default currently always present. Max Key number has
increase from 4 to 8. 8th Key is irrevocable. A New Barker Code is being
used.
Signed-off-by: Aneesh Bansal
Signed-off-by: Saksham Jain
---
Changes for v2:
- No changes
Changes for v3:
- No changes
Changes for v4:
- Cleaned
During secure boot, SMMU is enabled on POR by SP bootrom. SMMU needs
to be put in Bypass mode in uboot to enable CAAM transcations to pass
through.
During Nonsecure Boot, SP BootROM doesn't enable SMMU and at reset
SMMU is in bypass mode.
Signed-off-by: Aneesh Bansal
Signed-off-by: Saksham
The GUR (DCFG) registers in CCSR space are in Little Endian format for
ls2080. Defined a config CONFIG_SYS_FSL_CCSR_GUR_LE in
arch/arm/include/asm/arch-fsl-layerscape/config.h
Signed-off-by: Aneesh Bansal
Signed-off-by: Saksham Jain
---
Changes for v2:
- No changes
Changes for v3
e and
Read Allocate.
Signed-off-by: Saksham Jain
---
Changes for v2:
- No changes
Changes for v3:
- No changes
Changes for v4:
- Cleaned up commit message
Changes for v5:
- Cleaned up commit message
drivers/crypto/fsl/jr.c | 13 +
drivers/crypto/fsl
in bootscript (Execute esbc_halt command
in case of image verification process) or it can be taken care in Uboot
Code. In this commit, doing the latter via esbc_halt().
Signed-off-by: Aneesh Bansal
Signed-off-by: Saksham Jain
---
Changes for v2:
- No changes
Changes for v3:
- No
-by: Saksham Jain
---
Changes for v2:
- No changes
Changes for v3:
- No changes
Changes for v4:
- Cleaned up commit message
Changes for v5:
- Cleaned up commit message
- Added new configs in defconfigs as per new intermediate patches
arch/arm/include/asm
o same value as
it's default value during non-secure boot.
Signed-off-by: Aneesh Bansal
Signed-off-by: Saksham Jain
---
Changes for v2:
- No changes
Changes for v3:
- No changes
Changes for v4:
- No changes
Changes for v5:
- Cleaned up commit messa
Signed-off-by: Saksham Jain
---
Changes for v2:
- No changes
Changes for v3:
- No changes
Changes for v4:
- No changes
Changes for v5:
- Cleaned up commit message
drivers/crypto/fsl/desc_constr.h | 7 +++
1 file changed, 3 insertions(+), 4 deletions(-)
diff
In LS2080, SFP is Little Endian and Verion is 3.4 . The base address is
0x01e80200. SFP will be used in Secure Boot to read fuses.
Signed-off-by: Aneesh Bansal
Signed-off-by: Saksham Jain
---
Changes for v2:
- No changes
Changes for v3:
- No changes
Changes for v4
For ls2080, Added configs for various IPs used during secure boot.
Added address and endianness for SEC and Security Monitor. SRK are
Fuses in SFP (Fuses for public key's hash). These are stored in Little
Endian format.
Signed-off-by: Aneesh Bansal
Signed-off-by: Saksham Jain
---
Changes f
since
these patches were floated for review)
Saksham Jain (14):
armv8: ls2080: Add SFP Configs for LS2080
ls2080: Add configs for SEC, SecMon, SRK and DCFG
fsl: ls-ch3: Add new header for Secure Boot
ls2080: Add Secure Boot support
ls2080: Add bootscript header addr for
: Saksham Jain
---
Changes for v2:
- No changes
Changes for v3:
- No changes
Changes for v4:
- Cleaned up commit message
Changes for v5:
- Cleaned up commit message
include/config_fsl_chain_trust.h | 14 ++
1 file changed, 10 insertions(+), 4 deletions(-)
diff
is change helps when fsl_secboot_validate function is called from
within UBOOT (because now instead of calling function
"getenv("img_addr")" we can directly get the image address).
Signed-off-by: Aneesh Bansal
Signed-off-by: Saksham Jain
---
Changes for v2:
- No changes
Changes for
-xip memories (e.g. NAND, SD) it is neccessary to
copy both these images to DDR.
For other ARM Platforms (ls1043 and ls1020), header is not copied from
NOR to DDR (otherwise customers will need to modify the existing
headers).
Signed-off-by: Aneesh Bansal
Signed-off-by: Saksham Jain
---
Changes
: Saksham Jain
---
Changes for v2:
- No changes
Changes for v3:
- No changes
Changes for v4:
-Cleaned up commit message
Changes for v5:
-Cleaned up commit message
arch/arm/include/asm/fsl_secure_boot.h | 4
1 file changed, 4 insertions(+)
diff --git a/arch/arm
Added myself as maintainers for the following:
1) configs/ls2080aqds_SECURE_BOOT_defconfig
2) configs/ls2085aqds_SECURE_BOOT_defconfig
3) configs/ls2080ardb_SECURE_BOOT_defconfig
4) configs/ls2085ardb_SECURE_BOOT_defconfig
Signed-off-by: Saksham Jain
---
This patch depends on patch which adds
e and Read
Allocate.
Signed-off-by: Aneesh Bansal
Signed-off-by: Saksham Jain
---
Changes for v2:
- No changes
Changes for v3:
- No changes
Changes for v4:
- Cleaned up commit message
drivers/crypto/fsl/jr.c | 13 +
drivers/crypto/fsl/jr.h | 3 +++
2 files c
: Saksham Jain
---
Changes for v2:
- No changes
Changes for v3:
- No changes
Changes for v4:
- Cleaned up commit message
include/config_fsl_chain_trust.h | 14 ++
1 file changed, 10 insertions(+), 4 deletions(-)
diff --git a/include/config_fsl_chain_trust.h b/include
care in bootscript (Execute esbc_halt command in case
of
image verification process) or it can be taken care in Uboot Code.
Doing the latter via a esbc_halt.
Signed-off-by: Aneesh Bansal
Signed-off-by: Saksham Jain
---
Changes for v2:
- No changes
Changes for v3:
- No changes
is change helps when fsl_secboot_validate function is called from within
UBOOT (because now instead of calling function "getenv("img_addr")"
we can directly get the image address.)
Signed-off-by: Aneesh Bansal
Signed-off-by: Saksham Jain
---
Changes for v2:
- No changes
Changes for
-off-by: Saksham Jain
---
Changes for v2:
- No changes
Changes for v3:
- No changes
Changes for v4:
- No changes
drivers/crypto/fsl/desc_constr.h | 7 +++
1 file changed, 3 insertions(+), 4 deletions(-)
diff --git a/drivers/crypto/fsl/desc_constr.h b/drivers/crypto
Secure Boot to same value
as it's default value during non-secure boot.
Signed-off-by: Aneesh Bansal
Signed-off-by: Saksham Jain
---
Changes for v2:
- No changes
Changes for v3:
- No changes
Changes for v4:
- No changes
arch/arm/include/asm/fsl_secure_boot.h | 7 +
The GUR (DCFG) registers in CCSR space are in LE format
for ls2080/ls2085. Defined a config CONFIG_SYS_FSL_CCSR_GUR_LE in
arch/arm/include/asm/arch-fsl-layerscape/config.h
Signed-off-by: Aneesh Bansal
Signed-off-by: Saksham Jain
---
Changes for v2:
- No changes
Changes for v3
case of non-xip memories (e.g. NAND, SD) it is neccessary to copy
both these images to DDR.
For other ARM Platforms (ls1043 and ls1020), header is not copied from NOR
to DDR (otherwise customers will need to modify the existing headers).
Signed-off-by: Aneesh Bansal
Signed-off-by: Saksham Jain
During secure boot, SMMU is enabled on POR by SP bootrom.
SMMU needs to be put in Bypass mode in uboot to
enable CAAM transcations to pass through.
During Nonsecure Boot, SP BootROM doesn't enable SMMU and
at reset SMMU is in bypass mode.
Signed-off-by: Aneesh Bansal
Signed-off-by: Saksham
Boot defconfigs created for boards (NOR Boot).
Signed-off-by: Aneesh Bansal
Signed-off-by: Saksham Jain
---
Changes for v2:
- No changes
Changes for v3:
- No changes
Changes for v4:
- Cleaned up commit message
arch/arm/include/asm/fsl_secure_boot.h | 9 +++--
board
. Keys must be in table format.
3) Hence, SRK (Key table) is by default currently always present.
4) Max Key number has increase from 4 to 8. 8th Key is unrevockable.
5) New Barker Code is being used.
Signed-off-by: Aneesh Bansal
Signed-off-by: Saksham Jain
---
Changes for v2:
- No changes
-by: Saksham Jain
---
Changes for v2:
- No changes
Changes for v3:
- No changes
Changes for v4:
-Cleaned up commit message
arch/arm/include/asm/fsl_secure_boot.h | 4
1 file changed, 4 insertions(+)
diff --git a/arch/arm/include/asm/fsl_secure_boot.h
b/arch/arm
For ls2080, Added configs for various IPs used during secure boot
Added address and endianness for SEC and Security Monitor.
SRK - Fuses in SFP (Fused for public keys hash)
These are stored in LE format.
Signed-off-by: Aneesh Bansal
Signed-off-by: Saksham Jain
---
Changes for v2:
- No
:
- removed IE Key extenstion support. Methodology not fixed yet.
- minor changes in commit messages (clean up)
Saksham Jain (14):
armv8: ls2080: Add SFP Configs for LS2080/LS2085
armv8: ls2080: Add Secure Boot configs: SEC, Security Monitor, SRK and
RCW
SECURE BOOT: Add
In LS2080/LS2085, SFP is LE and Ver is 3.4
The base address is 0x01e80200
SFP will be used in Secure Boot to read fuses.
Signed-off-by: Aneesh Bansal
Signed-off-by: Saksham Jain
---
Changes for v2:
- No changes
Changes for v3:
- No changes
Changes for v4:
- Cleaned up
care in bootscript (Execute esbc_halt command in case
of
image verification process) or it can be taken care in Uboot Code.
Doing the latter via a esbc_halt.
Signed-off-by: Aneesh Bansal
Signed-off-by: Saksham Jain
---
Changes for v2:
- No changes
Changes for v3:
- No changes
er of any image, Use keys from IE table,
otherwise use keys tied up with SoC's fuses (SRK).
The address of IE Table HDR is fixed for NOR. In case of boot from other
devices, IE Table and it's Header needs to be copied to an XIP Memory.
Signed-off-by: Aneesh Bansal
Signed-off-by: Saksham
is change helps when fsl_secboot_validate function is called from within
UBOOT (because now instead of calling function "getenv("img_addr")"
we can directly get the image address.)
Signed-off-by: Aneesh Bansal
Signed-off-by: Saksham Jain
---
Changes for v2:
- Not present in v1 patch
For secure boot, currently we were using fixed bootargs for
all SoCs. This is not needed and we can use the bootargs
which are used in non-secure boot.
Incase bootargs are not defined for non-secure boot of any
platform, we use default bootargs.
Signed-off-by: Aneesh Bansal
Signed-off-by: Saksham
-off-by: Saksham Jain
---
Changes for v2:
- No changes
Changed for v3:
- No changes
drivers/crypto/fsl/desc_constr.h | 7 +++
1 file changed, 3 insertions(+), 4 deletions(-)
diff --git a/drivers/crypto/fsl/desc_constr.h b/drivers/crypto/fsl/desc_constr.h
index 2559ccd
e and Read
Allocate.
Signed-off-by: Aneesh Bansal
Signed-off-by: Saksham Jain
---
Changes for v2:
- No changes
Changes for v3:
- No changes
drivers/crypto/fsl/jr.c | 13 +
drivers/crypto/fsl/jr.h | 3 +++
2 files changed, 16 insertions(+)
diff --git a/drivers/crypt
The GUR (DCFG) registers in CCSR space are in LE format
for ls2080/ls2085. Defined a config CONFIG_SYS_FSL_CCSR_GUR_LE in
arch/arm/include/asm/arch-fsl-layerscape/config.h
Signed-off-by: Aneesh Bansal
Signed-off-by: Saksham Jain
---
Changes for v2:
- No changes
Changes for v3
During secure boot, SMMU is enabled on POR by SP bootrom.
SMMU needs to be put in Bypass mode in uboot to
enable CAAM transcations to pass through.
During Nonsecure Boot, SP BootROM doesn't enable SMMU and
at reset SMMU is in bypass mode.
Signed-off-by: Aneesh Bansal
Signed-off-by: Saksham
case of non-xip memories (e.g. NAND, SD) it is neccessary to copy
both these images to DDR.
For other ARM Platforms (ls1043 and ls1020), header is not copied from NOR
to DDR (otherwise customers will need to modify the existing headers).
Signed-off-by: Aneesh Bansal
Signed-off-by: Saksham Jain
Secure Boot to same value
as it's default value during non-secure boot.
Signed-off-by: Aneesh Bansal
Signed-off-by: Saksham Jain
---
Changes for v2:
- No changes
Changes for v3:
- No changes
arch/arm/include/asm/fsl_secure_boot.h | 7 +++
1 file changed, 7 insertions(
: Saksham Jain
---
Changes for v2:
- No changes
Changes for v3:
- No changes
arch/arm/include/asm/fsl_secure_boot.h | 4
1 file changed, 4 insertions(+)
diff --git a/arch/arm/include/asm/fsl_secure_boot.h
b/arch/arm/include/asm/fsl_secure_boot.h
index e65caed..7c55ea1
Boot defconfigs created for boards (NOR Boot).
Signed-off-by: Aneesh Bansal
Signed-off-by: Saksham Jain
---
Changes for v2:
- No changes
Changes for v3:
- No changes
arch/arm/include/asm/fsl_secure_boot.h | 9 +++--
board/freescale/ls2080aqds/ls2080aqds.c | 5 -
board
. Keys must be in table format.
3) Hence, SRK (Key table) is by default currently always present.
4) Max Key number has increase from 4 to 8. 8th Key is unrevockable.
5) New Barker Code is being used.
Signed-off-by: Aneesh Bansal
Signed-off-by: Saksham Jain
---
Changes for v2:
- No changes
For ls2080, Added configs for various IPs used during secure boot
Added address and endianness for SEC and Security Monitor.
SRK - Fuses in SFP (Fused for public keys hash)
These are stored in LE format.
Signed-off-by: Aneesh Bansal
Signed-off-by: Saksham Jain
---
Changes for v2:
- No
In LS2080/LS2085, SFP is LE and Ver is 3.4
The base address is 0x01e80200
SFP will be used in Secure Boot to read fuses.
Signed-off-by: Aneesh Bansal
Signed-off-by: Saksham Jain
---
Changes for v2:
- No changes
Changes for v3:
- No changes
arch/arm/include/asm/arch-fsl
:
- minor changes to remove compilation warnings
Saksham Jain (15):
armv8: ls2080: Add SFP Configs for LS2080/LS2085
armv8: ls2080: Add Secure Boot configs: SEC, Security Monitor, SRK and
RCW
SECURE BOOT: Add new ESBC header for ls-ch3 Secure Boot
SECURE BOOT: Add Secure Boot
is change helps when fsl_secboot_validate function is called from within
UBOOT (because now instead of calling function "getenv("img_addr")"
we can directly get the image address.)
Signed-off-by: Aneesh Bansal
Signed-off-by: Saksham Jain
---
Changes for v2:
- Not present
er of any image, Use keys from IE table,
otherwise use keys tied up with SoC's fuses (SRK).
The address of IE Table HDR is fixed for NOR. In case of boot from other
devices, IE Table and it's Header needs to be copied to an XIP Memory.
Signed-off-by: Aneesh Bansal
Signed-off-by: Saksham
For secure boot, currently we were using fixed bootargs for
all SoCs. This is not needed and we can use the bootargs
which are used in non-secure boot.
Incase bootargs are not defined for non-secure boot of any
platform, we use default bootargs.
Signed-off-by: Aneesh Bansal
Signed-off-by: Saksham
e and Read
Allocate.
Signed-off-by: Aneesh Bansal
Signed-off-by: Saksham Jain
---
Changes for v2:
- No changes
drivers/crypto/fsl/jr.c | 13 +
drivers/crypto/fsl/jr.h | 3 +++
2 files changed, 16 insertions(+)
diff --git a/drivers/crypto/fsl/jr.c b/drivers/crypto/fsl/
During secure boot, SMMU is enabled on POR by SP bootrom.
SMMU needs to be put in Bypass mode in uboot to
enable CAAM transcations to pass through.
During Nonsecure Boot, SP BootROM doesn't enable SMMU and
at reset SMMU is in bypass mode.
Signed-off-by: Aneesh Bansal
Signed-off-by: Saksham
-off-by: Saksham Jain
---
Changes for v2:
- No changes
drivers/crypto/fsl/desc_constr.h | 7 +++
1 file changed, 3 insertions(+), 4 deletions(-)
diff --git a/drivers/crypto/fsl/desc_constr.h b/drivers/crypto/fsl/desc_constr.h
index 2559ccd..db6ddee 100644
--- a/drivers/crypto/fsl
care in bootscript (Execute esbc_halt command in case
of
image verification process) or it can be taken care in Uboot Code.
Doing the latter via a esbc_halt.
Signed-off-by: Aneesh Bansal
Signed-off-by: Saksham Jain
---
Changes for v2:
- No changes
board/freescale/common
The GUR (DCFG) registers in CCSR space are in LE format
for ls2080/ls2085. Defined a config CONFIG_SYS_FSL_CCSR_GUR_LE in
arch/arm/include/asm/arch-fsl-layerscape/config.h
Signed-off-by: Aneesh Bansal
Signed-off-by: Saksham Jain
---
Changes for v2:
- No changes
arch/arm/include/asm
Secure Boot to same value
as it's default value during non-secure boot.
Signed-off-by: Aneesh Bansal
Signed-off-by: Saksham Jain
---
Changes for v2:
- No changes
arch/arm/include/asm/fsl_secure_boot.h | 7 +++
1 file changed, 7 insertions(+)
diff --git a/arch/arm/include/asm/fsl_
case of non-xip memories (e.g. NAND, SD) it is neccessary to copy
both these images to DDR.
For other ARM Platforms (ls1043 and ls1020), header is not copied from NOR
to DDR (otherwise customers will need to modify the existing headers).
Signed-off-by: Aneesh Bansal
Signed-off-by: Saksham Jain
: Saksham Jain
---
Changes for v2:
- No changes
arch/arm/include/asm/fsl_secure_boot.h | 4
1 file changed, 4 insertions(+)
diff --git a/arch/arm/include/asm/fsl_secure_boot.h
b/arch/arm/include/asm/fsl_secure_boot.h
index e65caed..7c55ea1 100644
--- a/arch/arm/include/asm
Boot defconfigs created for boards (NOR Boot).
Signed-off-by: Aneesh Bansal
Signed-off-by: Saksham Jain
---
Changes for v2:
- No changes
arch/arm/include/asm/fsl_secure_boot.h | 9 +++--
board/freescale/ls2080aqds/ls2080aqds.c | 5 -
board/freescale/ls2080ardb/ls2080ardb.c
. Keys must be in table format.
3) Hence, SRK (Key table) is by default currently always present.
4) Max Key number has increase from 4 to 8. 8th Key is unrevockable.
5) New Barker Code is being used.
Signed-off-by: Aneesh Bansal
Signed-off-by: Saksham Jain
---
Changes for v2:
- No changes
For ls2080, Added configs for various IPs used during secure boot
Added address and endianness for SEC and Security Monitor.
SRK - Fuses in SFP (Fused for public keys hash)
These are stored in LE format.
Signed-off-by: Aneesh Bansal
Signed-off-by: Saksham Jain
---
Changes for v2:
- No
In LS2080/LS2085, SFP is LE and Ver is 3.4
The base address is 0x01e80200
SFP will be used in Secure Boot to read fuses.
Signed-off-by: Aneesh Bansal
Signed-off-by: Saksham Jain
---
Changes for v2:
- No changes
arch/arm/include/asm/arch-fsl-layerscape/config.h | 4
arch/arm
Secure Boot ESBC has been enabled on FSL LS208x platforms.
This patchset is dependent on
http://patchwork.ozlabs.org/patch/571612/
Changes for v2:
- changed function fsl_secboot_validate to return address of image
- corrected Bootscript header for ls1043 and ls1021
Saksham Jain
During secure boot, SMMU is enabled on POR by SP bootrom.
SMMU needs to be put in Bypass mode in uboot to
enable CAAM transcations to pass through.
During Nonsecure Boot, SP BootROM doesn't enable SMMU and
at reset SMMU is in bypass mode.
Signed-off-by: Aneesh Bansal
Signed-off-by: Saksham
The GUR (DCFG) registers in CCSR space are in LE format
for ls2080/ls2085. Defined a config CONFIG_SYS_FSL_CCSR_GUR_LE in
arch/arm/include/asm/arch-fsl-layerscape/config.h
Signed-off-by: Aneesh Bansal
Signed-off-by: Saksham Jain
---
arch/arm/include/asm/arch-fsl-layerscape/config.h | 3 +++
1
case of non-xip memories (e.g. NAND, SD) it is neccessary to copy
both these images to DDR.
For other ARM Platforms (ls1043 and ls1020), header is not copied from NOR
to DDR (otherwise customers will need to modify the existing headers).
Signed-off-by: Aneesh Bansal
Signed-off-by: Saksham Jain
er of any image, Use keys from IE table,
otherwise use keys tied up with SoC's fuses (SRK).
The address of IE Table HDR is fixed for NOR. In case of boot from other
devices, IE Table and it's Header needs to be copied to an XIP Memory.
Signed-off-by: Aneesh Bansal
Signed-off-by: Sa
Secure Boot ESBC has been enabled on FSL LS208x platforms.
This patchset is dependent on
http://patchwork.ozlabs.org/patch/571612/
Saksham Jain (14):
armv8: ls2080: Add SFP Configs for LS2080/LS2085
armv8: ls2080: Add Secure Boot configs: SEC, Security Monitor, SRK and
RCW
SECURE BOOT
e and Read
Allocate.
Signed-off-by: Aneesh Bansal
Signed-off-by: Saksham Jain
---
drivers/crypto/fsl/jr.c | 13 +
drivers/crypto/fsl/jr.h | 3 +++
2 files changed, 16 insertions(+)
diff --git a/drivers/crypto/fsl/jr.c b/drivers/crypto/fsl/jr.c
index b8c0c0a..01d9967 100644
---
For secure boot, currently we were using fixed bootargs for
all SoCs. This is not needed and we can use the bootargs
which are used in non-secure boot.
Incase bootargs are not defined for non-secure boot of any
platform, we use default bootargs.
Signed-off-by: Aneesh Bansal
Signed-off-by: Saksham
For ls2080, Added configs for various IPs used during secure boot
Added address and endianness for SEC and Security Monitor.
SRK - Fuses in SFP (Fused for public keys hash)
These are stored in LE format.
Signed-off-by: Aneesh Bansal
Signed-off-by: Saksham Jain
---
arch/arm/include/asm/arch
In LS2080/LS2085, SFP is LE and Ver is 3.4
The base address is 0x01e80200
SFP will be used in Secure Boot to read fuses.
Signed-off-by: Aneesh Bansal
Signed-off-by: Saksham Jain
---
arch/arm/include/asm/arch-fsl-layerscape/config.h | 4
arch/arm/include/asm/arch-fsl-layerscape
: Saksham Jain
---
arch/arm/include/asm/fsl_secure_boot.h | 4
1 file changed, 4 insertions(+)
diff --git a/arch/arm/include/asm/fsl_secure_boot.h
b/arch/arm/include/asm/fsl_secure_boot.h
index e65caed..7c55ea1 100644
--- a/arch/arm/include/asm/fsl_secure_boot.h
+++ b/arch/arm/include/asm
Secure Boot to same value
as it's default value during non-secure boot.
Signed-off-by: Aneesh Bansal
Signed-off-by: Saksham Jain
---
arch/arm/include/asm/fsl_secure_boot.h | 7 +++
1 file changed, 7 insertions(+)
diff --git a/arch/arm/include/asm/fsl_secure_boot.h
b/arch/arm/include/as
care in bootscript (Execute esbc_halt command in case
of
image verification process) or it can be taken care in Uboot Code.
Doing the latter via a esbc_halt.
Signed-off-by: Aneesh Bansal
Signed-off-by: Saksham Jain
---
board/freescale/common/cmd_esbc_validate.c | 2 +-
board/freescale/common
. Keys must be in table format.
3) Hence, SRK (Key table) is by default currently always present.
4) Max Key number has increase from 4 to 8. 8th Key is unrevockable.
5) New Barker Code is being used.
Signed-off-by: Aneesh Bansal
Signed-off-by: Saksham Jain
---
arch/arm/include/asm/arch-fsl
-off-by: Saksham Jain
---
drivers/crypto/fsl/desc_constr.h | 7 +++
1 file changed, 3 insertions(+), 4 deletions(-)
diff --git a/drivers/crypto/fsl/desc_constr.h b/drivers/crypto/fsl/desc_constr.h
index 2559ccd..db6ddee 100644
--- a/drivers/crypto/fsl/desc_constr.h
+++ b/drivers/crypto/fsl
Boot defconfigs created for boards (NOR Boot).
Signed-off-by: Aneesh Bansal
Signed-off-by: Saksham Jain
---
arch/arm/include/asm/fsl_secure_boot.h | 9 +++--
board/freescale/ls2080aqds/ls2080aqds.c | 5 -
board/freescale/ls2080ardb/ls2080ardb.c | 5 -
configs
78 matches
Mail list logo