Lines Matching +full:long +full:- +full:press +full:- +full:ms
1 // SPDX-License-Identifier: GPL-2.0+
15 #include <u-boot/sha256.h>
35 * Use a "constant-length" time compare function for this
38 * https://crackstation.net/hashing-security.htm
78 * We don't know how long the stop-string is, so we need to in passwd_abort()
152 for (i = 0; i < presskey_max - 1; i++) in passwd_abort()
162 memcmp(presskey + presskey_len - in passwd_abort()
183 * returns: 0 - no key string, allow autoboot 1 - got key string, abort
214 unsigned long ts; in __abortboot()
225 if (tstc()) { /* we got a key press */ in __abortboot()
232 --bootdelay; in __abortboot()
233 /* delay 1000 ms */ in __abortboot()
236 if (tstc()) { /* we got a key press */ in __abortboot()
267 gd->flags &= ~GD_FLG_SILENT; in abortboot()
279 addr = fdtdec_get_config_int(gd->fdt_blob, "kernel-offset", 0); in process_fdt_options()
284 addr = fdtdec_get_config_int(gd->fdt_blob, "rootdisk-offset", 0); in process_fdt_options()
301 bootdelay = fdtdec_get_config_int(gd->fdt_blob, "bootdelay", in bootdelay_process()
313 if (gd->flags & GD_FLG_POSTFAIL) { in bootdelay_process()
322 process_fdt_options(gd->fdt_blob); in bootdelay_process()
332 if (stored_bootdelay != -1 && s && !abortboot(stored_bootdelay)) { in autoboot_command()
337 run_command_list(s, -1, 0); in autoboot_command()
348 run_command_list(s, -1, 0); in autoboot_command()