"arch/arm/mach-imx/timer.c" did not exist on "84ad688473bec2875e171b71040eb9e033c6c206"
Forked from
Reform / reform-boundary-uboot
Source project has a limited visibility.
-
Mario Six authored
The patch implements secure booting for the mvebu architecture. This includes: - The addition of secure headers and all needed signatures and keys in mkimage - Commands capable of writing the board's efuses to both write the needed cryptographic data and enable the secure booting mechanism - The creation of convenience text files containing the necessary commands to write the efuses The KAK and CSK keys are expected to reside in the files kwb_kak.key and kwb_csk.key (OpenSSL 2048 bit private keys) in the top-level directory. Signed-off-by:
Reinhard Pfau <reinhard.pfau@gdsys.cc> Signed-off-by:
Mario Six <mario.six@gdsys.cc> Reviewed-by:
Stefan Roese <sr@denx.de> Reviewed-by:
Simon Glass <sjg@chromium.org> Signed-off-by:
Stefan Roese <sr@denx.de>
Mario Six authoredThe patch implements secure booting for the mvebu architecture. This includes: - The addition of secure headers and all needed signatures and keys in mkimage - Commands capable of writing the board's efuses to both write the needed cryptographic data and enable the secure booting mechanism - The creation of convenience text files containing the necessary commands to write the efuses The KAK and CSK keys are expected to reside in the files kwb_kak.key and kwb_csk.key (OpenSSL 2048 bit private keys) in the top-level directory. Signed-off-by:
Reinhard Pfau <reinhard.pfau@gdsys.cc> Signed-off-by:
Mario Six <mario.six@gdsys.cc> Reviewed-by:
Stefan Roese <sr@denx.de> Reviewed-by:
Simon Glass <sjg@chromium.org> Signed-off-by:
Stefan Roese <sr@denx.de>