| /lib/efi_loader/ |
| A D | efi_bootbin.c | 67 struct efi_device_path *image, *device; in calculate_paths() local 83 if (image) { in calculate_paths() 85 struct efi_device_path *image_tmp = image; in calculate_paths() 87 efi_dp_split_file_path(image, &device, &image); in calculate_paths() 90 *image_pathp = image; in calculate_paths() 92 if (image) in calculate_paths() 93 log_debug("- image %pD\n", image); in calculate_paths() 241 return efi_run_image(image, size, dp_dev, dp_img); in efi_binary_run_dp() 272 (uintptr_t)image, size); in efi_binary_run() 336 struct efi_device_path *device, *image; in efi_bootflow_run() local [all …]
|
| A D | efi_firmware.c | 88 void *image, in efi_firmware_get_image_unsupported() argument 101 const void *image, in efi_firmware_check_image_unsupported() argument 132 const void *image, in efi_firmware_set_package_info_unsupported() argument 391 const void *image = *p_image; in efi_firmware_capsule_authenticate() local 412 image = capsule_payload; in efi_firmware_capsule_authenticate() 419 *p_image = image; in efi_firmware_capsule_authenticate() 644 const void *image, in efi_firmware_fit_set_image() argument 658 if (!image || image_index != 1) in efi_firmware_fit_set_image() 680 ret = fit_update(image); in efi_firmware_fit_set_image() 731 const void *image, in efi_firmware_raw_set_image() argument [all …]
|
| A D | efi_capsule.c | 278 *image = (uint8_t *)*image + sizeof(auth_hdr->monotonic_count) + in efi_remove_auth_hdr() 324 *image = (uint8_t *)capsule; in efi_capsule_authenticate() 343 (uint8_t *)*image + *image_size, 1); in efi_capsule_authenticate() 614 if (image->version != 0x00000003) { in efi_capsule_update_firmware() 621 image->update_image_index, in efi_capsule_update_firmware() 622 image->update_hardware_instance, in efi_capsule_update_firmware() 626 &image->update_image_type_id, in efi_capsule_update_firmware() 627 image->update_hardware_instance); in efi_capsule_update_firmware() 634 !(image->image_capsule_support & in efi_capsule_update_firmware() 641 image_binary = (void *)image + sizeof(*image); in efi_capsule_update_firmware() [all …]
|
| A D | efi_image_loader.c | 68 struct efi_loaded_image *image, in efi_print_image_info() argument 73 image->image_base, image->image_base + image->image_size - 1); in efi_print_image_info() 74 if (pc && pc >= image->image_base && in efi_print_image_info() 75 pc < image->image_base + image->image_size) in efi_print_image_info() 76 printf(" pc=0x%zx", pc - image->image_base); in efi_print_image_info() 77 if (image->file_path) in efi_print_image_info() 78 printf(" '%pD'", image->file_path); in efi_print_image_info()
|
| A D | Kconfig | 81 agent or an external debugger to determine loaded image information 295 Define the namespace or "salt" GUID used to generate the per-image 321 driver for FIT image 332 driver for raw image 454 When enabled, the DTB image passed to the booted EFI image is 591 This compiles an app designed for testing. It is packed into an image
|
| /lib/ |
| A D | binman.c | 26 ofnode image; member 69 node = binman->image; in binman_entry_find_internal() 88 ret = binman_entry_find_internal(binman->image, name, entry); in binman_entry_find() 115 return ofnode_find_subnode(binman->image, name); in binman_section_find_node() 139 binman->image = node; in binman_select_subnode() 141 ofnode_get_name(binman->image)); in binman_select_subnode() 154 ret = find_image_node(&binman->image); in binman_init() 158 ofnode_read_u32(binman->image, "skip-at-start", &binman->skip_at_start); in binman_init() 160 ofnode_get_name(binman->image)); in binman_init()
|
| A D | elf.c | 128 unsigned char *image; /* Binary image pointer */ in load_elf64_image_shdr() local 162 image = (unsigned char *)addr + (ulong)shdr->sh_offset; in load_elf64_image_shdr() 164 (const void *)image, shdr->sh_size); in load_elf64_image_shdr() 234 unsigned char *image; /* Binary image pointer */ in load_elf_image_shdr() local 270 image = (unsigned char *)addr + shdr->sh_offset; in load_elf_image_shdr() 272 (const void *)image, shdr->sh_size); in load_elf_image_shdr()
|
| A D | Makefile | 45 obj-$(CONFIG_IMAGE_SPARSE) += image-sparse.o
|
| /lib/efi_selftest/ |
| A D | efi_selftest_startimage_return.c | 40 static u8 *image; variable 48 static efi_status_t decompress(u8 **image) in decompress() argument 73 *image = buf; in decompress() 91 decompress(&image); in setup() 105 if (image) { in teardown() 106 r = boottime->free_pool(image); in teardown() 127 ret = boottime->load_image(false, image_handle, NULL, image, in execute()
|
| A D | efi_selftest_startimage_exit.c | 40 static u8 *image; variable 48 static efi_status_t decompress(u8 **image) in decompress() argument 73 *image = buf; in decompress() 93 ret = decompress(&image); in setup() 107 if (image) { in teardown() 108 r = boottime->free_pool(image); in teardown() 132 ret = boottime->load_image(false, image_handle, NULL, image, in execute()
|
| A D | efi_selftest_exception.c | 60 static u8 *image; variable 68 static efi_status_t decompress(u8 **image) in decompress() argument 93 *image = buf; in decompress() 111 decompress(&image); in setup() 128 ret = boottime->load_image(false, image_handle, &dp.dp, image, in execute()
|
| A D | efi_selftest_load_file.c | 61 static u8 *image; variable 171 static efi_status_t decompress(u8 **image) in decompress() argument 196 *image = buf; in decompress() 231 memcpy(buffer, image, img.length); in load_file() 271 memcpy(buffer, image, img.length); in load_file2() 297 decompress(&image); in efi_st_load_file_setup() 363 if (image) { in efi_st_load_file_teardown() 364 ret = boottime->free_pool(image); in efi_st_load_file_teardown()
|
| A D | efi_selftest_block_device.c | 58 static u8 *image; variable 91 start = image + (lba << LB_BLOCK_SIZE); in read_blocks() 116 start = image + (lba << LB_BLOCK_SIZE); in write_blocks() 140 static efi_status_t decompress(u8 **image) in decompress() argument 165 *image = buf; in decompress() 198 decompress(&image); in setup() 271 if (image) { in teardown() 272 r = boottime->free_pool(image); in teardown() 374 memcpy(&part1_size, image + 0x1ca, sizeof(u32)); in execute()
|
| A D | efi_selftest_tcg2.c | 46 static u8 *image; variable 405 static efi_status_t decompress(u8 **image) in decompress() argument 430 *image = buf; in decompress() 621 decompress(&image); in efi_st_tcg2_setup() 869 (uintptr_t)image, in efi_st_tcg2_execute() 876 ret = tcg2->hash_log_extend_event(tcg2, PE_COFF_IMAGE, (uintptr_t)image, in efi_st_tcg2_execute() 901 ret = boottime->load_image(false, image_handle, NULL, image, in efi_st_tcg2_execute() 955 if (image) { in efi_st_tcg2_teardown() 956 r = boottime->free_pool(image); in efi_st_tcg2_teardown()
|
| A D | efi_selftest_loadimage.c | 64 static u8 *image; variable 286 boottime->copy_mem(buffer, &image[priv.file_pos], *buffer_size); in efi_st_read() 376 static efi_status_t decompress(u8 **image) in decompress() argument 401 *image = buf; in decompress() 426 decompress(&image); in setup() 475 if (image) { in teardown() 476 ret = boottime->free_pool(image); in teardown()
|
| /lib/optee/ |
| A D | Kconfig | 12 an OPTEE image created with mkimage 15 hex "Amount of Trust-Zone RAM for the OPTEE image"
|
| /lib/fwu_updates/ |
| A D | fwu.c | 139 struct efi_fw_image *image; in fwu_get_image_type_id() local 141 image = update_info.images; in fwu_get_image_type_id() 143 if (image_index == image[i].image_index) { in fwu_get_image_type_id() 144 guidcpy(image_type_id, &image[i].image_type_id); in fwu_get_image_type_id()
|
| /lib/efi_client/ |
| A D | efi.c | 91 int efi_init(struct efi_priv *priv, const char *banner, efi_handle_t image, in efi_init() argument 102 priv->parent_image = image; in efi_init()
|
| A D | efi_app.c | 158 efi_status_t EFIAPI efi_main(efi_handle_t image, in efi_main() argument 165 ret = efi_init(priv, "App", image, sys_table); in efi_main()
|
| A D | efi_stub.c | 301 efi_status_t EFIAPI efi_main(efi_handle_t image, in efi_main() argument 314 ret = efi_init(priv, "Payload", image, sys_table); in efi_main()
|
| /lib/mbedtls/external/mbedtls/tests/scripts/ |
| A D | docker_env.sh | 62 ${DOCKER} image build \
|
| /lib/rsa/ |
| A D | Kconfig | 7 RSA support. This enables the RSA algorithm used for FIT image 75 algorithm used in FIT image verification. It required RSA Key as
|
| /lib/ecdsa/ |
| A D | Kconfig | 6 image verification in U-Boot. The ECDSA algorithm is implemented
|
| /lib/lzma/ |
| A D | README.txt | 22 compressed image.
|
| /lib/lwip/lwip/contrib/apps/LwipMibCompiler/Mibs/IANA/ |
| A D | IANA-PRINTER-MIB | 568 -- (text, image, graphics, bar codes), 607 -- objects (text, image, graphics, bar 799 -- MIME type 'image/cgm' 802 -- MIME type 'image/jpeg'
|