Home
last modified time | relevance | path

Searched full:dtb (Results 1 – 25 of 428) sorted by relevance

12345678910>>...18

/external/dtc/tests/
Drun_tests.sh167 # $1: dtb file
237 run_dtc_test -I dts -O dtb -o overlay_base_no_symbols.test.dtb "$SRCDIR/overlay_base.dts"
238 run_test check_path overlay_base_no_symbols.test.dtb not-exists "/__symbols__"
239 run_test check_path overlay_base_no_symbols.test.dtb not-exists "/__fixups__"
240 run_test check_path overlay_base_no_symbols.test.dtb not-exists "/__local_fixups__"
242 …run_dtc_test -I dts -O dtb -o overlay_overlay_no_fixups.test.dtb "$SRCDIR/overlay_overlay_no_fixup…
243 run_test check_path overlay_overlay_no_fixups.test.dtb not-exists "/__symbols__"
244 run_test check_path overlay_overlay_no_fixups.test.dtb not-exists "/__fixups__"
245 run_test check_path overlay_overlay_no_fixups.test.dtb exists "/__local_fixups__"
247 run_test overlay overlay_base_no_symbols.test.dtb overlay_overlay_no_fixups.test.dtb
[all …]
/external/trusty/arm-trusted-firmware/plat/arm/common/
Darm_dyn_cfg_helpers.c41 * Validate the tb_fw_config is a valid DTB file and returns the node offset
44 * void *dtb - pointer to the TB_FW_CONFIG in memory
49 int arm_dyn_tb_fw_cfg_init(void *dtb, int *node) in arm_dyn_tb_fw_cfg_init() argument
51 assert(dtb != NULL); in arm_dyn_tb_fw_cfg_init()
55 if (fdt_check_header(dtb) != 0) { in arm_dyn_tb_fw_cfg_init()
56 WARN("Invalid DTB file passed as%s\n", " TB_FW_CONFIG"); in arm_dyn_tb_fw_cfg_init()
61 *node = fdt_node_offset_by_compatible(dtb, -1, "arm,tb_fw"); in arm_dyn_tb_fw_cfg_init()
73 * This function writes the Mbed TLS heap address and size in the DTB. When it
74 * is called, it is guaranteed that a DTB is available. However it is not
85 int arm_set_dtb_mbedtls_heap_info(void *dtb, void *heap_addr, size_t heap_size) in arm_set_dtb_mbedtls_heap_info() argument
[all …]
Darm_dyn_cfg.c35 * which is a DTB.
40 * - This implementation requires the DTB to be present so that BL1 has a
60 /* If in BL2, retrieve the already allocated heap's info from DTB */ in arm_get_mbedtls_heap()
70 * Puts the shared Mbed TLS heap information to the DTB.
80 * If tb_fw_cfg_dtb==NULL then DTB is not present for the current in arm_bl1_set_mbedtls_heap()
81 * platform. As such, we don't attempt to write to the DTB at all. in arm_bl1_set_mbedtls_heap()
85 * and hence there is no need to pass any information to the DTB. in arm_bl1_set_mbedtls_heap()
87 * In the latter case, if we still wanted to write in the DTB the heap in arm_bl1_set_mbedtls_heap()
92 tb_fw_config_info = FCONF_GET_PROPERTY(dyn_cfg, dtb, TB_FW_CONFIG_ID); in arm_bl1_set_mbedtls_heap()
99 void *dtb = (void *)tb_fw_cfg_dtb; in arm_bl1_set_mbedtls_heap() local
[all …]
/external/trusty/arm-trusted-firmware/plat/imx/imx8m/
Dimx8m_dyn_cfg_helpers.c27 void *dtb = (void *)dt_base; in imx8m_event_log_fdt_init_overlay() local
29 ret = fdt_create_empty_tree(dtb, dt_size); in imx8m_event_log_fdt_init_overlay()
31 ERROR("cannot create empty dtb tree: %s\n", in imx8m_event_log_fdt_init_overlay()
36 offset = fdt_path_offset(dtb, "/"); in imx8m_event_log_fdt_init_overlay()
43 offset = fdt_add_subnode(dtb, offset, "fragment@0"); in imx8m_event_log_fdt_init_overlay()
50 ret = fdt_setprop_string(dtb, offset, "target-path", "/"); in imx8m_event_log_fdt_init_overlay()
57 offset = fdt_add_subnode(dtb, offset, "__overlay__"); in imx8m_event_log_fdt_init_overlay()
64 offset = fdt_add_subnode(dtb, offset, "tpm_event_log"); in imx8m_event_log_fdt_init_overlay()
71 ret = fdt_setprop_string(dtb, offset, "compatible", in imx8m_event_log_fdt_init_overlay()
79 ret = fdt_setprop_u64(dtb, offset, "tpm_event_log_addr", 0); in imx8m_event_log_fdt_init_overlay()
[all …]
/external/trusty/arm-trusted-firmware/plat/xilinx/common/
Dplat_console.c34 #if ((CONSOLE_IS(dtb) || RT_CONSOLE_IS(dtb)) && defined(XILINX_OF_BOARD_DTB_ADDR)) && \
81 #if ((CONSOLE_IS(dtb) || RT_CONSOLE_IS(dtb)) && defined(XILINX_OF_BOARD_DTB_ADDR)) && \
85 * get_baudrate() - Get the baudrate form DTB.
86 * @dtb: Address of the Device Tree Blob (DTB).
90 static int32_t get_baudrate(void *dtb) in get_baudrate() argument
98 node = fdt_path_offset(dtb, "/secure-chosen"); in get_baudrate()
100 node = fdt_path_offset(dtb, "/chosen"); in get_baudrate()
107 prop = fdt_getprop(dtb, node, "stdout-path", NULL); in get_baudrate()
134 * get_node_status() - Get the DTB node status.
135 * @dtb: Address of the Device Tree Blob (DTB).
[all …]
Dplat_fdt.c20 static uint8_t is_fit_image(void *dtb) in is_fit_image() argument
25 confs_noffset = fdt_path_offset(dtb, FIT_CONFS_PATH); in is_fit_image()
54 WARN("FIT image detected, TF-A will not update DTB for DDR address space\n"); in is_valid_dtb()
68 WARN("Failed to add dynamic region for dtb: error %d\n", in add_mmap_dynamic_region()
81 WARN("Failed to remove dynamic region for dtb:error %d\n", in remove_mmap_dynamic_region()
90 static int check_fdt_reserved_memory(void *dtb, const char *node_name) in check_fdt_reserved_memory() argument
92 int offset = fdt_path_offset(dtb, "/reserved-memory"); in check_fdt_reserved_memory()
95 offset = fdt_subnode_offset(dtb, offset, node_name); in check_fdt_reserved_memory()
104 void *dtb; in prepare_dtb() local
108 dtb = (void *)XILINX_OF_BOARD_DTB_ADDR; in prepare_dtb()
[all …]
/external/arm-trusted-firmware/plat/arm/common/
Darm_dyn_cfg_helpers.c37 * Validate the tb_fw_config is a valid DTB file and returns the node offset
40 * void *dtb - pointer to the TB_FW_CONFIG in memory
45 int arm_dyn_tb_fw_cfg_init(void *dtb, int *node) in arm_dyn_tb_fw_cfg_init() argument
47 assert(dtb != NULL); in arm_dyn_tb_fw_cfg_init()
51 if (fdt_check_header(dtb) != 0) { in arm_dyn_tb_fw_cfg_init()
52 WARN("Invalid DTB file passed as%s\n", " TB_FW_CONFIG"); in arm_dyn_tb_fw_cfg_init()
57 *node = fdt_node_offset_by_compatible(dtb, -1, "arm,tb_fw"); in arm_dyn_tb_fw_cfg_init()
69 * This function writes the Mbed TLS heap address and size in the DTB. When it
70 * is called, it is guaranteed that a DTB is available. However it is not
81 int arm_set_dtb_mbedtls_heap_info(void *dtb, void *heap_addr, size_t heap_size) in arm_set_dtb_mbedtls_heap_info() argument
[all …]
Darm_dyn_cfg.c35 * which is a DTB.
40 * - This implementation requires the DTB to be present so that BL1 has a
60 /* If in BL2, retrieve the already allocated heap's info from DTB */ in arm_get_mbedtls_heap()
70 * Puts the shared Mbed TLS heap information to the DTB.
80 * If tb_fw_cfg_dtb==NULL then DTB is not present for the current in arm_bl1_set_mbedtls_heap()
81 * platform. As such, we don't attempt to write to the DTB at all. in arm_bl1_set_mbedtls_heap()
85 * and hence there is no need to pass any information to the DTB. in arm_bl1_set_mbedtls_heap()
87 * In the latter case, if we still wanted to write in the DTB the heap in arm_bl1_set_mbedtls_heap()
92 tb_fw_config_info = FCONF_GET_PROPERTY(dyn_cfg, dtb, TB_FW_CONFIG_ID); in arm_bl1_set_mbedtls_heap()
99 void *dtb = (void *)tb_fw_cfg_dtb; in arm_bl1_set_mbedtls_heap() local
[all …]
/external/arm-trusted-firmware/include/common/
Dfdt_wrappers.h17 int fdt_read_uint32(const void *dtb, int node, const char *prop_name,
19 uint32_t fdt_read_uint32_default(const void *dtb, int node,
21 int fdt_read_uint64(const void *dtb, int node, const char *prop_name,
23 int fdt_read_uint32_array(const void *dtb, int node, const char *prop_name,
25 int fdtw_read_string(const void *dtb, int node, const char *prop,
27 int fdtw_read_uuid(const void *dtb, int node, const char *prop,
29 int fdtw_write_inplace_cells(void *dtb, int node, const char *prop,
31 int fdtw_read_bytes(const void *dtb, int node, const char *prop,
33 int fdtw_write_inplace_bytes(void *dtb, int node, const char *prop,
35 int fdt_get_reg_props_by_index(const void *dtb, int node, int index,
[all …]
/external/arm-trusted-firmware/common/
Dfdt_wrappers.c26 int fdt_read_uint32_array(const void *dtb, int node, const char *prop_name, in fdt_read_uint32_array() argument
32 assert(dtb != NULL); in fdt_read_uint32_array()
38 prop = fdt_getprop(dtb, node, prop_name, &value_len); in fdt_read_uint32_array()
40 VERBOSE("Couldn't find property %s in dtb\n", prop_name); in fdt_read_uint32_array()
57 int fdt_read_uint32(const void *dtb, int node, const char *prop_name, in fdt_read_uint32() argument
60 return fdt_read_uint32_array(dtb, node, prop_name, 1, value); in fdt_read_uint32()
63 uint32_t fdt_read_uint32_default(const void *dtb, int node, in fdt_read_uint32_default() argument
67 int err = fdt_read_uint32(dtb, node, prop_name, &ret); in fdt_read_uint32_default()
76 int fdt_read_uint64(const void *dtb, int node, const char *prop_name, in fdt_read_uint64() argument
82 ret = fdt_read_uint32_array(dtb, node, prop_name, 2, array); in fdt_read_uint64()
[all …]
Dfdt_fixup.c177 * @dtb: pointer to the device tree blob in memory
196 int fdt_add_reserved_memory(void *dtb, const char *node_name, in fdt_add_reserved_memory() argument
199 int offs = fdt_path_offset(dtb, "/reserved-memory"); in fdt_add_reserved_memory()
204 ac = fdt_address_cells(dtb, 0); in fdt_add_reserved_memory()
205 sc = fdt_size_cells(dtb, 0); in fdt_add_reserved_memory()
207 offs = fdt_add_subnode(dtb, 0, "reserved-memory"); in fdt_add_reserved_memory()
211 fdt_setprop_u32(dtb, offs, "#address-cells", ac); in fdt_add_reserved_memory()
212 fdt_setprop_u32(dtb, offs, "#size-cells", sc); in fdt_add_reserved_memory()
213 fdt_setprop(dtb, offs, "ranges", NULL, 0); in fdt_add_reserved_memory()
228 offs = fdt_add_subnode(dtb, offs, node_name); in fdt_add_reserved_memory()
[all …]
/external/trusty/arm-trusted-firmware/plat/rpi/rpi4/
Drpi4_setup.c24 static void remove_spintable_memreserve(void *dtb) in remove_spintable_memreserve() argument
27 int regions = fdt_num_mem_rsv(dtb); in remove_spintable_memreserve()
31 if (fdt_get_mem_rsv(dtb, i, &addr, &size) != 0) { in remove_spintable_memreserve()
47 fdt_del_mem_rsv(dtb, i); in remove_spintable_memreserve()
57 void *dtb = (void *)rpi4_get_dtb_address(); in rpi4_prepare_dtb() local
62 if (fdt_check_header(dtb) != 0) in rpi4_prepare_dtb()
65 ret = fdt_open_into(dtb, dtb, 0x100000); in rpi4_prepare_dtb()
67 ERROR("Invalid Device Tree at %p: error %d\n", dtb, ret); in rpi4_prepare_dtb()
71 if (dt_add_psci_node(dtb)) { in rpi4_prepare_dtb()
76 if (dt_add_psci_cpu_enable_methods(dtb)) { in rpi4_prepare_dtb()
[all …]
/external/trusty/arm-trusted-firmware/include/common/
Dfdt_wrappers.h18 int fdt_read_uint32(const void *dtb, int node, const char *prop_name,
20 uint32_t fdt_read_uint32_default(const void *dtb, int node,
22 int fdt_read_uint64(const void *dtb, int node, const char *prop_name,
24 uint64_t fdt_read_uint64_default(const void *dtb, int node,
26 int fdt_read_uint32_array(const void *dtb, int node, const char *prop_name,
28 int fdtw_read_string(const void *dtb, int node, const char *prop,
30 int fdtw_read_uuid(const void *dtb, int node, const char *prop,
32 int fdtw_write_inplace_cells(void *dtb, int node, const char *prop,
34 int fdtw_read_bytes(const void *dtb, int node, const char *prop,
36 int fdtw_write_inplace_bytes(void *dtb, int node, const char *prop,
[all …]
/external/trusty/arm-trusted-firmware/plat/qemu/qemu/
Dqemu_helpers.c36 void *dtb = (void *)config_base; in qemu_set_tee_fw_info() local
41 offs = fdtw_find_or_add_subnode(dtb, 0, "tpm-event-log"); in qemu_set_tee_fw_info()
47 if (fdt_appendprop(dtb, offs, "compatible", compatible, in qemu_set_tee_fw_info()
52 err = fdt_setprop(dtb, offs, DTB_PROP_HW_SM_LOG_ADDR, &sec_base, 8); in qemu_set_tee_fw_info()
58 err = fdt_setprop(dtb, offs, DTB_PROP_HW_LOG_SIZE, &sz, 4); in qemu_set_tee_fw_info()
69 * Write the Event Log address and its size in the DTB.
84 void *dtb = (void *)config_base; in qemu_set_event_log_info() local
90 err = fdt_open_into(dtb, dtb, PLAT_QEMU_DT_MAX_SIZE); in qemu_set_event_log_info()
92 ERROR("Invalid Device Tree at %p: error %d\n", dtb, err); in qemu_set_event_log_info()
97 * Verify that the DTB is valid, before attempting to write to it, in qemu_set_event_log_info()
[all …]
/external/trusty/arm-trusted-firmware/common/
Dfdt_wrappers.c26 int fdt_read_uint32_array(const void *dtb, int node, const char *prop_name, in fdt_read_uint32_array() argument
32 assert(dtb != NULL); in fdt_read_uint32_array()
38 prop = fdt_getprop(dtb, node, prop_name, &value_len); in fdt_read_uint32_array()
40 VERBOSE("Couldn't find property %s in dtb\n", prop_name); in fdt_read_uint32_array()
57 int fdt_read_uint32(const void *dtb, int node, const char *prop_name, in fdt_read_uint32() argument
60 return fdt_read_uint32_array(dtb, node, prop_name, 1, value); in fdt_read_uint32()
63 uint32_t fdt_read_uint32_default(const void *dtb, int node, in fdt_read_uint32_default() argument
67 int err = fdt_read_uint32(dtb, node, prop_name, &ret); in fdt_read_uint32_default()
76 int fdt_read_uint64(const void *dtb, int node, const char *prop_name, in fdt_read_uint64() argument
82 ret = fdt_read_uint32_array(dtb, node, prop_name, 2, array); in fdt_read_uint64()
[all …]
Dfdt_fixup.c177 * @dtb: pointer to the device tree blob in memory
196 int fdt_add_reserved_memory(void *dtb, const char *node_name, in fdt_add_reserved_memory() argument
199 int offs = fdt_path_offset(dtb, "/reserved-memory"); in fdt_add_reserved_memory()
205 ac = fdt_address_cells(dtb, 0); in fdt_add_reserved_memory()
206 sc = fdt_size_cells(dtb, 0); in fdt_add_reserved_memory()
208 offs = fdt_add_subnode(dtb, 0, "reserved-memory"); in fdt_add_reserved_memory()
212 fdt_setprop_u32(dtb, offs, "#address-cells", ac); in fdt_add_reserved_memory()
213 fdt_setprop_u32(dtb, offs, "#size-cells", sc); in fdt_add_reserved_memory()
214 fdt_setprop(dtb, offs, "ranges", NULL, 0); in fdt_add_reserved_memory()
218 fdt_for_each_subnode(node, dtb, offs) { in fdt_add_reserved_memory()
[all …]
/external/trusty/arm-trusted-firmware/plat/qemu/qemu_sbsa/
Dsbsa_sip_svc.c89 static void read_cpu_topology_from_dt(void *dtb) in read_cpu_topology_from_dt() argument
105 node = fdt_path_offset(dtb, "/cpus/topology"); in read_cpu_topology_from_dt()
108 fdt_read_uint32_default(dtb, node, "sockets", 0); in read_cpu_topology_from_dt()
110 fdt_read_uint32_default(dtb, node, "clusters", 0); in read_cpu_topology_from_dt()
112 fdt_read_uint32_default(dtb, node, "cores", 0); in read_cpu_topology_from_dt()
114 fdt_read_uint32_default(dtb, node, "threads", 0); in read_cpu_topology_from_dt()
124 void read_cpuinfo_from_dt(void *dtb) in read_cpuinfo_from_dt() argument
150 node = fdt_path_offset(dtb, "/cpus"); in read_cpuinfo_from_dt()
160 node = fdt_path_offset(dtb, "/cpus/cpu@0"); in read_cpuinfo_from_dt()
163 if (fdt_getprop(dtb, node, "reg", NULL)) { in read_cpuinfo_from_dt()
[all …]
/external/arm-trusted-firmware/plat/rpi/rpi4/
Drpi4_bl31_setup.c93 /* Cleared by the GPU if DTB address is valid. */ in rpi4_get_dtb_address()
97 WARN("Stub magic failure, DTB address unknown\n"); in rpi4_get_dtb_address()
162 * tree blob (DTB) in x0, while x1-x3 are reserved for future use and in bl31_early_platform_setup2()
177 * Is the dtb_ptr32 pointer valid? If yes, map the DTB region. in bl31_plat_arch_setup()
178 * We map the 2MB region the DTB start address lives in, plus in bl31_plat_arch_setup()
213 static void remove_spintable_memreserve(void *dtb) in remove_spintable_memreserve() argument
216 int regions = fdt_num_mem_rsv(dtb); in remove_spintable_memreserve()
220 if (fdt_get_mem_rsv(dtb, i, &addr, &size) != 0) { in remove_spintable_memreserve()
236 fdt_del_mem_rsv(dtb, i); in remove_spintable_memreserve()
246 void *dtb = (void *)rpi4_get_dtb_address(); in rpi4_prepare_dtb() local
[all …]
/external/mesa3d/.gitlab-ci/bare-metal/
Dfastboot.sh45 echo "Must set BM_DTB to your board's DTB file in the job's variables:"
106 "$BM_DTB" -o dtb
108 cat kernel dtb > Image.gz-dtb
118 "${FDO_HTTP_CACHE_URI:-}${KERNEL_IMAGE_BASE}/${DEBIAN_ARCH}/${BM_DTB}.dtb" -o dtb
121 cat kernel dtb > Image.gz-dtb || echo "No DTB available, using pure kernel."
126 cat /baremetal-files/"$BM_KERNEL" /baremetal-files/"$BM_DTB".dtb > Image.gz-dtb
127 cp /baremetal-files/"$BM_DTB".dtb dtb
134 --kernel Image.gz-dtb \
136 --dtb dtb \
142 rm Image.gz-dtb dtb
/external/coreboot/src/mainboard/sifive/hifive-unmatched/
DMakefile.mk9 DTB=$(obj)/hifive-unmatched.dtb
11 $(DTB): $(DTS)
12 dtc -I dts -O dtb -o $(DTB) $(DTS)
14 cbfs-files-y += fallback/DTB
15 fallback/DTB-file := $(DTB)
16 fallback/DTB-type := raw
/external/coreboot/src/mainboard/sifive/hifive-unleashed/
DMakefile.mk11 DTB=$(obj)/hifive-unleashed.dtb
13 $(DTB): $(DTS)
14 dtc -I dts -O dtb -o $(DTB) $(DTS)
16 cbfs-files-y += fallback/DTB
17 fallback/DTB-file := $(DTB)
18 fallback/DTB-type := raw
/external/trusty/arm-trusted-firmware/lib/fconf/
Dfconf_dyn_cfg_getter.c82 const void *dtb = (void *)config; in fconf_populate_dtb_registry() local
85 * In case of BL1, fw_config dtb information is already in fconf_populate_dtb_registry()
94 uint32_t config_max_size = fdt_totalsize(dtb); in fconf_populate_dtb_registry()
100 node = fdt_node_offset_by_compatible(dtb, -1, compatible_str); in fconf_populate_dtb_registry()
102 ERROR("FCONF: Can't find %s compatible in dtb\n", compatible_str); in fconf_populate_dtb_registry()
106 fdt_for_each_subnode(child, dtb, node) { in fconf_populate_dtb_registry()
112 /* Read configuration dtb information */ in fconf_populate_dtb_registry()
113 rc = fdt_read_uint64(dtb, child, "load-address", &val64); in fconf_populate_dtb_registry()
115 ERROR("FCONF: Incomplete configuration property in dtb-registry.\n"); in fconf_populate_dtb_registry()
120 rc = fdt_read_uint32(dtb, child, "max-size", &config_max_size); in fconf_populate_dtb_registry()
[all …]
Dfconf_cot_getter.c184 * @dtb[in]: Pointer to the device tree blob in memory
191 static int get_oid(const void *dtb, int node, const char *prop, char **oid) in get_oid() argument
196 rc = fdt_read_uint32(dtb, node, prop, &phandle); in get_oid()
201 node = fdt_node_offset_by_phandle(dtb, phandle); in get_oid()
207 rc = fdtw_read_string(dtb, node, "oid", *oid, MAX_OID_NAME_LEN); in get_oid()
216 * @dtb[in]: Pointer to the device tree blob in memory
224 static int populate_and_set_auth_methods(const void *dtb, int node, in populate_and_set_auth_methods() argument
240 rc = get_oid(dtb, node, "signing-key", &oid); in populate_and_set_auth_methods()
256 rc = get_oid(dtb, node, "hash", &oid); in populate_and_set_auth_methods()
271 rc = get_oid(dtb, node, "antirollback-counter", &oid); in populate_and_set_auth_methods()
[all …]
/external/arm-trusted-firmware/lib/fconf/
Dfconf_dyn_cfg_getter.c65 const void *dtb = (void *)config; in fconf_populate_dtb_registry() local
68 * In case of BL1, fw_config dtb information is already in fconf_populate_dtb_registry()
77 uint32_t config_max_size = fdt_totalsize(dtb); in fconf_populate_dtb_registry()
83 node = fdt_node_offset_by_compatible(dtb, -1, compatible_str); in fconf_populate_dtb_registry()
85 ERROR("FCONF: Can't find %s compatible in dtb\n", compatible_str); in fconf_populate_dtb_registry()
89 fdt_for_each_subnode(child, dtb, node) { in fconf_populate_dtb_registry()
94 /* Read configuration dtb information */ in fconf_populate_dtb_registry()
95 rc = fdt_read_uint64(dtb, child, "load-address", &val64); in fconf_populate_dtb_registry()
97 ERROR("FCONF: Incomplete configuration property in dtb-registry.\n"); in fconf_populate_dtb_registry()
102 rc = fdt_read_uint32(dtb, child, "max-size", &config_max_size); in fconf_populate_dtb_registry()
[all …]
Dfconf_cot_getter.c182 * @dtb[in]: Pointer to the device tree blob in memory
189 static int get_oid(const void *dtb, int node, const char *prop, char **oid) in get_oid() argument
194 rc = fdt_read_uint32(dtb, node, prop, &phandle); in get_oid()
199 node = fdt_node_offset_by_phandle(dtb, phandle); in get_oid()
205 rc = fdtw_read_string(dtb, node, "oid", *oid, MAX_OID_NAME_LEN); in get_oid()
214 * @dtb[in]: Pointer to the device tree blob in memory
222 static int populate_and_set_auth_methods(const void *dtb, int node, in populate_and_set_auth_methods() argument
241 rc = get_oid(dtb, node, "signing-key", &oid); in populate_and_set_auth_methods()
250 rc = get_oid(dtb, node, "hash", &oid); in populate_and_set_auth_methods()
265 rc = get_oid(dtb, node, "antirollback-counter", &oid); in populate_and_set_auth_methods()
[all …]

12345678910>>...18