summaryrefslogtreecommitdiff
path: root/common/cmd_bootm.c
diff options
context:
space:
mode:
authorSimon Glass <sjg@chromium.org>2013-05-07 06:11:57 +0000
committerTom Rini <trini@ti.com>2013-05-14 15:37:25 -0400
commitb8da8366500f7a88f1f5117f22f713fe920bcdd9 (patch)
tree1d318bff195eba6aa99b7cde7758c3f3641b2f38 /common/cmd_bootm.c
parentb7260910dca95b8a608d3721e0584484e887d756 (diff)
downloadu-boot-imx-b8da8366500f7a88f1f5117f22f713fe920bcdd9.zip
u-boot-imx-b8da8366500f7a88f1f5117f22f713fe920bcdd9.tar.gz
u-boot-imx-b8da8366500f7a88f1f5117f22f713fe920bcdd9.tar.bz2
image: Rename fit_image_check_hashes() to fit_image_verify()
This is the main entry point to the FIT image verification code. We will be using it to handle image verification with signatures, so rename the function. Signed-off-by: Simon Glass <sjg@chromium.org> Reviewed-by: Marek Vasut <marex@denx.de>
Diffstat (limited to 'common/cmd_bootm.c')
-rw-r--r--common/cmd_bootm.c4
1 files changed, 2 insertions, 2 deletions
diff --git a/common/cmd_bootm.c b/common/cmd_bootm.c
index 7438469..aa717bf 100644
--- a/common/cmd_bootm.c
+++ b/common/cmd_bootm.c
@@ -815,7 +815,7 @@ static int fit_check_kernel(const void *fit, int os_noffset, int verify)
if (verify) {
puts(" Verifying Hash Integrity ... ");
- if (!fit_image_check_hashes(fit, os_noffset)) {
+ if (!fit_image_verify(fit, os_noffset)) {
puts("Bad Data Hash\n");
bootstage_error(BOOTSTAGE_ID_FIT_CHECK_HASH);
return 0;
@@ -1169,7 +1169,7 @@ static int image_info(ulong addr)
fit_print_contents(hdr);
- if (!fit_all_image_check_hashes(hdr)) {
+ if (!fit_all_image_verify(hdr)) {
puts("Bad hash in FIT image!\n");
return 1;
}