blob: 280f7d46b808852e82ab3c737961ca611417a81f [file] [log] [blame]
Tom Rini51b06fa2017-01-22 19:43:10 -05001config CHAIN_OF_TRUST
2 depends on !FIT_SIGNATURE && SECURE_BOOT
Simon Glass311ec4f2017-04-26 22:27:53 -06003 imply CMD_BLOB
Simon Glass027608e2017-05-17 03:25:25 -06004 imply CMD_HASH if ARM
Tom Rinia5c4d402017-03-01 16:51:58 -05005 select FSL_CAAM
Ley Foon Tan48fcc4a2017-05-03 17:13:32 +08006 select SPL_BOARD_INIT if (ARM && SPL)
Tom Rini5bdd9192017-05-15 12:17:49 -04007 select SHA_HW_ACCEL
8 select SHA_PROG_HW_ACCEL
Simon Glass73c18b42017-07-23 21:19:39 -06009 select ENV_IS_NOWHERE
Sumit Garg13ad2902018-01-09 01:27:46 +053010 select CMD_EXT4 if ARM
11 select CMD_EXT4_WRITE if ARM
Tom Rini51b06fa2017-01-22 19:43:10 -050012 bool
13 default y
Simon Glassa6a9ea42017-05-17 03:25:16 -060014
15config CMD_ESBC_VALIDATE
16 bool "Enable the 'esbc_validate' and 'esbc_halt' commands"
17 default y if CHAIN_OF_TRUST
18 help
19 This option enables two commands used for secure booting:
20
21 esbc_validate - validate signature using RSA verification
22 esbc_halt - put the core in spin loop (Secure Boot Only)