blob: 53b606ebb502898a8301ae688ab8e46d7432285a [file] [log] [blame]
Tom Rini88077712017-01-22 19:43:10 -05001config CHAIN_OF_TRUST
2 depends on !FIT_SIGNATURE && SECURE_BOOT
Simon Glassc04b9b32017-04-26 22:27:53 -06003 imply CMD_BLOB
Simon Glass551c3932017-05-17 03:25:25 -06004 imply CMD_HASH if ARM
Tom Rini28522672017-03-01 16:51:58 -05005 select FSL_CAAM
Ley Foon Tan0680f1b2017-05-03 17:13:32 +08006 select SPL_BOARD_INIT if (ARM && SPL)
Tom Rini089df182017-05-15 12:17:49 -04007 select SHA_HW_ACCEL
8 select SHA_PROG_HW_ACCEL
Tom Rini88077712017-01-22 19:43:10 -05009 bool
10 default y
Simon Glassea7971f2017-05-17 03:25:16 -060011
12config CMD_ESBC_VALIDATE
13 bool "Enable the 'esbc_validate' and 'esbc_halt' commands"
14 default y if CHAIN_OF_TRUST
15 help
16 This option enables two commands used for secure booting:
17
18 esbc_validate - validate signature using RSA verification
19 esbc_halt - put the core in spin loop (Secure Boot Only)