diff options
| author | Tom Rini <[email protected]> | 2024-10-21 17:53:11 -0600 |
|---|---|---|
| committer | Tom Rini <[email protected]> | 2024-10-21 17:53:11 -0600 |
| commit | a3709638ecbc7ffeff36d2233c5cf4e830e428a2 (patch) | |
| tree | 999a3d5a763b13ed73e89344b03a2f8ec4eb3764 /boot | |
| parent | 63a3dbb7b9e1c352c85b4fa6508f1c895e163458 (diff) | |
| parent | 936d4cb6eb4cb6ee611d0cf4f74b923f6593cbee (diff) | |
Merge patch series "aspeed: ast2700: Add Caliptra ECDSA driver"
Chia-Wei Wang <[email protected]> says:
Aspeed AST2700 SoCs integrates the Caliptra secure IP, where an ECDSA384
signature verification HW interface is exported for SoC crypto needs.
This patch series firstly extends the FIT image signing/verify common
code to support the ECDSA384 algorithm. For better convenience, the
device tree for ECDSA public key storage is also revised by referring
to RSA implementations.
After the FIT common code revision, the driver is implemented for
AST2700 to leverage the Caliptra ECDSA384 signature verification.
These are verified by signed FIT images with the algorithm "sha384,ecdsa384".
Link: https://lore.kernel.org/r/[email protected]
Diffstat (limited to 'boot')
| -rw-r--r-- | boot/image-fit-sig.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/boot/image-fit-sig.c b/boot/image-fit-sig.c index 35873b1fb0e..a121de60ae2 100644 --- a/boot/image-fit-sig.c +++ b/boot/image-fit-sig.c @@ -95,7 +95,7 @@ static int fit_image_setup_verify(struct image_sign_info *info, info->required_keynode = required_keynode; printf("%s:%s", algo_name, info->keyname); - if (!info->checksum || !info->crypto || !info->padding) { + if (!info->checksum || !info->crypto) { *err_msgp = "Unknown signature algorithm"; return -1; } |
