diff options
author | Simon Glass <sjg@chromium.org> | 2017-05-17 03:25:16 -0600 |
---|---|---|
committer | Tom Rini <trini@konsulko.com> | 2017-05-22 09:33:55 -0400 |
commit | ea7971f705e5b00fad41bc15941b5415fec01ee6 (patch) | |
tree | f2d58a6d128a434ca2816200d16567b20215897f | |
parent | 230ecd7150e83fc5a669bc1d986a79cd036de90a (diff) | |
download | u-boot-ea7971f705e5b00fad41bc15941b5415fec01ee6.tar.gz |
Convert CONFIG_CMD_ESBC_VALIDATE to Kconfig
This converts the following to Kconfig:
CONFIG_CMD_ESBC_VALIDATE
Signed-off-by: Simon Glass <sjg@chromium.org>
Reviewed-by: Tom Rini <trini@konsulko.com>
-rw-r--r-- | arch/arm/include/asm/fsl_secure_boot.h | 1 | ||||
-rw-r--r-- | arch/powerpc/include/asm/fsl_secure_boot.h | 1 | ||||
-rw-r--r-- | board/freescale/common/Kconfig | 9 | ||||
-rw-r--r-- | scripts/config_whitelist.txt | 1 |
4 files changed, 9 insertions, 3 deletions
diff --git a/arch/arm/include/asm/fsl_secure_boot.h b/arch/arm/include/asm/fsl_secure_boot.h index bd39b6e267..2e3f520f47 100644 --- a/arch/arm/include/asm/fsl_secure_boot.h +++ b/arch/arm/include/asm/fsl_secure_boot.h @@ -8,7 +8,6 @@ #define __FSL_SECURE_BOOT_H #ifdef CONFIG_CHAIN_OF_TRUST -#define CONFIG_CMD_ESBC_VALIDATE #define CONFIG_FSL_SEC_MON #ifdef CONFIG_SPL_BUILD diff --git a/arch/powerpc/include/asm/fsl_secure_boot.h b/arch/powerpc/include/asm/fsl_secure_boot.h index 8f66fc5182..76921eea9a 100644 --- a/arch/powerpc/include/asm/fsl_secure_boot.h +++ b/arch/powerpc/include/asm/fsl_secure_boot.h @@ -99,7 +99,6 @@ #define CONFIG_SPL_UBOOT_KEY_HASH NULL #endif /* ifdef CONFIG_SPL_BUILD */ -#define CONFIG_CMD_ESBC_VALIDATE #define CONFIG_FSL_SEC_MON #ifndef CONFIG_SPL_BUILD diff --git a/board/freescale/common/Kconfig b/board/freescale/common/Kconfig index 540885786b..b4bf90d4f5 100644 --- a/board/freescale/common/Kconfig +++ b/board/freescale/common/Kconfig @@ -7,3 +7,12 @@ config CHAIN_OF_TRUST select SHA_PROG_HW_ACCEL bool default y + +config CMD_ESBC_VALIDATE + bool "Enable the 'esbc_validate' and 'esbc_halt' commands" + default y if CHAIN_OF_TRUST + help + This option enables two commands used for secure booting: + + esbc_validate - validate signature using RSA verification + esbc_halt - put the core in spin loop (Secure Boot Only) diff --git a/scripts/config_whitelist.txt b/scripts/config_whitelist.txt index 6a6bb27bb4..01e44eea4c 100644 --- a/scripts/config_whitelist.txt +++ b/scripts/config_whitelist.txt @@ -383,7 +383,6 @@ CONFIG_CM922T_XA10 CONFIG_CMDLINE_EDITING CONFIG_CMDLINE_PS_SUPPORT CONFIG_CMDLINE_TAG -CONFIG_CMD_ESBC_VALIDATE CONFIG_CMD_ETHSW CONFIG_CMD_FDC CONFIG_CMD_FDT_MAX_DUMP |