diff options
author | Philippe Reynes <philippe.reynes@softathome.com> | 2022-03-28 22:56:58 +0200 |
---|---|---|
committer | Tom Rini <trini@konsulko.com> | 2022-03-31 14:12:01 -0400 |
commit | f6bacf1d489090c8fca1d442cedd8902d8f5acec (patch) | |
tree | 80bb4f7df15eb8d7183b52f5416ecd70f5968bf6 | |
parent | e44ec9f7095ddccc33b19dd636aebc7bc0bf4789 (diff) | |
download | u-boot-f6bacf1d489090c8fca1d442cedd8902d8f5acec.zip u-boot-f6bacf1d489090c8fca1d442cedd8902d8f5acec.tar.gz u-boot-f6bacf1d489090c8fca1d442cedd8902d8f5acec.tar.bz2 |
lib: rsa: allow rsa verify with pkey in SPL
This commit adds the option SPL_RSA_VERIFY_WITH_PKEY.
Reviewed-by: Simon Glass <sjg@chromium.org>
Signed-off-by: Philippe Reynes <philippe.reynes@softathome.com>
-rw-r--r-- | lib/rsa/Kconfig | 19 |
1 files changed, 19 insertions, 0 deletions
diff --git a/lib/rsa/Kconfig b/lib/rsa/Kconfig index be9775b..b773f17 100644 --- a/lib/rsa/Kconfig +++ b/lib/rsa/Kconfig @@ -47,6 +47,25 @@ config RSA_VERIFY_WITH_PKEY directly specified in image_sign_info, where all the necessary key properties will be calculated on the fly in verification code. +config SPL_RSA_VERIFY_WITH_PKEY + bool "Execute RSA verification without key parameters from FDT within SPL" + depends on SPL + select SPL_RSA_VERIFY + select SPL_ASYMMETRIC_KEY_TYPE + select SPL_ASYMMETRIC_PUBLIC_KEY_SUBTYPE + select SPL_RSA_PUBLIC_KEY_PARSER + help + The standard RSA-signature verification code (FIT_SIGNATURE) uses + pre-calculated key properties, that are stored in fdt blob, in + decrypting a signature. + This does not suit the use case where there is no way defined to + provide such additional key properties in standardized form, + particularly UEFI secure boot. + This options enables RSA signature verification with a public key + directly specified in image_sign_info, where all the necessary + key properties will be calculated on the fly in verification code + in the SPL. + config RSA_SOFTWARE_EXP bool "Enable driver for RSA Modular Exponentiation in software" depends on DM |