aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorOleksandr Suvorov2023-08-03 19:05:40 +0300
committerTom Rini2023-08-07 13:41:44 -0400
commitaf62d83cc0ee27ca5051718a0df44341f71abff1 (patch)
treea2dffd699096ebbb888b1180256963808e259a5d
parent0d2761abbde00e1ff756426fdb77b4b30192311d (diff)
spl: move SPL_CRC32 option to lib/Kconfig
All SPL hash algorithm options are collected in lib/Kconfig. Move SPL_CRC32 there as well. Signed-off-by: Oleksandr Suvorov <oleksandr.suvorov@foundries.io> Reviewed-by: Simon Glass <sjg@chromium.org>
-rw-r--r--common/spl/Kconfig11
-rw-r--r--lib/Kconfig11
2 files changed, 11 insertions, 11 deletions
diff --git a/common/spl/Kconfig b/common/spl/Kconfig
index c66d70e2a99..c5dd476db58 100644
--- a/common/spl/Kconfig
+++ b/common/spl/Kconfig
@@ -550,17 +550,6 @@ config SYS_MMCSD_RAW_MODE_EMMC_BOOT_PARTITION
the eMMC EXT_CSC_PART_CONFIG selection should be overridden in SPL
by user defined partition number.
-config SPL_CRC32
- bool "Support CRC32"
- default y if SPL_LEGACY_IMAGE_FORMAT || SPL_EFI_PARTITION
- default y if SPL_ENV_SUPPORT || TPL_BLOBLIST
- help
- Enable this to support CRC32 in uImages or FIT images within SPL.
- This is a 32-bit checksum value that can be used to verify images.
- For FIT images, this is the least secure type of checksum, suitable
- for detected accidental image corruption. For secure applications you
- should consider SHA1 or SHA256.
-
config SPL_FIT_IMAGE_TINY
bool "Remove functionality from SPL FIT loading to reduce size"
depends on SPL_FIT
diff --git a/lib/Kconfig b/lib/Kconfig
index 3926652db63..07e61de5b64 100644
--- a/lib/Kconfig
+++ b/lib/Kconfig
@@ -534,6 +534,17 @@ config SHA_HW_ACCEL
if SPL
+config SPL_CRC32
+ bool "Enable CRC32 support in SPL"
+ default y if SPL_LEGACY_IMAGE_SUPPORT || SPL_EFI_PARTITION
+ default y if SPL_ENV_SUPPORT || TPL_BLOBLIST
+ help
+ This option enables support of hashing using CRC32 algorithm.
+ The CRC32 algorithm produces 32-bit checksum value. For FIT
+ images, this is the least secure type of checksum, suitable for
+ detected accidental image corruption. For secure applications you
+ should consider SHA256 or SHA384.
+
config SPL_SHA1
bool "Enable SHA1 support in SPL"
default y if SHA1