u-boot/drivers/crypto
Teddy Reed 51c14cd128 verified-boot: Minimal support for booting U-Boot proper from SPL
This allows a board to configure verified boot within the SPL using
a FIT or FIT with external data. It also allows the SPL to perform
signature verification without needing relocation.

The board configuration will need to add the following feature defines:
CONFIG_SPL_CRYPTO_SUPPORT
CONFIG_SPL_HASH_SUPPORT
CONFIG_SPL_SHA256

In this example, SHA256 is the only selected hashing algorithm.

And the following booleans:
CONFIG_SPL=y
CONFIG_SPL_DM=y
CONFIG_SPL_LOAD_FIT=y
CONFIG_SPL_FIT=y
CONFIG_SPL_OF_CONTROL=y
CONFIG_SPL_OF_LIBFDT=y
CONFIG_SPL_FIT_SIGNATURE=y

Signed-off-by: Teddy Reed <teddy.reed@gmail.com>
Acked-by: Simon Glass <sjg@chromium.org>
Acked-by: Andreas Dannenberg <dannenberg@ti.com>
Acked-by: Sumit Garg <sumit.garg@nxp.com>
2016-06-12 13:14:58 -04:00
..
fsl crypto/fsl: add support for multiple SEC engines initialization 2016-05-18 08:51:46 -07:00
rsa_mod_exp verified-boot: Minimal support for booting U-Boot proper from SPL 2016-06-12 13:14:58 -04:00
ace_sha.c includes: move openssl headers to include/u-boot 2014-06-19 11:19:04 -04:00
ace_sha.h drivers: crypto: ace_sha: add implementation of hardware based lib rand 2014-03-28 15:06:31 -04:00
Kconfig drivers: hierarchize drivers Kconfig menu 2015-08-12 20:47:44 -04:00
Makefile DM: crypto/rsa_mod_exp: Add rsa Modular Exponentiation DM driver 2015-01-29 17:09:58 -07:00