arm-trusted-firmware/drivers/auth/mbedtls
laurenw-arm 78da42a5f1 refactor(measured-boot): mb algorithm selection
With RSS now introduced, we have 2 Measured Boot backends. Both backends
can be used in the same firmware build with potentially different hash
algorithms, so now there can be more than one hash algorithm in a build.
Therefore the logic for selecting the measured boot hash algorithm needs
to be updated and the coordination of algorithm selection added. This is
done by:

- Adding MBOOT_EL_HASH_ALG for Event Log to define the hash algorithm
to replace TPM_HASH_ALG, removing reference to TPM.

- Adding MBOOT_RSS_HASH_ALG for RSS to define the hash algorithm to
replace TPM_HASH_ALG.

- Coordinating MBOOT_EL_HASH_ALG and MBOOT_RSS_HASH_ALG to define the
Measured Boot configuration macros through defining
TF_MBEDTLS_MBOOT_USE_SHA512 to pull in SHA-512 support if either
backend requires a stronger algorithm than SHA-256.

Signed-off-by: Lauren Wehrmeister <lauren.wehrmeister@arm.com>
Change-Id: I4ddf06ebdc3835beb4d1b6c7bab5a257ffc5c71a
2022-06-16 13:42:19 -05:00
..
mbedtls_common.c refactor(mbedtls): allow platform to specify their config file 2022-03-01 19:08:11 +01:00
mbedtls_common.mk refactor(measured-boot): mb algorithm selection 2022-06-16 13:42:19 -05:00
mbedtls_crypto.c refactor(measured-boot): avoid Measured-Boot dependency on Trusted-Boot 2022-01-11 23:06:22 +00:00
mbedtls_crypto.mk Create a library file for libmbedtls 2018-08-03 11:31:36 +01:00
mbedtls_x509.mk Create a library file for libmbedtls 2018-08-03 11:31:36 +01:00
mbedtls_x509_parser.c Sanitise includes across codebase 2019-01-04 10:43:17 +00:00