@@ -76,7 +76,7 @@ static int fit_image_setup_decrypt(struct image_cipher_info *info,
char *algo_name;
int ret;
- node_name = fit_get_name(fit, image_noffset, NULL);
+ node_name = fit_get_name(fit, image_noffset);
if (!node_name) {
printf("Can't get node name\n");
return -1;
@@ -145,7 +145,7 @@ static int fit_image_verify_sig(const void *fit, int image_noffset,
/* Process all hash subnodes of the component image node */
fdt_for_each_subnode(noffset, fit, image_noffset) {
- const char *name = fit_get_name(fit, noffset, NULL);
+ const char *name = fit_get_name(fit, noffset);
/*
* We don't support this since libfdt considers names with the
@@ -178,8 +178,8 @@ static int fit_image_verify_sig(const void *fit, int image_noffset,
error:
printf(" error!\n%s for '%s' hash node in '%s' image node\n",
- err_msg, fit_get_name(fit, noffset, NULL),
- fit_get_name(fit, image_noffset, NULL));
+ err_msg, fit_get_name(fit, noffset),
+ fit_get_name(fit, image_noffset));
return -1;
}
@@ -212,7 +212,7 @@ int fit_image_verify_required_sigs(const void *fit, int image_noffset,
key_blob, noffset);
if (ret) {
printf("Failed to verify required signature '%s'\n",
- fit_get_name(key_blob, noffset, NULL));
+ fit_get_name(key_blob, noffset));
return ret;
}
verify_count++;
@@ -277,10 +277,10 @@ static int fit_config_check_sig(const void *fit, int noffset, int conf_noffset,
char path[200];
int count;
- config_name = fit_get_name(fit, conf_noffset, NULL);
+ config_name = fit_get_name(fit, conf_noffset);
debug("%s: fdt=%p, conf='%s', sig='%s'\n", __func__, key_blob,
- fit_get_name(fit, noffset, NULL),
- fit_get_name(key_blob, required_keynode, NULL));
+ fit_get_name(fit, noffset),
+ fit_get_name(key_blob, required_keynode));
*err_msgp = NULL;
if (fit_image_setup_verify(&info, fit, noffset, key_blob,
required_keynode, err_msgp))
@@ -421,7 +421,7 @@ static int fit_config_verify_key(const void *fit, int conf_noffset,
/* Process all hash subnodes of the component conf node */
fdt_for_each_subnode(noffset, fit, conf_noffset) {
- const char *name = fit_get_name(fit, noffset, NULL);
+ const char *name = fit_get_name(fit, noffset);
if (!strncmp(name, FIT_SIG_NODENAME,
strlen(FIT_SIG_NODENAME))) {
@@ -448,8 +448,8 @@ static int fit_config_verify_key(const void *fit, int conf_noffset,
error:
printf(" error!\n%s for '%s' hash node in '%s' config node\n",
- err_msg, fit_get_name(fit, noffset, NULL),
- fit_get_name(fit, conf_noffset, NULL));
+ err_msg, fit_get_name(fit, noffset),
+ fit_get_name(fit, conf_noffset));
return -EPERM;
}
@@ -469,7 +469,7 @@ error:
static int fit_config_verify_required_keys(const void *fit, int conf_noffset,
const void *key_blob)
{
- const char *name = fit_get_name(fit, conf_noffset, NULL);
+ const char *name = fit_get_name(fit, conf_noffset);
int noffset;
int key_node;
int verified = 0;
@@ -525,7 +525,7 @@ static int fit_config_verify_required_keys(const void *fit, int conf_noffset,
if (ret) {
if (reqd_policy_all) {
printf("Failed to verify required signature '%s'\n",
- fit_get_name(key_blob, noffset, NULL));
+ fit_get_name(key_blob, noffset));
return ret;
}
} else {
@@ -148,7 +148,7 @@ static void fit_get_debug(const void *fit, int noffset,
char *prop_name, int err)
{
debug("Can't get '%s' property from FIT 0x%08lx, node: offset %d, name %s (%s)\n",
- prop_name, (ulong)fit, noffset, fit_get_name(fit, noffset, NULL),
+ prop_name, (ulong)fit, noffset, fit_get_name(fit, noffset),
fdt_strerror(err));
}
@@ -205,8 +205,7 @@ static void fit_image_print_data(const void *fit, int noffset, const char *p,
bool required;
int ret, i;
- debug("%s %s node: '%s'\n", p, type,
- fit_get_name(fit, noffset, NULL));
+ debug("%s %s node: '%s'\n", p, type, fit_get_name(fit, noffset));
printf("%s %s algo: ", p, type);
if (fit_image_hash_get_algo(fit, noffset, &algo)) {
printf("invalid/unsupported\n");
@@ -271,7 +270,7 @@ static void fit_image_print_verification_data(const void *fit, int noffset,
* Multiple hash/signature nodes require unique unit node
* names, e.g. hash-1, hash-2, signature-1, signature-2, etc.
*/
- name = fit_get_name(fit, noffset, NULL);
+ name = fit_get_name(fit, noffset);
if (!strncmp(name, FIT_HASH_NODENAME, strlen(FIT_HASH_NODENAME))) {
fit_image_print_data(fit, noffset, p, "Hash");
} else if (!strncmp(name, FIT_SIG_NODENAME,
@@ -436,7 +435,7 @@ void fit_print_contents(const void *fit)
* i.e. component image node.
*/
printf("%s Image %u (%s)\n", p, count++,
- fit_get_name(fit, noffset, NULL));
+ fit_get_name(fit, noffset));
fit_image_print(fit, noffset, p);
}
@@ -466,7 +465,7 @@ void fit_print_contents(const void *fit)
* i.e. configuration node.
*/
printf("%s Configuration %u (%s)\n", p, count++,
- fit_get_name(fit, noffset, NULL));
+ fit_get_name(fit, noffset));
fit_conf_print(fit, noffset, p);
}
@@ -1215,7 +1214,7 @@ int fit_set_timestamp(void *fit, int noffset, time_t timestamp)
sizeof(uint32_t));
if (ret) {
debug("Can't set '%s' property for '%s' node (%s)\n",
- FIT_TIMESTAMP_PROP, fit_get_name(fit, noffset, NULL),
+ FIT_TIMESTAMP_PROP, fit_get_name(fit, noffset),
fdt_strerror(ret));
return ret == -FDT_ERR_NOSPACE ? -ENOSPC : -1;
}
@@ -1352,7 +1351,7 @@ int fit_image_verify_with_data(const void *fit, int image_noffset,
/* Process all hash subnodes of the component image node */
fdt_for_each_subnode(noffset, fit, image_noffset) {
- const char *name = fit_get_name(fit, noffset, NULL);
+ const char *name = fit_get_name(fit, noffset);
/*
* Check subnode name, must be equal to "hash".
@@ -1393,8 +1392,8 @@ int fit_image_verify_with_data(const void *fit, int image_noffset,
error:
printf(" error!\n%s for '%s' hash node in '%s' image node\n",
- err_msg, fit_get_name(fit, noffset, NULL),
- fit_get_name(fit, image_noffset, NULL));
+ err_msg, fit_get_name(fit, noffset),
+ fit_get_name(fit, image_noffset));
return 0;
}
@@ -1413,7 +1412,7 @@ error:
*/
int fit_image_verify(const void *fit, int image_noffset)
{
- const char *name = fit_get_name(fit, image_noffset, NULL);
+ const char *name = fit_get_name(fit, image_noffset);
const void *data;
size_t size;
char *err_msg = "";
@@ -1437,7 +1436,7 @@ int fit_image_verify(const void *fit, int image_noffset)
err:
printf("error!\n%s in '%s' image node\n", err_msg,
- fit_get_name(fit, image_noffset, NULL));
+ fit_get_name(fit, image_noffset));
return 0;
}
@@ -1480,7 +1479,7 @@ int fit_all_image_verify(const void *fit)
* i.e. component image node.
*/
printf(" Hash(es) for Image %u (%s): ", count,
- fit_get_name(fit, noffset, NULL));
+ fit_get_name(fit, noffset));
count++;
if (!fit_image_verify(fit, noffset))
@@ -2127,7 +2126,7 @@ static int select_from_config(const void *fit, struct bootm_headers *images,
return -ENOPKG;
}
- *fit_unamep = fit_get_name(fit, noffset, NULL);
+ *fit_unamep = fit_get_name(fit, noffset);
return noffset;
}
@@ -2639,7 +2638,7 @@ int boot_get_fdt_fit(struct bootm_headers *images, ulong addr,
if (i < count) {
noffset = fit_conf_get_prop_node_index(fit, cfg_noffset,
FIT_FDT_PROP, i);
- uname = fit_get_name(fit, noffset, NULL);
+ uname = fit_get_name(fit, noffset);
uconfig = NULL;
} else {
if (!next_config)
@@ -255,7 +255,7 @@ static int load_simple_fit(struct spl_load_info *info, ulong fit_offset,
if (fit_image_get_load(fit, node, &load_addr)) {
if (!image_info->load_addr) {
printf("Can't load %s: No load address and no buffer\n",
- fit_get_name(fit, node, NULL));
+ fit_get_name(fit, node));
return -ENOBUFS;
}
load_addr = image_info->load_addr;
@@ -281,7 +281,7 @@ static int load_simple_fit(struct spl_load_info *info, ulong fit_offset,
/* Dont bother to copy 0 byte data, but warn, though */
if (!len) {
log_warning("%s: Skip load '%s': image size is 0!\n",
- __func__, fit_get_name(fit, node, NULL));
+ __func__, fit_get_name(fit, node));
return 0;
}
@@ -318,7 +318,7 @@ static int load_simple_fit(struct spl_load_info *info, ulong fit_offset,
if (CONFIG_IS_ENABLED(FIT_SIGNATURE)) {
printf("## Checking hash(es) for Image %s ... ",
- fit_get_name(fit, node, NULL));
+ fit_get_name(fit, node));
if (!fit_image_verify_with_data(fit, node, gd_fdt_blob(), src,
length))
return -EPERM;
@@ -489,12 +489,12 @@ static int spl_fit_append_fdt(struct spl_image_info *spl_image,
(void *)image_info.load_addr);
if (ret) {
pr_err("failed to apply DT overlay %s\n",
- fit_get_name(ctx->fit, node, NULL));
+ fit_get_name(ctx->fit, node));
break;
}
debug("%s: DT overlay %s applied\n", __func__,
- fit_get_name(ctx->fit, node, NULL));
+ fit_get_name(ctx->fit, node));
}
free(tmpbuffer);
if (ret)
@@ -720,7 +720,7 @@ static int spl_simple_fit_parse(struct spl_fit_info *ctx)
if (IS_ENABLED(CONFIG_SPL_FIT_SIGNATURE)) {
printf("## Checking hash(es) for config %s ... ",
- fit_get_name(ctx->fit, ctx->conf_node, NULL));
+ fit_get_name(ctx->fit, ctx->conf_node));
if (fit_config_verify(ctx->fit, ctx->conf_node))
return -EPERM;
puts("OK\n");
@@ -278,7 +278,7 @@ got_update_file:
if (ndepth != 1)
goto next_node;
- fit_image_name = (char *)fit_get_name(fit, noffset, NULL);
+ fit_image_name = (char *)fit_get_name(fit, noffset);
printf("Processing update '%s' :", fit_image_name);
if (!fit_image_verify(fit, noffset)) {
@@ -354,7 +354,7 @@ int fit_update(const void *fit)
if (ndepth != 1)
goto next_node;
- fit_image_name = (char *)fit_get_name(fit, noffset, NULL);
+ fit_image_name = (char *)fit_get_name(fit, noffset);
printf("Processing update '%s' :", fit_image_name);
if (!fit_image_verify(fit, noffset)) {
@@ -613,7 +613,7 @@ static int first_loading_rbf_to_buffer(struct udevice *dev,
images_noffset = fit_conf_get_prop_node_index(buffer_p,
confs_noffset,
FIT_FPGA_PROP, i);
- uname = fit_get_name(buffer_p, images_noffset, NULL);
+ uname = fit_get_name(buffer_p, images_noffset);
if (uname) {
debug("FPGA: %s\n", uname);
@@ -1225,15 +1225,15 @@ ulong fit_get_end(const void *fit);
/**
* fit_get_name - get FIT node name
* @fit: pointer to the FIT format image header
+ * @noffset: node offset
*
* returns:
* NULL, on error
* pointer to node name, on success
*/
-static inline const char *fit_get_name(const void *fit_hdr,
- int noffset, int *len)
+static inline const char *fit_get_name(const void *fit_hdr, int noffset)
{
- return fdt_get_name(fit_hdr, noffset, len);
+ return fdt_get_name(fit_hdr, noffset, NULL);
}
/**
@@ -972,7 +972,7 @@ static int fit_extract_contents(void *ptr, struct imgtool *itl)
*/
if (itl->pflag == count) {
printf("Extracted:\n%s Image %u (%s)\n", p,
- count, fit_get_name(fit, noffset, NULL));
+ count, fit_get_name(fit, noffset));
fit_image_print(fit, noffset, p);
@@ -98,7 +98,7 @@ int main(int argc, char **argv)
exit(EXIT_FAILURE);
}
- printf("NAME: %s\n", fit_get_name(fit_blob, nodeoffset, NULL));
+ printf("NAME: %s\n", fit_get_name(fit_blob, nodeoffset));
printf("LEN: %d\n", len);
printf("OFF: %d\n", (int)(nodep - fit_blob));
(void) munmap((void *)fit_blob, fsbuf.st_size);
@@ -46,7 +46,7 @@ static int fit_set_hash_value(void *fit, int noffset, uint8_t *value,
ret = fdt_setprop(fit, noffset, FIT_VALUE_PROP, value, value_len);
if (ret) {
fprintf(stderr, "Can't set hash '%s' property for '%s' node(%s)\n",
- FIT_VALUE_PROP, fit_get_name(fit, noffset, NULL),
+ FIT_VALUE_PROP, fit_get_name(fit, noffset),
fdt_strerror(ret));
return ret == -FDT_ERR_NOSPACE ? -ENOSPC : -EIO;
}
@@ -76,7 +76,7 @@ static int fit_image_process_hash(void *fit, const char *image_name,
const char *algo;
int ret;
- node_name = fit_get_name(fit, noffset, NULL);
+ node_name = fit_get_name(fit, noffset);
if (fit_image_hash_get_algo(fit, noffset, &algo)) {
fprintf(stderr,
@@ -176,7 +176,7 @@ static int fit_image_setup_sig(struct image_sign_info *info,
const char *node_name;
const char *padding_name;
- node_name = fit_get_name(fit, noffset, NULL);
+ node_name = fit_get_name(fit, noffset);
if (!algo_name) {
if (fit_image_hash_get_algo(fit, noffset, &algo_name)) {
fprintf(stderr,
@@ -247,7 +247,7 @@ static int fit_image_process_sig(const char *keydir, const char *keyfile,
engine_id, algo_name))
return -1;
- node_name = fit_get_name(fit, noffset, NULL);
+ node_name = fit_get_name(fit, noffset);
region.data = data;
region.size = size;
ret = info.crypto->sign(&info, ®ion, 1, &value, &value_len);
@@ -585,7 +585,7 @@ int fit_image_cipher_data(const char *keydir, void *keydest,
int cipher_node_offset, len;
/* Get image name */
- image_name = fit_get_name(fit, image_noffset, NULL);
+ image_name = fit_get_name(fit, image_noffset);
if (!image_name) {
fprintf(stderr, "Can't get image name\n");
return -1;
@@ -677,7 +677,7 @@ int fit_image_add_verification_data(const char *keydir, const char *keyfile,
return -1;
}
- image_name = fit_get_name(fit, image_noffset, NULL);
+ image_name = fit_get_name(fit, image_noffset);
/* Process all hash subnodes of the component image node */
for (noffset = fdt_first_subnode(fit, image_noffset);
@@ -691,7 +691,7 @@ int fit_image_add_verification_data(const char *keydir, const char *keyfile,
* Multiple hash nodes require unique unit node
* names, e.g. hash-1, hash-2, signature-1, etc.
*/
- node_name = fit_get_name(fit, noffset, NULL);
+ node_name = fit_get_name(fit, noffset);
if (!strncmp(node_name, FIT_HASH_NODENAME,
strlen(FIT_HASH_NODENAME))) {
ret = fit_image_process_hash(fit, image_name, noffset,
@@ -809,7 +809,7 @@ static int fit_config_add_hash(const void *fit, int image_noffset,
for (noffset = fdt_first_subnode(fit, image_noffset);
noffset >= 0;
noffset = fdt_next_subnode(fit, noffset)) {
- const char *name = fit_get_name(fit, noffset, NULL);
+ const char *name = fit_get_name(fit, noffset);
if (strncmp(name, FIT_HASH_NODENAME,
strlen(FIT_HASH_NODENAME)))
@@ -884,8 +884,8 @@ static int fit_config_get_hash_list(const void *fit, int conf_noffset,
int image_count;
int ret, len;
- conf_name = fit_get_name(fit, conf_noffset, NULL);
- sig_name = fit_get_name(fit, sig_offset, NULL);
+ conf_name = fit_get_name(fit, conf_noffset);
+ sig_name = fit_get_name(fit, sig_offset);
/*
* Build a list of nodes we need to hash. We always need the root
@@ -991,8 +991,8 @@ static int fit_config_get_regions(const void *fit, int conf_noffset,
char *region_prop;
int ret, len;
- conf_name = fit_get_name(fit, conf_noffset, NULL);
- sig_name = fit_get_name(fit, sig_offset, NULL);
+ conf_name = fit_get_name(fit, conf_noffset);
+ sig_name = fit_get_name(fit, sig_offset);
debug("%s: conf='%s', sig='%s'\n", __func__, conf_name, sig_name);
/* Get a list of nodes we want to hash */
@@ -1084,7 +1084,7 @@ static int fit_config_process_sig(const char *keydir, const char *keyfile,
uint value_len;
int ret;
- node_name = fit_get_name(fit, noffset, NULL);
+ node_name = fit_get_name(fit, noffset);
if (fit_config_get_regions(fit, conf_noffset, noffset, ®ion,
®ion_count, ®ion_prop,
®ion_proplen))
@@ -1148,7 +1148,7 @@ static int fit_config_add_verification_data(const char *keydir,
const char *conf_name;
int noffset;
- conf_name = fit_get_name(fit, conf_noffset, NULL);
+ conf_name = fit_get_name(fit, conf_noffset);
/* Process all hash subnodes of the configuration node */
for (noffset = fdt_first_subnode(fit, conf_noffset);
@@ -1157,7 +1157,7 @@ static int fit_config_add_verification_data(const char *keydir,
const char *node_name;
int ret = 0;
- node_name = fit_get_name(fit, noffset, NULL);
+ node_name = fit_get_name(fit, noffset);
if (!strncmp(node_name, FIT_SIG_NODENAME,
strlen(FIT_SIG_NODENAME))) {
ret = fit_config_process_sig(keydir, keyfile, keydest,