extended PCR's, PCR0
would not be 0. So, read the PCR0 to determine if the PCR's need
to be extended as eventlog is parsed or not.
Signed-off-by: Ruchika Gupta
Reviewed-by: Ilias Apalodimas
Tested-by: Ilias Apalodimas
---
v8:
Addressed issues reported by cppcheck
v7:
Addressed Heinrick's
The current tpm2_pcr_read is hardcoded using SHA256. Make the
actual command to TPM configurable to use wider range of algorithms.
The current command line is kept as is i.e limited to SHA-256 only.
Signed-off-by: Ruchika Gupta
Reviewed-by: Ilias Apalodimas
---
v8: No change
v7: No change
v6
to check if even log has been passed to u-boot
from earlier firmware components. If available, the eventlog is parsed
to check for its correctness and further event logs are appended to the
passed log.
Signed-off-by: Ruchika Gupta
Reviewed-by: Ilias Apalodimas
Tested-by: Ilias Apalodimas
---
v8
extended PCR's, PCR0
would not be 0. So, read the PCR0 to determine if the PCR's need
to be extended as eventlog is parsed or not.
Signed-off-by: Ruchika Gupta
Reviewed-by: Ilias Apalodimas
Tested-by: Ilias Apalodimas
---
v7:
Addressed Heinrick's comments - Added missing parameter in function
The current tpm2_pcr_read is hardcoded using SHA256. Make the
actual command to TPM configurable to use wider range of algorithms.
The current command line is kept as is i.e limited to SHA-256 only.
Signed-off-by: Ruchika Gupta
Reviewed-by: Ilias Apalodimas
---
v7: No change
v6: No change
v5
to check if even log has been passed to u-boot
from earlier firmware components. If available, the eventlog is parsed
to check for its correctness and further event logs are appended to the
passed log.
Signed-off-by: Ruchika Gupta
---
v7:
Addressed Heinrich's comments
Changed functions
Hi Heinrich,
On Fri, 26 Nov 2021 at 13:01, Heinrich Schuchardt
wrote:
> On 11/26/21 06:00, Ruchika Gupta wrote:
> > Platforms may have support to measure their initial firmware components
> > and pass the event log to u-boot. The event log address can be passed
extended PCR's, PCR0
would not be 0. So, read the PCR0 to determine if the PCR's need
to be extended as eventlog is parsed or not.
Signed-off-by: Ruchika Gupta
Reviewed-by: Ilias Apalodimas
Tested-by: Ilias Apalodimas
---
v6: Changed TPM2_DIGEST_LEN to TPM2_SHA512_DIGEST_SIZE
v5 : No change
v4
The current tpm2_pcr_read is hardcoded using SHA256. Make the
actual command to TPM configurable to use wider range of algorithms.
The current command line is kept as is i.e limited to SHA-256 only.
Signed-off-by: Ruchika Gupta
Reviewed-by: Ilias Apalodimas
---
v6: No change
v5: No change
v4
to check if even log has been passed to u-boot
from earlier firmware components. If available, the eventlog is parsed
to check for its correctness and further event logs are appended to the
passed log.
Signed-off-by: Ruchika Gupta
Tested-by: Ilias Apalodimas
Reviewed-by: Ilias Apalodimas
---
v6
The current tpm2_pcr_read is hardcoded using SHA256. Make the
actual command to TPM configurable to use wider range of algorithms.
The current command line is kept as is i.e limited to SHA-256 only.
Signed-off-by: Ruchika Gupta
Reviewed-by: Ilias Apalodimas
---
v5: No change
v4: No change
v3
extended PCR's, PCR0
would not be 0. So, read the PCR0 to determine if the PCR's need
to be extended as eventlog is parsed or not.
Signed-off-by: Ruchika Gupta
Reviewed-by: Ilias Apalodimas
---
v5 : No change
v4 : No change
v3 :
Rebase changes on top of changes made in first patch of series
v2
to check if even log has been passed to u-boot
from earlier firmware components. If available, the eventlog is parsed
to check for its correctness and further event logs are appended to the
passed log.
Signed-off-by: Ruchika Gupta
---
v5:
Shift the efi_init_event_log() to a different location
extended PCR's, PCR0
would not be 0. So, read the PCR0 to determine if the PCR's need
to be extended as eventlog is parsed or not.
Signed-off-by: Ruchika Gupta
Reviewed-by: Ilias Apalodimas
---
v4 : No change
v3 :
Rebase changes on top of changes made in first patch of series
v2 :
Removed
The current tpm2_pcr_read is hardcoded using SHA256. Make the
actual command to TPM configurable to use wider range of algorithms.
The current command line is kept as is i.e limited to SHA-256 only.
Signed-off-by: Ruchika Gupta
Reviewed-by: Ilias Apalodimas
---
v4: No change
v3: No change
v2
to check if even log has been passed to u-boot
from earlier firmware components. If available, the eventlog is parsed
to check for its correctness and further event logs are appended to the
passed log.
Signed-off-by: Ruchika Gupta
---
v4:
Add SCRTM version to log only if previous firmware doesn;t
Hi Kojima-san,
On Wed, 24 Nov 2021 at 13:08, Masahisa Kojima
wrote:
> Hi Ruchika, Ilias,
>
> On Tue, 23 Nov 2021 at 20:53, Ruchika Gupta
> wrote:
> >
> > Platforms may have support to measure their initial firmware components
> > and pass the event log to u-b
Hi Ilias,
On Wed, 24 Nov 2021 at 12:34, Ilias Apalodimas
wrote:
> Hi Ruchika,
> > +
>
> [...]
>
> > + ret = platform_get_eventlog(dev, , );
> > + if (ret == EFI_SUCCESS) {
>
> Can we invert the logic here?
> if (ret != EFI_SUCCESS)
> return ret;
>
> etc...
>
Change posted in v3.
extended PCR's, PCR0
would not be 0. So, read the PCR0 to determine if the PCR's need
to be extended as eventlog is parsed or not.
Signed-off-by: Ruchika Gupta
---
v3 :
Rebase changes on top of changes made in first patch of series
v2 :
Removed check for PCR0 in eventlog
lib/efi_loader
The current tpm2_pcr_read is hardcoded using SHA256. Make the
actual command to TPM configurable to use wider range of algorithms.
The current command line is kept as is i.e limited to SHA-256 only.
Signed-off-by: Ruchika Gupta
---
v3: No change
v2:
Change algorithm from u32 to u16
Add
to check if even log has been passed to u-boot
from earlier firmware components. If available, the eventlog is parsed
to check for its correctness and further event logs are appended to the
passed log.
Signed-off-by: Ruchika Gupta
---
v3:
Return as soon as you detect error
v2:
Moved firmware
extended PCR's, PCR0
would not be 0. So, read the PCR0 to determine if the PCR's need
to be extended as eventlog is parsed or not.
Signed-off-by: Ruchika Gupta
---
v2 : Removed check for PCR0 in eventlog
lib/efi_loader/efi_tcg2.c | 77 +++
1 file changed, 77
The current tpm2_pcr_read is hardcoded using SHA256. Make the
actual command to TPM configurable to use wider range of algorithms.
The current command line is kept as is i.e limited to SHA-256 only.
Signed-off-by: Ruchika Gupta
---
v2:
Change algorithm from u32 to u16
Add parameter description
to check if even log has been passed to u-boot
from earlier firmware components. If available, the eventlog is parsed
to check for its correctness and further event logs are appended to the
passed log.
Signed-off-by: Ruchika Gupta
---
v2:
Moved firmware eventlog code parsing
extended PCR's, PCR0
would not be 0. So, read the PCR0 to determine if the PCR's need
to be extended as eventlog is parsed or not.
Signed-off-by: Ruchika Gupta
---
v2 : Removed check for PCR0 in eventlog
lib/efi_loader/efi_tcg2.c | 77 +++
1 file changed, 77
The current tpm2_pcr_read is hardcoded using SHA256. Make the
actual command to TPM configurable to use wider range of algorithms.
The current command line is kept as is i.e limited to SHA-256 only.
Signed-off-by: Ruchika Gupta
---
v2:
Change algorithm from u32 to u16
Add parameter description
to check if even log has been passed to u-boot
from earlier firmware components. If available, the eventlog is parsed
to check for its correctness and further event logs are appended to the
passed log.
Signed-off-by: Ruchika Gupta
---
v2:
Moved firmware eventlog code parsing
Please ignore this patch. Sent by mistake.
On Thu, 18 Nov 2021 at 11:48, Ruchika Gupta
wrote:
> ---
> lib/efi_loader/efi_tcg2.c | 90 ++-
> 1 file changed, 61 insertions(+), 29 deletions(-)
>
> diff --git a/lib/efi_loader/efi_tcg2.c b/lib/efi_
to determine if the
previous firmwares have extended the PCR0. If not, then extend
the PCR's as the eventlog is parsed.
Signed-off-by: Ruchika Gupta
---
lib/efi_loader/efi_tcg2.c | 86 +++
1 file changed, 86 insertions(+)
diff --git a/lib/efi_loader/efi_tcg2.c b
The current tpm2_pcr_read is hardcoded using SHA256. Make the
actual command to TPM configurable to use wider range of algorithms.
The current command line is kept as is i.e limited to SHA-256 only.
Signed-off-by: Ruchika Gupta
---
cmd/tpm-v2.c | 3 ++-
include/tpm-v2.h | 3 ++-
lib/tpm
---
lib/efi_loader/efi_tcg2.c | 90 ++-
1 file changed, 61 insertions(+), 29 deletions(-)
diff --git a/lib/efi_loader/efi_tcg2.c b/lib/efi_loader/efi_tcg2.c
index 189e4a5ba5..215f4b2b04 100644
--- a/lib/efi_loader/efi_tcg2.c
+++ b/lib/efi_loader/efi_tcg2.c
@@
to check if even log has been passed to u-boot
from earlier firmware components. If available, the eventlog is parsed
to check for its correctness and further event logs are appended to the
passed log.
Signed-off-by: Ruchika Gupta
---
lib/efi_loader/efi_tcg2.c | 312
ID event creation.
Similarly, the algorithm array in spec ID event should be a variable
length array with length being equal to the number_of_algorithms field.
In current implementation this is defined as a fixed length array
which has been fixed.
Signed-off-by: Ruchika Gupta
CC: Masahisa Kojima
Enable support to compile OPTEE driver, access AVB TA
and RPMB API's access via RPC from OPTEE for lx2160
Signed-off-by: Ruchika Gupta
---
configs/lx2160ardb_tfa_defconfig | 5 +
1 file changed, 5 insertions(+)
diff --git a/configs/lx2160ardb_tfa_defconfig b/configs
Add OPTEE node in lx2 device tree to enable access of
OPTEE TA's from u-boot.
Signed-off-by: Ruchika Gupta
---
arch/arm/dts/fsl-lx2160a.dtsi | 7 +++
1 file changed, 7 insertions(+)
diff --git a/arch/arm/dts/fsl-lx2160a.dtsi b/arch/arm/dts/fsl-lx2160a.dtsi
index 42ce4379ec..f0306e9390
lue - read persistent values on rpmb via OPTEE AVB TA
optee_rpmb write_pvalue - write persistent values on rpmb via OPTEE AVB TA
Signed-off-by: Ruchika Gupta
---
cmd/Kconfig | 16 +++
cmd/Makefile | 1 +
cmd/optee_rpmb.c | 269 +++
3 files ch
of random number generation function
has been removed
Signed-off-by: Ruchika Gupta <ruchika.gu...@nxp.com>
---
Changes from v1:
Removed unused variable rand from the sec_firmware_support_hwrng function
arch/arm/cpu/armv8/fsl-layerscape/fdt.c | 4 ++--
arch/arm/cpu/armv8/sec_firmware.c
of random number generation function
has been removed
Signed-off-by: Ruchika Gupta <ruchika.gu...@nxp.com>
---
arch/arm/cpu/armv8/fsl-layerscape/fdt.c | 4 ++--
arch/arm/cpu/armv8/sec_firmware.c | 5 +++--
2 files changed, 5 insertions(+), 4 deletions(-)
diff --git a/arch/arm/cpu/arm
raunhofer.de; Bryan O'Donoghue
><bryan.odonog...@linaro.org>; Alexandru Porosanu
><alexandru.poros...@nxp.com>; Ruchika Gupta <ruchika.gu...@nxp.com>;
>Aneesh Bansal <aneesh.ban...@nxp.com>
>Subject: [RESEND PATCH v3 1/2] drivers/crypto/fsl: assign job-rings to non
kASLR support in kernel requires a random number to be passed via
chosen/kaslr-seed propert. sec_firmware generates this random seed
which can then be passed in the device tree node.
sec_firmware reserves JR3 for it's own usage. Node for JR3 is
removed from device-tree.
Signed-off-by: Ruchika
kASLR support in kernel requires a random number to be passed via
chosen/kaslr-seed propert. sec_firmware generates this random seed
which can then be passed in the device tree node.
sec_firmware reserves JR3 for it's own usage. Node for JR3 is
removed from device-tree.
Signed-off-by: Ruchika
kASLR support in kernel requires a random number to be passed via
chosen/kaslr-seed propert. sec_firmware generates this random seed
which can then be passed in the device tree node.
sec_firmware reserves JR3 for it's own usage. Node for JR3 is
removed from device-tree.
Signed-off-by: Ruchika
> -Original Message-
> From: Poonam Aggrwal
> Sent: Monday, May 15, 2017 9:27 AM
> To: Ruchika Gupta <ruchika.gu...@nxp.com>; u-boot@lists.denx.de;
> sun.y...@nxp.com; Prabhakar Kushwaha <prabhakar.kushw...@nxp.com>
> Cc: Ruchika Gupta <ruchika.gu..
> -Original Message-
> From: Peter Robinson [mailto:pbrobin...@gmail.com]
> Sent: Monday, May 15, 2017 6:18 PM
> To: Ruchika Gupta <ruchika.gu...@nxp.com>
> Cc: u-boot@lists.denx.de; sun.y...@nxp.com; Prabhakar Kushwaha
> <prabhakar.kushw...@nxp.com>
> Su
kASLR support in kernel requires a random number to be passed via
chosen/kaslr-seed propert. sec_firmware generates this random seed
which can then be passed in the device tree node
sec_firmware reserves JR3 for it's own usage. Node for JR3 is
removed from device-tree.
Signed-off-by: Ruchika
> -Original Message-
> From: York Sun [mailto:york@nxp.com]
> Sent: Wednesday, April 12, 2017 9:10 PM
> To: Ruchika Gupta <ruchika.gu...@nxp.com>; u-boot@lists.denx.de
> Cc: Vini Pillai <vinitha.pil...@nxp.com>; Sumit Garg <sumit.g...@nxp.com>
&
for SPL build.
Signed-off-by: Vinitha Pillai <vinitha.pil...@nxp.com>
Signed-off-by: Sumit Garg <sumit.g...@nxp.com>
Signed-off-by: Ruchika Gupta <ruchika.gu...@nxp.com>
---
Changes in v5:
Updated MAINTAINERS file
Changes in v4:
Removed spl_board_init from board specific file.
Cha
for CONFIG_BOOTSCRIPT_COPY_RAM is enabled to copy Bootscript from NAND
to
DDR. Offsets for Bootscript on NAND and DDR have been also defined.
Signed-off-by: Vinitha Pillai <vinitha.pil...@nxp.com>
Signed-off-by: Sumit Garg <sumit.g...@nxp.com>
Signed-off-by: Ruchika Gupta <ruchika.gu...@nxp.com>
of
strings
to reduce the size of SPL image
Signed-off-by: Vinitha Pillai-B57223 <vinitha.pil...@nxp.com>
Signed-off-by: Sumit Garg <sumit.g...@nxp.com>
Signed-off-by: Ruchika Gupta <ruchika.gu...@nxp.com>
---
Changes in v4:
Updated Maintainers file
Changes in v3:
Moved spl_b
> -Original Message-
> From: York Sun [mailto:york@nxp.com]
> Sent: Wednesday, April 12, 2017 9:00 PM
> To: Ruchika Gupta <ruchika.gu...@nxp.com>; u-boot@lists.denx.de
> Cc: Vini Pillai <vinitha.pil...@nxp.com>; Sumit Garg <sumit.g...@nxp.com>
&
> -Original Message-
> From: york sun
> Sent: Tuesday, April 04, 2017 9:29 PM
> To: Ruchika Gupta <ruchika.gu...@nxp.com>; u-boot@lists.denx.de
> Cc: Vini Pillai <vinitha.pil...@nxp.com>; Sumit Garg <sumit.g...@nxp.com>
> Subject: Re: [PATCH 3/3][v3] [RE
for SPL build.
Signed-off-by: Vinitha Pillai <vinitha.pil...@nxp.com>
Signed-off-by: Sumit Garg <sumit.g...@nxp.com>
Signed-off-by: Ruchika Gupta <ruchika.gu...@nxp.com>
---
Changes in v4:
Removed spl_board_init from board specific file.
Changes in v3:
Resend
Changes in v2:
for CONFIG_BOOTSCRIPT_COPY_RAM is enabled to copy Bootscript from NAND
to
DDR. Offsets for Bootscript on NAND and DDR have been also defined.
Signed-off-by: Vinitha Pillai <vinitha.pil...@nxp.com>
Signed-off-by: Sumit Garg <sumit.g...@nxp.com>
Signed-off-by: Ruchika Gupta <ruchika.gu...@nxp.com>
of
strings
to reduce the size of SPL image
Signed-off-by: Vinitha Pillai-B57223 <vinitha.pil...@nxp.com>
Signed-off-by: Sumit Garg <sumit.g...@nxp.com>
Signed-off-by: Ruchika Gupta <ruchika.gu...@nxp.com>
---
Changes in v3:
Moved spl_board_init function to arch/arm/cpu/armv8/fs
> -Original Message-
> From: york sun
> Sent: Monday, April 03, 2017 9:01 PM
> To: Ruchika Gupta <ruchika.gu...@nxp.com>; u-boot@lists.denx.de
> Cc: Vini Pillai <vinitha.pil...@nxp.com>; Sumit Garg <sumit.g...@nxp.com>
> Subject: Re: [PATCH 3/3][v3] [RE
> -Original Message-
> From: york sun
> Sent: Saturday, April 01, 2017 1:44 AM
> To: Ruchika Gupta <ruchika.gu...@nxp.com>; u-boot@lists.denx.de
> Cc: Vini Pillai <vinitha.pil...@nxp.com>; Sumit Garg <sumit.g...@nxp.com>
> Subject: Re: [PATCH 3/3][
l also be copied from SD to
DDR.
- MACRO for CONFIG_BOOTSCRIPT_COPY_RAM is enabled to copy Bootscript from NAND
to
DDR. Offsets for Bootscript on NAND and DDR have been also defined.
Signed-off-by: Vinitha Pillai <vinitha.pil...@nxp.com>
Signed-off-by: Sumit Garg <sumit.g...@nxp.com>
Sign
Pillai <vinitha.pil...@nxp.com>
Signed-off-by: Sumit Garg <sumit.g...@nxp.com>
Signed-off-by: Ruchika Gupta <ruchika.gu...@nxp.com>
---
Changes from v1:
- Rebased patches to latest dependent patch set
- With the dependent path set , spl imag size increased to 94K. So
- additionally r
Pillai <vinitha.pil...@nxp.com>
Signed-off-by: Sumit Garg <sumit.g...@nxp.com>
Signed-off-by: Ruchika Gupta <ruchika.gu...@nxp.com>
---
Changes from v1:
- Rebased patches to latest dependent patch set
- With the dependent path set , spl imag size increased to 94K. So
- additionally r
of
strings
to reduce the size of SPL image
Signed-off-by: Vinitha Pillai-B57223 <vinitha.pil...@nxp.com>
Signed-off-by: Sumit Garg <sumit.g...@nxp.com>
Signed-off-by: Ruchika Gupta <ruchika.gu...@nxp.com>
---
Changes from v1:
Rebased to latest dependent patches: - No change
Dependent
> -Original Message-
> From: york sun
> Sent: Saturday, March 25, 2017 10:16 PM
> To: Ruchika Gupta <ruchika.gu...@nxp.com>; u-boot@lists.denx.de;
> prabhakar.khushw...@nxp.com
> Subject: Re: [U-Boot] [PATCH] powerpc: e6500: Lock/unlock 1 cache instead
> of L
Fir E6500 cores, L2 cache has been used as init_ram. L1 cache is a write
through cache on E6500.If lines are not locked in both L1 and L2 caches,
crashes are observed during secure boot. This patch locks/unlocks both L1
as well as L2 cache to prevent the crash.
Signed-off-by: Ruchika Gupta
Fir E6500 cores, L2 cache has been used as init_ram. L1 cache is a write
through cache on E6500.If lines are not locked in both L1 and L2 caches,
crashes are observed during secure boot. This patch locks/unlocks both L1
as well as L2 cache to prevent the crash.
Signed-off-by: Ruchika Gupta
of
strings
to reduce the size of SPL image
Signed-off-by: Vinitha Pillai-B57223 <vinitha.pil...@nxp.com>
Signed-off-by: Sumit Garg <sumit.g...@nxp.com>
Signed-off-by: Ruchika Gupta <ruchika.gu...@nxp.com>
---
The patchset is dependent on the following patches:
https://patchwork.ozlab
t Garg <sumit.g...@nxp.com>
Signed-off-by: Ruchika Gupta <ruchika.gu...@nxp.com>
---
The patchset is dependent on the following patches:
https://patchwork.ozlabs.org/patch/717614/
http://patchwork.ozlabs.org/patch/724332/
http://patchwork.ozlabs.org/patch/729932/
http://patchwork.ozlab
for CONFIG_BOOTSCRIPT_COPY_RAM is enabled to copy Bootscript from NAND
to
DDR. Offsets for Bootscript on NAND and DDR have been also defined.
Signed-off-by: Vinitha Pillai-B57223 <vinitha.pil...@nxp.com>
Signed-off-by: Sumit Garg <sumit.g...@nxp.com>
Signed-off-by: Ruchika Gupta <ruchika.gu...@nxp.com>
Ruchika Gupta (3):
arm: ls1043ardb: Add SD secure boot target
arm: ls1043ardb: Add NAND secure boot target
arm: ls1046ardb: Add SD secure boot target
arch/arm/include/asm/fsl_secure_boot.h | 16 +--
board/freescale/common/fsl_validate.c | 4 ++
board/freescale
from the boot source.
Regards,
Ruchika
-Original Message-
From: Q.Y. Gong
Sent: Thursday, September 08, 2016 12:32 PM
To: Prabhakar Kushwaha <prabhakar.kushw...@nxp.com>; york sun
<york@nxp.com>; Ruchika Gupta <ruchika.gu...@nxp.com>; u-boot@lists.denx.de
Cc: V
> diff --git a/drivers/crypto/fsl/Makefile b/drivers/crypto/fsl/Makefile index
> fd736cf..6d6903b 100644
> --- a/drivers/crypto/fsl/Makefile
> +++ b/drivers/crypto/fsl/Makefile
> @@ -8,3 +8,7 @@ obj-y += sec.o
> obj-$(CONFIG_FSL_CAAM) += jr.o fsl_hash.o jobdesc.o error.o
>
> -Original Message-
> From: Aneesh Bansal [mailto:aneesh.ban...@nxp.com]
> Sent: Friday, January 22, 2016 4:37 PM
> To: u-boot@lists.denx.de
> Cc: york sun <york@nxp.com>; Ruchika Gupta
> <ruchika.gu...@nxp.com>; Prabhakar Kushwaha
> <prabha
> -Original Message-
> From: Aneesh Bansal [mailto:aneesh.ban...@nxp.com]
> Sent: Friday, January 22, 2016 4:37 PM
> To: u-boot@lists.denx.de
> Cc: york sun <york@nxp.com>; Ruchika Gupta
> <ruchika.gu...@nxp.com>; Prabhakar Kushwaha
> <prabha
> -Original Message-
> From: Aneesh Bansal [mailto:aneesh.ban...@nxp.com]
> Sent: Friday, January 22, 2016 4:37 PM
> To: u-boot@lists.denx.de
> Cc: york sun <york@nxp.com>; Ruchika Gupta
> <ruchika.gu...@nxp.com>; Prabhakar Kushwaha
> <prabha
> -Original Message-
> From: Aneesh Bansal [mailto:aneesh.ban...@nxp.com]
> Sent: Friday, January 22, 2016 4:37 PM
> To: u-boot@lists.denx.de
> Cc: york sun <york@nxp.com>; Ruchika Gupta
> <ruchika.gu...@nxp.com>; Prabhakar Kushwaha
> <prabha
> -Original Message-
> From: Aneesh Bansal [mailto:aneesh.ban...@nxp.com]
> Sent: Friday, January 22, 2016 4:37 PM
> To: u-boot@lists.denx.de
> Cc: york sun <york@nxp.com>; Ruchika Gupta
> <ruchika.gu...@nxp.com>; Prabhakar Kushwaha
> <prabha
> -Original Message-
> From: Aneesh Bansal [mailto:aneesh.ban...@nxp.com]
> Sent: Friday, January 22, 2016 4:37 PM
> To: u-boot@lists.denx.de
> Cc: york sun <york@nxp.com>; Ruchika Gupta
> <ruchika.gu...@nxp.com>; Prabhakar Kushwaha
> <prabha
> -Original Message-
> From: Aneesh Bansal [mailto:aneesh.ban...@nxp.com]
> Sent: Friday, January 22, 2016 4:37 PM
> To: u-boot@lists.denx.de
> Cc: york sun <york@nxp.com>; Ruchika Gupta
> <ruchika.gu...@nxp.com>; Prabhakar Kushwaha
> <prabha
From: Ruchika Gupta <ruchika.gu...@freescale.com>
The output ring needs to be invalidated before enqueuing the job to SEC.
While allocation of space to output ring, it should be taken care that the
size is cacheline size aligned inorder to prevent invalidating valid data.
The patch also c
> -Original Message-
> From: Aneesh Bansal
> Sent: Tuesday, December 08, 2015 2:14 PM
> To: u-boot@lists.denx.de
> Cc: Yusong Sun <york...@freescale.com>; Ruchika Gupta
> <ruchika.gu...@freescale.com>; Prabhakar Kushwaha
> <prabha...@freesca
> -Original Message-
> From: Aneesh Bansal
> Sent: Tuesday, December 08, 2015 2:14 PM
> To: u-boot@lists.denx.de
> Cc: Yusong Sun <york...@freescale.com>; Ruchika Gupta
> <ruchika.gu...@freescale.com>; Prabhakar Kushwaha
> <prabha...@freesca
> -Original Message-
> From: Aneesh Bansal
> Sent: Tuesday, December 08, 2015 2:14 PM
> To: u-boot@lists.denx.de
> Cc: Yusong Sun <york...@freescale.com>; Ruchika Gupta
> <ruchika.gu...@freescale.com>; Prabhakar Kushwaha
> <prabha...@freesca
> -Original Message-
> From: Aneesh Bansal
> Sent: Tuesday, December 08, 2015 2:14 PM
> To: u-boot@lists.denx.de
> Cc: Yusong Sun <york...@freescale.com>; Ruchika Gupta
> <ruchika.gu...@freescale.com>; Prabhakar Kushwaha
> <prabha...@freesca
gpio.h - Added missing copyright in few files.
rsa-mod-exp.h - Corrected copyright in the file.
fsl_sec.h - Added missing license in files
drivers/crypto/fsl/Makefile - Removed the incomplete GPLv2 license and replaced
it with GPLv2+ license
Signed-off-by: Ruchika Gupta ruchika.gu
Hi,
Hi,
Am 23.07.2015 um 16:10 schrieb Ruchika Gupta:
Signed-off-by: Ruchika Gupta ruchika.gu...@freescale.com
[...]
diff --git a/drivers/crypto/fsl/Makefile b/drivers/crypto/fsl/Makefile
index 4aa91e4..fd736cf 100644
--- a/drivers/crypto/fsl/Makefile
+++ b/drivers/crypto/fsl
Signed-off-by: Ruchika Gupta ruchika.gu...@freescale.com
---
arch/arm/include/asm/arch-ls102xa/gpio.h | 2 ++
arch/powerpc/include/asm/arch-mpc85xx/gpio.h | 2 ++
drivers/crypto/fsl/Makefile | 4 +---
include/fsl_sec.h| 1 +
include/u-boot/rsa-mod
Acked-by: Ruchika Guptaruchika.gu...@freescale.com
-Original Message-
From: Sun York-R58495
Sent: Sunday, July 19, 2015 3:44 AM
To: Gupta Ruchika-R66431
Subject: Re: [PATCH 1/3] crypto/fsl: fix era property value on LE platforms
Ruchika,
Please comment/ack.
York
On
Acked-by: Ruchika Guptaruchika.gu...@freescale.com
-Original Message-
From: Sun York-R58495
Sent: Sunday, July 19, 2015 3:43 AM
To: Gupta Ruchika-R66431
Subject: Re: [PATCH 2/3] crypto/fsl - change starting entropy delay value
Ruchika,
Please comment/ack this patch and others
Acked-by: Ruchika Guptaruchika.gu...@freescale.com
-Original Message-
From: Sun York-R58495
Sent: Sunday, July 19, 2015 3:44 AM
To: Gupta Ruchika-R66431
Subject: Re: [PATCH 3/3] crypto/fsl: clean-up - use fdt_setprop_u32 helper
Ruchika,
Please comment/ack.
York
On
Acked-by: Ruchika Guptaruchika.gu...@freescale.com
-Original Message-
From: Sun York-R58495
Sent: Sunday, July 19, 2015 3:43 AM
To: Gupta Ruchika-R66431
Subject: Re: [PATCH 3/3] crypto/fsl - enable raw data instead of von
Neumann data
Ruchika,
Please comment/ack.
York
On
Acked-by: Ruchika Guptaruchika.gu...@freescale.com
-Original Message-
From: Sun York-R58495
Sent: Sunday, July 19, 2015 3:43 AM
To: Gupta Ruchika-R66431
Subject: Re: [PATCH 1/3] crypto/fsl - disable RNG oscillator maximum
frequency check
Ruchika,
Please comment/ack this patch
Acked-by: Ruchika Guptaruchika.gu...@freescale.com
-Original Message-
From: Sun York-R58495
Sent: Sunday, July 19, 2015 3:44 AM
To: Gupta Ruchika-R66431
Subject: Re: [PATCH 2/3] crypto/fsl: fix snooping for write transactions
Ruchika,
Please comment/ack.
York
On
Signed-off-by: Ruchika Gupta ruchika.gu...@freescale.com
---
include/u-boot/rsa-mod-exp.h | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/include/u-boot/rsa-mod-exp.h b/include/u-boot/rsa-mod-exp.h
index fce445a..d250694 100644
--- a/include/u-boot/rsa-mod-exp.h
+++ b/include
/cmd_dek.c
+++ b/arch/arm/imx-common/cmd_dek.c
@@ -14,6 +14,7 @@
#include linux/compiler.h
#include fsl_sec.h
#include asm/arch/clock.h
+#include mapmem.h
DECLARE_GLOBAL_DATA_PTR;
--
2.3.2
Reviewed-by: Ruchika Gupta ruchika.gu...@freescale.com
Hi York,
-Original Message-
From: Sun York-R58495
Sent: Tuesday, March 10, 2015 10:03 PM
To: Gupta Ruchika-R66431; Rana Gaurav-B46163; u-boot@lists.denx.de
Cc: Wood Scott-B07421; Bansal Aneesh-B39320
Subject: Re: [PATCH] Add bootscript support to esbc_validate.
On 03/10/2015
Hi York,
-Original Message-
From: Sun York-R58495
Sent: Tuesday, March 10, 2015 9:45 PM
To: Rana Gaurav-B46163; u-boot@lists.denx.de
Cc: Wood Scott-B07421; Gupta Ruchika-R66431; Bansal Aneesh-B39320
Subject: Re: [PATCH] Add bootscript support to esbc_validate.
On 03/10/2015
Hi Ulises,
-Original Message-
From: ulises.carde...@freescale.com [mailto:ulises.carde...@freescale.com]
Sent: Wednesday, February 18, 2015 1:45 AM
To: Gupta Ruchika-R66431
Cc: u-boot@lists.denx.de; Estevam Fabio-R49496; sba...@denx.de;
s...@chromium.org; Ulises Cardenas Casas; Garg
Hi Ulises,
-Original Message-
From: ulises.carde...@freescale.com [mailto:ulises.carde...@freescale.com]
Sent: Thursday, February 05, 2015 2:38 AM
To: Gupta Ruchika-R66431
Cc: u-boot@lists.denx.de; Estevam Fabio-R49496; sba...@denx.de; Ulises
Cardenas Casas; Garg Nitin-B37173
for progressinve hashing using h/w.
Signed-off-by: Ruchika Gupta ruchika.gu...@freescale.com
Signed-off-by: Gaurav Rana gaurav.r...@freescale.com
CC: Simon Glass s...@chromium.org
---
This patch is dependent on following series of 10 patches.
https://patchwork.ozlabs.org/patch/432126
to this file.
Signed-off-by: Ruchika Gupta ruchika.gu...@freescale.com
CC: Simon Glass s...@chromium.org
---
Changes in v6:
No changes
Changes in v5:
Reverted change in rsa_mod_exp_sw function to add pointer to output length
Addressed other comments by Simon
Changes in v4:
Modified
Add a new rsa uclass for performing modular exponentiation and implement
the software driver basing on this uclass.
Signed-off-by: Ruchika Gupta ruchika.gu...@freescale.com
CC: Simon Glass s...@chromium.org
---
Changes in v6:
No Changes
Changes in v5:
Changed UCLASS name to UCLASS_MOD_EXP
Modify rsa_verify to use the rsa driver of DM library .The tools
will continue to use the same RSA sw library.
CONFIG_RSA is now dependent on CONFIG_DM. All configurations which
enable FIT based signatures have been modified to enable CONFIG_DM
by default.
Signed-off-by: Ruchika Gupta ruchika.gu
1 - 100 of 203 matches
Mail list logo