Searched hist:a1b6b0a9c1f91756b93e6d804837dc178d79d39e (Results 1 – 10 of 10) sorted by relevance
/openbmc/u-boot/doc/ |
H A D | README.armada-secureboot | a1b6b0a9c1f91756b93e6d804837dc178d79d39e Wed Jan 11 09:01:00 CST 2017 Mario Six <mario.six@gdsys.cc> arm: mvebu: Implement secure boot
The patch implements secure booting for the mvebu architecture.
This includes: - The addition of secure headers and all needed signatures and keys in mkimage - Commands capable of writing the board's efuses to both write the needed cryptographic data and enable the secure booting mechanism - The creation of convenience text files containing the necessary commands to write the efuses
The KAK and CSK keys are expected to reside in the files kwb_kak.key and kwb_csk.key (OpenSSL 2048 bit private keys) in the top-level directory.
Signed-off-by: Reinhard Pfau <reinhard.pfau@gdsys.cc> Signed-off-by: Mario Six <mario.six@gdsys.cc> Reviewed-by: Stefan Roese <sr@denx.de> Reviewed-by: Simon Glass <sjg@chromium.org> Signed-off-by: Stefan Roese <sr@denx.de>
|
/openbmc/u-boot/arch/arm/mach-mvebu/ |
H A D | efuse.c | a1b6b0a9c1f91756b93e6d804837dc178d79d39e Wed Jan 11 09:01:00 CST 2017 Mario Six <mario.six@gdsys.cc> arm: mvebu: Implement secure boot
The patch implements secure booting for the mvebu architecture.
This includes: - The addition of secure headers and all needed signatures and keys in mkimage - Commands capable of writing the board's efuses to both write the needed cryptographic data and enable the secure booting mechanism - The creation of convenience text files containing the necessary commands to write the efuses
The KAK and CSK keys are expected to reside in the files kwb_kak.key and kwb_csk.key (OpenSSL 2048 bit private keys) in the top-level directory.
Signed-off-by: Reinhard Pfau <reinhard.pfau@gdsys.cc> Signed-off-by: Mario Six <mario.six@gdsys.cc> Reviewed-by: Stefan Roese <sr@denx.de> Reviewed-by: Simon Glass <sjg@chromium.org> Signed-off-by: Stefan Roese <sr@denx.de>
|
H A D | Makefile | a1b6b0a9c1f91756b93e6d804837dc178d79d39e Wed Jan 11 09:01:00 CST 2017 Mario Six <mario.six@gdsys.cc> arm: mvebu: Implement secure boot
The patch implements secure booting for the mvebu architecture.
This includes: - The addition of secure headers and all needed signatures and keys in mkimage - Commands capable of writing the board's efuses to both write the needed cryptographic data and enable the secure booting mechanism - The creation of convenience text files containing the necessary commands to write the efuses
The KAK and CSK keys are expected to reside in the files kwb_kak.key and kwb_csk.key (OpenSSL 2048 bit private keys) in the top-level directory.
Signed-off-by: Reinhard Pfau <reinhard.pfau@gdsys.cc> Signed-off-by: Mario Six <mario.six@gdsys.cc> Reviewed-by: Stefan Roese <sr@denx.de> Reviewed-by: Simon Glass <sjg@chromium.org> Signed-off-by: Stefan Roese <sr@denx.de>
|
H A D | Kconfig | a1b6b0a9c1f91756b93e6d804837dc178d79d39e Wed Jan 11 09:01:00 CST 2017 Mario Six <mario.six@gdsys.cc> arm: mvebu: Implement secure boot
The patch implements secure booting for the mvebu architecture.
This includes: - The addition of secure headers and all needed signatures and keys in mkimage - Commands capable of writing the board's efuses to both write the needed cryptographic data and enable the secure booting mechanism - The creation of convenience text files containing the necessary commands to write the efuses
The KAK and CSK keys are expected to reside in the files kwb_kak.key and kwb_csk.key (OpenSSL 2048 bit private keys) in the top-level directory.
Signed-off-by: Reinhard Pfau <reinhard.pfau@gdsys.cc> Signed-off-by: Mario Six <mario.six@gdsys.cc> Reviewed-by: Stefan Roese <sr@denx.de> Reviewed-by: Simon Glass <sjg@chromium.org> Signed-off-by: Stefan Roese <sr@denx.de>
|
/openbmc/u-boot/arch/arm/mach-mvebu/include/mach/ |
H A D | efuse.h | a1b6b0a9c1f91756b93e6d804837dc178d79d39e Wed Jan 11 09:01:00 CST 2017 Mario Six <mario.six@gdsys.cc> arm: mvebu: Implement secure boot
The patch implements secure booting for the mvebu architecture.
This includes: - The addition of secure headers and all needed signatures and keys in mkimage - Commands capable of writing the board's efuses to both write the needed cryptographic data and enable the secure booting mechanism - The creation of convenience text files containing the necessary commands to write the efuses
The KAK and CSK keys are expected to reside in the files kwb_kak.key and kwb_csk.key (OpenSSL 2048 bit private keys) in the top-level directory.
Signed-off-by: Reinhard Pfau <reinhard.pfau@gdsys.cc> Signed-off-by: Mario Six <mario.six@gdsys.cc> Reviewed-by: Stefan Roese <sr@denx.de> Reviewed-by: Simon Glass <sjg@chromium.org> Signed-off-by: Stefan Roese <sr@denx.de>
|
H A D | cpu.h | a1b6b0a9c1f91756b93e6d804837dc178d79d39e Wed Jan 11 09:01:00 CST 2017 Mario Six <mario.six@gdsys.cc> arm: mvebu: Implement secure boot
The patch implements secure booting for the mvebu architecture.
This includes: - The addition of secure headers and all needed signatures and keys in mkimage - Commands capable of writing the board's efuses to both write the needed cryptographic data and enable the secure booting mechanism - The creation of convenience text files containing the necessary commands to write the efuses
The KAK and CSK keys are expected to reside in the files kwb_kak.key and kwb_csk.key (OpenSSL 2048 bit private keys) in the top-level directory.
Signed-off-by: Reinhard Pfau <reinhard.pfau@gdsys.cc> Signed-off-by: Mario Six <mario.six@gdsys.cc> Reviewed-by: Stefan Roese <sr@denx.de> Reviewed-by: Simon Glass <sjg@chromium.org> Signed-off-by: Stefan Roese <sr@denx.de>
|
/openbmc/u-boot/tools/ |
H A D | kwbimage.h | a1b6b0a9c1f91756b93e6d804837dc178d79d39e Wed Jan 11 09:01:00 CST 2017 Mario Six <mario.six@gdsys.cc> arm: mvebu: Implement secure boot
The patch implements secure booting for the mvebu architecture.
This includes: - The addition of secure headers and all needed signatures and keys in mkimage - Commands capable of writing the board's efuses to both write the needed cryptographic data and enable the secure booting mechanism - The creation of convenience text files containing the necessary commands to write the efuses
The KAK and CSK keys are expected to reside in the files kwb_kak.key and kwb_csk.key (OpenSSL 2048 bit private keys) in the top-level directory.
Signed-off-by: Reinhard Pfau <reinhard.pfau@gdsys.cc> Signed-off-by: Mario Six <mario.six@gdsys.cc> Reviewed-by: Stefan Roese <sr@denx.de> Reviewed-by: Simon Glass <sjg@chromium.org> Signed-off-by: Stefan Roese <sr@denx.de>
|
H A D | kwbimage.c | a1b6b0a9c1f91756b93e6d804837dc178d79d39e Wed Jan 11 09:01:00 CST 2017 Mario Six <mario.six@gdsys.cc> arm: mvebu: Implement secure boot
The patch implements secure booting for the mvebu architecture.
This includes: - The addition of secure headers and all needed signatures and keys in mkimage - Commands capable of writing the board's efuses to both write the needed cryptographic data and enable the secure booting mechanism - The creation of convenience text files containing the necessary commands to write the efuses
The KAK and CSK keys are expected to reside in the files kwb_kak.key and kwb_csk.key (OpenSSL 2048 bit private keys) in the top-level directory.
Signed-off-by: Reinhard Pfau <reinhard.pfau@gdsys.cc> Signed-off-by: Mario Six <mario.six@gdsys.cc> Reviewed-by: Stefan Roese <sr@denx.de> Reviewed-by: Simon Glass <sjg@chromium.org> Signed-off-by: Stefan Roese <sr@denx.de>
|
H A D | Makefile | a1b6b0a9c1f91756b93e6d804837dc178d79d39e Wed Jan 11 09:01:00 CST 2017 Mario Six <mario.six@gdsys.cc> arm: mvebu: Implement secure boot
The patch implements secure booting for the mvebu architecture.
This includes: - The addition of secure headers and all needed signatures and keys in mkimage - Commands capable of writing the board's efuses to both write the needed cryptographic data and enable the secure booting mechanism - The creation of convenience text files containing the necessary commands to write the efuses
The KAK and CSK keys are expected to reside in the files kwb_kak.key and kwb_csk.key (OpenSSL 2048 bit private keys) in the top-level directory.
Signed-off-by: Reinhard Pfau <reinhard.pfau@gdsys.cc> Signed-off-by: Mario Six <mario.six@gdsys.cc> Reviewed-by: Stefan Roese <sr@denx.de> Reviewed-by: Simon Glass <sjg@chromium.org> Signed-off-by: Stefan Roese <sr@denx.de>
|
/openbmc/u-boot/ |
H A D | Makefile | a1b6b0a9c1f91756b93e6d804837dc178d79d39e Wed Jan 11 09:01:00 CST 2017 Mario Six <mario.six@gdsys.cc> arm: mvebu: Implement secure boot
The patch implements secure booting for the mvebu architecture.
This includes: - The addition of secure headers and all needed signatures and keys in mkimage - Commands capable of writing the board's efuses to both write the needed cryptographic data and enable the secure booting mechanism - The creation of convenience text files containing the necessary commands to write the efuses
The KAK and CSK keys are expected to reside in the files kwb_kak.key and kwb_csk.key (OpenSSL 2048 bit private keys) in the top-level directory.
Signed-off-by: Reinhard Pfau <reinhard.pfau@gdsys.cc> Signed-off-by: Mario Six <mario.six@gdsys.cc> Reviewed-by: Stefan Roese <sr@denx.de> Reviewed-by: Simon Glass <sjg@chromium.org> Signed-off-by: Stefan Roese <sr@denx.de>
|