/external/dtc/tests/ |
D | run_tests.sh | 167 # $1: dtb file 237 run_dtc_test -I dts -O dtb -o overlay_base_no_symbols.test.dtb "$SRCDIR/overlay_base.dts" 238 run_test check_path overlay_base_no_symbols.test.dtb not-exists "/__symbols__" 239 run_test check_path overlay_base_no_symbols.test.dtb not-exists "/__fixups__" 240 run_test check_path overlay_base_no_symbols.test.dtb not-exists "/__local_fixups__" 242 …run_dtc_test -I dts -O dtb -o overlay_overlay_no_fixups.test.dtb "$SRCDIR/overlay_overlay_no_fixup… 243 run_test check_path overlay_overlay_no_fixups.test.dtb not-exists "/__symbols__" 244 run_test check_path overlay_overlay_no_fixups.test.dtb not-exists "/__fixups__" 245 run_test check_path overlay_overlay_no_fixups.test.dtb exists "/__local_fixups__" 247 run_test overlay overlay_base_no_symbols.test.dtb overlay_overlay_no_fixups.test.dtb [all …]
|
/external/trusty/arm-trusted-firmware/plat/arm/common/ |
D | arm_dyn_cfg_helpers.c | 41 * Validate the tb_fw_config is a valid DTB file and returns the node offset 44 * void *dtb - pointer to the TB_FW_CONFIG in memory 49 int arm_dyn_tb_fw_cfg_init(void *dtb, int *node) in arm_dyn_tb_fw_cfg_init() argument 51 assert(dtb != NULL); in arm_dyn_tb_fw_cfg_init() 55 if (fdt_check_header(dtb) != 0) { in arm_dyn_tb_fw_cfg_init() 56 WARN("Invalid DTB file passed as%s\n", " TB_FW_CONFIG"); in arm_dyn_tb_fw_cfg_init() 61 *node = fdt_node_offset_by_compatible(dtb, -1, "arm,tb_fw"); in arm_dyn_tb_fw_cfg_init() 73 * This function writes the Mbed TLS heap address and size in the DTB. When it 74 * is called, it is guaranteed that a DTB is available. However it is not 85 int arm_set_dtb_mbedtls_heap_info(void *dtb, void *heap_addr, size_t heap_size) in arm_set_dtb_mbedtls_heap_info() argument [all …]
|
D | arm_dyn_cfg.c | 35 * which is a DTB. 40 * - This implementation requires the DTB to be present so that BL1 has a 60 /* If in BL2, retrieve the already allocated heap's info from DTB */ in arm_get_mbedtls_heap() 70 * Puts the shared Mbed TLS heap information to the DTB. 80 * If tb_fw_cfg_dtb==NULL then DTB is not present for the current in arm_bl1_set_mbedtls_heap() 81 * platform. As such, we don't attempt to write to the DTB at all. in arm_bl1_set_mbedtls_heap() 85 * and hence there is no need to pass any information to the DTB. in arm_bl1_set_mbedtls_heap() 87 * In the latter case, if we still wanted to write in the DTB the heap in arm_bl1_set_mbedtls_heap() 92 tb_fw_config_info = FCONF_GET_PROPERTY(dyn_cfg, dtb, TB_FW_CONFIG_ID); in arm_bl1_set_mbedtls_heap() 99 void *dtb = (void *)tb_fw_cfg_dtb; in arm_bl1_set_mbedtls_heap() local [all …]
|
/external/trusty/arm-trusted-firmware/plat/imx/imx8m/ |
D | imx8m_dyn_cfg_helpers.c | 27 void *dtb = (void *)dt_base; in imx8m_event_log_fdt_init_overlay() local 29 ret = fdt_create_empty_tree(dtb, dt_size); in imx8m_event_log_fdt_init_overlay() 31 ERROR("cannot create empty dtb tree: %s\n", in imx8m_event_log_fdt_init_overlay() 36 offset = fdt_path_offset(dtb, "/"); in imx8m_event_log_fdt_init_overlay() 43 offset = fdt_add_subnode(dtb, offset, "fragment@0"); in imx8m_event_log_fdt_init_overlay() 50 ret = fdt_setprop_string(dtb, offset, "target-path", "/"); in imx8m_event_log_fdt_init_overlay() 57 offset = fdt_add_subnode(dtb, offset, "__overlay__"); in imx8m_event_log_fdt_init_overlay() 64 offset = fdt_add_subnode(dtb, offset, "tpm_event_log"); in imx8m_event_log_fdt_init_overlay() 71 ret = fdt_setprop_string(dtb, offset, "compatible", in imx8m_event_log_fdt_init_overlay() 79 ret = fdt_setprop_u64(dtb, offset, "tpm_event_log_addr", 0); in imx8m_event_log_fdt_init_overlay() [all …]
|
/external/trusty/arm-trusted-firmware/plat/xilinx/common/ |
D | plat_console.c | 34 #if ((CONSOLE_IS(dtb) || RT_CONSOLE_IS(dtb)) && defined(XILINX_OF_BOARD_DTB_ADDR)) && \ 81 #if ((CONSOLE_IS(dtb) || RT_CONSOLE_IS(dtb)) && defined(XILINX_OF_BOARD_DTB_ADDR)) && \ 85 * get_baudrate() - Get the baudrate form DTB. 86 * @dtb: Address of the Device Tree Blob (DTB). 90 static int32_t get_baudrate(void *dtb) in get_baudrate() argument 98 node = fdt_path_offset(dtb, "/secure-chosen"); in get_baudrate() 100 node = fdt_path_offset(dtb, "/chosen"); in get_baudrate() 107 prop = fdt_getprop(dtb, node, "stdout-path", NULL); in get_baudrate() 134 * get_node_status() - Get the DTB node status. 135 * @dtb: Address of the Device Tree Blob (DTB). [all …]
|
D | plat_fdt.c | 20 static uint8_t is_fit_image(void *dtb) in is_fit_image() argument 25 confs_noffset = fdt_path_offset(dtb, FIT_CONFS_PATH); in is_fit_image() 54 WARN("FIT image detected, TF-A will not update DTB for DDR address space\n"); in is_valid_dtb() 68 WARN("Failed to add dynamic region for dtb: error %d\n", in add_mmap_dynamic_region() 81 WARN("Failed to remove dynamic region for dtb:error %d\n", in remove_mmap_dynamic_region() 90 static int check_fdt_reserved_memory(void *dtb, const char *node_name) in check_fdt_reserved_memory() argument 92 int offset = fdt_path_offset(dtb, "/reserved-memory"); in check_fdt_reserved_memory() 95 offset = fdt_subnode_offset(dtb, offset, node_name); in check_fdt_reserved_memory() 104 void *dtb; in prepare_dtb() local 108 dtb = (void *)XILINX_OF_BOARD_DTB_ADDR; in prepare_dtb() [all …]
|
/external/arm-trusted-firmware/plat/arm/common/ |
D | arm_dyn_cfg_helpers.c | 37 * Validate the tb_fw_config is a valid DTB file and returns the node offset 40 * void *dtb - pointer to the TB_FW_CONFIG in memory 45 int arm_dyn_tb_fw_cfg_init(void *dtb, int *node) in arm_dyn_tb_fw_cfg_init() argument 47 assert(dtb != NULL); in arm_dyn_tb_fw_cfg_init() 51 if (fdt_check_header(dtb) != 0) { in arm_dyn_tb_fw_cfg_init() 52 WARN("Invalid DTB file passed as%s\n", " TB_FW_CONFIG"); in arm_dyn_tb_fw_cfg_init() 57 *node = fdt_node_offset_by_compatible(dtb, -1, "arm,tb_fw"); in arm_dyn_tb_fw_cfg_init() 69 * This function writes the Mbed TLS heap address and size in the DTB. When it 70 * is called, it is guaranteed that a DTB is available. However it is not 81 int arm_set_dtb_mbedtls_heap_info(void *dtb, void *heap_addr, size_t heap_size) in arm_set_dtb_mbedtls_heap_info() argument [all …]
|
D | arm_dyn_cfg.c | 35 * which is a DTB. 40 * - This implementation requires the DTB to be present so that BL1 has a 60 /* If in BL2, retrieve the already allocated heap's info from DTB */ in arm_get_mbedtls_heap() 70 * Puts the shared Mbed TLS heap information to the DTB. 80 * If tb_fw_cfg_dtb==NULL then DTB is not present for the current in arm_bl1_set_mbedtls_heap() 81 * platform. As such, we don't attempt to write to the DTB at all. in arm_bl1_set_mbedtls_heap() 85 * and hence there is no need to pass any information to the DTB. in arm_bl1_set_mbedtls_heap() 87 * In the latter case, if we still wanted to write in the DTB the heap in arm_bl1_set_mbedtls_heap() 92 tb_fw_config_info = FCONF_GET_PROPERTY(dyn_cfg, dtb, TB_FW_CONFIG_ID); in arm_bl1_set_mbedtls_heap() 99 void *dtb = (void *)tb_fw_cfg_dtb; in arm_bl1_set_mbedtls_heap() local [all …]
|
/external/arm-trusted-firmware/include/common/ |
D | fdt_wrappers.h | 17 int fdt_read_uint32(const void *dtb, int node, const char *prop_name, 19 uint32_t fdt_read_uint32_default(const void *dtb, int node, 21 int fdt_read_uint64(const void *dtb, int node, const char *prop_name, 23 int fdt_read_uint32_array(const void *dtb, int node, const char *prop_name, 25 int fdtw_read_string(const void *dtb, int node, const char *prop, 27 int fdtw_read_uuid(const void *dtb, int node, const char *prop, 29 int fdtw_write_inplace_cells(void *dtb, int node, const char *prop, 31 int fdtw_read_bytes(const void *dtb, int node, const char *prop, 33 int fdtw_write_inplace_bytes(void *dtb, int node, const char *prop, 35 int fdt_get_reg_props_by_index(const void *dtb, int node, int index, [all …]
|
/external/arm-trusted-firmware/common/ |
D | fdt_wrappers.c | 26 int fdt_read_uint32_array(const void *dtb, int node, const char *prop_name, in fdt_read_uint32_array() argument 32 assert(dtb != NULL); in fdt_read_uint32_array() 38 prop = fdt_getprop(dtb, node, prop_name, &value_len); in fdt_read_uint32_array() 40 VERBOSE("Couldn't find property %s in dtb\n", prop_name); in fdt_read_uint32_array() 57 int fdt_read_uint32(const void *dtb, int node, const char *prop_name, in fdt_read_uint32() argument 60 return fdt_read_uint32_array(dtb, node, prop_name, 1, value); in fdt_read_uint32() 63 uint32_t fdt_read_uint32_default(const void *dtb, int node, in fdt_read_uint32_default() argument 67 int err = fdt_read_uint32(dtb, node, prop_name, &ret); in fdt_read_uint32_default() 76 int fdt_read_uint64(const void *dtb, int node, const char *prop_name, in fdt_read_uint64() argument 82 ret = fdt_read_uint32_array(dtb, node, prop_name, 2, array); in fdt_read_uint64() [all …]
|
D | fdt_fixup.c | 177 * @dtb: pointer to the device tree blob in memory 196 int fdt_add_reserved_memory(void *dtb, const char *node_name, in fdt_add_reserved_memory() argument 199 int offs = fdt_path_offset(dtb, "/reserved-memory"); in fdt_add_reserved_memory() 204 ac = fdt_address_cells(dtb, 0); in fdt_add_reserved_memory() 205 sc = fdt_size_cells(dtb, 0); in fdt_add_reserved_memory() 207 offs = fdt_add_subnode(dtb, 0, "reserved-memory"); in fdt_add_reserved_memory() 211 fdt_setprop_u32(dtb, offs, "#address-cells", ac); in fdt_add_reserved_memory() 212 fdt_setprop_u32(dtb, offs, "#size-cells", sc); in fdt_add_reserved_memory() 213 fdt_setprop(dtb, offs, "ranges", NULL, 0); in fdt_add_reserved_memory() 228 offs = fdt_add_subnode(dtb, offs, node_name); in fdt_add_reserved_memory() [all …]
|
/external/trusty/arm-trusted-firmware/plat/rpi/rpi4/ |
D | rpi4_setup.c | 24 static void remove_spintable_memreserve(void *dtb) in remove_spintable_memreserve() argument 27 int regions = fdt_num_mem_rsv(dtb); in remove_spintable_memreserve() 31 if (fdt_get_mem_rsv(dtb, i, &addr, &size) != 0) { in remove_spintable_memreserve() 47 fdt_del_mem_rsv(dtb, i); in remove_spintable_memreserve() 57 void *dtb = (void *)rpi4_get_dtb_address(); in rpi4_prepare_dtb() local 62 if (fdt_check_header(dtb) != 0) in rpi4_prepare_dtb() 65 ret = fdt_open_into(dtb, dtb, 0x100000); in rpi4_prepare_dtb() 67 ERROR("Invalid Device Tree at %p: error %d\n", dtb, ret); in rpi4_prepare_dtb() 71 if (dt_add_psci_node(dtb)) { in rpi4_prepare_dtb() 76 if (dt_add_psci_cpu_enable_methods(dtb)) { in rpi4_prepare_dtb() [all …]
|
/external/trusty/arm-trusted-firmware/include/common/ |
D | fdt_wrappers.h | 18 int fdt_read_uint32(const void *dtb, int node, const char *prop_name, 20 uint32_t fdt_read_uint32_default(const void *dtb, int node, 22 int fdt_read_uint64(const void *dtb, int node, const char *prop_name, 24 uint64_t fdt_read_uint64_default(const void *dtb, int node, 26 int fdt_read_uint32_array(const void *dtb, int node, const char *prop_name, 28 int fdtw_read_string(const void *dtb, int node, const char *prop, 30 int fdtw_read_uuid(const void *dtb, int node, const char *prop, 32 int fdtw_write_inplace_cells(void *dtb, int node, const char *prop, 34 int fdtw_read_bytes(const void *dtb, int node, const char *prop, 36 int fdtw_write_inplace_bytes(void *dtb, int node, const char *prop, [all …]
|
/external/trusty/arm-trusted-firmware/plat/qemu/qemu/ |
D | qemu_helpers.c | 36 void *dtb = (void *)config_base; in qemu_set_tee_fw_info() local 41 offs = fdtw_find_or_add_subnode(dtb, 0, "tpm-event-log"); in qemu_set_tee_fw_info() 47 if (fdt_appendprop(dtb, offs, "compatible", compatible, in qemu_set_tee_fw_info() 52 err = fdt_setprop(dtb, offs, DTB_PROP_HW_SM_LOG_ADDR, &sec_base, 8); in qemu_set_tee_fw_info() 58 err = fdt_setprop(dtb, offs, DTB_PROP_HW_LOG_SIZE, &sz, 4); in qemu_set_tee_fw_info() 69 * Write the Event Log address and its size in the DTB. 84 void *dtb = (void *)config_base; in qemu_set_event_log_info() local 90 err = fdt_open_into(dtb, dtb, PLAT_QEMU_DT_MAX_SIZE); in qemu_set_event_log_info() 92 ERROR("Invalid Device Tree at %p: error %d\n", dtb, err); in qemu_set_event_log_info() 97 * Verify that the DTB is valid, before attempting to write to it, in qemu_set_event_log_info() [all …]
|
/external/trusty/arm-trusted-firmware/common/ |
D | fdt_wrappers.c | 26 int fdt_read_uint32_array(const void *dtb, int node, const char *prop_name, in fdt_read_uint32_array() argument 32 assert(dtb != NULL); in fdt_read_uint32_array() 38 prop = fdt_getprop(dtb, node, prop_name, &value_len); in fdt_read_uint32_array() 40 VERBOSE("Couldn't find property %s in dtb\n", prop_name); in fdt_read_uint32_array() 57 int fdt_read_uint32(const void *dtb, int node, const char *prop_name, in fdt_read_uint32() argument 60 return fdt_read_uint32_array(dtb, node, prop_name, 1, value); in fdt_read_uint32() 63 uint32_t fdt_read_uint32_default(const void *dtb, int node, in fdt_read_uint32_default() argument 67 int err = fdt_read_uint32(dtb, node, prop_name, &ret); in fdt_read_uint32_default() 76 int fdt_read_uint64(const void *dtb, int node, const char *prop_name, in fdt_read_uint64() argument 82 ret = fdt_read_uint32_array(dtb, node, prop_name, 2, array); in fdt_read_uint64() [all …]
|
D | fdt_fixup.c | 177 * @dtb: pointer to the device tree blob in memory 196 int fdt_add_reserved_memory(void *dtb, const char *node_name, in fdt_add_reserved_memory() argument 199 int offs = fdt_path_offset(dtb, "/reserved-memory"); in fdt_add_reserved_memory() 205 ac = fdt_address_cells(dtb, 0); in fdt_add_reserved_memory() 206 sc = fdt_size_cells(dtb, 0); in fdt_add_reserved_memory() 208 offs = fdt_add_subnode(dtb, 0, "reserved-memory"); in fdt_add_reserved_memory() 212 fdt_setprop_u32(dtb, offs, "#address-cells", ac); in fdt_add_reserved_memory() 213 fdt_setprop_u32(dtb, offs, "#size-cells", sc); in fdt_add_reserved_memory() 214 fdt_setprop(dtb, offs, "ranges", NULL, 0); in fdt_add_reserved_memory() 218 fdt_for_each_subnode(node, dtb, offs) { in fdt_add_reserved_memory() [all …]
|
/external/trusty/arm-trusted-firmware/plat/qemu/qemu_sbsa/ |
D | sbsa_sip_svc.c | 89 static void read_cpu_topology_from_dt(void *dtb) in read_cpu_topology_from_dt() argument 105 node = fdt_path_offset(dtb, "/cpus/topology"); in read_cpu_topology_from_dt() 108 fdt_read_uint32_default(dtb, node, "sockets", 0); in read_cpu_topology_from_dt() 110 fdt_read_uint32_default(dtb, node, "clusters", 0); in read_cpu_topology_from_dt() 112 fdt_read_uint32_default(dtb, node, "cores", 0); in read_cpu_topology_from_dt() 114 fdt_read_uint32_default(dtb, node, "threads", 0); in read_cpu_topology_from_dt() 124 void read_cpuinfo_from_dt(void *dtb) in read_cpuinfo_from_dt() argument 150 node = fdt_path_offset(dtb, "/cpus"); in read_cpuinfo_from_dt() 160 node = fdt_path_offset(dtb, "/cpus/cpu@0"); in read_cpuinfo_from_dt() 163 if (fdt_getprop(dtb, node, "reg", NULL)) { in read_cpuinfo_from_dt() [all …]
|
/external/arm-trusted-firmware/plat/rpi/rpi4/ |
D | rpi4_bl31_setup.c | 93 /* Cleared by the GPU if DTB address is valid. */ in rpi4_get_dtb_address() 97 WARN("Stub magic failure, DTB address unknown\n"); in rpi4_get_dtb_address() 162 * tree blob (DTB) in x0, while x1-x3 are reserved for future use and in bl31_early_platform_setup2() 177 * Is the dtb_ptr32 pointer valid? If yes, map the DTB region. in bl31_plat_arch_setup() 178 * We map the 2MB region the DTB start address lives in, plus in bl31_plat_arch_setup() 213 static void remove_spintable_memreserve(void *dtb) in remove_spintable_memreserve() argument 216 int regions = fdt_num_mem_rsv(dtb); in remove_spintable_memreserve() 220 if (fdt_get_mem_rsv(dtb, i, &addr, &size) != 0) { in remove_spintable_memreserve() 236 fdt_del_mem_rsv(dtb, i); in remove_spintable_memreserve() 246 void *dtb = (void *)rpi4_get_dtb_address(); in rpi4_prepare_dtb() local [all …]
|
/external/mesa3d/.gitlab-ci/bare-metal/ |
D | fastboot.sh | 45 echo "Must set BM_DTB to your board's DTB file in the job's variables:" 106 "$BM_DTB" -o dtb 108 cat kernel dtb > Image.gz-dtb 118 "${FDO_HTTP_CACHE_URI:-}${KERNEL_IMAGE_BASE}/${DEBIAN_ARCH}/${BM_DTB}.dtb" -o dtb 121 cat kernel dtb > Image.gz-dtb || echo "No DTB available, using pure kernel." 126 cat /baremetal-files/"$BM_KERNEL" /baremetal-files/"$BM_DTB".dtb > Image.gz-dtb 127 cp /baremetal-files/"$BM_DTB".dtb dtb 134 --kernel Image.gz-dtb \ 136 --dtb dtb \ 142 rm Image.gz-dtb dtb
|
/external/coreboot/src/mainboard/sifive/hifive-unmatched/ |
D | Makefile.mk | 9 DTB=$(obj)/hifive-unmatched.dtb 11 $(DTB): $(DTS) 12 dtc -I dts -O dtb -o $(DTB) $(DTS) 14 cbfs-files-y += fallback/DTB 15 fallback/DTB-file := $(DTB) 16 fallback/DTB-type := raw
|
/external/coreboot/src/mainboard/sifive/hifive-unleashed/ |
D | Makefile.mk | 11 DTB=$(obj)/hifive-unleashed.dtb 13 $(DTB): $(DTS) 14 dtc -I dts -O dtb -o $(DTB) $(DTS) 16 cbfs-files-y += fallback/DTB 17 fallback/DTB-file := $(DTB) 18 fallback/DTB-type := raw
|
/external/trusty/arm-trusted-firmware/lib/fconf/ |
D | fconf_dyn_cfg_getter.c | 82 const void *dtb = (void *)config; in fconf_populate_dtb_registry() local 85 * In case of BL1, fw_config dtb information is already in fconf_populate_dtb_registry() 94 uint32_t config_max_size = fdt_totalsize(dtb); in fconf_populate_dtb_registry() 100 node = fdt_node_offset_by_compatible(dtb, -1, compatible_str); in fconf_populate_dtb_registry() 102 ERROR("FCONF: Can't find %s compatible in dtb\n", compatible_str); in fconf_populate_dtb_registry() 106 fdt_for_each_subnode(child, dtb, node) { in fconf_populate_dtb_registry() 112 /* Read configuration dtb information */ in fconf_populate_dtb_registry() 113 rc = fdt_read_uint64(dtb, child, "load-address", &val64); in fconf_populate_dtb_registry() 115 ERROR("FCONF: Incomplete configuration property in dtb-registry.\n"); in fconf_populate_dtb_registry() 120 rc = fdt_read_uint32(dtb, child, "max-size", &config_max_size); in fconf_populate_dtb_registry() [all …]
|
D | fconf_cot_getter.c | 184 * @dtb[in]: Pointer to the device tree blob in memory 191 static int get_oid(const void *dtb, int node, const char *prop, char **oid) in get_oid() argument 196 rc = fdt_read_uint32(dtb, node, prop, &phandle); in get_oid() 201 node = fdt_node_offset_by_phandle(dtb, phandle); in get_oid() 207 rc = fdtw_read_string(dtb, node, "oid", *oid, MAX_OID_NAME_LEN); in get_oid() 216 * @dtb[in]: Pointer to the device tree blob in memory 224 static int populate_and_set_auth_methods(const void *dtb, int node, in populate_and_set_auth_methods() argument 240 rc = get_oid(dtb, node, "signing-key", &oid); in populate_and_set_auth_methods() 256 rc = get_oid(dtb, node, "hash", &oid); in populate_and_set_auth_methods() 271 rc = get_oid(dtb, node, "antirollback-counter", &oid); in populate_and_set_auth_methods() [all …]
|
/external/arm-trusted-firmware/lib/fconf/ |
D | fconf_dyn_cfg_getter.c | 65 const void *dtb = (void *)config; in fconf_populate_dtb_registry() local 68 * In case of BL1, fw_config dtb information is already in fconf_populate_dtb_registry() 77 uint32_t config_max_size = fdt_totalsize(dtb); in fconf_populate_dtb_registry() 83 node = fdt_node_offset_by_compatible(dtb, -1, compatible_str); in fconf_populate_dtb_registry() 85 ERROR("FCONF: Can't find %s compatible in dtb\n", compatible_str); in fconf_populate_dtb_registry() 89 fdt_for_each_subnode(child, dtb, node) { in fconf_populate_dtb_registry() 94 /* Read configuration dtb information */ in fconf_populate_dtb_registry() 95 rc = fdt_read_uint64(dtb, child, "load-address", &val64); in fconf_populate_dtb_registry() 97 ERROR("FCONF: Incomplete configuration property in dtb-registry.\n"); in fconf_populate_dtb_registry() 102 rc = fdt_read_uint32(dtb, child, "max-size", &config_max_size); in fconf_populate_dtb_registry() [all …]
|
D | fconf_cot_getter.c | 182 * @dtb[in]: Pointer to the device tree blob in memory 189 static int get_oid(const void *dtb, int node, const char *prop, char **oid) in get_oid() argument 194 rc = fdt_read_uint32(dtb, node, prop, &phandle); in get_oid() 199 node = fdt_node_offset_by_phandle(dtb, phandle); in get_oid() 205 rc = fdtw_read_string(dtb, node, "oid", *oid, MAX_OID_NAME_LEN); in get_oid() 214 * @dtb[in]: Pointer to the device tree blob in memory 222 static int populate_and_set_auth_methods(const void *dtb, int node, in populate_and_set_auth_methods() argument 241 rc = get_oid(dtb, node, "signing-key", &oid); in populate_and_set_auth_methods() 250 rc = get_oid(dtb, node, "hash", &oid); in populate_and_set_auth_methods() 265 rc = get_oid(dtb, node, "antirollback-counter", &oid); in populate_and_set_auth_methods() [all …]
|