| Commit message (Collapse) | Author | Age |
| |
|
|
|
|
| |
Factor all printf method with a unique one defined in misc.h
Change-Id: I58fbf8916b76e873a2e6678506d2c8aece7834ec
|
| |
|
|
|
|
|
| |
The code used printf instead of the provided printf functions,
resulting in strange output.
Change-Id: I2c7c2531d8d54ecdea97e8c189d18d351320ca7d
|
| |
|
|
|
|
|
| |
Factor common elf/sb read/write/printf routines. Factor sb zero
key, move sb version guess.
Change-Id: I5ae1885587456736e782e623610281bbee545039
|
| |
|
|
| |
Change-Id: I17daaff068fcd3a8c70c52db5fa209082461173f
|
| |
|
|
| |
Change-Id: I6c8e5f3faf04741e4a13c1e705e9e869ccf8cfec
|
| |
|
|
|
|
|
|
|
| |
In the case of encrypted SB files without any key match, it is
still possible to dump the section headers. The force option
allows one to do so. It also allows to dump unencrypted sections
of encrypted files if there are some.
Change-Id: I36280230679ac5903f9c451c68c276f5c6959536
|
|
|
Change-Id: I0d8d6831b35037725486f61fc363de87bc8ba92e
|