/u-boot/common/ |
A D | image-fit-sig.c | 145 int verified = 0; in fit_image_verify_sig() local 168 verified = 1; in fit_image_verify_sig() 179 return verified ? 0 : -EPERM; in fit_image_verify_sig() 373 int verified = 0; in fit_config_verify_sig() local 388 verified = 1; in fit_config_verify_sig() 399 if (verified) in fit_config_verify_sig() 415 int verified = 0; in fit_config_verify_required_sigs() local 465 verified++; in fit_config_verify_required_sigs() 471 if (reqd_sigs && !verified) { in fit_config_verify_required_sigs()
|
A D | Kconfig.boot | 24 verified boot (secure boot using RSA). 85 using a hash signed and verified using RSA. If 101 This option sets a max size in bytes for verified FIT uImages. 383 bool "Support Chrome OS verified boot" 385 This is intended to enable the full Chrome OS verified boot support
|
/u-boot/doc/SPL/ |
A D | README.spl-secure-boot | 1 Overview of SPL verified boot on powerpc/mpc85xx & arm/layerscape platforms 7 This document provides an overview of how SPL verified boot works on powerpc/
|
/u-boot/lib/efi_loader/ |
A D | efi_signature.c | 303 bool verified = false; in efi_verify_certificate() local 327 verified = true; in efi_verify_certificate() 339 EFI_PRINT("%s: Exit, verified: %d\n", __func__, verified); in efi_verify_certificate() 340 return verified; in efi_verify_certificate() 445 bool verified = false; in efi_signature_verify() local 502 verified = true; in efi_signature_verify() 504 EFI_PRINT("%s: Exit, verified: %d\n", __func__, verified); in efi_signature_verify() 505 return verified; in efi_signature_verify()
|
/u-boot/doc/ |
A D | README.chromium | 21 - Running U-Boot with Chromium OS verified boot. This allows U-Boot to be 30 - Running U-Boot and booting into a Chrome OS image, but without verified 34 U-Boot with Chromium OS verified boot 91 environment for new verified-boot features. 126 UCLASS_CROS_VBOOT_FLAG Chrome OS verified boot flag 154 Various options are available which control the operation of verified boot. 181 U-Boot without Chromium OS verified boot 187 # The offset 4f0 is defined by verified boot and may change for other
|
A D | README.uniphier | 252 Please note the "u-boot.bin" must be signed, and verified by someone when it is 256 the system reset. If the Chain of Trust has a breakage somewhere, the verified 259 7. Boot verified kernel
|
A D | README.update | 13 TFTP transfer is successful, the hash of each update is verified, and if the
|
A D | README.armada-secureboot | 90 images are verified (non-secure images won't boot); 96 Trusted boot framework - The ARMADA SoC's implementation of a secure verified 162 NOTE: All RSA signatures are verified according to the PKCS #1 v2.1 standard
|
A D | README.socfpga | 24 verified with DE1_SOC_Linux_FB demo project (https://github.com/VCTLabs/DE1_SOC_Linux_FB).
|
A D | README.POST | 485 The first 2 instructions (b, bl) will be verified by jumping to 634 following areas will be verified: 0x00000000-0x00000800, 680 features will be verified: 684 This will be verified by reading RTC in polling within a short
|
/u-boot/include/crypto/ |
A D | x509_parser.h | 40 bool verified; member
|
/u-boot/doc/uImage.FIT/ |
A D | beaglebone_vboot.txt | 7 Before reading this, please read verified-boot.txt and signature.txt. These 11 verified boot works in U-Boot. There is also a test which runs through the 16 for an example of how to enable verified boot using U-Boot. 22 packaged with the kernel. In particular this is important with verified boot, 24 public keys can be changed and verified boot is useless. An attacker can 37 1. Build U-Boot for the board, with the verified boot options enabled. 68 b. Configure and build U-Boot with verified boot enabled: 198 'required' property, which tells U-Boot that this key must be verified for the 301 'dev' and the '+' means that it verified. If it showed '-' that would be bad. 303 Once the configuration is verified it is then possible to rely on the hashes [all …]
|
A D | verified-boot.txt | 16 which use verified boot. Since the machine will only run software that has 26 be verified using a public key. As its name suggests the public key can be 96 a standard place. Then when a FIT is loaded it can be verified using that
|
A D | signature.txt | 11 that it can be verified using a public key later. Provided that the private 13 any image can be verified in this way. 15 See verified-boot.txt for more general information on verified boot. 153 - required: If present this indicates that the key must be verified for the 155 normally verified by the FIT image booting algorithm. Valid values are 376 verified later even if the FIT has been signed with other keys in the 382 FITs are verified when loaded. After the configuration is selected a list 384 each image must be verified against those keys. This means that every image 392 - required-mode: Valid values are "any" to allow verified boot to succeed if 394 to allow verified boot to succeed if the selected configuration is signed by [all …]
|
A D | x86-fit-boot.txt | 252 5. You can use verified/secure boot and other features which haven't yet been
|
/u-boot/arch/x86/include/asm/acpi/ |
A D | cros_gnvs.asl | 20 CHVD, 24576, // 0x19a - VDAT space filled by verified boot
|
/u-boot/drivers/tpm/ |
A D | Kconfig | 24 support Chrome OS verified boot. Extend functionality is not 138 verified boot. Cr50 is used on recent Chromebooks (since 2017).
|
/u-boot/drivers/misc/ |
A D | Kconfig | 166 keyboard (use the -l flag to enable the LCD), verified boot context, 168 enough to perform a Chrome OS verified boot on sandbox. 175 keyboard (use the -l flag to enable the LCD), verified boot context, 177 enough to perform a Chrome OS verified boot on sandbox. 184 keyboard (use the -l flag to enable the LCD), verified boot context, 186 enough to perform a Chrome OS verified boot on sandbox.
|
/u-boot/board/google/ |
A D | Kconfig | 73 U-Boot proper. This is useful where verified boot must select
|
/u-boot/arch/arm/dts/ |
A D | rk3399-gru-chromebook.dtsi | 313 /* May run faster once verified. */
|
/u-boot/doc/board/emulation/ |
A D | qemu_capsule_update.rst | 81 capsule generation. This signature is then verified by using the
|
/u-boot/doc/arch/ |
A D | sandbox.rst | 183 commands, hashing, FIT images, verified boot and many other features are 507 verified boot:
|
/u-boot/doc/imx/habv4/ |
A D | introduction_habv4.txt | 31 keys. The resulting signed image data is then verified on the i.MX processor
|
/u-boot/doc/board/sipeed/ |
A D | maix.rst | 369 The FDT is verified after the kernel is relocated, so it must be loaded high 585 * The SHA-256 sum of the next stage is automatically calculated, and verified
|
/u-boot/doc/board/google/ |
A D | chromebook_coral.rst | 219 - Booting Chrome OS, e.g. with verified boot
|