[U-Boot] LCD LVDS support in u-boot to display splash screen on OMAP4460

2013-10-24 Thread bin4ry
Hi everybody, I am using PandaBoard ES (OMAP446) in conjunction with the chipsee resistive touch screen expansion pack (chipsee.org) for PandaBoard. The LCD is LVDS signal, it is connect to the CPU with a RGB-LVDS converter. Is there a possibility to display a splash screen or BMP in u-boot with

Re: [U-Boot] Dynamically define which Kernel image to boot during SPL execution

2013-10-10 Thread bin4ry
Am 06.10.2013 21:31, schrieb Wolfgang Denk: > Dear 0xbin4ry, > > don't you have a real name? Yes indeed, Peter. > What would "u-boot.img" be here - the full U-Boot image loaded by the > SPL? If you load and start that, then this would be the place where > you determine which kernel image to load a

Re: [U-Boot] [U-boot] SPL: Reading large files with file_fat_read()

2013-10-02 Thread bin4ry
When enabling debug mode I get the following error: dlmalloc.c:2084: malloc_extend_top: Assertion `((unsigned long)((char*)top + top_size) & (pagesz - 1)) == 0' failed. Best regards, -b ___ U-Boot mailing list U-Boot@lists.denx.de http://lists.denx.de/m

[U-Boot] SPL: Reading large files with file_fat_read()

2013-10-01 Thread bin4ry
Hi, I need to read a file in spl.c, which is about 675 bytes. I used the following code: static unsigned char helperData[675] = {0x00}; s32 err; uint8_t i = 0; printf("\n[D] - Reading Helper Data\r\n\n"); err = file_fat_read(filename, helperData, length); if(err > 0){ printf("[D] - R

Re: [U-Boot] AES: Encryption of u-boot.img

2013-09-30 Thread bin4ry
Am 13.09.2013 19:28, schrieb Michael Trimarchi: > Hi > I don't understand you can decrypt it after load. Why just verify the > signature? > > Michael > This is a proof-of-concept for a technique, which involves de-/encrypting the u-boot.img with a key derived from a hardware fingerprint. This is

Re: [U-Boot] AES: Encryption of u-boot.img

2013-09-30 Thread bin4ry
Hi Albert, so if I get you right the workflow for payload authentication is the following: Encryption process: 1. Create hash value H for u-boot.img 2. Encrypt the hash value H with secret K to get encrypted hash values H_enc 3. Store H_enc Decryption process: 1. Read H_enc 2. Decrypt H_enc us

[U-Boot] AES: Encryption of u-boot.img

2013-09-13 Thread bin4ry
Hi everyone, I want to implement a minimal secure boot architecture into u-boot by letting the u-boot.img be decrypted during SPL execution. Thus, the u-boot.img is present on the MMC in an encrypted version. I already implemented a basic AES-128 en-/decryption algorithm into the SPL. Everything

Re: [U-Boot] SPL binary too large for OMAP4460 OCM

2013-09-05 Thread bin4ry
013 02:34 PM, bin4ry wrote: >> Am 04.09.2013 10:56, schrieb Sricharan R: >>> On Wednesday 04 September 2013 02:18 PM, Michael Trimarchi wrote: >>>> Hi >>>> >>>> On Wed, Sep 4, 2013 at 10:44 AM, Sricharan R wrote: >>>>> On We

Re: [U-Boot] SPL binary too large for OMAP4460 OCM

2013-09-04 Thread bin4ry
Am 04.09.2013 10:56, schrieb Sricharan R: > On Wednesday 04 September 2013 02:18 PM, Michael Trimarchi wrote: >> Hi >> >> On Wed, Sep 4, 2013 at 10:44 AM, Sricharan R wrote: >>> On Wednesday 04 September 2013 01:01 PM, bin4ry wrote: >>>> Hi everybody, &g

[U-Boot] SPL binary too large for OMAP4460 OCM

2013-09-04 Thread bin4ry
Hi everybody, I need to add functionality to the SPL code. I tried to implement in a memory-saving way, however, the SPL is about 45 kB after compilation. To get compilation working, I had to set CONFIG_SPL_MAX_SIZE to (45 * 1024). Now, the SPL as well as u-boot won't boot. After the device' (Pand

[U-Boot] Unexpected effects/problems porting code to u-boot SPL

2013-08-28 Thread bin4ry
I want to extend the u-boot SPL code with some fuzzy extractor logic by adding code into `{u-boot_sources}/arch/arm/cpu/armv7/omap-common/hwinit-common.c`. U-boot shall be used on a PandaBoard ES (omap4460 SoC). Thus, first I successfully implemented the code on my x86 pc and I am porting it to th