From patchwork Thu Aug 3 15:48:14 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Oleksandr Suvorov X-Patchwork-Id: 1816531 X-Patchwork-Delegate: trini@ti.com Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=lists.denx.de (client-ip=85.214.62.61; helo=phobos.denx.de; envelope-from=u-boot-bounces@lists.denx.de; receiver=) Authentication-Results: legolas.ozlabs.org; dkim=pass (2048-bit key; unprotected) header.d=foundries.io header.i=@foundries.io header.a=rsa-sha256 header.s=google header.b=aWNybDPd; dkim-atps=neutral Received: from phobos.denx.de (phobos.denx.de [85.214.62.61]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384)) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4RGtYC1NgXz1yYC for ; Fri, 4 Aug 2023 01:48:31 +1000 (AEST) Received: from h2850616.stratoserver.net (localhost [IPv6:::1]) by phobos.denx.de (Postfix) with ESMTP id 0E30B866E9; Thu, 3 Aug 2023 17:48:29 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=foundries.io Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de Authentication-Results: phobos.denx.de; dkim=pass (2048-bit key; unprotected) header.d=foundries.io header.i=@foundries.io header.b="aWNybDPd"; dkim-atps=neutral Received: by phobos.denx.de (Postfix, from userid 109) id 2A1ED866BD; Thu, 3 Aug 2023 17:48:28 +0200 (CEST) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on phobos.denx.de X-Spam-Level: X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.2 Received: from mail-ej1-x62f.google.com (mail-ej1-x62f.google.com [IPv6:2a00:1450:4864:20::62f]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits)) (No client certificate requested) by phobos.denx.de (Postfix) with ESMTPS id 3801386774 for ; Thu, 3 Aug 2023 17:48:26 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=foundries.io Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=oleksandr.suvorov@foundries.io Received: by mail-ej1-x62f.google.com with SMTP id a640c23a62f3a-99c353a395cso150323766b.2 for ; Thu, 03 Aug 2023 08:48:26 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=foundries.io; s=google; t=1691077705; x=1691682505; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:from:to:cc:subject:date:message-id:reply-to; bh=DVN7fz0r/fn61WXVtmGq+f4BMnrQAdKe/56hzU4clQ8=; b=aWNybDPd1x8kRJlQSm96beBjyTXcSl3IVgFUWJAtqk6Xf4rsbunjGIURGrR7m6IRAg zXJXM4oLnY1ZnlMHrOIAcy2ZXPmZI99gt/tkax4f0mG8b6FBgJcq4FD/rVI+kyce/38O PdShwcZ9F7Hf82Vxrkk5X8rO5ZmD9ix/1U/NSHapWX7dUkzM4f1EtCAj5ZByZvu9WuZQ RaDIIkpRkuy4Nb/7HpwUP1uBQC/04dMpJyTn6iWAc1zSnFWY+wKHCwE0vO3wFDMR4TSL HQ92f+q5hdcOwgIYQ2ASny3vyiS8Uz3/QWwQtoXWifnU5yJrYzIVgvF1LZ+3Ug+QxZ4u IaMA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1691077705; x=1691682505; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=DVN7fz0r/fn61WXVtmGq+f4BMnrQAdKe/56hzU4clQ8=; b=RBQwb+TIZJzr3q9kES+U+//Iw9LJfjhFvp42DymcbVto+jgkYvkMb6LSvW6i2D0gpk Fm74lrP3Id8vhF52epN1nGoDPdSv7vTUXCjeEtwJ7Qalw6/mCS4FXbm0LpFE4Gl1Eg/k mSH5sz7SmnrKWzMfn3CxCLglFAY+9xIUF82fXgYdKLk0lbsb7nS/BlRfPYXIShJV1m0B 04KNs/jkSw4jL5paEh724H/3NRrcz5UoMg02PdnBP/jzbtSX+f7B4zA/nmBRSSKF5DZr Nicve9nc//WO8DSWwzyYgWT2KAWJoC+esn76qsWvJLOeYFNiz3d3JDXjAggkmKgdlIVG JtzQ== X-Gm-Message-State: ABy/qLZmJVmvLCGfrKNlPPfwzG3so/+zrmE969ceLhP3DPX2bZI/jyjQ 1D/72bVLVy4lJkinwLt4O4SOO0IFxvLk7rExdoE= X-Google-Smtp-Source: APBJJlHOP73CKPSESjEjLqpx4Beskj4VgxRjDKbuiIrfF4XoLO8WXTcguwnFRhKhZCdzPpcOk5n1BQ== X-Received: by 2002:a17:906:8a5b:b0:99b:f8ab:f675 with SMTP id gx27-20020a1709068a5b00b0099bf8abf675mr7503738ejc.14.1691077705446; Thu, 03 Aug 2023 08:48:25 -0700 (PDT) Received: from localhost.localdomain ([194.104.22.162]) by smtp.gmail.com with ESMTPSA id i10-20020a170906250a00b009931baa0d44sm10808655ejb.140.2023.08.03.08.48.24 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 03 Aug 2023 08:48:24 -0700 (PDT) From: Oleksandr Suvorov To: u-boot@lists.denx.de Cc: Oleksandr Suvorov , Alexandru Gagniuc , Anup Patel , Leo Yu-Chi Liang , Marek Vasut , Mayuresh Chitale , Nikita Shubin , =?utf-8?q?Pali_Roh=C3=A1r?= , Roger Quadros , Simon Glass Subject: [PATCH] spl: remove duplicate SPL_MD5 option Date: Thu, 3 Aug 2023 18:48:14 +0300 Message-Id: <20230803154814.731506-1-oleksandr.suvorov@foundries.io> X-Mailer: git-send-email 2.40.1 MIME-Version: 1.0 X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.39 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" X-Virus-Scanned: clamav-milter 0.103.8 at phobos.denx.de X-Virus-Status: Clean There is another SPL_MD5 option defined in lib/Kconfig. Renaming SPL_MD5_SUPPORT introduced duplicate option with different description. As for now FIT and hash algorithm options are not related to each others, removing a duplicate option seems OK. Fixes: 4b00fd1a84c ("Kconfig: Rename SPL_MD5_SUPPORT to SPL_MD5") Signed-off-by: Oleksandr Suvorov --- common/spl/Kconfig | 12 ------------ 1 file changed, 12 deletions(-) diff --git a/common/spl/Kconfig b/common/spl/Kconfig index bee231b583a..c66d70e2a99 100644 --- a/common/spl/Kconfig +++ b/common/spl/Kconfig @@ -561,18 +561,6 @@ config SPL_CRC32 for detected accidental image corruption. For secure applications you should consider SHA1 or SHA256. -config SPL_MD5 - bool "Support MD5" - depends on SPL_FIT - help - Enable this to support MD5 in FIT images within SPL. An MD5 - checksum is a 128-bit hash value used to check that the image - contents have not been corrupted. Note that MD5 is not considered - secure as it is possible (with a brute-force attack) to adjust the - image while still retaining the same MD5 hash value. For secure - applications where images may be changed maliciously, you should - consider SHA256 or SHA384. - config SPL_FIT_IMAGE_TINY bool "Remove functionality from SPL FIT loading to reduce size" depends on SPL_FIT