[PATCH v8 3/3] efi_loader: Extend PCR's for firmware measurements

2021-11-28 Thread Ruchika Gupta
extended PCR's, PCR0 would not be 0. So, read the PCR0 to determine if the PCR's need to be extended as eventlog is parsed or not. Signed-off-by: Ruchika Gupta Reviewed-by: Ilias Apalodimas Tested-by: Ilias Apalodimas --- v8: Addressed issues reported by cppcheck v7: Addressed Heinrick's

[PATCH v8 2/3] tpm: use more algorithms than sha256 on pcr_read

2021-11-28 Thread Ruchika Gupta
The current tpm2_pcr_read is hardcoded using SHA256. Make the actual command to TPM configurable to use wider range of algorithms. The current command line is kept as is i.e limited to SHA-256 only. Signed-off-by: Ruchika Gupta Reviewed-by: Ilias Apalodimas --- v8: No change v7: No change v6

[PATCH v8 1/3] efi_loader: Add check for event log passed from firmware

2021-11-28 Thread Ruchika Gupta
to check if even log has been passed to u-boot from earlier firmware components. If available, the eventlog is parsed to check for its correctness and further event logs are appended to the passed log. Signed-off-by: Ruchika Gupta Reviewed-by: Ilias Apalodimas Tested-by: Ilias Apalodimas --- v8

[PATCH v7 3/3] efi_loader: Extend PCR's for firmware measurements

2021-11-26 Thread Ruchika Gupta
extended PCR's, PCR0 would not be 0. So, read the PCR0 to determine if the PCR's need to be extended as eventlog is parsed or not. Signed-off-by: Ruchika Gupta Reviewed-by: Ilias Apalodimas Tested-by: Ilias Apalodimas --- v7: Addressed Heinrick's comments - Added missing parameter in function

[v7 PATCH 2/3] tpm: use more algorithms than sha256 on pcr_read

2021-11-26 Thread Ruchika Gupta
The current tpm2_pcr_read is hardcoded using SHA256. Make the actual command to TPM configurable to use wider range of algorithms. The current command line is kept as is i.e limited to SHA-256 only. Signed-off-by: Ruchika Gupta Reviewed-by: Ilias Apalodimas --- v7: No change v6: No change v5

[PATCH v7 1/3] efi_loader: Add check for event log passed from firmware

2021-11-26 Thread Ruchika Gupta
to check if even log has been passed to u-boot from earlier firmware components. If available, the eventlog is parsed to check for its correctness and further event logs are appended to the passed log. Signed-off-by: Ruchika Gupta --- v7: Addressed Heinrich's comments Changed functions

Re: [PATCH v6 1/3] efi_loader: Add check for event log passed from firmware

2021-11-26 Thread Ruchika Gupta
Hi Heinrich, On Fri, 26 Nov 2021 at 13:01, Heinrich Schuchardt wrote: > On 11/26/21 06:00, Ruchika Gupta wrote: > > Platforms may have support to measure their initial firmware components > > and pass the event log to u-boot. The event log address can be passed

[PATCH v6 3/3] efi_loader: Extend PCR's for firmware measurements

2021-11-25 Thread Ruchika Gupta
extended PCR's, PCR0 would not be 0. So, read the PCR0 to determine if the PCR's need to be extended as eventlog is parsed or not. Signed-off-by: Ruchika Gupta Reviewed-by: Ilias Apalodimas Tested-by: Ilias Apalodimas --- v6: Changed TPM2_DIGEST_LEN to TPM2_SHA512_DIGEST_SIZE v5 : No change v4

[PATCH v6 2/3] tpm: use more algorithms than sha256 on pcr_read

2021-11-25 Thread Ruchika Gupta
The current tpm2_pcr_read is hardcoded using SHA256. Make the actual command to TPM configurable to use wider range of algorithms. The current command line is kept as is i.e limited to SHA-256 only. Signed-off-by: Ruchika Gupta Reviewed-by: Ilias Apalodimas --- v6: No change v5: No change v4

[PATCH v6 1/3] efi_loader: Add check for event log passed from firmware

2021-11-25 Thread Ruchika Gupta
to check if even log has been passed to u-boot from earlier firmware components. If available, the eventlog is parsed to check for its correctness and further event logs are appended to the passed log. Signed-off-by: Ruchika Gupta Tested-by: Ilias Apalodimas Reviewed-by: Ilias Apalodimas --- v6

[PATCH v5 2/3] tpm: use more algorithms than sha256 on pcr_read

2021-11-24 Thread Ruchika Gupta
The current tpm2_pcr_read is hardcoded using SHA256. Make the actual command to TPM configurable to use wider range of algorithms. The current command line is kept as is i.e limited to SHA-256 only. Signed-off-by: Ruchika Gupta Reviewed-by: Ilias Apalodimas --- v5: No change v4: No change v3

[PATCH v5 3/3] efi_loader: Extend PCR's for firmware measurements

2021-11-24 Thread Ruchika Gupta
extended PCR's, PCR0 would not be 0. So, read the PCR0 to determine if the PCR's need to be extended as eventlog is parsed or not. Signed-off-by: Ruchika Gupta Reviewed-by: Ilias Apalodimas --- v5 : No change v4 : No change v3 : Rebase changes on top of changes made in first patch of series v2

[PATCH v5 1/3] efi_loader: Add check for event log passed from firmware

2021-11-24 Thread Ruchika Gupta
to check if even log has been passed to u-boot from earlier firmware components. If available, the eventlog is parsed to check for its correctness and further event logs are appended to the passed log. Signed-off-by: Ruchika Gupta --- v5: Shift the efi_init_event_log() to a different location

[PATCH v4 3/3] efi_loader: Extend PCR's for firmware measurements

2021-11-24 Thread Ruchika Gupta
extended PCR's, PCR0 would not be 0. So, read the PCR0 to determine if the PCR's need to be extended as eventlog is parsed or not. Signed-off-by: Ruchika Gupta Reviewed-by: Ilias Apalodimas --- v4 : No change v3 : Rebase changes on top of changes made in first patch of series v2 : Removed

[PATCH v4 2/3] tpm: use more algorithms than sha256 on pcr_read

2021-11-24 Thread Ruchika Gupta
The current tpm2_pcr_read is hardcoded using SHA256. Make the actual command to TPM configurable to use wider range of algorithms. The current command line is kept as is i.e limited to SHA-256 only. Signed-off-by: Ruchika Gupta Reviewed-by: Ilias Apalodimas --- v4: No change v3: No change v2

[PATCH v4 1/3] efi_loader: Add check for event log passed from firmware

2021-11-24 Thread Ruchika Gupta
to check if even log has been passed to u-boot from earlier firmware components. If available, the eventlog is parsed to check for its correctness and further event logs are appended to the passed log. Signed-off-by: Ruchika Gupta --- v4: Add SCRTM version to log only if previous firmware doesn;t

Re: [v2][PATCH 1/3] efi_loader: Add check for event log passed from firmware

2021-11-24 Thread Ruchika Gupta
Hi Kojima-san, On Wed, 24 Nov 2021 at 13:08, Masahisa Kojima wrote: > Hi Ruchika, Ilias, > > On Tue, 23 Nov 2021 at 20:53, Ruchika Gupta > wrote: > > > > Platforms may have support to measure their initial firmware components > > and pass the event log to u-b

Re: [v2][PATCH 1/3] efi_loader: Add check for event log passed from firmware

2021-11-24 Thread Ruchika Gupta
Hi Ilias, On Wed, 24 Nov 2021 at 12:34, Ilias Apalodimas wrote: > Hi Ruchika, > > + > > [...] > > > + ret = platform_get_eventlog(dev, , ); > > + if (ret == EFI_SUCCESS) { > > Can we invert the logic here? > if (ret != EFI_SUCCESS) > return ret; > > etc... > Change posted in v3.

[v3] [PATCH 3/3] efi_loader: Extend PCR's for firmware measurements

2021-11-23 Thread Ruchika Gupta
extended PCR's, PCR0 would not be 0. So, read the PCR0 to determine if the PCR's need to be extended as eventlog is parsed or not. Signed-off-by: Ruchika Gupta --- v3 : Rebase changes on top of changes made in first patch of series v2 : Removed check for PCR0 in eventlog lib/efi_loader

[v3][PATCH 2/3] tpm: use more algorithms than sha256 on pcr_read

2021-11-23 Thread Ruchika Gupta
The current tpm2_pcr_read is hardcoded using SHA256. Make the actual command to TPM configurable to use wider range of algorithms. The current command line is kept as is i.e limited to SHA-256 only. Signed-off-by: Ruchika Gupta --- v3: No change v2: Change algorithm from u32 to u16 Add

[v3][PATCH 1/3] efi_loader: Add check for event log passed from firmware

2021-11-23 Thread Ruchika Gupta
to check if even log has been passed to u-boot from earlier firmware components. If available, the eventlog is parsed to check for its correctness and further event logs are appended to the passed log. Signed-off-by: Ruchika Gupta --- v3: Return as soon as you detect error v2: Moved firmware

[v2] [PATCH 3/3] efi_loader: Extend PCR's for firmware measurements

2021-11-23 Thread Ruchika Gupta
extended PCR's, PCR0 would not be 0. So, read the PCR0 to determine if the PCR's need to be extended as eventlog is parsed or not. Signed-off-by: Ruchika Gupta --- v2 : Removed check for PCR0 in eventlog lib/efi_loader/efi_tcg2.c | 77 +++ 1 file changed, 77

[v2] [PATCH 2/3] tpm: use more algorithms than sha256 on pcr_read

2021-11-23 Thread Ruchika Gupta
The current tpm2_pcr_read is hardcoded using SHA256. Make the actual command to TPM configurable to use wider range of algorithms. The current command line is kept as is i.e limited to SHA-256 only. Signed-off-by: Ruchika Gupta --- v2: Change algorithm from u32 to u16 Add parameter description

[v2][PATCH 1/3] efi_loader: Add check for event log passed from firmware

2021-11-23 Thread Ruchika Gupta
to check if even log has been passed to u-boot from earlier firmware components. If available, the eventlog is parsed to check for its correctness and further event logs are appended to the passed log. Signed-off-by: Ruchika Gupta --- v2: Moved firmware eventlog code parsing

[v2] [PATCH 3/3] efi_loader: Extend PCR's for firmware measurements

2021-11-23 Thread Ruchika Gupta
extended PCR's, PCR0 would not be 0. So, read the PCR0 to determine if the PCR's need to be extended as eventlog is parsed or not. Signed-off-by: Ruchika Gupta --- v2 : Removed check for PCR0 in eventlog lib/efi_loader/efi_tcg2.c | 77 +++ 1 file changed, 77

[v2] [PATCH 2/3] tpm: use more algorithms than sha256 on pcr_read

2021-11-23 Thread Ruchika Gupta
The current tpm2_pcr_read is hardcoded using SHA256. Make the actual command to TPM configurable to use wider range of algorithms. The current command line is kept as is i.e limited to SHA-256 only. Signed-off-by: Ruchika Gupta --- v2: Change algorithm from u32 to u16 Add parameter description

[v2][PATCH 1/3] efi_loader: Add check for event log passed from firmware

2021-11-23 Thread Ruchika Gupta
to check if even log has been passed to u-boot from earlier firmware components. If available, the eventlog is parsed to check for its correctness and further event logs are appended to the passed log. Signed-off-by: Ruchika Gupta --- v2: Moved firmware eventlog code parsing

Re: [PATCH] efi_loader: fix FinalEvents table if an EFI uses GetEventLog

2021-11-17 Thread Ruchika Gupta
Please ignore this patch. Sent by mistake. On Thu, 18 Nov 2021 at 11:48, Ruchika Gupta wrote: > --- > lib/efi_loader/efi_tcg2.c | 90 ++- > 1 file changed, 61 insertions(+), 29 deletions(-) > > diff --git a/lib/efi_loader/efi_tcg2.c b/lib/efi_

[PATCH 3/3] efi_loader: Extend PCR's for firmware measurements

2021-11-17 Thread Ruchika Gupta
to determine if the previous firmwares have extended the PCR0. If not, then extend the PCR's as the eventlog is parsed. Signed-off-by: Ruchika Gupta --- lib/efi_loader/efi_tcg2.c | 86 +++ 1 file changed, 86 insertions(+) diff --git a/lib/efi_loader/efi_tcg2.c b

[PATCH 2/3] tpm: use more algorithms than sha256 on pcr_read

2021-11-17 Thread Ruchika Gupta
The current tpm2_pcr_read is hardcoded using SHA256. Make the actual command to TPM configurable to use wider range of algorithms. The current command line is kept as is i.e limited to SHA-256 only. Signed-off-by: Ruchika Gupta --- cmd/tpm-v2.c | 3 ++- include/tpm-v2.h | 3 ++- lib/tpm

[PATCH] efi_loader: fix FinalEvents table if an EFI uses GetEventLog

2021-11-17 Thread Ruchika Gupta
--- lib/efi_loader/efi_tcg2.c | 90 ++- 1 file changed, 61 insertions(+), 29 deletions(-) diff --git a/lib/efi_loader/efi_tcg2.c b/lib/efi_loader/efi_tcg2.c index 189e4a5ba5..215f4b2b04 100644 --- a/lib/efi_loader/efi_tcg2.c +++ b/lib/efi_loader/efi_tcg2.c @@

[PATCH 1/3] efi_loader: Add check for event log passed from firmware

2021-11-17 Thread Ruchika Gupta
to check if even log has been passed to u-boot from earlier firmware components. If available, the eventlog is parsed to check for its correctness and further event logs are appended to the passed log. Signed-off-by: Ruchika Gupta --- lib/efi_loader/efi_tcg2.c | 312

[PATCH] efi_loader: Fix spec ID event creation

2021-09-14 Thread Ruchika Gupta
ID event creation. Similarly, the algorithm array in spec ID event should be a variable length array with length being equal to the number_of_algorithms field. In current implementation this is defined as a fixed length array which has been fixed. Signed-off-by: Ruchika Gupta CC: Masahisa Kojima

[PATCH 3/3] configs: lx2160a: Enable OPTEE support

2020-04-22 Thread Ruchika Gupta
Enable support to compile OPTEE driver, access AVB TA and RPMB API's access via RPC from OPTEE for lx2160 Signed-off-by: Ruchika Gupta --- configs/lx2160ardb_tfa_defconfig | 5 + 1 file changed, 5 insertions(+) diff --git a/configs/lx2160ardb_tfa_defconfig b/configs

[PATCH 2/3] arm64: lx2160a: dts: Add OPTEE node

2020-04-22 Thread Ruchika Gupta
Add OPTEE node in lx2 device tree to enable access of OPTEE TA's from u-boot. Signed-off-by: Ruchika Gupta --- arch/arm/dts/fsl-lx2160a.dtsi | 7 +++ 1 file changed, 7 insertions(+) diff --git a/arch/arm/dts/fsl-lx2160a.dtsi b/arch/arm/dts/fsl-lx2160a.dtsi index 42ce4379ec..f0306e9390

[PATCH 1/3] cmd: optee_rpmb command for read/write of rpmb from optee

2020-04-22 Thread Ruchika Gupta
lue - read persistent values on rpmb via OPTEE AVB TA optee_rpmb write_pvalue - write persistent values on rpmb via OPTEE AVB TA Signed-off-by: Ruchika Gupta --- cmd/Kconfig | 16 +++ cmd/Makefile | 1 + cmd/optee_rpmb.c | 269 +++ 3 files ch

[U-Boot] [PATCH][v2] armv8: sec_firmware: Remove JR3 from device tree node in all cases

2018-04-12 Thread Ruchika Gupta
of random number generation function has been removed Signed-off-by: Ruchika Gupta <ruchika.gu...@nxp.com> --- Changes from v1: Removed unused variable rand from the sec_firmware_support_hwrng function arch/arm/cpu/armv8/fsl-layerscape/fdt.c | 4 ++-- arch/arm/cpu/armv8/sec_firmware.c

[U-Boot] [PATCH] armv8: sec_firmware: Remove JR3 from device tree node in all cases

2018-02-09 Thread Ruchika Gupta
of random number generation function has been removed Signed-off-by: Ruchika Gupta <ruchika.gu...@nxp.com> --- arch/arm/cpu/armv8/fsl-layerscape/fdt.c | 4 ++-- arch/arm/cpu/armv8/sec_firmware.c | 5 +++-- 2 files changed, 5 insertions(+), 4 deletions(-) diff --git a/arch/arm/cpu/arm

Re: [U-Boot] [RESEND PATCH v3 1/2] drivers/crypto/fsl: assign job-rings to non-TrustZone

2018-02-08 Thread Ruchika Gupta
raunhofer.de; Bryan O'Donoghue ><bryan.odonog...@linaro.org>; Alexandru Porosanu ><alexandru.poros...@nxp.com>; Ruchika Gupta <ruchika.gu...@nxp.com>; >Aneesh Bansal <aneesh.ban...@nxp.com> >Subject: [RESEND PATCH v3 1/2] drivers/crypto/fsl: assign job-rings to non

[U-Boot] [PATCH][v4] ARMv8/sec_firmware : Update chosen/kaslr-seed with random number

2017-08-16 Thread Ruchika Gupta
kASLR support in kernel requires a random number to be passed via chosen/kaslr-seed propert. sec_firmware generates this random seed which can then be passed in the device tree node. sec_firmware reserves JR3 for it's own usage. Node for JR3 is removed from device-tree. Signed-off-by: Ruchika

[U-Boot] [PATCH][v3] ARMv8/sec_firmware : Update chosen/kaslr-seed with random number

2017-08-02 Thread Ruchika Gupta
kASLR support in kernel requires a random number to be passed via chosen/kaslr-seed propert. sec_firmware generates this random seed which can then be passed in the device tree node. sec_firmware reserves JR3 for it's own usage. Node for JR3 is removed from device-tree. Signed-off-by: Ruchika

[U-Boot] [PATCH][v2] ARMv8/sec_firmware : Update chosen/kaslr-seed with random number

2017-07-28 Thread Ruchika Gupta
kASLR support in kernel requires a random number to be passed via chosen/kaslr-seed propert. sec_firmware generates this random seed which can then be passed in the device tree node. sec_firmware reserves JR3 for it's own usage. Node for JR3 is removed from device-tree. Signed-off-by: Ruchika

Re: [U-Boot] [PATCH] ARMv8/sec_firmware : Update chosen/kaslr-seed

2017-05-16 Thread Ruchika Gupta
> -Original Message- > From: Poonam Aggrwal > Sent: Monday, May 15, 2017 9:27 AM > To: Ruchika Gupta <ruchika.gu...@nxp.com>; u-boot@lists.denx.de; > sun.y...@nxp.com; Prabhakar Kushwaha <prabhakar.kushw...@nxp.com> > Cc: Ruchika Gupta <ruchika.gu..

Re: [U-Boot] [PATCH] ARMv8/sec_firmware : Update chosen/kaslr-seed

2017-05-16 Thread Ruchika Gupta
> -Original Message- > From: Peter Robinson [mailto:pbrobin...@gmail.com] > Sent: Monday, May 15, 2017 6:18 PM > To: Ruchika Gupta <ruchika.gu...@nxp.com> > Cc: u-boot@lists.denx.de; sun.y...@nxp.com; Prabhakar Kushwaha > <prabhakar.kushw...@nxp.com> > Su

[U-Boot] [PATCH] ARMv8/sec_firmware : Update chosen/kaslr-seed

2017-05-12 Thread Ruchika Gupta
kASLR support in kernel requires a random number to be passed via chosen/kaslr-seed propert. sec_firmware generates this random seed which can then be passed in the device tree node sec_firmware reserves JR3 for it's own usage. Node for JR3 is removed from device-tree. Signed-off-by: Ruchika

Re: [U-Boot] [PATCH 1/3][v3] arm: ls1043ardb: Add SD secure boot target

2017-04-17 Thread Ruchika Gupta
> -Original Message- > From: York Sun [mailto:york@nxp.com] > Sent: Wednesday, April 12, 2017 9:10 PM > To: Ruchika Gupta <ruchika.gu...@nxp.com>; u-boot@lists.denx.de > Cc: Vini Pillai <vinitha.pil...@nxp.com>; Sumit Garg <sumit.g...@nxp.com> &

[U-Boot] [PATCH 3/3][v5] arm: ls1046ardb: Add SD secure boot target

2017-04-17 Thread Ruchika Gupta
for SPL build. Signed-off-by: Vinitha Pillai <vinitha.pil...@nxp.com> Signed-off-by: Sumit Garg <sumit.g...@nxp.com> Signed-off-by: Ruchika Gupta <ruchika.gu...@nxp.com> --- Changes in v5: Updated MAINTAINERS file Changes in v4: Removed spl_board_init from board specific file. Cha

[U-Boot] [PATCH 2/3][v4] arm: ls1043ardb: Add NAND secure boot target

2017-04-17 Thread Ruchika Gupta
for CONFIG_BOOTSCRIPT_COPY_RAM is enabled to copy Bootscript from NAND to DDR. Offsets for Bootscript on NAND and DDR have been also defined. Signed-off-by: Vinitha Pillai <vinitha.pil...@nxp.com> Signed-off-by: Sumit Garg <sumit.g...@nxp.com> Signed-off-by: Ruchika Gupta <ruchika.gu...@nxp.com>

[U-Boot] [PATCH 1/3][v4] arm: ls1043ardb: Add SD secure boot target

2017-04-17 Thread Ruchika Gupta
of strings to reduce the size of SPL image Signed-off-by: Vinitha Pillai-B57223 <vinitha.pil...@nxp.com> Signed-off-by: Sumit Garg <sumit.g...@nxp.com> Signed-off-by: Ruchika Gupta <ruchika.gu...@nxp.com> --- Changes in v4: Updated Maintainers file Changes in v3: Moved spl_b

Re: [U-Boot] [PATCH 2/3][v3] arm: ls1043ardb: Add NAND secure boot target

2017-04-13 Thread Ruchika Gupta
> -Original Message- > From: York Sun [mailto:york@nxp.com] > Sent: Wednesday, April 12, 2017 9:00 PM > To: Ruchika Gupta <ruchika.gu...@nxp.com>; u-boot@lists.denx.de > Cc: Vini Pillai <vinitha.pil...@nxp.com>; Sumit Garg <sumit.g...@nxp.com> &

Re: [U-Boot] [PATCH 3/3][v3] [RESEND] arm: ls1046ardb: Add SD secure boot target

2017-04-04 Thread Ruchika Gupta
> -Original Message- > From: york sun > Sent: Tuesday, April 04, 2017 9:29 PM > To: Ruchika Gupta <ruchika.gu...@nxp.com>; u-boot@lists.denx.de > Cc: Vini Pillai <vinitha.pil...@nxp.com>; Sumit Garg <sumit.g...@nxp.com> > Subject: Re: [PATCH 3/3][v3] [RE

[U-Boot] [PATCH 3/3][v4] arm: ls1046ardb: Add SD secure boot target

2017-04-04 Thread Ruchika Gupta
for SPL build. Signed-off-by: Vinitha Pillai <vinitha.pil...@nxp.com> Signed-off-by: Sumit Garg <sumit.g...@nxp.com> Signed-off-by: Ruchika Gupta <ruchika.gu...@nxp.com> --- Changes in v4: Removed spl_board_init from board specific file. Changes in v3: Resend Changes in v2:

[U-Boot] [PATCH 2/3][v3] arm: ls1043ardb: Add NAND secure boot target

2017-04-04 Thread Ruchika Gupta
for CONFIG_BOOTSCRIPT_COPY_RAM is enabled to copy Bootscript from NAND to DDR. Offsets for Bootscript on NAND and DDR have been also defined. Signed-off-by: Vinitha Pillai <vinitha.pil...@nxp.com> Signed-off-by: Sumit Garg <sumit.g...@nxp.com> Signed-off-by: Ruchika Gupta <ruchika.gu...@nxp.com>

[U-Boot] [PATCH 1/3][v3] arm: ls1043ardb: Add SD secure boot target

2017-04-04 Thread Ruchika Gupta
of strings to reduce the size of SPL image Signed-off-by: Vinitha Pillai-B57223 <vinitha.pil...@nxp.com> Signed-off-by: Sumit Garg <sumit.g...@nxp.com> Signed-off-by: Ruchika Gupta <ruchika.gu...@nxp.com> --- Changes in v3: Moved spl_board_init function to arch/arm/cpu/armv8/fs

Re: [U-Boot] [PATCH 3/3][v3] [RESEND] arm: ls1046ardb: Add SD secure boot target

2017-04-04 Thread Ruchika Gupta
> -Original Message- > From: york sun > Sent: Monday, April 03, 2017 9:01 PM > To: Ruchika Gupta <ruchika.gu...@nxp.com>; u-boot@lists.denx.de > Cc: Vini Pillai <vinitha.pil...@nxp.com>; Sumit Garg <sumit.g...@nxp.com> > Subject: Re: [PATCH 3/3][v3] [RE

Re: [U-Boot] [PATCH 3/3][v3] [RESEND] arm: ls1046ardb: Add SD secure boot target

2017-04-03 Thread Ruchika Gupta
> -Original Message- > From: york sun > Sent: Saturday, April 01, 2017 1:44 AM > To: Ruchika Gupta <ruchika.gu...@nxp.com>; u-boot@lists.denx.de > Cc: Vini Pillai <vinitha.pil...@nxp.com>; Sumit Garg <sumit.g...@nxp.com> > Subject: Re: [PATCH 3/3][

[U-Boot] [PATCH 2/3][v2] arm: ls1043ardb: Add NAND secure boot target

2017-03-29 Thread Ruchika Gupta
l also be copied from SD to DDR. - MACRO for CONFIG_BOOTSCRIPT_COPY_RAM is enabled to copy Bootscript from NAND to DDR. Offsets for Bootscript on NAND and DDR have been also defined. Signed-off-by: Vinitha Pillai <vinitha.pil...@nxp.com> Signed-off-by: Sumit Garg <sumit.g...@nxp.com> Sign

[U-Boot] [PATCH 3/3][v3] [RESEND] arm: ls1046ardb: Add SD secure boot target

2017-03-29 Thread Ruchika Gupta
Pillai <vinitha.pil...@nxp.com> Signed-off-by: Sumit Garg <sumit.g...@nxp.com> Signed-off-by: Ruchika Gupta <ruchika.gu...@nxp.com> --- Changes from v1: - Rebased patches to latest dependent patch set - With the dependent path set , spl imag size increased to 94K. So - additionally r

[U-Boot] [PATCH 3/3] arm: ls1046ardb: Add SD secure boot target

2017-03-29 Thread Ruchika Gupta
Pillai <vinitha.pil...@nxp.com> Signed-off-by: Sumit Garg <sumit.g...@nxp.com> Signed-off-by: Ruchika Gupta <ruchika.gu...@nxp.com> --- Changes from v1: - Rebased patches to latest dependent patch set - With the dependent path set , spl imag size increased to 94K. So - additionally r

[U-Boot] [PATCH 1/3][v2] arm: ls1043ardb: Add SD secure boot target

2017-03-29 Thread Ruchika Gupta
of strings to reduce the size of SPL image Signed-off-by: Vinitha Pillai-B57223 <vinitha.pil...@nxp.com> Signed-off-by: Sumit Garg <sumit.g...@nxp.com> Signed-off-by: Ruchika Gupta <ruchika.gu...@nxp.com> --- Changes from v1: Rebased to latest dependent patches: - No change Dependent

Re: [U-Boot] [PATCH] powerpc: e6500: Lock/unlock 1 cache instead of L1 as init_ram

2017-03-27 Thread Ruchika Gupta
> -Original Message- > From: york sun > Sent: Saturday, March 25, 2017 10:16 PM > To: Ruchika Gupta <ruchika.gu...@nxp.com>; u-boot@lists.denx.de; > prabhakar.khushw...@nxp.com > Subject: Re: [U-Boot] [PATCH] powerpc: e6500: Lock/unlock 1 cache instead > of L

[U-Boot] [PATCH] powerpc: e6500: Lock/unlock 1 cache instead of L1 as init_ram

2017-03-01 Thread Ruchika Gupta
Fir E6500 cores, L2 cache has been used as init_ram. L1 cache is a write through cache on E6500.If lines are not locked in both L1 and L2 caches, crashes are observed during secure boot. This patch locks/unlocks both L1 as well as L2 cache to prevent the crash. Signed-off-by: Ruchika Gupta

[U-Boot] [PATCH] powerpc: e6500: Lock/unlock 1 cache instead of L1 as init_ram

2017-03-01 Thread Ruchika Gupta
Fir E6500 cores, L2 cache has been used as init_ram. L1 cache is a write through cache on E6500.If lines are not locked in both L1 and L2 caches, crashes are observed during secure boot. This patch locks/unlocks both L1 as well as L2 cache to prevent the crash. Signed-off-by: Ruchika Gupta

[U-Boot] [PATCH 1/3] arm: ls1043ardb: Add SD secure boot target

2017-02-20 Thread Ruchika Gupta
of strings to reduce the size of SPL image Signed-off-by: Vinitha Pillai-B57223 <vinitha.pil...@nxp.com> Signed-off-by: Sumit Garg <sumit.g...@nxp.com> Signed-off-by: Ruchika Gupta <ruchika.gu...@nxp.com> --- The patchset is dependent on the following patches: https://patchwork.ozlab

[U-Boot] [PATCH 3/3] arm: ls1046ardb: Add SD secure boot target

2017-02-20 Thread Ruchika Gupta
t Garg <sumit.g...@nxp.com> Signed-off-by: Ruchika Gupta <ruchika.gu...@nxp.com> --- The patchset is dependent on the following patches: https://patchwork.ozlabs.org/patch/717614/ http://patchwork.ozlabs.org/patch/724332/ http://patchwork.ozlabs.org/patch/729932/ http://patchwork.ozlab

[U-Boot] [PATCH 2/3] arm: ls1043ardb: Add NAND secure boot target

2017-02-20 Thread Ruchika Gupta
for CONFIG_BOOTSCRIPT_COPY_RAM is enabled to copy Bootscript from NAND to DDR. Offsets for Bootscript on NAND and DDR have been also defined. Signed-off-by: Vinitha Pillai-B57223 <vinitha.pil...@nxp.com> Signed-off-by: Sumit Garg <sumit.g...@nxp.com> Signed-off-by: Ruchika Gupta <ruchika.gu...@nxp.com>

[U-Boot] [PATCH 0/3] SECURE Boot targets for NAND and SD on LS1043, LS1046

2017-02-20 Thread Ruchika Gupta
Ruchika Gupta (3): arm: ls1043ardb: Add SD secure boot target arm: ls1043ardb: Add NAND secure boot target arm: ls1046ardb: Add SD secure boot target arch/arm/include/asm/fsl_secure_boot.h | 16 +-- board/freescale/common/fsl_validate.c | 4 ++ board/freescale

Re: [U-Boot] [PATCH] armv8: ls1043a: Extend the size for SPL

2016-09-08 Thread Ruchika Gupta
from the boot source. Regards, Ruchika -Original Message- From: Q.Y. Gong Sent: Thursday, September 08, 2016 12:32 PM To: Prabhakar Kushwaha <prabhakar.kushw...@nxp.com>; york sun <york@nxp.com>; Ruchika Gupta <ruchika.gu...@nxp.com>; u-boot@lists.denx.de Cc: V

Re: [U-Boot] [PATCH v3] imx: imx7 Support for Manufacturing Protection

2016-02-15 Thread Ruchika Gupta
> diff --git a/drivers/crypto/fsl/Makefile b/drivers/crypto/fsl/Makefile index > fd736cf..6d6903b 100644 > --- a/drivers/crypto/fsl/Makefile > +++ b/drivers/crypto/fsl/Makefile > @@ -8,3 +8,7 @@ obj-y += sec.o > obj-$(CONFIG_FSL_CAAM) += jr.o fsl_hash.o jobdesc.o error.o >

Re: [U-Boot] [PATCH v3 5/7] enable chain of trust for ARM platforms

2016-01-27 Thread Ruchika Gupta
> -Original Message- > From: Aneesh Bansal [mailto:aneesh.ban...@nxp.com] > Sent: Friday, January 22, 2016 4:37 PM > To: u-boot@lists.denx.de > Cc: york sun <york@nxp.com>; Ruchika Gupta > <ruchika.gu...@nxp.com>; Prabhakar Kushwaha > <prabha

Re: [U-Boot] [PATCH v3 1/7] include/configs: make secure boot header file include uniform

2016-01-27 Thread Ruchika Gupta
> -Original Message- > From: Aneesh Bansal [mailto:aneesh.ban...@nxp.com] > Sent: Friday, January 22, 2016 4:37 PM > To: u-boot@lists.denx.de > Cc: york sun <york@nxp.com>; Ruchika Gupta > <ruchika.gu...@nxp.com>; Prabhakar Kushwaha > <prabha

Re: [U-Boot] [PATCH v3 2/7] include/configs: move definition of CONFIG_CMD_BLOB

2016-01-27 Thread Ruchika Gupta
> -Original Message- > From: Aneesh Bansal [mailto:aneesh.ban...@nxp.com] > Sent: Friday, January 22, 2016 4:37 PM > To: u-boot@lists.denx.de > Cc: york sun <york@nxp.com>; Ruchika Gupta > <ruchika.gu...@nxp.com>; Prabhakar Kushwaha > <prabha

Re: [U-Boot] [PATCH v3 7/7] SECURE_BOOT: change error handler for esbc_validate

2016-01-27 Thread Ruchika Gupta
> -Original Message- > From: Aneesh Bansal [mailto:aneesh.ban...@nxp.com] > Sent: Friday, January 22, 2016 4:37 PM > To: u-boot@lists.denx.de > Cc: york sun <york@nxp.com>; Ruchika Gupta > <ruchika.gu...@nxp.com>; Prabhakar Kushwaha > <prabha

Re: [U-Boot] [PATCH v3 3/7] SECURE_BOOT: split the secure boot functionality in two parts

2016-01-27 Thread Ruchika Gupta
> -Original Message- > From: Aneesh Bansal [mailto:aneesh.ban...@nxp.com] > Sent: Friday, January 22, 2016 4:37 PM > To: u-boot@lists.denx.de > Cc: york sun <york@nxp.com>; Ruchika Gupta > <ruchika.gu...@nxp.com>; Prabhakar Kushwaha > <prabha

Re: [U-Boot] [PATCH v3 6/7] enable chain of trust for PowerPC platforms

2016-01-27 Thread Ruchika Gupta
> -Original Message- > From: Aneesh Bansal [mailto:aneesh.ban...@nxp.com] > Sent: Friday, January 22, 2016 4:37 PM > To: u-boot@lists.denx.de > Cc: york sun <york@nxp.com>; Ruchika Gupta > <ruchika.gu...@nxp.com>; Prabhakar Kushwaha > <prabha

Re: [U-Boot] [PATCH v3 4/7] create function to determine boot mode

2016-01-27 Thread Ruchika Gupta
> -Original Message- > From: Aneesh Bansal [mailto:aneesh.ban...@nxp.com] > Sent: Friday, January 22, 2016 4:37 PM > To: u-boot@lists.denx.de > Cc: york sun <york@nxp.com>; Ruchika Gupta > <ruchika.gu...@nxp.com>; Prabhakar Kushwaha > <prabha

[U-Boot] [PATCH] drivers/crypto/fsl : Allocate output ring with size aligned to CACHELNE SIZE

2016-01-22 Thread Ruchika Gupta
From: Ruchika Gupta <ruchika.gu...@freescale.com> The output ring needs to be invalidated before enqueuing the job to SEC. While allocation of space to output ring, it should be taken care that the size is cacheline size aligned inorder to prevent invalidating valid data. The patch also c

Re: [U-Boot] [PATCH 3/4] SECURE BOOT: separate function created for signature

2016-01-15 Thread Ruchika Gupta
> -Original Message- > From: Aneesh Bansal > Sent: Tuesday, December 08, 2015 2:14 PM > To: u-boot@lists.denx.de > Cc: Yusong Sun <york...@freescale.com>; Ruchika Gupta > <ruchika.gu...@freescale.com>; Prabhakar Kushwaha > <prabha...@freesca

Re: [U-Boot] [PATCH 1/4] SECURE BOOT: change prototype of fsl_secboot_validate function

2016-01-15 Thread Ruchika Gupta
> -Original Message- > From: Aneesh Bansal > Sent: Tuesday, December 08, 2015 2:14 PM > To: u-boot@lists.denx.de > Cc: Yusong Sun <york...@freescale.com>; Ruchika Gupta > <ruchika.gu...@freescale.com>; Prabhakar Kushwaha > <prabha...@freesca

Re: [U-Boot] [PATCH 2/4] SECURE BOOT: separate functions for reading keys

2016-01-15 Thread Ruchika Gupta
> -Original Message- > From: Aneesh Bansal > Sent: Tuesday, December 08, 2015 2:14 PM > To: u-boot@lists.denx.de > Cc: Yusong Sun <york...@freescale.com>; Ruchika Gupta > <ruchika.gu...@freescale.com>; Prabhakar Kushwaha > <prabha...@freesca

Re: [U-Boot] [PATCH 4/4] SECURE BOOT: support for validation of dynamic image

2016-01-15 Thread Ruchika Gupta
> -Original Message- > From: Aneesh Bansal > Sent: Tuesday, December 08, 2015 2:14 PM > To: u-boot@lists.denx.de > Cc: Yusong Sun <york...@freescale.com>; Ruchika Gupta > <ruchika.gu...@freescale.com>; Prabhakar Kushwaha > <prabha...@freesca

[U-Boot] [PATCH][v2] Correct License and Copyright information on few files

2015-07-26 Thread Ruchika Gupta
gpio.h - Added missing copyright in few files. rsa-mod-exp.h - Corrected copyright in the file. fsl_sec.h - Added missing license in files drivers/crypto/fsl/Makefile - Removed the incomplete GPLv2 license and replaced it with GPLv2+ license Signed-off-by: Ruchika Gupta ruchika.gu

Re: [U-Boot] [PATCH] Correct License and Copyright information on few files

2015-07-23 Thread Ruchika Gupta
Hi, Hi, Am 23.07.2015 um 16:10 schrieb Ruchika Gupta: Signed-off-by: Ruchika Gupta ruchika.gu...@freescale.com [...] diff --git a/drivers/crypto/fsl/Makefile b/drivers/crypto/fsl/Makefile index 4aa91e4..fd736cf 100644 --- a/drivers/crypto/fsl/Makefile +++ b/drivers/crypto/fsl

[U-Boot] [PATCH] Correct License and Copyright information on few files

2015-07-23 Thread Ruchika Gupta
Signed-off-by: Ruchika Gupta ruchika.gu...@freescale.com --- arch/arm/include/asm/arch-ls102xa/gpio.h | 2 ++ arch/powerpc/include/asm/arch-mpc85xx/gpio.h | 2 ++ drivers/crypto/fsl/Makefile | 4 +--- include/fsl_sec.h| 1 + include/u-boot/rsa-mod

Re: [U-Boot] [PATCH 1/3] crypto/fsl: fix era property value on LE platforms

2015-07-22 Thread Ruchika Gupta
Acked-by: Ruchika Guptaruchika.gu...@freescale.com -Original Message- From: Sun York-R58495 Sent: Sunday, July 19, 2015 3:44 AM To: Gupta Ruchika-R66431 Subject: Re: [PATCH 1/3] crypto/fsl: fix era property value on LE platforms Ruchika, Please comment/ack. York On

Re: [U-Boot] [PATCH 2/3] crypto/fsl - change starting entropy delay value

2015-07-22 Thread Ruchika Gupta
Acked-by: Ruchika Guptaruchika.gu...@freescale.com -Original Message- From: Sun York-R58495 Sent: Sunday, July 19, 2015 3:43 AM To: Gupta Ruchika-R66431 Subject: Re: [PATCH 2/3] crypto/fsl - change starting entropy delay value Ruchika, Please comment/ack this patch and others

Re: [U-Boot] [PATCH 3/3] crypto/fsl: clean-up - use fdt_setprop_u32 helper

2015-07-22 Thread Ruchika Gupta
Acked-by: Ruchika Guptaruchika.gu...@freescale.com -Original Message- From: Sun York-R58495 Sent: Sunday, July 19, 2015 3:44 AM To: Gupta Ruchika-R66431 Subject: Re: [PATCH 3/3] crypto/fsl: clean-up - use fdt_setprop_u32 helper Ruchika, Please comment/ack. York On

Re: [U-Boot] [PATCH 3/3] crypto/fsl - enable raw data instead of von Neumann data

2015-07-22 Thread Ruchika Gupta
Acked-by: Ruchika Guptaruchika.gu...@freescale.com -Original Message- From: Sun York-R58495 Sent: Sunday, July 19, 2015 3:43 AM To: Gupta Ruchika-R66431 Subject: Re: [PATCH 3/3] crypto/fsl - enable raw data instead of von Neumann data Ruchika, Please comment/ack. York On

Re: [U-Boot] [PATCH 1/3] crypto/fsl - disable RNG oscillator maximum frequency check

2015-07-22 Thread Ruchika Gupta
Acked-by: Ruchika Guptaruchika.gu...@freescale.com -Original Message- From: Sun York-R58495 Sent: Sunday, July 19, 2015 3:43 AM To: Gupta Ruchika-R66431 Subject: Re: [PATCH 1/3] crypto/fsl - disable RNG oscillator maximum frequency check Ruchika, Please comment/ack this patch

Re: [U-Boot] [PATCH 2/3] crypto/fsl: fix snooping for write transactions

2015-07-22 Thread Ruchika Gupta
Acked-by: Ruchika Guptaruchika.gu...@freescale.com -Original Message- From: Sun York-R58495 Sent: Sunday, July 19, 2015 3:44 AM To: Gupta Ruchika-R66431 Subject: Re: [PATCH 2/3] crypto/fsl: fix snooping for write transactions Ruchika, Please comment/ack. York On

[U-Boot] [PATCH] DM: crypto/rsa_mod_exp - Correct copyright on rsa-mod-exp.h

2015-06-11 Thread Ruchika Gupta
Signed-off-by: Ruchika Gupta ruchika.gu...@freescale.com --- include/u-boot/rsa-mod-exp.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/include/u-boot/rsa-mod-exp.h b/include/u-boot/rsa-mod-exp.h index fce445a..d250694 100644 --- a/include/u-boot/rsa-mod-exp.h +++ b/include

Re: [U-Boot] [PATCH] imx: dek_blob: Add explicit include for mapmem

2015-05-10 Thread Ruchika Gupta
/cmd_dek.c +++ b/arch/arm/imx-common/cmd_dek.c @@ -14,6 +14,7 @@ #include linux/compiler.h #include fsl_sec.h #include asm/arch/clock.h +#include mapmem.h DECLARE_GLOBAL_DATA_PTR; -- 2.3.2 Reviewed-by: Ruchika Gupta ruchika.gu...@freescale.com

Re: [U-Boot] [PATCH] Add bootscript support to esbc_validate.

2015-03-11 Thread Ruchika Gupta
Hi York, -Original Message- From: Sun York-R58495 Sent: Tuesday, March 10, 2015 10:03 PM To: Gupta Ruchika-R66431; Rana Gaurav-B46163; u-boot@lists.denx.de Cc: Wood Scott-B07421; Bansal Aneesh-B39320 Subject: Re: [PATCH] Add bootscript support to esbc_validate. On 03/10/2015

Re: [U-Boot] [PATCH] Add bootscript support to esbc_validate.

2015-03-10 Thread Ruchika Gupta
Hi York, -Original Message- From: Sun York-R58495 Sent: Tuesday, March 10, 2015 9:45 PM To: Rana Gaurav-B46163; u-boot@lists.denx.de Cc: Wood Scott-B07421; Gupta Ruchika-R66431; Bansal Aneesh-B39320 Subject: Re: [PATCH] Add bootscript support to esbc_validate. On 03/10/2015

Re: [U-Boot] [PATCH v4] imx6: Added DEK blob generator command

2015-02-20 Thread Ruchika Gupta
Hi Ulises, -Original Message- From: ulises.carde...@freescale.com [mailto:ulises.carde...@freescale.com] Sent: Wednesday, February 18, 2015 1:45 AM To: Gupta Ruchika-R66431 Cc: u-boot@lists.denx.de; Estevam Fabio-R49496; sba...@denx.de; s...@chromium.org; Ulises Cardenas Casas; Garg

Re: [U-Boot] [PATCH] imx6: Added DEK blob generator command

2015-02-09 Thread Ruchika Gupta
Hi Ulises, -Original Message- From: ulises.carde...@freescale.com [mailto:ulises.carde...@freescale.com] Sent: Thursday, February 05, 2015 2:38 AM To: Gupta Ruchika-R66431 Cc: u-boot@lists.denx.de; Estevam Fabio-R49496; sba...@denx.de; Ulises Cardenas Casas; Garg Nitin-B37173

Re: [U-Boot] [PATCH] crypto/fsl - Add progressive hashing support using hardware acceleration.

2015-02-05 Thread Ruchika Gupta
for progressinve hashing using h/w. Signed-off-by: Ruchika Gupta ruchika.gu...@freescale.com Signed-off-by: Gaurav Rana gaurav.r...@freescale.com CC: Simon Glass s...@chromium.org --- This patch is dependent on following series of 10 patches. https://patchwork.ozlabs.org/patch/432126

[U-Boot] [PATCH 01/10][v6] rsa: Split the rsa-verify to separate the modular exponentiation

2015-01-23 Thread Ruchika Gupta
to this file. Signed-off-by: Ruchika Gupta ruchika.gu...@freescale.com CC: Simon Glass s...@chromium.org --- Changes in v6: No changes Changes in v5: Reverted change in rsa_mod_exp_sw function to add pointer to output length Addressed other comments by Simon Changes in v4: Modified

[U-Boot] [PATCH 03/10][v6] DM: crypto/rsa_mod_exp: Add rsa Modular Exponentiation DM driver

2015-01-23 Thread Ruchika Gupta
Add a new rsa uclass for performing modular exponentiation and implement the software driver basing on this uclass. Signed-off-by: Ruchika Gupta ruchika.gu...@freescale.com CC: Simon Glass s...@chromium.org --- Changes in v6: No Changes Changes in v5: Changed UCLASS name to UCLASS_MOD_EXP

[U-Boot] [PATCH 05/10][v6] lib/rsa: Modify rsa to use DM driver

2015-01-23 Thread Ruchika Gupta
Modify rsa_verify to use the rsa driver of DM library .The tools will continue to use the same RSA sw library. CONFIG_RSA is now dependent on CONFIG_DM. All configurations which enable FIT based signatures have been modified to enable CONFIG_DM by default. Signed-off-by: Ruchika Gupta ruchika.gu

  1   2   3   >