addr = img.lines[i].addr; 71 if (addr + len > img.length) 72 len = img.length - addr; 73 memcpy(buf + addr, img.lines[i].line, len); 84 blkcnt = BLOCK_CNT(img.length, dev_desc);
|
/u-boot/arch/arm/mach-imx/imx8/ |
H A D | ahab.c | 58 int ahab_verify_cntr_image(struct boot_img_t *img, int image_index) argument 65 debug("img %d, dst 0x%llx, src 0x%x, size 0x%x\n", 66 image_index, img->dst, img->offset, img->size); 70 img->dst & ~(CONFIG_SYS_CACHELINE_SIZE - 1), 71 ALIGN(img->dst + img->size, CONFIG_SYS_CACHELINE_SIZE) - 1); 75 img->dst, err); 86 printf("Set permission failed for img 132 struct boot_img_t *img; local [all...] |
/u-boot/test/image/ |
H A D | spl_load_nor.c | 20 static int spl_test_nor_write_image(struct unit_test_state *uts, void *img, argument 23 spl_test_nor_base = img;
|
H A D | spl_load_spi.c | 13 static int spl_test_spi_write_image(struct unit_test_state *uts, void *img, argument 23 img_size, img));
|
H A D | spl_load_nand.c | 13 static int spl_test_nand_write_image(struct unit_test_state *uts, void *img, argument 37 ut_assertok(mtd_write(mtd, off, img_size, &length, img));
|
H A D | spl_load_net.c | 79 void *img; member in struct:spl_test_net_priv 188 test_priv->img + block * TFTP_BLOCK_SIZE, size); 216 static int spl_test_net_write_image(struct unit_test_state *uts, void *img, argument 223 test_priv->img = img;
|
/u-boot/board/BuR/brsmarc1/ |
H A D | config.mk | 15 dd bs=1 if=u-boot-dtb.img of=$@ seek=$(payload_off) 2>/dev/null 23 cp u-boot-dtb.img misc/ && \ 29 $(hw-platform-y)_prog.bin: u-boot-dtb.img spl/u-boot-spl.bin
|
/u-boot/board/BuR/brppt2/ |
H A D | config.mk | 15 dd bs=1 if=u-boot-dtb.img of=$@ seek=$(payload_off) 2>/dev/null 22 cp u-boot-dtb.img misc/ && \ 32 $(hw-platform-y)_prog.bin: u-boot-dtb.img spl SPL
|
/u-boot/board/BuR/brppt1/ |
H A D | config.mk | 16 dd bs=1 if=u-boot-dtb.img of=$@ seek=$(payload_off) 2>/dev/null 24 cp u-boot-dtb.img misc/ && \ 32 $(hw-platform-y)_prog.bin: u-boot-dtb.img spl/u-boot-spl.bin
|
/u-boot/arch/arm/mach-imx/ |
H A D | ele_ahab.c | 293 int ahab_verify_cntr_image(struct boot_img_t *img, int image_index) argument 300 printf("Authenticate img %d failed, return %d, resp 0x%x\n", 332 struct boot_img_t *img; local 370 img = (struct boot_img_t *)(addr + 374 debug("img %d, dst 0x%x, src 0x%lx, size 0x%x\n", 375 i, (uint32_t)img->dst, img->offset + addr, img->size); 377 memcpy((void *)img->dst, (const void *)(img [all...] |
/u-boot/arch/arm/mach-keystone/ |
H A D | config.mk | 25 u-boot-spi.gph: spl/u-boot-spl.gph u-boot.img FORCE
|