Skip to content
Snippets Groups Projects
  1. May 07, 2018
    • Tom Rini's avatar
      SPDX: Convert all of our single license tags to Linux Kernel style · 83d290c5
      Tom Rini authored
      
      When U-Boot started using SPDX tags we were among the early adopters and
      there weren't a lot of other examples to borrow from.  So we picked the
      area of the file that usually had a full license text and replaced it
      with an appropriate SPDX-License-Identifier: entry.  Since then, the
      Linux Kernel has adopted SPDX tags and they place it as the very first
      line in a file (except where shebangs are used, then it's second line)
      and with slightly different comment styles than us.
      
      In part due to community overlap, in part due to better tag visibility
      and in part for other minor reasons, switch over to that style.
      
      This commit changes all instances where we have a single declared
      license in the tag as both the before and after are identical in tag
      contents.  There's also a few places where I found we did not have a tag
      and have introduced one.
      
      Signed-off-by: default avatarTom Rini <trini@konsulko.com>
      83d290c5
  2. Apr 27, 2018
  3. Aug 02, 2016
  4. Jan 25, 2016
  5. Dec 15, 2015
  6. Feb 25, 2015
  7. Oct 16, 2014
    • Ruchika Gupta's avatar
      crypto/fsl: Add command for encapsulating/decapsulating blobs · c5de15cb
      Ruchika Gupta authored
      
      Freescale's SEC block has built-in Blob Protocol which provides
      a method for protecting user-defined data across system power
      cycles. SEC block protects data in a data structure called a Blob,
      which provides both confidentiality and integrity protection.
      
      Encapsulating data as a blob
      Each time that the Blob Protocol is used to protect data, a
      different randomly generated key is used to encrypt the data.
      This random key is itself encrypted using a key which is derived
      from SoC's non volatile secret key and a 16 bit Key identifier.
      The resulting encrypted key along with encrypted data is called a blob.
      The non volatile secure key is available for use only during secure boot.
      
      During decapsulation, the reverse process is performed to get back
      the original data.
      
      Commands added
      --------------
          blob enc - encapsulating data as a cryptgraphic blob
          blob dec - decapsulating cryptgraphic blob to get the data
      
      Commands Syntax
      ---------------
      	blob enc src dst len km
      
      	Encapsulate and create blob of data $len bytes long
      	at address $src and store the result at address $dst.
      	$km is the 16 byte key modifier is also required for
      	generation/use as key for cryptographic operation. Key
      	modifier should be 16 byte long.
      
      	blob dec src dst len km
      
      	Decapsulate the  blob of data at address $src and
      	store result of $len byte at addr $dst.
      	$km is the 16 byte key modifier is also required for
      	generation/use as key for cryptographic operation. Key
      	modifier should be 16 byte long.
      
      Signed-off-by: default avatarRuchika Gupta <ruchika.gupta@freescale.com>
      Reviewed-by: default avatarYork Sun <yorksun@freescale.com>
      c5de15cb
Loading