Searched refs:dbx (Results 1 – 6 of 6) sorted by relevance
/openbmc/linux/security/integrity/platform_certs/ |
H A D | load_uefi.c | 164 void *db = NULL, *dbx = NULL, *mokx = NULL; in load_uefi_certs() local 199 dbx = get_cert_list(L"dbx", &secure_var, &dbxsize, &status); in load_uefi_certs() 200 if (!dbx) { in load_uefi_certs() 207 dbx, dbxsize, in load_uefi_certs() 211 kfree(dbx); in load_uefi_certs()
|
H A D | load_powerpc.c | 61 void *db = NULL, *dbx = NULL, *data = NULL; in load_powerpc_certs() local 116 extract_esl(dbx, data, dsize, offset); in load_powerpc_certs() 118 rc = parse_efi_signature_list("powerpc:dbx", dbx, dsize, in load_powerpc_certs()
|
/openbmc/openbmc/meta-arm/meta-arm/recipes-bsp/u-boot/ |
H A D | u-boot-uefi-secureboot.inc | 18 "${S}"/tools/efivar.py set -i "${S}"/ubootefi.var -n dbx -d "${SBSIGN_KEYS_DIR}"/dbx.esl -t file
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-security/trusted-services/corstone1000/ |
H A D | 0016-Isolate-common-uefi-variable-authentication-steps.patch | 52 - * should be checked by db and dbx so the length of two will be enough. 146 + * should be checked by db and dbx so the length of two will be enough.
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/documentation/corstone1000/ |
H A D | user-guide.rst | 1567 … 1:1 $loadaddr corstone1000_secureboot_keys/dbx.auth && setenv -e -nv -bs -rt -at -i $loadaddr:$fi… 1639 …sb 0 $loadaddr corstone1000_secureboot_keys/dbx.auth && setenv -e -nv -bs -rt -at -i $loadaddr:$fi…
|
/openbmc/linux/Documentation/admin-guide/media/ |
H A D | bttv.rst | 234 for dbx stereo. Default is on if supported by
|