Home
last modified time | relevance | path

Searched refs:encrypted (Results 1 – 14 of 14) sorted by relevance

/u-boot/doc/imx/ahab/guides/
A Dmx8_mx8x_encrypted_boot.txt17 1.1 Understanding the encrypted image signature block
69 1.2 Enabling the encrypted boot support in U-Boot
90 1.3 Enabling the encrypted boot support in CST
137 2nd container will be encrypted.
146 encrypted image and a random dek.bin file.
176 1.9 Assembling the encrypted image
191 1.10 Flashing the encrypted boot image
197 - Flash encrypted image in SDCard:
254 be included into the final encrypted binary.
268 2.5 Assembling the encrypted image
[all …]
/u-boot/doc/imx/habv4/guides/
A Dencrypted_boot.txt4 Encrypted Boot. The image is encrypted by i.MX Code Signing
6 u-boot-dtb.imx with the encrypted data. The Initial Vector Table,
9 The image data is encrypted with a Encryption Key (DEK).
22 Note: The encrypted boot feature is only supported by HABv4 or
31 The resulting DEK blob then is used to construct the encrypted
39 cat u-boot-signed-pad.imx DEK_blob.bin > u-boot-encrypted.imx
/u-boot/board/xilinx/zynq/
A DKconfig14 bool "Enable zynq aes command for decryption of encrypted images"
18 Decrypts the encrypted image present in source address
/u-boot/doc/imx/habv4/
A Dintroduction_habv4.txt83 second mechanism is the digital signature, which authenticates the encrypted
86 Keep in mind that the encrypted boot makes use of both mechanisms whatever the
89 boot data and DCD) which can only be signed, not encrypted.
91 The diagram below illustrate the encrypted boot process overview:
133 During the design of encrypted boot using DEK blob, it is necessary to inhibit
141 encrypted boot guide and application note AN12056[3] .
/u-boot/arch/arm/mach-socfpga/include/mach/
A Dfpga_manager_arria10.h109 encrypted enumerator
/u-boot/drivers/fpga/
A Dsocfpga_arria10.c492 rbf->security = encrypted; in get_rbf_image_info()
498 rbf->security = encrypted; in get_rbf_image_info()
/u-boot/doc/imx/common/
A Dmxs.txt44 The mkimage supports generation of BootStream images encrypted
46 case you do need to produce image encrypted with non-zero key
128 BootStream. The BootStream is encrypted with zero key. In case you need
/u-boot/doc/uefi/
A Discsi.rst115 The iSCSI protocol is not encrypted. The traffic could be secured using IPsec
/u-boot/doc/imx/mkimage/
A Dmxsimage.txt4 This tool allows user to produce SB BootStream encrypted with a zero key.
/u-boot/doc/
A DREADME.ti-secure156 u-boot_HS_MLO - signed and encrypted boot image that can be used to
A DREADME.rockchip333 rc4-encrypted. Except for the very first stage the bootrom always reads
/u-boot/cmd/
A DKconfig916 (authenticated or encrypted or both) bitstreams on to FPGA.
1974 This random key is itself encrypted using a key which is derived
1976 The resulting encrypted key along with encrypted data is called a
/u-boot/scripts/
A Dspelling.txt444 encrupted||encrypted
/u-boot/common/
A DKconfig.boot847 string "Stop autobooting via SHA256 encrypted password"

Completed in 26 milliseconds