This series is based on the latest master, so no patch dependencies.
Q: Will there be a software-only implementation of ECDSA ?
A: That is the goal, so that we can have more extensive testing with
the sandbox. I don not have the bandwidth to implement it. There
has been an initial poer of so
Hi Patrick,
On 2/9/21 9:08 AM, Patrick DELAUNAY wrote:
[snip]
For information, today the STMicroelectronics expected that the boot
sequence for secure boot
(with closed STM32MP1 devices) is the trusted boot chain.
TF-A (BL2) => OP-TEE or => U-Boot => OS
TF-A
Hi Alexandru,
On 1/11/21 4:41 PM, Alexandru Gagniuc wrote:
This series is Part II of the ECDSA saga. It applies on top of [1]: * > [PATCH v4 0/6] Add support for ECDSA image signing (with test) > >
I've designed the UCLASS_ECDSA such that it aligns with the ROM API > of
the stm32mp. Instead of
This series is Part II of the ECDSA saga. It applies on top of [1]:
* [PATCH v4 0/6] Add support for ECDSA image signing (with test)
I've designed the UCLASS_ECDSA such that it aligns with the ROM API
of the stm32mp. Instead of splitting the verification into
(1) curve operations and (2) modular
4 matches
Mail list logo