Lines Matching defs:image
61 * 8KB: To align the boot image to the largest NAND page size, and simplify
63 * We choose the largest page size, in order to use a single image for all
171 printf("create bootrom image from u-boot and boot extensions\n\n");
174 printf(" input_file name of boot image file.\n");
175 printf(" if -p is used, name of the bootrom image file");
177 printf(" output_file name of output bootrom image file\n");
181 printf(" different SOCs may have different boot image\n");
185 printf(" image header\n");
186 printf(" -l boot image load address. default is 0x0\n");
187 printf(" -e boot image entry address. default is 0x0\n");
188 printf(" -b binary extension image file.\n");
189 printf(" This image is executed before the boot image.\n");
194 printf(" -c Make trusted boot image using parameters\n");
197 printf(" -p Parse and display a pre-built boot image\n");
200 printf(" when parsing the boot image\n");
406 * Encrypt image buffer using AES-256-CBC scheme.
407 * The resulting image is saved into opts.sec_opts->encrypted_image
408 * and the adjusted image size into opts.sec_opts->enc_image_sz
409 * First AES_BLOCK_SZ bytes of the output image contain IV
461 /* The output image has to include extra space for IV
463 * The input image buffer has to be already aligned to AES_BLOCK_SZ
470 fprintf(stderr, "Failed to allocate encrypted image!\n");
474 /* Put IV into the output buffer next to the encrypted image
485 fprintf(stderr, "Failed to encrypt the image! Error %d\n",
492 /* Try to decrypt the image and compare it with the original data */
499 fprintf(stderr, "Failed to allocate test image!d\n");
511 fprintf(stderr, "Failed to decrypt the image! Error %d\n",
518 fprintf(stderr, "Failed to compare the image after");
536 * Verify CSK array, header and image signatures and print results
547 uint8_t *image = (uint8_t *)main_hdr + main_hdr->prolog_size;
573 image, main_hdr->boot_image_size,
957 * (image and header signature fields are still empty)
980 * Make final changes to secure extension - calculate image and header
981 * signatures and encrypt the image if needed.
982 * The main header checksum and image size fields updated accordingly
987 * image_buf buffer containing the input binary image
988 * image_size image buffer size.
1027 /* Encrypt the image if needed */
1028 fprintf(stdout, "Encrypting the image...\n");
1031 fprintf(stderr, "Failed to encrypt the image!\n");
1036 * This way the image could be verified by the BootROM
1047 /* Create the image signature first, since it will be later
1056 fprintf(stderr, "Failed to sign image!\n");
1059 /* Check that the image signature is correct */
1066 fprintf(stderr, "Failed to verify image signature!\n");
1192 do_print_field(0, "image signature",
1210 do_print_field(0, "binary image", base, ext_hdr->size, FMT_NONE);
1266 "\n################### Boot image ######################\n");
1268 do_print_field(0, "boot image", base, size - base - 4, FMT_NONE);
1300 /* boot image checksum */
1397 /* Write image */
1465 * Write the image prolog, i.e.
1565 fprintf(stderr, "Error: Failed to write boot image\n");
1682 * Always align the image to 16 byte boundary
1698 /* Parse the input image and leave */