From 10ebd8556b7990499c896a550e3d416b444211e6 Mon Sep 17 00:00:00 2001
From: hc <hc@nodka.com>
Date: Fri, 10 May 2024 02:23:07 +0000
Subject: [PATCH] add led
---
u-boot/lib/rsa/rsa-verify.c | 16 +++++++++++-----
1 files changed, 11 insertions(+), 5 deletions(-)
diff --git a/u-boot/lib/rsa/rsa-verify.c b/u-boot/lib/rsa/rsa-verify.c
index 18b9ff9..fe15293 100644
--- a/u-boot/lib/rsa/rsa-verify.c
+++ b/u-boot/lib/rsa/rsa-verify.c
@@ -86,11 +86,17 @@
uint8_t buf[sig_len];
rsa_key rsa_key;
int i, ret;
+#ifdef CONFIG_FIT_ENABLE_RSA4096_SUPPORT
+ if (key_len != RSA4096_BYTES)
+ return -EINVAL;
+ rsa_key.algo = CRYPTO_RSA4096;
+#else
if (key_len != RSA2048_BYTES)
return -EINVAL;
rsa_key.algo = CRYPTO_RSA2048;
+#endif
rsa_key.n = malloc(key_len);
rsa_key.e = malloc(key_len);
rsa_key.c = malloc(key_len);
@@ -599,7 +605,7 @@
struct udevice *dev;
struct key_prop prop;
char name[100] = {0};
- u16 secure_boot_enable = 0;
+ u16 secure_flags = 0;
const void *blob = info->fdt_blob;
uint8_t digest[FIT_MAX_HASH_LEN];
uint8_t digest_read[FIT_MAX_HASH_LEN];
@@ -610,11 +616,11 @@
return -ENODEV;
ret = misc_otp_read(dev, OTP_SECURE_BOOT_ENABLE_ADDR,
- &secure_boot_enable, OTP_SECURE_BOOT_ENABLE_SIZE);
+ &secure_flags, OTP_SECURE_BOOT_ENABLE_SIZE);
if (ret)
return ret;
- if (secure_boot_enable)
+ if (secure_flags == 0xff)
return 0;
sig_node = fdt_subnode_offset(blob, 0, FIT_SIG_NODENAME);
@@ -701,9 +707,9 @@
goto error;
}
- secure_boot_enable = 0xff;
+ secure_flags = 0xff;
ret = misc_otp_write(dev, OTP_SECURE_BOOT_ENABLE_ADDR,
- &secure_boot_enable, OTP_SECURE_BOOT_ENABLE_SIZE);
+ &secure_flags, OTP_SECURE_BOOT_ENABLE_SIZE);
if (ret)
goto error;
--
Gitblit v1.6.2