[PATCH v8 3/3] efi_loader: Extend PCR's for firmware measurements

2021-11-28 Thread Ruchika Gupta
e has extended PCR's, PCR0 would not be 0. So, read the PCR0 to determine if the PCR's need to be extended as eventlog is parsed or not. Signed-off-by: Ruchika Gupta Reviewed-by: Ilias Apalodimas Tested-by: Ilias Apalodimas --- v8: Addressed issues reported by cppcheck v7: Addre

[PATCH v8 2/3] tpm: use more algorithms than sha256 on pcr_read

2021-11-28 Thread Ruchika Gupta
The current tpm2_pcr_read is hardcoded using SHA256. Make the actual command to TPM configurable to use wider range of algorithms. The current command line is kept as is i.e limited to SHA-256 only. Signed-off-by: Ruchika Gupta Reviewed-by: Ilias Apalodimas --- v8: No change v7: No change v6

[PATCH v8 1/3] efi_loader: Add check for event log passed from firmware

2021-11-28 Thread Ruchika Gupta
to check if even log has been passed to u-boot from earlier firmware components. If available, the eventlog is parsed to check for its correctness and further event logs are appended to the passed log. Signed-off-by: Ruchika Gupta Reviewed-by: Ilias Apalodimas Tested-by: Ilias Apalodimas --- v8

[PATCH v7 3/3] efi_loader: Extend PCR's for firmware measurements

2021-11-26 Thread Ruchika Gupta
e has extended PCR's, PCR0 would not be 0. So, read the PCR0 to determine if the PCR's need to be extended as eventlog is parsed or not. Signed-off-by: Ruchika Gupta Reviewed-by: Ilias Apalodimas Tested-by: Ilias Apalodimas --- v7: Addressed Heinrick's comments - Added missing p

[v7 PATCH 2/3] tpm: use more algorithms than sha256 on pcr_read

2021-11-26 Thread Ruchika Gupta
The current tpm2_pcr_read is hardcoded using SHA256. Make the actual command to TPM configurable to use wider range of algorithms. The current command line is kept as is i.e limited to SHA-256 only. Signed-off-by: Ruchika Gupta Reviewed-by: Ilias Apalodimas --- v7: No change v6: No change v5

[PATCH v7 1/3] efi_loader: Add check for event log passed from firmware

2021-11-26 Thread Ruchika Gupta
to check if even log has been passed to u-boot from earlier firmware components. If available, the eventlog is parsed to check for its correctness and further event logs are appended to the passed log. Signed-off-by: Ruchika Gupta --- v7: Addressed Heinrich's comments Changed function

Re: [PATCH v6 1/3] efi_loader: Add check for event log passed from firmware

2021-11-26 Thread Ruchika Gupta
Hi Heinrich, On Fri, 26 Nov 2021 at 13:01, Heinrich Schuchardt wrote: > On 11/26/21 06:00, Ruchika Gupta wrote: > > Platforms may have support to measure their initial firmware components > > and pass the event log to u-boot. The event log address can be passed

[PATCH v6 3/3] efi_loader: Extend PCR's for firmware measurements

2021-11-25 Thread Ruchika Gupta
e has extended PCR's, PCR0 would not be 0. So, read the PCR0 to determine if the PCR's need to be extended as eventlog is parsed or not. Signed-off-by: Ruchika Gupta Reviewed-by: Ilias Apalodimas Tested-by: Ilias Apalodimas --- v6: Changed TPM2_DIGEST_LEN to TPM2_SHA512_DIGEST_SIZE v5

[PATCH v6 2/3] tpm: use more algorithms than sha256 on pcr_read

2021-11-25 Thread Ruchika Gupta
The current tpm2_pcr_read is hardcoded using SHA256. Make the actual command to TPM configurable to use wider range of algorithms. The current command line is kept as is i.e limited to SHA-256 only. Signed-off-by: Ruchika Gupta Reviewed-by: Ilias Apalodimas --- v6: No change v5: No change v4

[PATCH v6 1/3] efi_loader: Add check for event log passed from firmware

2021-11-25 Thread Ruchika Gupta
to check if even log has been passed to u-boot from earlier firmware components. If available, the eventlog is parsed to check for its correctness and further event logs are appended to the passed log. Signed-off-by: Ruchika Gupta Tested-by: Ilias Apalodimas Reviewed-by: Ilias Apalodimas --- v6

[PATCH v5 2/3] tpm: use more algorithms than sha256 on pcr_read

2021-11-24 Thread Ruchika Gupta
The current tpm2_pcr_read is hardcoded using SHA256. Make the actual command to TPM configurable to use wider range of algorithms. The current command line is kept as is i.e limited to SHA-256 only. Signed-off-by: Ruchika Gupta Reviewed-by: Ilias Apalodimas --- v5: No change v4: No change v3

[PATCH v5 3/3] efi_loader: Extend PCR's for firmware measurements

2021-11-24 Thread Ruchika Gupta
e has extended PCR's, PCR0 would not be 0. So, read the PCR0 to determine if the PCR's need to be extended as eventlog is parsed or not. Signed-off-by: Ruchika Gupta Reviewed-by: Ilias Apalodimas --- v5 : No change v4 : No change v3 : Rebase changes on top of changes made in first patc

[PATCH v5 1/3] efi_loader: Add check for event log passed from firmware

2021-11-24 Thread Ruchika Gupta
to check if even log has been passed to u-boot from earlier firmware components. If available, the eventlog is parsed to check for its correctness and further event logs are appended to the passed log. Signed-off-by: Ruchika Gupta --- v5: Shift the efi_init_event_log() to a different location in

[PATCH v4 3/3] efi_loader: Extend PCR's for firmware measurements

2021-11-24 Thread Ruchika Gupta
e has extended PCR's, PCR0 would not be 0. So, read the PCR0 to determine if the PCR's need to be extended as eventlog is parsed or not. Signed-off-by: Ruchika Gupta Reviewed-by: Ilias Apalodimas --- v4 : No change v3 : Rebase changes on top of changes made in first patch of series

[PATCH v4 2/3] tpm: use more algorithms than sha256 on pcr_read

2021-11-24 Thread Ruchika Gupta
The current tpm2_pcr_read is hardcoded using SHA256. Make the actual command to TPM configurable to use wider range of algorithms. The current command line is kept as is i.e limited to SHA-256 only. Signed-off-by: Ruchika Gupta Reviewed-by: Ilias Apalodimas --- v4: No change v3: No change v2

[PATCH v4 1/3] efi_loader: Add check for event log passed from firmware

2021-11-24 Thread Ruchika Gupta
to check if even log has been passed to u-boot from earlier firmware components. If available, the eventlog is parsed to check for its correctness and further event logs are appended to the passed log. Signed-off-by: Ruchika Gupta --- v4: Add SCRTM version to log only if previous firmware doesn;t

Re: [v2][PATCH 1/3] efi_loader: Add check for event log passed from firmware

2021-11-24 Thread Ruchika Gupta
Hi Kojima-san, On Wed, 24 Nov 2021 at 13:08, Masahisa Kojima wrote: > Hi Ruchika, Ilias, > > On Tue, 23 Nov 2021 at 20:53, Ruchika Gupta > wrote: > > > > Platforms may have support to measure their initial firmware components > > and pass the event log to u-boot

Re: [v2][PATCH 1/3] efi_loader: Add check for event log passed from firmware

2021-11-24 Thread Ruchika Gupta
Hi Ilias, On Wed, 24 Nov 2021 at 12:34, Ilias Apalodimas wrote: > Hi Ruchika, > > + > > [...] > > > + ret = platform_get_eventlog(dev, &base, &sz); > > + if (ret == EFI_SUCCESS) { > > Can we invert the logic here? > if (ret != EFI_SUCCESS) > return ret; > > etc... > Change posted

[v3] [PATCH 3/3] efi_loader: Extend PCR's for firmware measurements

2021-11-23 Thread Ruchika Gupta
e has extended PCR's, PCR0 would not be 0. So, read the PCR0 to determine if the PCR's need to be extended as eventlog is parsed or not. Signed-off-by: Ruchika Gupta --- v3 : Rebase changes on top of changes made in first patch of series v2 : Removed check for PCR0 in eventlog

[v3][PATCH 2/3] tpm: use more algorithms than sha256 on pcr_read

2021-11-23 Thread Ruchika Gupta
The current tpm2_pcr_read is hardcoded using SHA256. Make the actual command to TPM configurable to use wider range of algorithms. The current command line is kept as is i.e limited to SHA-256 only. Signed-off-by: Ruchika Gupta --- v3: No change v2: Change algorithm from u32 to u16 Add

[v3][PATCH 1/3] efi_loader: Add check for event log passed from firmware

2021-11-23 Thread Ruchika Gupta
to check if even log has been passed to u-boot from earlier firmware components. If available, the eventlog is parsed to check for its correctness and further event logs are appended to the passed log. Signed-off-by: Ruchika Gupta --- v3: Return as soon as you detect error v2: Moved firmware

[v2] [PATCH 3/3] efi_loader: Extend PCR's for firmware measurements

2021-11-23 Thread Ruchika Gupta
e has extended PCR's, PCR0 would not be 0. So, read the PCR0 to determine if the PCR's need to be extended as eventlog is parsed or not. Signed-off-by: Ruchika Gupta --- v2 : Removed check for PCR0 in eventlog lib/efi_loader/efi_tcg2.c | 77 +++ 1 f

[v2] [PATCH 2/3] tpm: use more algorithms than sha256 on pcr_read

2021-11-23 Thread Ruchika Gupta
The current tpm2_pcr_read is hardcoded using SHA256. Make the actual command to TPM configurable to use wider range of algorithms. The current command line is kept as is i.e limited to SHA-256 only. Signed-off-by: Ruchika Gupta --- v2: Change algorithm from u32 to u16 Add parameter description

[v2][PATCH 1/3] efi_loader: Add check for event log passed from firmware

2021-11-23 Thread Ruchika Gupta
to check if even log has been passed to u-boot from earlier firmware components. If available, the eventlog is parsed to check for its correctness and further event logs are appended to the passed log. Signed-off-by: Ruchika Gupta --- v2: Moved firmware eventlog code parsing to

[v2] [PATCH 3/3] efi_loader: Extend PCR's for firmware measurements

2021-11-23 Thread Ruchika Gupta
e has extended PCR's, PCR0 would not be 0. So, read the PCR0 to determine if the PCR's need to be extended as eventlog is parsed or not. Signed-off-by: Ruchika Gupta --- v2 : Removed check for PCR0 in eventlog lib/efi_loader/efi_tcg2.c | 77 +++ 1 f

[v2] [PATCH 2/3] tpm: use more algorithms than sha256 on pcr_read

2021-11-23 Thread Ruchika Gupta
The current tpm2_pcr_read is hardcoded using SHA256. Make the actual command to TPM configurable to use wider range of algorithms. The current command line is kept as is i.e limited to SHA-256 only. Signed-off-by: Ruchika Gupta --- v2: Change algorithm from u32 to u16 Add parameter description

[v2][PATCH 1/3] efi_loader: Add check for event log passed from firmware

2021-11-23 Thread Ruchika Gupta
to check if even log has been passed to u-boot from earlier firmware components. If available, the eventlog is parsed to check for its correctness and further event logs are appended to the passed log. Signed-off-by: Ruchika Gupta --- v2: Moved firmware eventlog code parsing to

Re: [PATCH] efi_loader: fix FinalEvents table if an EFI uses GetEventLog

2021-11-17 Thread Ruchika Gupta
Please ignore this patch. Sent by mistake. On Thu, 18 Nov 2021 at 11:48, Ruchika Gupta wrote: > --- > lib/efi_loader/efi_tcg2.c | 90 ++- > 1 file changed, 61 insertions(+), 29 deletions(-) > > diff --git a/lib/efi_loader/efi_tcg2.c b/lib/efi_

[PATCH 3/3] efi_loader: Extend PCR's for firmware measurements

2021-11-17 Thread Ruchika Gupta
R0 to determine if the previous firmwares have extended the PCR0. If not, then extend the PCR's as the eventlog is parsed. Signed-off-by: Ruchika Gupta --- lib/efi_loader/efi_tcg2.c | 86 +++ 1 file changed, 86 insertions(+) diff --git a/lib/efi_loader/ef

[PATCH 2/3] tpm: use more algorithms than sha256 on pcr_read

2021-11-17 Thread Ruchika Gupta
The current tpm2_pcr_read is hardcoded using SHA256. Make the actual command to TPM configurable to use wider range of algorithms. The current command line is kept as is i.e limited to SHA-256 only. Signed-off-by: Ruchika Gupta --- cmd/tpm-v2.c | 3 ++- include/tpm-v2.h | 3 ++- lib/tpm

[PATCH] efi_loader: fix FinalEvents table if an EFI uses GetEventLog

2021-11-17 Thread Ruchika Gupta
--- lib/efi_loader/efi_tcg2.c | 90 ++- 1 file changed, 61 insertions(+), 29 deletions(-) diff --git a/lib/efi_loader/efi_tcg2.c b/lib/efi_loader/efi_tcg2.c index 189e4a5ba5..215f4b2b04 100644 --- a/lib/efi_loader/efi_tcg2.c +++ b/lib/efi_loader/efi_tcg2.c @@ -

[PATCH 1/3] efi_loader: Add check for event log passed from firmware

2021-11-17 Thread Ruchika Gupta
to check if even log has been passed to u-boot from earlier firmware components. If available, the eventlog is parsed to check for its correctness and further event logs are appended to the passed log. Signed-off-by: Ruchika Gupta --- lib/efi_loader/efi_tcg2.c | 312

[PATCH] efi_loader: Fix spec ID event creation

2021-09-14 Thread Ruchika Gupta
ID event creation. Similarly, the algorithm array in spec ID event should be a variable length array with length being equal to the number_of_algorithms field. In current implementation this is defined as a fixed length array which has been fixed. Signed-off-by: Ruchika Gupta CC: Masahisa Kojima

[PATCH 3/3] configs: lx2160a: Enable OPTEE support

2020-04-22 Thread Ruchika Gupta
Enable support to compile OPTEE driver, access AVB TA and RPMB API's access via RPC from OPTEE for lx2160 Signed-off-by: Ruchika Gupta --- configs/lx2160ardb_tfa_defconfig | 5 + 1 file changed, 5 insertions(+) diff --git a/configs/lx2160ardb_tfa_defconfig b/co

[PATCH 2/3] arm64: lx2160a: dts: Add OPTEE node

2020-04-22 Thread Ruchika Gupta
Add OPTEE node in lx2 device tree to enable access of OPTEE TA's from u-boot. Signed-off-by: Ruchika Gupta --- arch/arm/dts/fsl-lx2160a.dtsi | 7 +++ 1 file changed, 7 insertions(+) diff --git a/arch/arm/dts/fsl-lx2160a.dtsi b/arch/arm/dts/fsl-lx2160a.dtsi index 42ce4379ec..f0306

[PATCH 1/3] cmd: optee_rpmb command for read/write of rpmb from optee

2020-04-22 Thread Ruchika Gupta
lue - read persistent values on rpmb via OPTEE AVB TA optee_rpmb write_pvalue - write persistent values on rpmb via OPTEE AVB TA Signed-off-by: Ruchika Gupta --- cmd/Kconfig | 16 +++ cmd/Makefile | 1 + cmd/optee_rpmb.c | 269 +++ 3 files ch

[U-Boot] [PATCH][v2] armv8: sec_firmware: Remove JR3 from device tree node in all cases

2018-04-12 Thread Ruchika Gupta
ng of random number generation function has been removed Signed-off-by: Ruchika Gupta --- Changes from v1: Removed unused variable rand from the sec_firmware_support_hwrng function arch/arm/cpu/armv8/fsl-layerscape/fdt.c | 4 ++-- arch/arm/cpu/armv8/sec_firmware.c | 6 +++--- 2 files chang

[U-Boot] [PATCH] armv8: sec_firmware: Remove JR3 from device tree node in all cases

2018-02-09 Thread Ruchika Gupta
ng of random number generation function has been removed Signed-off-by: Ruchika Gupta --- arch/arm/cpu/armv8/fsl-layerscape/fdt.c | 4 ++-- arch/arm/cpu/armv8/sec_firmware.c | 5 +++-- 2 files changed, 5 insertions(+), 4 deletions(-) diff --git a/arch/arm/cpu/armv8/fsl-layerscape/fdt.c b

Re: [U-Boot] [RESEND PATCH v3 1/2] drivers/crypto/fsl: assign job-rings to non-TrustZone

2018-02-08 Thread Ruchika Gupta
>-Original Message- >From: Bryan O'Donoghue [mailto:bryan.odonog...@linaro.org] >Sent: Friday, January 26, 2018 5:55 PM >To: u-boot@lists.denx.de; tr...@konsulko.com >Cc: Peng Fan ; Fabio Estevam ; >lukas.a...@aisec.fraunhofer.de; Bryan O'Donoghue >; Alex

[U-Boot] [PATCH][v4] ARMv8/sec_firmware : Update chosen/kaslr-seed with random number

2017-08-16 Thread Ruchika Gupta
kASLR support in kernel requires a random number to be passed via chosen/kaslr-seed propert. sec_firmware generates this random seed which can then be passed in the device tree node. sec_firmware reserves JR3 for it's own usage. Node for JR3 is removed from device-tree. Signed-off-by: Ru

[U-Boot] [PATCH][v3] ARMv8/sec_firmware : Update chosen/kaslr-seed with random number

2017-08-01 Thread Ruchika Gupta
kASLR support in kernel requires a random number to be passed via chosen/kaslr-seed propert. sec_firmware generates this random seed which can then be passed in the device tree node. sec_firmware reserves JR3 for it's own usage. Node for JR3 is removed from device-tree. Signed-off-by: Ru

[U-Boot] [PATCH][v2] ARMv8/sec_firmware : Update chosen/kaslr-seed with random number

2017-07-28 Thread Ruchika Gupta
kASLR support in kernel requires a random number to be passed via chosen/kaslr-seed propert. sec_firmware generates this random seed which can then be passed in the device tree node. sec_firmware reserves JR3 for it's own usage. Node for JR3 is removed from device-tree. Signed-off-by: Ru

Re: [U-Boot] [PATCH] ARMv8/sec_firmware : Update chosen/kaslr-seed

2017-05-16 Thread Ruchika Gupta
> -Original Message- > From: Poonam Aggrwal > Sent: Monday, May 15, 2017 9:27 AM > To: Ruchika Gupta ; u-boot@lists.denx.de; > sun.y...@nxp.com; Prabhakar Kushwaha > Cc: Ruchika Gupta > Subject: RE: [U-Boot] [PATCH] ARMv8/sec_firmware : Update

Re: [U-Boot] [PATCH] ARMv8/sec_firmware : Update chosen/kaslr-seed

2017-05-16 Thread Ruchika Gupta
> -Original Message- > From: Peter Robinson [mailto:pbrobin...@gmail.com] > Sent: Monday, May 15, 2017 6:18 PM > To: Ruchika Gupta > Cc: u-boot@lists.denx.de; sun.y...@nxp.com; Prabhakar Kushwaha > > Subject: Re: [U-Boot] [PATCH] ARMv8/sec_firmware : Update chosen/

[U-Boot] [PATCH] ARMv8/sec_firmware : Update chosen/kaslr-seed

2017-05-12 Thread Ruchika Gupta
kASLR support in kernel requires a random number to be passed via chosen/kaslr-seed propert. sec_firmware generates this random seed which can then be passed in the device tree node sec_firmware reserves JR3 for it's own usage. Node for JR3 is removed from device-tree. Signed-off-by: Ru

Re: [U-Boot] [PATCH 1/3][v3] arm: ls1043ardb: Add SD secure boot target

2017-04-17 Thread Ruchika Gupta
> -Original Message- > From: York Sun [mailto:york@nxp.com] > Sent: Wednesday, April 12, 2017 9:10 PM > To: Ruchika Gupta ; u-boot@lists.denx.de > Cc: Vini Pillai ; Sumit Garg > Subject: Re: [PATCH 1/3][v3] arm: ls1043ardb: Add SD secure boot target > >

[U-Boot] [PATCH 3/3][v5] arm: ls1046ardb: Add SD secure boot target

2017-04-17 Thread Ruchika Gupta
SPL build. Signed-off-by: Vinitha Pillai Signed-off-by: Sumit Garg Signed-off-by: Ruchika Gupta --- Changes in v5: Updated MAINTAINERS file Changes in v4: Removed spl_board_init from board specific file. Changes in v3: Resend Changes in v2: - Rebased patches to latest dependent patch set

[U-Boot] [PATCH 2/3][v4] arm: ls1043ardb: Add NAND secure boot target

2017-04-17 Thread Ruchika Gupta
CONFIG_BOOTSCRIPT_COPY_RAM is enabled to copy Bootscript from NAND to DDR. Offsets for Bootscript on NAND and DDR have been also defined. Signed-off-by: Vinitha Pillai Signed-off-by: Sumit Garg Signed-off-by: Ruchika Gupta --- Changes in v4: Updated Maintainers file Changes in v3: Removed changes to ls1043ardb.c

[U-Boot] [PATCH 1/3][v4] arm: ls1043ardb: Add SD secure boot target

2017-04-17 Thread Ruchika Gupta
strings to reduce the size of SPL image Signed-off-by: Vinitha Pillai-B57223 Signed-off-by: Sumit Garg Signed-off-by: Ruchika Gupta --- Changes in v4: Updated Maintainers file Changes in v3: Moved spl_board_init function to arch/arm/cpu/armv8/fsl-layerscape/spl.c Changes in v2: Rebased to

Re: [U-Boot] [PATCH 2/3][v3] arm: ls1043ardb: Add NAND secure boot target

2017-04-13 Thread Ruchika Gupta
> -Original Message- > From: York Sun [mailto:york@nxp.com] > Sent: Wednesday, April 12, 2017 9:00 PM > To: Ruchika Gupta ; u-boot@lists.denx.de > Cc: Vini Pillai ; Sumit Garg > Subject: Re: [PATCH 2/3][v3] arm: ls1043ardb: Add NAND secure boot target > >

Re: [U-Boot] [PATCH 3/3][v3] [RESEND] arm: ls1046ardb: Add SD secure boot target

2017-04-04 Thread Ruchika Gupta
> -Original Message- > From: york sun > Sent: Tuesday, April 04, 2017 9:29 PM > To: Ruchika Gupta ; u-boot@lists.denx.de > Cc: Vini Pillai ; Sumit Garg > Subject: Re: [PATCH 3/3][v3] [RESEND] arm: ls1046ardb: Add SD secure boot > target > > On 04/04/2017 12

[U-Boot] [PATCH 3/3][v4] arm: ls1046ardb: Add SD secure boot target

2017-04-04 Thread Ruchika Gupta
SPL build. Signed-off-by: Vinitha Pillai Signed-off-by: Sumit Garg Signed-off-by: Ruchika Gupta --- Changes in v4: Removed spl_board_init from board specific file. Changes in v3: Resend Changes in v2: - Rebased patches to latest dependent patch set - With the dependent path set , spl imag

[U-Boot] [PATCH 2/3][v3] arm: ls1043ardb: Add NAND secure boot target

2017-04-04 Thread Ruchika Gupta
CONFIG_BOOTSCRIPT_COPY_RAM is enabled to copy Bootscript from NAND to DDR. Offsets for Bootscript on NAND and DDR have been also defined. Signed-off-by: Vinitha Pillai Signed-off-by: Sumit Garg Signed-off-by: Ruchika Gupta --- Changes in v3: Removed changes to ls1043ardb.c Changes in v2: - Rebased this patch to

[U-Boot] [PATCH 1/3][v3] arm: ls1043ardb: Add SD secure boot target

2017-04-04 Thread Ruchika Gupta
strings to reduce the size of SPL image Signed-off-by: Vinitha Pillai-B57223 Signed-off-by: Sumit Garg Signed-off-by: Ruchika Gupta --- Changes in v3: Moved spl_board_init function to arch/arm/cpu/armv8/fsl-layerscape/spl.c Changes in v2: Rebased to latest dependent patches: - No change

Re: [U-Boot] [PATCH 3/3][v3] [RESEND] arm: ls1046ardb: Add SD secure boot target

2017-04-04 Thread Ruchika Gupta
> -Original Message- > From: york sun > Sent: Monday, April 03, 2017 9:01 PM > To: Ruchika Gupta ; u-boot@lists.denx.de > Cc: Vini Pillai ; Sumit Garg > Subject: Re: [PATCH 3/3][v3] [RESEND] arm: ls1046ardb: Add SD secure boot > target > > On 04/03/2017 12

Re: [U-Boot] [PATCH 3/3][v3] [RESEND] arm: ls1046ardb: Add SD secure boot target

2017-04-03 Thread Ruchika Gupta
> -Original Message- > From: york sun > Sent: Saturday, April 01, 2017 1:44 AM > To: Ruchika Gupta ; u-boot@lists.denx.de > Cc: Vini Pillai ; Sumit Garg > Subject: Re: [PATCH 3/3][v3] [RESEND] arm: ls1046ardb: Add SD secure boot > target > > On 03/29/2017 07

[U-Boot] [PATCH 2/3][v2] arm: ls1043ardb: Add NAND secure boot target

2017-03-29 Thread Ruchika Gupta
. - MACRO for CONFIG_BOOTSCRIPT_COPY_RAM is enabled to copy Bootscript from NAND to DDR. Offsets for Bootscript on NAND and DDR have been also defined. Signed-off-by: Vinitha Pillai Signed-off-by: Sumit Garg Signed-off-by: Ruchika Gupta --- Changes from v1 - Rebased this patch to the latest

[U-Boot] [PATCH 3/3][v3] [RESEND] arm: ls1046ardb: Add SD secure boot target

2017-03-29 Thread Ruchika Gupta
-off-by: Ruchika Gupta --- Changes from v1: - Rebased patches to latest dependent patch set - With the dependent path set , spl imag size increased to 94K. So - additionally reduce the spl image size by removing the functions from - CAAM driver that are not required in SPL flow Dependent patch set

[U-Boot] [PATCH 3/3] arm: ls1046ardb: Add SD secure boot target

2017-03-29 Thread Ruchika Gupta
-off-by: Ruchika Gupta --- Changes from v1: - Rebased patches to latest dependent patch set - With the dependent path set , spl imag size increased to 94K. So - additionally reduce the spl image size by removing the functions from - CAAM driver that are not required in SPL flow Dependent patch set

[U-Boot] [PATCH 1/3][v2] arm: ls1043ardb: Add SD secure boot target

2017-03-29 Thread Ruchika Gupta
strings to reduce the size of SPL image Signed-off-by: Vinitha Pillai-B57223 Signed-off-by: Sumit Garg Signed-off-by: Ruchika Gupta --- Changes from v1: Rebased to latest dependent patches: - No change Dependent patch set: SECURE boot target addition for NOR on LS1043, LS1046 https

Re: [U-Boot] [PATCH] powerpc: e6500: Lock/unlock 1 cache instead of L1 as init_ram

2017-03-27 Thread Ruchika Gupta
> -Original Message- > From: york sun > Sent: Saturday, March 25, 2017 10:16 PM > To: Ruchika Gupta ; u-boot@lists.denx.de; > prabhakar.khushw...@nxp.com > Subject: Re: [U-Boot] [PATCH] powerpc: e6500: Lock/unlock 1 cache instead > of L1 as init_ram > > On 0

[U-Boot] [PATCH] powerpc: e6500: Lock/unlock 1 cache instead of L1 as init_ram

2017-03-01 Thread Ruchika Gupta
Fir E6500 cores, L2 cache has been used as init_ram. L1 cache is a write through cache on E6500.If lines are not locked in both L1 and L2 caches, crashes are observed during secure boot. This patch locks/unlocks both L1 as well as L2 cache to prevent the crash. Signed-off-by: Ruchika Gupta

[U-Boot] [PATCH] powerpc: e6500: Lock/unlock 1 cache instead of L1 as init_ram

2017-03-01 Thread Ruchika Gupta
Fir E6500 cores, L2 cache has been used as init_ram. L1 cache is a write through cache on E6500.If lines are not locked in both L1 and L2 caches, crashes are observed during secure boot. This patch locks/unlocks both L1 as well as L2 cache to prevent the crash. Signed-off-by: Ruchika Gupta

[U-Boot] [PATCH 1/3] arm: ls1043ardb: Add SD secure boot target

2017-02-20 Thread Ruchika Gupta
strings to reduce the size of SPL image Signed-off-by: Vinitha Pillai-B57223 Signed-off-by: Sumit Garg Signed-off-by: Ruchika Gupta --- The patchset is dependent on the following patches: https://patchwork.ozlabs.org/patch/717614/ http://patchwork.ozlabs.org/patch/724332/ http

[U-Boot] [PATCH 3/3] arm: ls1046ardb: Add SD secure boot target

2017-02-20 Thread Ruchika Gupta
appended to u-boot image. So header will also be copied from SD to DDR. - CONFIG_MAX_SPL_SIZE is limited to 90K.SPL is copied to OCRAM (128K) where 32K are reserved for use by boot ROM and 6K for the header Signed-off-by: Vinitha Pillai-B57223 Signed-off-by: Sumit Garg Signed-off-by: Ruchika

[U-Boot] [PATCH 2/3] arm: ls1043ardb: Add NAND secure boot target

2017-02-20 Thread Ruchika Gupta
CONFIG_BOOTSCRIPT_COPY_RAM is enabled to copy Bootscript from NAND to DDR. Offsets for Bootscript on NAND and DDR have been also defined. Signed-off-by: Vinitha Pillai-B57223 Signed-off-by: Sumit Garg Signed-off-by: Ruchika Gupta --- The patchset is dependent on the following patches: https

[U-Boot] [PATCH 0/3] SECURE Boot targets for NAND and SD on LS1043, LS1046

2017-02-20 Thread Ruchika Gupta
Ruchika Gupta (3): arm: ls1043ardb: Add SD secure boot target arm: ls1043ardb: Add NAND secure boot target arm: ls1046ardb: Add SD secure boot target arch/arm/include/asm/fsl_secure_boot.h | 16 +-- board/freescale/common/fsl_validate.c | 4 ++ board/freescale

Re: [U-Boot] [PATCH] armv8: ls1043a: Extend the size for SPL

2016-09-08 Thread Ruchika Gupta
image from the boot source. Regards, Ruchika -Original Message- From: Q.Y. Gong Sent: Thursday, September 08, 2016 12:32 PM To: Prabhakar Kushwaha ; york sun ; Ruchika Gupta ; u-boot@lists.denx.de Cc: Vincent Hu Subject: RE: [PATCH] armv8: ls1043a: Extend the size for SPL Hi Prab

Re: [U-Boot] [PATCH v3] imx: imx7 Support for Manufacturing Protection

2016-02-15 Thread Ruchika Gupta
> diff --git a/drivers/crypto/fsl/Makefile b/drivers/crypto/fsl/Makefile index > fd736cf..6d6903b 100644 > --- a/drivers/crypto/fsl/Makefile > +++ b/drivers/crypto/fsl/Makefile > @@ -8,3 +8,7 @@ obj-y += sec.o > obj-$(CONFIG_FSL_CAAM) += jr.o fsl_hash.o jobdesc.o error.o > obj-$(CONFIG_CMD_BLOB)$

Re: [U-Boot] [PATCH v3 3/7] SECURE_BOOT: split the secure boot functionality in two parts

2016-01-27 Thread Ruchika Gupta
> -Original Message- > From: Aneesh Bansal [mailto:aneesh.ban...@nxp.com] > Sent: Friday, January 22, 2016 4:37 PM > To: u-boot@lists.denx.de > Cc: york sun ; Ruchika Gupta > ; Prabhakar Kushwaha > ; Aneesh Bansal > > Subject: [PATCH v3 3/7] SECURE_

Re: [U-Boot] [PATCH v3 6/7] enable chain of trust for PowerPC platforms

2016-01-27 Thread Ruchika Gupta
> -Original Message- > From: Aneesh Bansal [mailto:aneesh.ban...@nxp.com] > Sent: Friday, January 22, 2016 4:37 PM > To: u-boot@lists.denx.de > Cc: york sun ; Ruchika Gupta > ; Prabhakar Kushwaha > ; Aneesh Bansal > > Subject: [PATCH v3 6/7] enable chain of

Re: [U-Boot] [PATCH v3 4/7] create function to determine boot mode

2016-01-27 Thread Ruchika Gupta
> -Original Message- > From: Aneesh Bansal [mailto:aneesh.ban...@nxp.com] > Sent: Friday, January 22, 2016 4:37 PM > To: u-boot@lists.denx.de > Cc: york sun ; Ruchika Gupta > ; Prabhakar Kushwaha > ; Aneesh Bansal > > Subject: [PATCH v3 4/7] create function to

Re: [U-Boot] [PATCH v3 7/7] SECURE_BOOT: change error handler for esbc_validate

2016-01-27 Thread Ruchika Gupta
> -Original Message- > From: Aneesh Bansal [mailto:aneesh.ban...@nxp.com] > Sent: Friday, January 22, 2016 4:37 PM > To: u-boot@lists.denx.de > Cc: york sun ; Ruchika Gupta > ; Prabhakar Kushwaha > ; Aneesh Bansal > > Subject: [PATCH v3 7/7] SECURE_BOO

Re: [U-Boot] [PATCH v3 2/7] include/configs: move definition of CONFIG_CMD_BLOB

2016-01-27 Thread Ruchika Gupta
> -Original Message- > From: Aneesh Bansal [mailto:aneesh.ban...@nxp.com] > Sent: Friday, January 22, 2016 4:37 PM > To: u-boot@lists.denx.de > Cc: york sun ; Ruchika Gupta > ; Prabhakar Kushwaha > ; Aneesh Bansal > > Subject: [PATCH v3 2/7] include/

Re: [U-Boot] [PATCH v3 1/7] include/configs: make secure boot header file include uniform

2016-01-27 Thread Ruchika Gupta
> -Original Message- > From: Aneesh Bansal [mailto:aneesh.ban...@nxp.com] > Sent: Friday, January 22, 2016 4:37 PM > To: u-boot@lists.denx.de > Cc: york sun ; Ruchika Gupta > ; Prabhakar Kushwaha > ; Aneesh Bansal > > Subject: [PATCH v3 1/7] include/configs: m

Re: [U-Boot] [PATCH v3 5/7] enable chain of trust for ARM platforms

2016-01-27 Thread Ruchika Gupta
> -Original Message- > From: Aneesh Bansal [mailto:aneesh.ban...@nxp.com] > Sent: Friday, January 22, 2016 4:37 PM > To: u-boot@lists.denx.de > Cc: york sun ; Ruchika Gupta > ; Prabhakar Kushwaha > ; Aneesh Bansal > > Subject: [PATCH v3 5/7] enable chain

[U-Boot] [PATCH] drivers/crypto/fsl : Allocate output ring with size aligned to CACHELNE SIZE

2016-01-22 Thread Ruchika Gupta
From: Ruchika Gupta The output ring needs to be invalidated before enqueuing the job to SEC. While allocation of space to output ring, it should be taken care that the size is cacheline size aligned inorder to prevent invalidating valid data. The patch also correct the method of aligning end of

Re: [U-Boot] [PATCH 3/4] SECURE BOOT: separate function created for signature

2016-01-15 Thread Ruchika Gupta
> -Original Message- > From: Aneesh Bansal > Sent: Tuesday, December 08, 2015 2:14 PM > To: u-boot@lists.denx.de > Cc: Yusong Sun ; Ruchika Gupta > ; Prabhakar Kushwaha > ; Aneesh Bansal > ; Saksham Jain > Subject: [PATCH 3/4] SECURE BOOT: separate fun

Re: [U-Boot] [PATCH 4/4] SECURE BOOT: support for validation of dynamic image

2016-01-15 Thread Ruchika Gupta
> -Original Message- > From: Aneesh Bansal > Sent: Tuesday, December 08, 2015 2:14 PM > To: u-boot@lists.denx.de > Cc: Yusong Sun ; Ruchika Gupta > ; Prabhakar Kushwaha > ; Aneesh Bansal > ; Saksham Jain > Subject: [PATCH 4/4] SECURE BOOT: support for

Re: [U-Boot] [PATCH 2/4] SECURE BOOT: separate functions for reading keys

2016-01-15 Thread Ruchika Gupta
> -Original Message- > From: Aneesh Bansal > Sent: Tuesday, December 08, 2015 2:14 PM > To: u-boot@lists.denx.de > Cc: Yusong Sun ; Ruchika Gupta > ; Prabhakar Kushwaha > ; Aneesh Bansal > ; Saksham Jain > Subject: [PATCH 2/4] SECURE BOOT: separate

Re: [U-Boot] [PATCH 1/4] SECURE BOOT: change prototype of fsl_secboot_validate function

2016-01-15 Thread Ruchika Gupta
> -Original Message- > From: Aneesh Bansal > Sent: Tuesday, December 08, 2015 2:14 PM > To: u-boot@lists.denx.de > Cc: Yusong Sun ; Ruchika Gupta > ; Prabhakar Kushwaha > ; Aneesh Bansal > ; Saksham Jain > Subject: [PATCH 1/4] SECURE BOOT: change prototyp

[U-Boot] [PATCH][v2] Correct License and Copyright information on few files

2015-07-26 Thread Ruchika Gupta
gpio.h - Added missing copyright in few files. rsa-mod-exp.h - Corrected copyright in the file. fsl_sec.h - Added missing license in files drivers/crypto/fsl/Makefile - Removed the incomplete GPLv2 license and replaced it with GPLv2+ license Signed-off-by: Ruchika Gupta --- Changes from v2: 1

Re: [U-Boot] [PATCH] Correct License and Copyright information on few files

2015-07-23 Thread Ruchika Gupta
Hi, > Hi, > > Am 23.07.2015 um 16:10 schrieb Ruchika Gupta: > > Signed-off-by: Ruchika Gupta > [...] > > diff --git a/drivers/crypto/fsl/Makefile b/drivers/crypto/fsl/Makefile > > index 4aa91e4..fd736cf 100644 > > --- a/drivers/crypto/fsl/Makefile &

[U-Boot] [PATCH] Correct License and Copyright information on few files

2015-07-23 Thread Ruchika Gupta
Signed-off-by: Ruchika Gupta --- arch/arm/include/asm/arch-ls102xa/gpio.h | 2 ++ arch/powerpc/include/asm/arch-mpc85xx/gpio.h | 2 ++ drivers/crypto/fsl/Makefile | 4 +--- include/fsl_sec.h| 1 + include/u-boot/rsa-mod-exp.h | 2

Re: [U-Boot] [PATCH 2/3] crypto/fsl: fix snooping for write transactions

2015-07-22 Thread Ruchika Gupta
Acked-by: Ruchika Gupta > -Original Message- > From: Sun York-R58495 > Sent: Sunday, July 19, 2015 3:44 AM > To: Gupta Ruchika-R66431 > Subject: Re: [PATCH 2/3] crypto/fsl: fix snooping for write transactions > > Ruchika, > > Please comment/ack. > >

Re: [U-Boot] [PATCH 1/3] crypto/fsl: fix "era" property value on LE platforms

2015-07-22 Thread Ruchika Gupta
Acked-by: Ruchika Gupta > -Original Message- > From: Sun York-R58495 > Sent: Sunday, July 19, 2015 3:44 AM > To: Gupta Ruchika-R66431 > Subject: Re: [PATCH 1/3] crypto/fsl: fix "era" property value on LE platforms > > Ruchika, > > Please comment/ac

Re: [U-Boot] [PATCH 2/3] crypto/fsl - change starting entropy delay value

2015-07-22 Thread Ruchika Gupta
Acked-by: Ruchika Gupta > -Original Message- > From: Sun York-R58495 > Sent: Sunday, July 19, 2015 3:43 AM > To: Gupta Ruchika-R66431 > Subject: Re: [PATCH 2/3] crypto/fsl - change starting entropy delay value > > Ruchika, > > Please comment/ack this p

Re: [U-Boot] [PATCH 1/3] crypto/fsl - disable RNG oscillator maximum frequency check

2015-07-22 Thread Ruchika Gupta
Acked-by: Ruchika Gupta > -Original Message- > From: Sun York-R58495 > Sent: Sunday, July 19, 2015 3:43 AM > To: Gupta Ruchika-R66431 > Subject: Re: [PATCH 1/3] crypto/fsl - disable RNG oscillator maximum > frequency check > > Ruchika, > > Please commen

Re: [U-Boot] [PATCH 3/3] crypto/fsl: clean-up - use fdt_setprop_u32 helper

2015-07-22 Thread Ruchika Gupta
Acked-by: Ruchika Gupta > -Original Message- > From: Sun York-R58495 > Sent: Sunday, July 19, 2015 3:44 AM > To: Gupta Ruchika-R66431 > Subject: Re: [PATCH 3/3] crypto/fsl: clean-up - use fdt_setprop_u32 helper > > Ruchika, > > Please comment/ack. > >

Re: [U-Boot] [PATCH 3/3] crypto/fsl - enable raw data instead of von Neumann data

2015-07-22 Thread Ruchika Gupta
Acked-by: Ruchika Gupta > -Original Message- > From: Sun York-R58495 > Sent: Sunday, July 19, 2015 3:43 AM > To: Gupta Ruchika-R66431 > Subject: Re: [PATCH 3/3] crypto/fsl - enable raw data instead of von > Neumann data > > Ruchika, > > Please comment/ack

[U-Boot] [PATCH] DM: crypto/rsa_mod_exp - Correct copyright on rsa-mod-exp.h

2015-06-11 Thread Ruchika Gupta
Signed-off-by: Ruchika Gupta --- include/u-boot/rsa-mod-exp.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/include/u-boot/rsa-mod-exp.h b/include/u-boot/rsa-mod-exp.h index fce445a..d250694 100644 --- a/include/u-boot/rsa-mod-exp.h +++ b/include/u-boot/rsa-mod-exp.h

Re: [U-Boot] [PATCH] imx: dek_blob: Add explicit include for mapmem

2015-05-10 Thread Ruchika Gupta
..ada8adf 100644 > --- a/arch/arm/imx-common/cmd_dek.c > +++ b/arch/arm/imx-common/cmd_dek.c > @@ -14,6 +14,7 @@ > #include > #include > #include > +#include > > DECLARE_GLOBAL_DATA_PTR; > > -- > 2.3.2 Reviewed-by: Ruchika Gupta ___ U-Boot mailing list U-Boot@lists.denx.de http://lists.denx.de/mailman/listinfo/u-boot

Re: [U-Boot] [PATCH] Add bootscript support to esbc_validate.

2015-03-11 Thread Ruchika Gupta
Hi York, > -Original Message- > From: Sun York-R58495 > Sent: Tuesday, March 10, 2015 10:03 PM > To: Gupta Ruchika-R66431; Rana Gaurav-B46163; u-boot@lists.denx.de > Cc: Wood Scott-B07421; Bansal Aneesh-B39320 > Subject: Re: [PATCH] Add bootscript support to esbc_validate. > > On 03/10/20

Re: [U-Boot] [PATCH] Add bootscript support to esbc_validate.

2015-03-10 Thread Ruchika Gupta
Hi York, > -Original Message- > From: Sun York-R58495 > Sent: Tuesday, March 10, 2015 9:45 PM > To: Rana Gaurav-B46163; u-boot@lists.denx.de > Cc: Wood Scott-B07421; Gupta Ruchika-R66431; Bansal Aneesh-B39320 > Subject: Re: [PATCH] Add bootscript support to esbc_validate. > > > > On 03/

Re: [U-Boot] [PATCH v4] imx6: Added DEK blob generator command

2015-02-20 Thread Ruchika Gupta
Hi Ulises, > -Original Message- > From: ulises.carde...@freescale.com [mailto:ulises.carde...@freescale.com] > Sent: Wednesday, February 18, 2015 1:45 AM > To: Gupta Ruchika-R66431 > Cc: u-boot@lists.denx.de; Estevam Fabio-R49496; sba...@denx.de; > s...@chromium.org; Ulises Cardenas Casas;

Re: [U-Boot] [PATCH] imx6: Added DEK blob generator command

2015-02-09 Thread Ruchika Gupta
Hi Ulises, > -Original Message- > From: ulises.carde...@freescale.com [mailto:ulises.carde...@freescale.com] > Sent: Thursday, February 05, 2015 2:38 AM > To: Gupta Ruchika-R66431 > Cc: u-boot@lists.denx.de; Estevam Fabio-R49496; sba...@denx.de; Ulises > Cardenas Casas; Garg Nitin-B37173 >

Re: [U-Boot] [PATCH] crypto/fsl - Add progressive hashing support using hardware acceleration.

2015-02-05 Thread Ruchika Gupta
ration. > > Added support for progressinve hashing using h/w. > > > > Signed-off-by: Ruchika Gupta > > Signed-off-by: Gaurav Rana > > CC: Simon Glass > > --- > > This patch is dependent on following series of 10 patches. > > https://patchwork.ozl

[U-Boot] [PATCH 10/10][v6] rsa: Use checksum algorithms from struct hash_algo

2015-01-23 Thread Ruchika Gupta
x27;s once available. Signed-off-by: Ruchika Gupta CC: Simon Glass --- Changes in v6: Removed changes in ls1021aqds.h accidently included in this patch Changes in v5: Both tools and uboot use the same code in rsa-checksum.c Changes in v4: No changes in this patch. Still under discussion Cha

[U-Boot] [PATCH 09/10][v6] Use hash.c in mkimage

2015-01-23 Thread Ruchika Gupta
Signed-off-by: Ruchika Gupta CC: Simon Glass --- Changes in v6: Fixed compilation error in this file for tools when FIT_SIGNATURE not enabled Changes in v5: New patch based on WIP patch by Simon. common/hash.c | 81 +- include/hash.h

[U-Boot] [PATCH 08/10][v6] hash: Add function to find hash_algo struct with progressive hash

2015-01-23 Thread Ruchika Gupta
rary which uses Progressive Hash API's. Signed-off-by: Ruchika Gupta CC: Simon Glass --- Changes in v6: No Changes Changes in v5: None Changes in v4: Few cosmetic changes. Currently I have not replaced CONFIG_SHA1 with CONFIG_CMD_SHA1SUM. Waiting for reply from Simon and Denx for the same.

  1   2   3   >