e has extended PCR's, PCR0
would not be 0. So, read the PCR0 to determine if the PCR's need
to be extended as eventlog is parsed or not.
Signed-off-by: Ruchika Gupta
Reviewed-by: Ilias Apalodimas
Tested-by: Ilias Apalodimas
---
v8:
Addressed issues reported by cppcheck
v7:
Addre
The current tpm2_pcr_read is hardcoded using SHA256. Make the
actual command to TPM configurable to use wider range of algorithms.
The current command line is kept as is i.e limited to SHA-256 only.
Signed-off-by: Ruchika Gupta
Reviewed-by: Ilias Apalodimas
---
v8: No change
v7: No change
v6
to check if even log has been passed to u-boot
from earlier firmware components. If available, the eventlog is parsed
to check for its correctness and further event logs are appended to the
passed log.
Signed-off-by: Ruchika Gupta
Reviewed-by: Ilias Apalodimas
Tested-by: Ilias Apalodimas
---
v8
e has extended PCR's, PCR0
would not be 0. So, read the PCR0 to determine if the PCR's need
to be extended as eventlog is parsed or not.
Signed-off-by: Ruchika Gupta
Reviewed-by: Ilias Apalodimas
Tested-by: Ilias Apalodimas
---
v7:
Addressed Heinrick's comments - Added missing p
The current tpm2_pcr_read is hardcoded using SHA256. Make the
actual command to TPM configurable to use wider range of algorithms.
The current command line is kept as is i.e limited to SHA-256 only.
Signed-off-by: Ruchika Gupta
Reviewed-by: Ilias Apalodimas
---
v7: No change
v6: No change
v5
to check if even log has been passed to u-boot
from earlier firmware components. If available, the eventlog is parsed
to check for its correctness and further event logs are appended to the
passed log.
Signed-off-by: Ruchika Gupta
---
v7:
Addressed Heinrich's comments
Changed function
Hi Heinrich,
On Fri, 26 Nov 2021 at 13:01, Heinrich Schuchardt
wrote:
> On 11/26/21 06:00, Ruchika Gupta wrote:
> > Platforms may have support to measure their initial firmware components
> > and pass the event log to u-boot. The event log address can be passed
e has extended PCR's, PCR0
would not be 0. So, read the PCR0 to determine if the PCR's need
to be extended as eventlog is parsed or not.
Signed-off-by: Ruchika Gupta
Reviewed-by: Ilias Apalodimas
Tested-by: Ilias Apalodimas
---
v6: Changed TPM2_DIGEST_LEN to TPM2_SHA512_DIGEST_SIZE
v5
The current tpm2_pcr_read is hardcoded using SHA256. Make the
actual command to TPM configurable to use wider range of algorithms.
The current command line is kept as is i.e limited to SHA-256 only.
Signed-off-by: Ruchika Gupta
Reviewed-by: Ilias Apalodimas
---
v6: No change
v5: No change
v4
to check if even log has been passed to u-boot
from earlier firmware components. If available, the eventlog is parsed
to check for its correctness and further event logs are appended to the
passed log.
Signed-off-by: Ruchika Gupta
Tested-by: Ilias Apalodimas
Reviewed-by: Ilias Apalodimas
---
v6
The current tpm2_pcr_read is hardcoded using SHA256. Make the
actual command to TPM configurable to use wider range of algorithms.
The current command line is kept as is i.e limited to SHA-256 only.
Signed-off-by: Ruchika Gupta
Reviewed-by: Ilias Apalodimas
---
v5: No change
v4: No change
v3
e has extended PCR's, PCR0
would not be 0. So, read the PCR0 to determine if the PCR's need
to be extended as eventlog is parsed or not.
Signed-off-by: Ruchika Gupta
Reviewed-by: Ilias Apalodimas
---
v5 : No change
v4 : No change
v3 :
Rebase changes on top of changes made in first patc
to check if even log has been passed to u-boot
from earlier firmware components. If available, the eventlog is parsed
to check for its correctness and further event logs are appended to the
passed log.
Signed-off-by: Ruchika Gupta
---
v5:
Shift the efi_init_event_log() to a different location in
e has extended PCR's, PCR0
would not be 0. So, read the PCR0 to determine if the PCR's need
to be extended as eventlog is parsed or not.
Signed-off-by: Ruchika Gupta
Reviewed-by: Ilias Apalodimas
---
v4 : No change
v3 :
Rebase changes on top of changes made in first patch of series
The current tpm2_pcr_read is hardcoded using SHA256. Make the
actual command to TPM configurable to use wider range of algorithms.
The current command line is kept as is i.e limited to SHA-256 only.
Signed-off-by: Ruchika Gupta
Reviewed-by: Ilias Apalodimas
---
v4: No change
v3: No change
v2
to check if even log has been passed to u-boot
from earlier firmware components. If available, the eventlog is parsed
to check for its correctness and further event logs are appended to the
passed log.
Signed-off-by: Ruchika Gupta
---
v4:
Add SCRTM version to log only if previous firmware doesn;t
Hi Kojima-san,
On Wed, 24 Nov 2021 at 13:08, Masahisa Kojima
wrote:
> Hi Ruchika, Ilias,
>
> On Tue, 23 Nov 2021 at 20:53, Ruchika Gupta
> wrote:
> >
> > Platforms may have support to measure their initial firmware components
> > and pass the event log to u-boot
Hi Ilias,
On Wed, 24 Nov 2021 at 12:34, Ilias Apalodimas
wrote:
> Hi Ruchika,
> > +
>
> [...]
>
> > + ret = platform_get_eventlog(dev, &base, &sz);
> > + if (ret == EFI_SUCCESS) {
>
> Can we invert the logic here?
> if (ret != EFI_SUCCESS)
> return ret;
>
> etc...
>
Change posted
e has extended PCR's, PCR0
would not be 0. So, read the PCR0 to determine if the PCR's need
to be extended as eventlog is parsed or not.
Signed-off-by: Ruchika Gupta
---
v3 :
Rebase changes on top of changes made in first patch of series
v2 :
Removed check for PCR0 in eventlog
The current tpm2_pcr_read is hardcoded using SHA256. Make the
actual command to TPM configurable to use wider range of algorithms.
The current command line is kept as is i.e limited to SHA-256 only.
Signed-off-by: Ruchika Gupta
---
v3: No change
v2:
Change algorithm from u32 to u16
Add
to check if even log has been passed to u-boot
from earlier firmware components. If available, the eventlog is parsed
to check for its correctness and further event logs are appended to the
passed log.
Signed-off-by: Ruchika Gupta
---
v3:
Return as soon as you detect error
v2:
Moved firmware
e has extended PCR's, PCR0
would not be 0. So, read the PCR0 to determine if the PCR's need
to be extended as eventlog is parsed or not.
Signed-off-by: Ruchika Gupta
---
v2 : Removed check for PCR0 in eventlog
lib/efi_loader/efi_tcg2.c | 77 +++
1 f
The current tpm2_pcr_read is hardcoded using SHA256. Make the
actual command to TPM configurable to use wider range of algorithms.
The current command line is kept as is i.e limited to SHA-256 only.
Signed-off-by: Ruchika Gupta
---
v2:
Change algorithm from u32 to u16
Add parameter description
to check if even log has been passed to u-boot
from earlier firmware components. If available, the eventlog is parsed
to check for its correctness and further event logs are appended to the
passed log.
Signed-off-by: Ruchika Gupta
---
v2:
Moved firmware eventlog code parsing to
e has extended PCR's, PCR0
would not be 0. So, read the PCR0 to determine if the PCR's need
to be extended as eventlog is parsed or not.
Signed-off-by: Ruchika Gupta
---
v2 : Removed check for PCR0 in eventlog
lib/efi_loader/efi_tcg2.c | 77 +++
1 f
The current tpm2_pcr_read is hardcoded using SHA256. Make the
actual command to TPM configurable to use wider range of algorithms.
The current command line is kept as is i.e limited to SHA-256 only.
Signed-off-by: Ruchika Gupta
---
v2:
Change algorithm from u32 to u16
Add parameter description
to check if even log has been passed to u-boot
from earlier firmware components. If available, the eventlog is parsed
to check for its correctness and further event logs are appended to the
passed log.
Signed-off-by: Ruchika Gupta
---
v2:
Moved firmware eventlog code parsing to
Please ignore this patch. Sent by mistake.
On Thu, 18 Nov 2021 at 11:48, Ruchika Gupta
wrote:
> ---
> lib/efi_loader/efi_tcg2.c | 90 ++-
> 1 file changed, 61 insertions(+), 29 deletions(-)
>
> diff --git a/lib/efi_loader/efi_tcg2.c b/lib/efi_
R0 to determine if the
previous firmwares have extended the PCR0. If not, then extend
the PCR's as the eventlog is parsed.
Signed-off-by: Ruchika Gupta
---
lib/efi_loader/efi_tcg2.c | 86 +++
1 file changed, 86 insertions(+)
diff --git a/lib/efi_loader/ef
The current tpm2_pcr_read is hardcoded using SHA256. Make the
actual command to TPM configurable to use wider range of algorithms.
The current command line is kept as is i.e limited to SHA-256 only.
Signed-off-by: Ruchika Gupta
---
cmd/tpm-v2.c | 3 ++-
include/tpm-v2.h | 3 ++-
lib/tpm
---
lib/efi_loader/efi_tcg2.c | 90 ++-
1 file changed, 61 insertions(+), 29 deletions(-)
diff --git a/lib/efi_loader/efi_tcg2.c b/lib/efi_loader/efi_tcg2.c
index 189e4a5ba5..215f4b2b04 100644
--- a/lib/efi_loader/efi_tcg2.c
+++ b/lib/efi_loader/efi_tcg2.c
@@ -
to check if even log has been passed to u-boot
from earlier firmware components. If available, the eventlog is parsed
to check for its correctness and further event logs are appended to the
passed log.
Signed-off-by: Ruchika Gupta
---
lib/efi_loader/efi_tcg2.c | 312
ID event creation.
Similarly, the algorithm array in spec ID event should be a variable
length array with length being equal to the number_of_algorithms field.
In current implementation this is defined as a fixed length array
which has been fixed.
Signed-off-by: Ruchika Gupta
CC: Masahisa Kojima
Enable support to compile OPTEE driver, access AVB TA
and RPMB API's access via RPC from OPTEE for lx2160
Signed-off-by: Ruchika Gupta
---
configs/lx2160ardb_tfa_defconfig | 5 +
1 file changed, 5 insertions(+)
diff --git a/configs/lx2160ardb_tfa_defconfig b/co
Add OPTEE node in lx2 device tree to enable access of
OPTEE TA's from u-boot.
Signed-off-by: Ruchika Gupta
---
arch/arm/dts/fsl-lx2160a.dtsi | 7 +++
1 file changed, 7 insertions(+)
diff --git a/arch/arm/dts/fsl-lx2160a.dtsi b/arch/arm/dts/fsl-lx2160a.dtsi
index 42ce4379ec..f0306
lue - read persistent values on rpmb via OPTEE AVB TA
optee_rpmb write_pvalue - write persistent values on rpmb via OPTEE AVB TA
Signed-off-by: Ruchika Gupta
---
cmd/Kconfig | 16 +++
cmd/Makefile | 1 +
cmd/optee_rpmb.c | 269 +++
3 files ch
ng of random number generation function
has been removed
Signed-off-by: Ruchika Gupta
---
Changes from v1:
Removed unused variable rand from the sec_firmware_support_hwrng function
arch/arm/cpu/armv8/fsl-layerscape/fdt.c | 4 ++--
arch/arm/cpu/armv8/sec_firmware.c | 6 +++---
2 files chang
ng of random number generation function
has been removed
Signed-off-by: Ruchika Gupta
---
arch/arm/cpu/armv8/fsl-layerscape/fdt.c | 4 ++--
arch/arm/cpu/armv8/sec_firmware.c | 5 +++--
2 files changed, 5 insertions(+), 4 deletions(-)
diff --git a/arch/arm/cpu/armv8/fsl-layerscape/fdt.c
b
>-Original Message-
>From: Bryan O'Donoghue [mailto:bryan.odonog...@linaro.org]
>Sent: Friday, January 26, 2018 5:55 PM
>To: u-boot@lists.denx.de; tr...@konsulko.com
>Cc: Peng Fan ; Fabio Estevam ;
>lukas.a...@aisec.fraunhofer.de; Bryan O'Donoghue
>; Alex
kASLR support in kernel requires a random number to be passed via
chosen/kaslr-seed propert. sec_firmware generates this random seed
which can then be passed in the device tree node.
sec_firmware reserves JR3 for it's own usage. Node for JR3 is
removed from device-tree.
Signed-off-by: Ru
kASLR support in kernel requires a random number to be passed via
chosen/kaslr-seed propert. sec_firmware generates this random seed
which can then be passed in the device tree node.
sec_firmware reserves JR3 for it's own usage. Node for JR3 is
removed from device-tree.
Signed-off-by: Ru
kASLR support in kernel requires a random number to be passed via
chosen/kaslr-seed propert. sec_firmware generates this random seed
which can then be passed in the device tree node.
sec_firmware reserves JR3 for it's own usage. Node for JR3 is
removed from device-tree.
Signed-off-by: Ru
> -Original Message-
> From: Poonam Aggrwal
> Sent: Monday, May 15, 2017 9:27 AM
> To: Ruchika Gupta ; u-boot@lists.denx.de;
> sun.y...@nxp.com; Prabhakar Kushwaha
> Cc: Ruchika Gupta
> Subject: RE: [U-Boot] [PATCH] ARMv8/sec_firmware : Update
> -Original Message-
> From: Peter Robinson [mailto:pbrobin...@gmail.com]
> Sent: Monday, May 15, 2017 6:18 PM
> To: Ruchika Gupta
> Cc: u-boot@lists.denx.de; sun.y...@nxp.com; Prabhakar Kushwaha
>
> Subject: Re: [U-Boot] [PATCH] ARMv8/sec_firmware : Update chosen/
kASLR support in kernel requires a random number to be passed via
chosen/kaslr-seed propert. sec_firmware generates this random seed
which can then be passed in the device tree node
sec_firmware reserves JR3 for it's own usage. Node for JR3 is
removed from device-tree.
Signed-off-by: Ru
> -Original Message-
> From: York Sun [mailto:york@nxp.com]
> Sent: Wednesday, April 12, 2017 9:10 PM
> To: Ruchika Gupta ; u-boot@lists.denx.de
> Cc: Vini Pillai ; Sumit Garg
> Subject: Re: [PATCH 1/3][v3] arm: ls1043ardb: Add SD secure boot target
>
>
SPL build.
Signed-off-by: Vinitha Pillai
Signed-off-by: Sumit Garg
Signed-off-by: Ruchika Gupta
---
Changes in v5:
Updated MAINTAINERS file
Changes in v4:
Removed spl_board_init from board specific file.
Changes in v3:
Resend
Changes in v2:
- Rebased patches to latest dependent patch set
CONFIG_BOOTSCRIPT_COPY_RAM is enabled to copy Bootscript from NAND
to
DDR. Offsets for Bootscript on NAND and DDR have been also defined.
Signed-off-by: Vinitha Pillai
Signed-off-by: Sumit Garg
Signed-off-by: Ruchika Gupta
---
Changes in v4:
Updated Maintainers file
Changes in v3:
Removed changes to ls1043ardb.c
strings
to reduce the size of SPL image
Signed-off-by: Vinitha Pillai-B57223
Signed-off-by: Sumit Garg
Signed-off-by: Ruchika Gupta
---
Changes in v4:
Updated Maintainers file
Changes in v3:
Moved spl_board_init function to arch/arm/cpu/armv8/fsl-layerscape/spl.c
Changes in v2:
Rebased to
> -Original Message-
> From: York Sun [mailto:york@nxp.com]
> Sent: Wednesday, April 12, 2017 9:00 PM
> To: Ruchika Gupta ; u-boot@lists.denx.de
> Cc: Vini Pillai ; Sumit Garg
> Subject: Re: [PATCH 2/3][v3] arm: ls1043ardb: Add NAND secure boot target
>
>
> -Original Message-
> From: york sun
> Sent: Tuesday, April 04, 2017 9:29 PM
> To: Ruchika Gupta ; u-boot@lists.denx.de
> Cc: Vini Pillai ; Sumit Garg
> Subject: Re: [PATCH 3/3][v3] [RESEND] arm: ls1046ardb: Add SD secure boot
> target
>
> On 04/04/2017 12
SPL build.
Signed-off-by: Vinitha Pillai
Signed-off-by: Sumit Garg
Signed-off-by: Ruchika Gupta
---
Changes in v4:
Removed spl_board_init from board specific file.
Changes in v3:
Resend
Changes in v2:
- Rebased patches to latest dependent patch set
- With the dependent path set , spl imag
CONFIG_BOOTSCRIPT_COPY_RAM is enabled to copy Bootscript from NAND
to
DDR. Offsets for Bootscript on NAND and DDR have been also defined.
Signed-off-by: Vinitha Pillai
Signed-off-by: Sumit Garg
Signed-off-by: Ruchika Gupta
---
Changes in v3:
Removed changes to ls1043ardb.c
Changes in v2:
- Rebased this patch to
strings
to reduce the size of SPL image
Signed-off-by: Vinitha Pillai-B57223
Signed-off-by: Sumit Garg
Signed-off-by: Ruchika Gupta
---
Changes in v3:
Moved spl_board_init function to arch/arm/cpu/armv8/fsl-layerscape/spl.c
Changes in v2:
Rebased to latest dependent patches: - No change
> -Original Message-
> From: york sun
> Sent: Monday, April 03, 2017 9:01 PM
> To: Ruchika Gupta ; u-boot@lists.denx.de
> Cc: Vini Pillai ; Sumit Garg
> Subject: Re: [PATCH 3/3][v3] [RESEND] arm: ls1046ardb: Add SD secure boot
> target
>
> On 04/03/2017 12
> -Original Message-
> From: york sun
> Sent: Saturday, April 01, 2017 1:44 AM
> To: Ruchika Gupta ; u-boot@lists.denx.de
> Cc: Vini Pillai ; Sumit Garg
> Subject: Re: [PATCH 3/3][v3] [RESEND] arm: ls1046ardb: Add SD secure boot
> target
>
> On 03/29/2017 07
.
- MACRO for CONFIG_BOOTSCRIPT_COPY_RAM is enabled to copy Bootscript from NAND
to
DDR. Offsets for Bootscript on NAND and DDR have been also defined.
Signed-off-by: Vinitha Pillai
Signed-off-by: Sumit Garg
Signed-off-by: Ruchika Gupta
---
Changes from v1
- Rebased this patch to the latest
-off-by: Ruchika Gupta
---
Changes from v1:
- Rebased patches to latest dependent patch set
- With the dependent path set , spl imag size increased to 94K. So
- additionally reduce the spl image size by removing the functions from
- CAAM driver that are not required in SPL flow
Dependent patch set
-off-by: Ruchika Gupta
---
Changes from v1:
- Rebased patches to latest dependent patch set
- With the dependent path set , spl imag size increased to 94K. So
- additionally reduce the spl image size by removing the functions from
- CAAM driver that are not required in SPL flow
Dependent patch set
strings
to reduce the size of SPL image
Signed-off-by: Vinitha Pillai-B57223
Signed-off-by: Sumit Garg
Signed-off-by: Ruchika Gupta
---
Changes from v1:
Rebased to latest dependent patches: - No change
Dependent patch set:
SECURE boot target addition for NOR on LS1043, LS1046
https
> -Original Message-
> From: york sun
> Sent: Saturday, March 25, 2017 10:16 PM
> To: Ruchika Gupta ; u-boot@lists.denx.de;
> prabhakar.khushw...@nxp.com
> Subject: Re: [U-Boot] [PATCH] powerpc: e6500: Lock/unlock 1 cache instead
> of L1 as init_ram
>
> On 0
Fir E6500 cores, L2 cache has been used as init_ram. L1 cache is a write
through cache on E6500.If lines are not locked in both L1 and L2 caches,
crashes are observed during secure boot. This patch locks/unlocks both L1
as well as L2 cache to prevent the crash.
Signed-off-by: Ruchika Gupta
Fir E6500 cores, L2 cache has been used as init_ram. L1 cache is a write
through cache on E6500.If lines are not locked in both L1 and L2 caches,
crashes are observed during secure boot. This patch locks/unlocks both L1
as well as L2 cache to prevent the crash.
Signed-off-by: Ruchika Gupta
strings
to reduce the size of SPL image
Signed-off-by: Vinitha Pillai-B57223
Signed-off-by: Sumit Garg
Signed-off-by: Ruchika Gupta
---
The patchset is dependent on the following patches:
https://patchwork.ozlabs.org/patch/717614/
http://patchwork.ozlabs.org/patch/724332/
http
appended to
u-boot image. So header will also be copied from SD to DDR.
- CONFIG_MAX_SPL_SIZE is limited to 90K.SPL is copied to OCRAM (128K) where 32K
are reserved for use by boot ROM and 6K for the header
Signed-off-by: Vinitha Pillai-B57223
Signed-off-by: Sumit Garg
Signed-off-by: Ruchika
CONFIG_BOOTSCRIPT_COPY_RAM is enabled to copy Bootscript from NAND
to
DDR. Offsets for Bootscript on NAND and DDR have been also defined.
Signed-off-by: Vinitha Pillai-B57223
Signed-off-by: Sumit Garg
Signed-off-by: Ruchika Gupta
---
The patchset is dependent on the following patches:
https
Ruchika Gupta (3):
arm: ls1043ardb: Add SD secure boot target
arm: ls1043ardb: Add NAND secure boot target
arm: ls1046ardb: Add SD secure boot target
arch/arm/include/asm/fsl_secure_boot.h | 16 +--
board/freescale/common/fsl_validate.c | 4 ++
board/freescale
image from the boot source.
Regards,
Ruchika
-Original Message-
From: Q.Y. Gong
Sent: Thursday, September 08, 2016 12:32 PM
To: Prabhakar Kushwaha ; york sun
; Ruchika Gupta ; u-boot@lists.denx.de
Cc: Vincent Hu
Subject: RE: [PATCH] armv8: ls1043a: Extend the size for SPL
Hi Prab
> diff --git a/drivers/crypto/fsl/Makefile b/drivers/crypto/fsl/Makefile index
> fd736cf..6d6903b 100644
> --- a/drivers/crypto/fsl/Makefile
> +++ b/drivers/crypto/fsl/Makefile
> @@ -8,3 +8,7 @@ obj-y += sec.o
> obj-$(CONFIG_FSL_CAAM) += jr.o fsl_hash.o jobdesc.o error.o
> obj-$(CONFIG_CMD_BLOB)$
> -Original Message-
> From: Aneesh Bansal [mailto:aneesh.ban...@nxp.com]
> Sent: Friday, January 22, 2016 4:37 PM
> To: u-boot@lists.denx.de
> Cc: york sun ; Ruchika Gupta
> ; Prabhakar Kushwaha
> ; Aneesh Bansal
>
> Subject: [PATCH v3 3/7] SECURE_
> -Original Message-
> From: Aneesh Bansal [mailto:aneesh.ban...@nxp.com]
> Sent: Friday, January 22, 2016 4:37 PM
> To: u-boot@lists.denx.de
> Cc: york sun ; Ruchika Gupta
> ; Prabhakar Kushwaha
> ; Aneesh Bansal
>
> Subject: [PATCH v3 6/7] enable chain of
> -Original Message-
> From: Aneesh Bansal [mailto:aneesh.ban...@nxp.com]
> Sent: Friday, January 22, 2016 4:37 PM
> To: u-boot@lists.denx.de
> Cc: york sun ; Ruchika Gupta
> ; Prabhakar Kushwaha
> ; Aneesh Bansal
>
> Subject: [PATCH v3 4/7] create function to
> -Original Message-
> From: Aneesh Bansal [mailto:aneesh.ban...@nxp.com]
> Sent: Friday, January 22, 2016 4:37 PM
> To: u-boot@lists.denx.de
> Cc: york sun ; Ruchika Gupta
> ; Prabhakar Kushwaha
> ; Aneesh Bansal
>
> Subject: [PATCH v3 7/7] SECURE_BOO
> -Original Message-
> From: Aneesh Bansal [mailto:aneesh.ban...@nxp.com]
> Sent: Friday, January 22, 2016 4:37 PM
> To: u-boot@lists.denx.de
> Cc: york sun ; Ruchika Gupta
> ; Prabhakar Kushwaha
> ; Aneesh Bansal
>
> Subject: [PATCH v3 2/7] include/
> -Original Message-
> From: Aneesh Bansal [mailto:aneesh.ban...@nxp.com]
> Sent: Friday, January 22, 2016 4:37 PM
> To: u-boot@lists.denx.de
> Cc: york sun ; Ruchika Gupta
> ; Prabhakar Kushwaha
> ; Aneesh Bansal
>
> Subject: [PATCH v3 1/7] include/configs: m
> -Original Message-
> From: Aneesh Bansal [mailto:aneesh.ban...@nxp.com]
> Sent: Friday, January 22, 2016 4:37 PM
> To: u-boot@lists.denx.de
> Cc: york sun ; Ruchika Gupta
> ; Prabhakar Kushwaha
> ; Aneesh Bansal
>
> Subject: [PATCH v3 5/7] enable chain
From: Ruchika Gupta
The output ring needs to be invalidated before enqueuing the job to SEC.
While allocation of space to output ring, it should be taken care that the
size is cacheline size aligned inorder to prevent invalidating valid data.
The patch also correct the method of aligning end of
> -Original Message-
> From: Aneesh Bansal
> Sent: Tuesday, December 08, 2015 2:14 PM
> To: u-boot@lists.denx.de
> Cc: Yusong Sun ; Ruchika Gupta
> ; Prabhakar Kushwaha
> ; Aneesh Bansal
> ; Saksham Jain
> Subject: [PATCH 3/4] SECURE BOOT: separate fun
> -Original Message-
> From: Aneesh Bansal
> Sent: Tuesday, December 08, 2015 2:14 PM
> To: u-boot@lists.denx.de
> Cc: Yusong Sun ; Ruchika Gupta
> ; Prabhakar Kushwaha
> ; Aneesh Bansal
> ; Saksham Jain
> Subject: [PATCH 4/4] SECURE BOOT: support for
> -Original Message-
> From: Aneesh Bansal
> Sent: Tuesday, December 08, 2015 2:14 PM
> To: u-boot@lists.denx.de
> Cc: Yusong Sun ; Ruchika Gupta
> ; Prabhakar Kushwaha
> ; Aneesh Bansal
> ; Saksham Jain
> Subject: [PATCH 2/4] SECURE BOOT: separate
> -Original Message-
> From: Aneesh Bansal
> Sent: Tuesday, December 08, 2015 2:14 PM
> To: u-boot@lists.denx.de
> Cc: Yusong Sun ; Ruchika Gupta
> ; Prabhakar Kushwaha
> ; Aneesh Bansal
> ; Saksham Jain
> Subject: [PATCH 1/4] SECURE BOOT: change prototyp
gpio.h - Added missing copyright in few files.
rsa-mod-exp.h - Corrected copyright in the file.
fsl_sec.h - Added missing license in files
drivers/crypto/fsl/Makefile - Removed the incomplete GPLv2 license and replaced
it with GPLv2+ license
Signed-off-by: Ruchika Gupta
---
Changes from v2:
1
Hi,
> Hi,
>
> Am 23.07.2015 um 16:10 schrieb Ruchika Gupta:
> > Signed-off-by: Ruchika Gupta
> [...]
> > diff --git a/drivers/crypto/fsl/Makefile b/drivers/crypto/fsl/Makefile
> > index 4aa91e4..fd736cf 100644
> > --- a/drivers/crypto/fsl/Makefile
&
Signed-off-by: Ruchika Gupta
---
arch/arm/include/asm/arch-ls102xa/gpio.h | 2 ++
arch/powerpc/include/asm/arch-mpc85xx/gpio.h | 2 ++
drivers/crypto/fsl/Makefile | 4 +---
include/fsl_sec.h| 1 +
include/u-boot/rsa-mod-exp.h | 2
Acked-by: Ruchika Gupta
> -Original Message-
> From: Sun York-R58495
> Sent: Sunday, July 19, 2015 3:44 AM
> To: Gupta Ruchika-R66431
> Subject: Re: [PATCH 2/3] crypto/fsl: fix snooping for write transactions
>
> Ruchika,
>
> Please comment/ack.
>
>
Acked-by: Ruchika Gupta
> -Original Message-
> From: Sun York-R58495
> Sent: Sunday, July 19, 2015 3:44 AM
> To: Gupta Ruchika-R66431
> Subject: Re: [PATCH 1/3] crypto/fsl: fix "era" property value on LE platforms
>
> Ruchika,
>
> Please comment/ac
Acked-by: Ruchika Gupta
> -Original Message-
> From: Sun York-R58495
> Sent: Sunday, July 19, 2015 3:43 AM
> To: Gupta Ruchika-R66431
> Subject: Re: [PATCH 2/3] crypto/fsl - change starting entropy delay value
>
> Ruchika,
>
> Please comment/ack this p
Acked-by: Ruchika Gupta
> -Original Message-
> From: Sun York-R58495
> Sent: Sunday, July 19, 2015 3:43 AM
> To: Gupta Ruchika-R66431
> Subject: Re: [PATCH 1/3] crypto/fsl - disable RNG oscillator maximum
> frequency check
>
> Ruchika,
>
> Please commen
Acked-by: Ruchika Gupta
> -Original Message-
> From: Sun York-R58495
> Sent: Sunday, July 19, 2015 3:44 AM
> To: Gupta Ruchika-R66431
> Subject: Re: [PATCH 3/3] crypto/fsl: clean-up - use fdt_setprop_u32 helper
>
> Ruchika,
>
> Please comment/ack.
>
>
Acked-by: Ruchika Gupta
> -Original Message-
> From: Sun York-R58495
> Sent: Sunday, July 19, 2015 3:43 AM
> To: Gupta Ruchika-R66431
> Subject: Re: [PATCH 3/3] crypto/fsl - enable raw data instead of von
> Neumann data
>
> Ruchika,
>
> Please comment/ack
Signed-off-by: Ruchika Gupta
---
include/u-boot/rsa-mod-exp.h | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/include/u-boot/rsa-mod-exp.h b/include/u-boot/rsa-mod-exp.h
index fce445a..d250694 100644
--- a/include/u-boot/rsa-mod-exp.h
+++ b/include/u-boot/rsa-mod-exp.h
..ada8adf 100644
> --- a/arch/arm/imx-common/cmd_dek.c
> +++ b/arch/arm/imx-common/cmd_dek.c
> @@ -14,6 +14,7 @@
> #include
> #include
> #include
> +#include
>
> DECLARE_GLOBAL_DATA_PTR;
>
> --
> 2.3.2
Reviewed-by: Ruchika Gupta
___
U-Boot mailing list
U-Boot@lists.denx.de
http://lists.denx.de/mailman/listinfo/u-boot
Hi York,
> -Original Message-
> From: Sun York-R58495
> Sent: Tuesday, March 10, 2015 10:03 PM
> To: Gupta Ruchika-R66431; Rana Gaurav-B46163; u-boot@lists.denx.de
> Cc: Wood Scott-B07421; Bansal Aneesh-B39320
> Subject: Re: [PATCH] Add bootscript support to esbc_validate.
>
> On 03/10/20
Hi York,
> -Original Message-
> From: Sun York-R58495
> Sent: Tuesday, March 10, 2015 9:45 PM
> To: Rana Gaurav-B46163; u-boot@lists.denx.de
> Cc: Wood Scott-B07421; Gupta Ruchika-R66431; Bansal Aneesh-B39320
> Subject: Re: [PATCH] Add bootscript support to esbc_validate.
>
>
>
> On 03/
Hi Ulises,
> -Original Message-
> From: ulises.carde...@freescale.com [mailto:ulises.carde...@freescale.com]
> Sent: Wednesday, February 18, 2015 1:45 AM
> To: Gupta Ruchika-R66431
> Cc: u-boot@lists.denx.de; Estevam Fabio-R49496; sba...@denx.de;
> s...@chromium.org; Ulises Cardenas Casas;
Hi Ulises,
> -Original Message-
> From: ulises.carde...@freescale.com [mailto:ulises.carde...@freescale.com]
> Sent: Thursday, February 05, 2015 2:38 AM
> To: Gupta Ruchika-R66431
> Cc: u-boot@lists.denx.de; Estevam Fabio-R49496; sba...@denx.de; Ulises
> Cardenas Casas; Garg Nitin-B37173
>
ration.
> > Added support for progressinve hashing using h/w.
> >
> > Signed-off-by: Ruchika Gupta
> > Signed-off-by: Gaurav Rana
> > CC: Simon Glass
> > ---
> > This patch is dependent on following series of 10 patches.
> > https://patchwork.ozl
x27;s once available.
Signed-off-by: Ruchika Gupta
CC: Simon Glass
---
Changes in v6:
Removed changes in ls1021aqds.h accidently included in this patch
Changes in v5:
Both tools and uboot use the same code in rsa-checksum.c
Changes in v4:
No changes in this patch. Still under discussion
Cha
Signed-off-by: Ruchika Gupta
CC: Simon Glass
---
Changes in v6:
Fixed compilation error in this file for tools when FIT_SIGNATURE not enabled
Changes in v5:
New patch based on WIP patch by Simon.
common/hash.c | 81 +-
include/hash.h
rary which uses
Progressive Hash API's.
Signed-off-by: Ruchika Gupta
CC: Simon Glass
---
Changes in v6:
No Changes
Changes in v5:
None
Changes in v4:
Few cosmetic changes. Currently I have not replaced CONFIG_SHA1 with
CONFIG_CMD_SHA1SUM.
Waiting for reply from Simon and Denx for the same.
1 - 100 of 203 matches
Mail list logo