mirror of
https://github.com/AsahiLinux/u-boot
synced 2024-11-14 00:47:26 +00:00
51c14cd128
This allows a board to configure verified boot within the SPL using a FIT or FIT with external data. It also allows the SPL to perform signature verification without needing relocation. The board configuration will need to add the following feature defines: CONFIG_SPL_CRYPTO_SUPPORT CONFIG_SPL_HASH_SUPPORT CONFIG_SPL_SHA256 In this example, SHA256 is the only selected hashing algorithm. And the following booleans: CONFIG_SPL=y CONFIG_SPL_DM=y CONFIG_SPL_LOAD_FIT=y CONFIG_SPL_FIT=y CONFIG_SPL_OF_CONTROL=y CONFIG_SPL_OF_LIBFDT=y CONFIG_SPL_FIT_SIGNATURE=y Signed-off-by: Teddy Reed <teddy.reed@gmail.com> Acked-by: Simon Glass <sjg@chromium.org> Acked-by: Andreas Dannenberg <dannenberg@ti.com> Acked-by: Sumit Garg <sumit.garg@nxp.com>
40 lines
793 B
C
40 lines
793 B
C
/*
|
|
* (C) Copyright 2014 Freescale Semiconductor, Inc.
|
|
* Author: Ruchika Gupta <ruchika.gupta@freescale.com>
|
|
*
|
|
* SPDX-License-Identifier: GPL-2.0+
|
|
*/
|
|
|
|
#include <config.h>
|
|
#include <common.h>
|
|
#include <dm.h>
|
|
#include <u-boot/rsa-mod-exp.h>
|
|
|
|
int mod_exp_sw(struct udevice *dev, const uint8_t *sig, uint32_t sig_len,
|
|
struct key_prop *prop, uint8_t *out)
|
|
{
|
|
int ret = 0;
|
|
|
|
ret = rsa_mod_exp_sw(sig, sig_len, prop, out);
|
|
if (ret) {
|
|
debug("%s: RSA failed to verify: %d\n", __func__, ret);
|
|
return ret;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static const struct mod_exp_ops mod_exp_ops_sw = {
|
|
.mod_exp = mod_exp_sw,
|
|
};
|
|
|
|
U_BOOT_DRIVER(mod_exp_sw) = {
|
|
.name = "mod_exp_sw",
|
|
.id = UCLASS_MOD_EXP,
|
|
.ops = &mod_exp_ops_sw,
|
|
.flags = DM_FLAG_PRE_RELOC,
|
|
};
|
|
|
|
U_BOOT_DEVICE(mod_exp_sw) = {
|
|
.name = "mod_exp_sw",
|
|
};
|