<feed xmlns='http://www.w3.org/2005/Atom'>
<title>bcm63xx/u-boot/include/fsl_validate.h, branch master</title>
<subtitle>Broadcom-s U-Boot</subtitle>
<id>https://git-03.infra.openwrt.org/project/bcm63xx/u-boot/atom?h=master</id>
<link rel='self' href='https://git-03.infra.openwrt.org/project/bcm63xx/u-boot/atom?h=master'/>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/project/bcm63xx/u-boot/'/>
<updated>2018-05-07T13:34:12Z</updated>
<entry>
<title>SPDX: Convert all of our single license tags to Linux Kernel style</title>
<updated>2018-05-07T13:34:12Z</updated>
<author>
<name>Tom Rini</name>
</author>
<published>2018-05-06T21:58:06Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/project/bcm63xx/u-boot/commit/?id=83d290c56fab2d38cd1ab4c4cc7099559c1d5046'/>
<id>urn:sha1:83d290c56fab2d38cd1ab4c4cc7099559c1d5046</id>
<content type='text'>
When U-Boot started using SPDX tags we were among the early adopters and
there weren't a lot of other examples to borrow from.  So we picked the
area of the file that usually had a full license text and replaced it
with an appropriate SPDX-License-Identifier: entry.  Since then, the
Linux Kernel has adopted SPDX tags and they place it as the very first
line in a file (except where shebangs are used, then it's second line)
and with slightly different comment styles than us.

In part due to community overlap, in part due to better tag visibility
and in part for other minor reasons, switch over to that style.

This commit changes all instances where we have a single declared
license in the tag as both the before and after are identical in tag
contents.  There's also a few places where I found we did not have a tag
and have introduced one.

Signed-off-by: Tom Rini &lt;trini@konsulko.com&gt;
</content>
</entry>
<entry>
<title>fsl: Secure Boot: Enable IE (Key extention) Feature</title>
<updated>2017-03-28T16:03:04Z</updated>
<author>
<name>Udit Agarwal</name>
</author>
<published>2017-02-09T16:06:11Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/project/bcm63xx/u-boot/commit/?id=ac55dadb1cb6a350604affd84e19006984933fa0'/>
<id>urn:sha1:ac55dadb1cb6a350604affd84e19006984933fa0</id>
<content type='text'>
For validating images from uboot (Such as Kernel Image), either keys
from SoC fuses can be used or keys from a verified table of public
keys can be used. The latter feature is called IE Key Extension
Feature.

For Layerscape Chasis 3 based platforms, IE table is validated by
Bootrom and address of this table is written in scratch registers 13
and 14 via PBI commands.

Following are the steps describing usage of this feature:

1) Verify IE Table in ISBC phase using keys stored in fuses.
2) Install IE table. (To be used across verification of multiple
   images stored in a static global structure.)
3) Use keys from IE table, to verify further images.

Signed-off-by: Aneesh Bansal &lt;aneesh.bansal@nxp.com&gt;
Signed-off-by: Saksham Jain &lt;saksham.jain@nxp.com&gt;
Signed-off-by: Udit Agarwal &lt;udit.agarwal@nxp.com&gt;
Reviewed-by: York Sun &lt;york.sun@nxp.com&gt;
</content>
</entry>
<entry>
<title>powerpc/mpc85xx: SECURE BOOT- Enable chain of trust in SPL</title>
<updated>2016-07-21T18:09:23Z</updated>
<author>
<name>Sumit Garg</name>
</author>
<published>2016-07-14T16:27:51Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/project/bcm63xx/u-boot/commit/?id=8f01397ba76d1ee210bedbf031d807e8df34c482'/>
<id>urn:sha1:8f01397ba76d1ee210bedbf031d807e8df34c482</id>
<content type='text'>
As part of Chain of Trust for Secure boot, the SPL U-Boot will validate
the next level U-boot image. Add a new function spl_validate_uboot to
perform the validation.

Enable hardware crypto operations in SPL using SEC block.
In case of Secure Boot, PAMU is not bypassed. For allowing SEC block
access to CPC configured as SRAM, configure PAMU.

Reviewed-by: Ruchika Gupta &lt;ruchika.gupta@nxp.com&gt;
Signed-off-by: Aneesh Bansal &lt;aneesh.bansal@nxp.com&gt;
Signed-off-by: Sumit Garg &lt;sumit.garg@nxp.com&gt;
Reviewed-by: Simon Glass &lt;sjg@chromium.org&gt;
Reviewed-by: York Sun &lt;york.sun@nxp.com&gt;
</content>
</entry>
<entry>
<title>SECURE BOOT: Change fsl_secboot_validate func to pass image addr</title>
<updated>2016-03-29T15:46:23Z</updated>
<author>
<name>Saksham Jain</name>
</author>
<published>2016-03-23T10:54:45Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/project/bcm63xx/u-boot/commit/?id=85bb38965431424d4e4a7b5030cc589a3401a988'/>
<id>urn:sha1:85bb38965431424d4e4a7b5030cc589a3401a988</id>
<content type='text'>
Use a pointer to pass image address to fsl_secboot_validate(),
instead of using environmental variable "img_addr".

Signed-off-by: Aneesh Bansal &lt;aneesh.bansal@nxp.com&gt;
Signed-off-by: Saksham Jain &lt;saksham.jain@nxp.com&gt;
Reviewed-by: York Sun &lt;york.sun@nxp.com&gt;
</content>
</entry>
<entry>
<title>SECURE BOOT: Halt execution when secure boot fail</title>
<updated>2016-03-29T15:46:23Z</updated>
<author>
<name>Saksham Jain</name>
</author>
<published>2016-03-23T10:54:44Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/project/bcm63xx/u-boot/commit/?id=c4666cf6954a28ade5a8550505d5bc25dc7f92d7'/>
<id>urn:sha1:c4666cf6954a28ade5a8550505d5bc25dc7f92d7</id>
<content type='text'>
In case of fatal failure during secure boot execution (e.g. header
not found), reset is asserted to stop execution. If the RESET_REQ
is not tied to HRESET, this allows the execution to continue.

Add esbh_halt() after the reset to make sure execution stops.

Signed-off-by: Aneesh Bansal &lt;aneesh.bansal@nxp.com&gt;
Signed-off-by: Saksham Jain &lt;saksham.jain@nxp.com&gt;
Reviewed-by: York Sun &lt;york.sun@nxp.com&gt;
</content>
</entry>
<entry>
<title>armv8: fsl-lsch3: Add new header for secure boot</title>
<updated>2016-03-29T15:46:20Z</updated>
<author>
<name>Saksham Jain</name>
</author>
<published>2016-03-23T10:54:34Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/project/bcm63xx/u-boot/commit/?id=fd6dbc98a73207ff961f1f83ea833654d98354c3'/>
<id>urn:sha1:fd6dbc98a73207ff961f1f83ea833654d98354c3</id>
<content type='text'>
For secure boot, a header is used to identify key table, signature
and image address. A new header structure is added for lsch3.

Currently key extension (IE) feature is not supported. Single key
feature is not supported. Keys must be in table format. Hence, SRK
(key table) must be present. Max key number has increase from 4 to
8. The 8th key is irrevocable. A new barker Code is used.

Signed-off-by: Aneesh Bansal &lt;aneesh.bansal@nxp.com&gt;
Signed-off-by: Saksham Jain &lt;saksham.jain@nxp.com&gt;
Reviewed-by: York Sun &lt;york.sun@nxp.com&gt;
</content>
</entry>
<entry>
<title>secure_boot: enable chain of trust for ARM platforms</title>
<updated>2016-01-27T16:12:49Z</updated>
<author>
<name>Aneesh Bansal</name>
</author>
<published>2016-01-22T11:07:26Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/project/bcm63xx/u-boot/commit/?id=d041288586b05164c84794a5956ddc5fb8939115'/>
<id>urn:sha1:d041288586b05164c84794a5956ddc5fb8939115</id>
<content type='text'>
Chain of Trust is enabled for ARM platforms (LS1021 and LS1043).
In board_late_init(), fsl_setenv_chain_of_trust() is called which
will perform the following:
- If boot mode is non-secure, return (No Change)
- If boot mode is secure, set the following environmet variables:
   bootdelay = 0 (To disable Boot Prompt)
   bootcmd = CONFIG_CHAIN_BOOT_CMD (Validate and execute Boot script)

Signed-off-by: Aneesh Bansal &lt;aneesh.bansal@nxp.com&gt;
Acked-by: Ruchika Gupta &lt;ruchika.gupta@nxp.com&gt;
Reviewed-by: York Sun &lt;york.sun@nxp.com&gt;
</content>
</entry>
<entry>
<title>SECURE BOOT: support for validation of dynamic image</title>
<updated>2016-01-25T16:24:16Z</updated>
<author>
<name>Aneesh Bansal</name>
</author>
<published>2015-12-08T08:44:15Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/project/bcm63xx/u-boot/commit/?id=b055a0fd867b11e40944b3414026d37ea00e0840'/>
<id>urn:sha1:b055a0fd867b11e40944b3414026d37ea00e0840</id>
<content type='text'>
Some images to be validated are relocated to a dynamic
address at run time. So, these addresses cannot be known
befor hand while signing the images and creating the header
offline.
So, support is required to pass the image address to the
validate function as an argument.
If an address is provided to the function, the address
field in Header is not read and is treated as a reserved
field.

Signed-off-by: Saksham Jain &lt;saksham@freescale.com&gt;
Signed-off-by: Aneesh Bansal &lt;aneesh.bansal@freescale.com&gt;
Acked-by: Ruchika Gupta &lt;ruchika.gupta@nxp.com&gt;
Reviewed-by: York Sun &lt;york.sun@nxp.com&gt;
</content>
</entry>
<entry>
<title>SECURE BOOT: change prototype of fsl_secboot_validate function</title>
<updated>2016-01-25T16:24:16Z</updated>
<author>
<name>Aneesh Bansal</name>
</author>
<published>2015-12-08T08:44:12Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/project/bcm63xx/u-boot/commit/?id=bc71f926e35be8af1a9491ea0332871881c7eda5'/>
<id>urn:sha1:bc71f926e35be8af1a9491ea0332871881c7eda5</id>
<content type='text'>
The prototype and defination of function fsl_secboot_validate
has been changed to support calling this function from another
function within u-boot.
Only two aruments needed:
1) header address - Mandatory
2) SHA256 string - optional

Signed-off-by: Saksham Jain &lt;saksham@freescale.com&gt;
Signed-off-by: Aneesh Bansal &lt;aneesh.bansal@freescale.com&gt;
Acked-by: Ruchika Gupta &lt;ruchika.gupta@nxp.com&gt;
Reviewed-by: York Sun &lt;york.sun@nxp.com&gt;
</content>
</entry>
<entry>
<title>armv8/ls1043ardb: add SECURE BOOT target for NOR</title>
<updated>2015-12-15T00:57:35Z</updated>
<author>
<name>Aneesh Bansal</name>
</author>
<published>2015-12-08T08:24:29Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/project/bcm63xx/u-boot/commit/?id=9711f52806655bcfa28fe5594b91fed430beb72e'/>
<id>urn:sha1:9711f52806655bcfa28fe5594b91fed430beb72e</id>
<content type='text'>
LS1043ARDB Secure Boot Target from NOR has been added.
- Configs defined to enable esbc_validate.
- ESBC Address in header is made 64 bit.
- SMMU is re-configured in Bypass mode.

Signed-off-by: Aneesh Bansal &lt;aneesh.bansal@freescale.com&gt;
Reviewed-by: York Sun &lt;yorksun@freescale.com&gt;
</content>
</entry>
</feed>
