X-Git-Url: http://review.tizen.org/git/?a=blobdiff_plain;f=include%2Ffsl_validate.h;h=252d499e7b1a5c705ac6ae24621f42274279d943;hb=f9a48654ee70fbad29f487d074fd36a1548b4209;hp=452c6df83f25587b9d4eea82d42165d9adaaebc6;hpb=7d67bb1daf2daae7bce49147494f8c45001e76b1;p=platform%2Fkernel%2Fu-boot.git diff --git a/include/fsl_validate.h b/include/fsl_validate.h index 452c6df..252d499 100644 --- a/include/fsl_validate.h +++ b/include/fsl_validate.h @@ -1,7 +1,6 @@ +/* SPDX-License-Identifier: GPL-2.0+ */ /* * Copyright 2015 Freescale Semiconductor, Inc. - * - * SPDX-License-Identifier: GPL-2.0+ */ #ifndef _FSL_VALIDATE_H_ @@ -9,9 +8,10 @@ #include #include -#include #include +struct cmd_tbl; + #define WORD_SIZE 4 /* Minimum and maximum size of RSA signature length in bits */ @@ -213,7 +213,7 @@ struct fsl_secboot_sg_table { /* ESBC global structure. * Data to be used across verification of different images. - * Stores follwoing Data: + * Stores following Data: * IE Table */ struct fsl_secboot_glb { @@ -262,15 +262,14 @@ struct fsl_secboot_img_priv { uint32_t img_size; /* ESBC Image Size */ }; -int do_esbc_halt(cmd_tbl_t *cmdtp, int flag, int argc, - char * const argv[]); +int do_esbc_halt(struct cmd_tbl *cmdtp, int flag, int argc, char *const argv[]); int fsl_secboot_validate(uintptr_t haddr, char *arg_hash_str, uintptr_t *img_addr_ptr); -int fsl_secboot_blob_encap(cmd_tbl_t *cmdtp, int flag, int argc, - char * const argv[]); -int fsl_secboot_blob_decap(cmd_tbl_t *cmdtp, int flag, int argc, - char * const argv[]); +int fsl_secboot_blob_encap(struct cmd_tbl *cmdtp, int flag, int argc, + char *const argv[]); +int fsl_secboot_blob_decap(struct cmd_tbl *cmdtp, int flag, int argc, + char *const argv[]); int fsl_check_boot_mode_secure(void); int fsl_setenv_chain_of_trust(void);