| /openbmc/u-boot/doc/SPL/ |
| H A D | README.spl-secure-boot | 1 Overview of SPL verified boot on powerpc/mpc85xx & arm/layerscape platforms 7 This document provides an overview of how SPL verified boot works on powerpc/
|
| /openbmc/libpldm/tests/fuzz/ |
| H A D | fd-fuzz.cpp | 59 bool verified; member 194 fuzz_ctx->verified = false; in cb_update_component() 227 assert(!fuzz_ctx->verified); in cb_firmware_data() 256 assert(!fuzz_ctx->verified); in cb_verify() 273 fuzz_ctx->verified = true; in cb_verify() 289 assert(fuzz_ctx->verified); in cb_apply()
|
| /openbmc/u-boot/common/ |
| H A D | image-sig.c | 289 int verified = 0; in fit_image_verify_sig() local 304 verified = 1; in fit_image_verify_sig() 315 return verified ? 0 : -EPERM; in fit_image_verify_sig() 508 int verified = 0; in fit_config_verify_sig() local 523 verified = 1; in fit_config_verify_sig() 534 if (verified) in fit_config_verify_sig()
|
| /openbmc/qemu/tests/qemu-iotests/ |
| H A D | 265.out | 5 Content verified.
|
| /openbmc/openbmc/meta-phosphor/recipes-phosphor/flash/noverify-bmc-update/ |
| H A D | noverify-bmc-verify.service | 6 ExecStart=/bin/mv /run/initramfs/bmc-image /run/initramfs/bmc-image-verified
|
| H A D | noverify-bmc-update.service | 6 ExecStart=/bin/mv /run/initramfs/bmc-image-verified /run/initramfs/image-bmc
|
| /openbmc/openbmc/poky/meta/recipes-core/initscripts/initscripts-1.0/ |
| H A D | volatiles | 1 # This configuration file lists filesystem objects that should get verified 21 # Thus, if a link is in the place to be verified, the object will be created
|
| /openbmc/u-boot/doc/uImage.FIT/ |
| H A D | beaglebone_vboot.txt | 7 Before reading this, please read verified-boot.txt and signature.txt. These 11 verified boot works in U-Boot. There is also a test which runs through the 16 for an example of how to enable verified boot using U-Boot. 22 packaged with the kernel. In particular this is important with verified boot, 24 public keys can be changed and verified boot is useless. An attacker can 37 1. Build U-Boot for the board, with the verified boot options enabled. 68 b. Configure and build U-Boot with verified boot enabled: 199 'required' property, which tells U-Boot that this key must be verified for the 302 'dev' and the '+' means that it verified. If it showed '-' that would be bad. 304 Once the configuration is verified it is then possible to rely on the hashes [all …]
|
| H A D | verified-boot.txt | 16 which use verified boot. Since the machine will only run software that has 26 be verified using a public key. As its name suggests the public key can be 96 a standard place. Then when a FIT is loaded it can be verified using that
|
| H A D | signature.txt | 11 that it can be verified using a public key later. Provided that the private 13 any image can be verified in this way. 15 See verified-boot.txt for more general information on verified boot. 153 - required: If present this indicates that the key must be verified for the 155 normally verified by the FIT image booting algorithm. Valid values are 314 verified later even if the FIT has been signed with other keys in the 320 FITs are verified when loaded. After the configuration is selected a list 322 each image must be verified against those keys. This means that every image 355 Please see doc/uImage.FIT/verified-boot.txt for more information
|
| /openbmc/phosphor-state-manager/service_files/ |
| H A D | obmc-powered-off@.service | 13 # verified that power has been removed from the chassis. Then
|
| /openbmc/phosphor-power/phosphor-regulators/docs/config_file/ |
| H A D | pmbus_write_vout_command.md | 59 … value of VOUT_COMMAND is verified by reading it from the device. If false or not specified, the u…
|
| /openbmc/bmcweb/docs/ |
| H A D | DBUS_USAGE.md | 8 verified that _all_ OpenBMC implementers of the interface support that
|
| /openbmc/openbmc-test-automation/redfish/systems/ |
| H A D | test_boot_devices.robot | 228 # The values set using Redfish are verified via IPMI using the command: 281 # The values set using Redfish are verified via IPMI using the command: 336 # The values set using Redfish are verified via IPMI using the command: 400 # The values set using Redfish are verified via IPMI using the command:
|
| /openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/Control/ |
| H A D | README.msl.md | 37 MeetsMinimumShipLevel on the inventory assets to be verified. At present
|
| /openbmc/openbmc/meta-openembedded/meta-oe/recipes-devtools/android-tools/android-tools/core/ |
| H A D | 0016-libsparse-Add-hole-mode-to-sparse_file_read.patch | 82 - * verified. 89 + * care" chunks. If crc is true, the crc of the sparse file will be verified.
|
| /openbmc/openbmc/poky/meta/recipes-devtools/apt/apt/ |
| H A D | 0001-Remove-using-std-binary_function.patch | 65 check. Each contents file is verified to be newer than the package files
|
| /openbmc/openbmc-test-automation/redfish/managers/ |
| H A D | test_bmc_protocol_settings.robot | 336 # ssh_state State of SSH to be verified (e.g. True, False). 337 # ipmi_state State of IPMI to be verified (e.g. True, False). 338 # ntp_state State of NTP to be verified (e.g. True, False).
|
| /openbmc/docs/architecture/code-update/ |
| H A D | code-update-deprecated.md | 173 - After the tarball is downloaded and verified, the progress status becomes 189 - After it's flashed and verified, the status becomes
|
| /openbmc/u-boot/doc/ |
| H A D | README.uniphier | 252 Please note the "u-boot.bin" must be signed, and verified by someone when it is 256 the system reset. If the Chain of Trust has a breakage somewhere, the verified 259 7. Boot verified kernel
|
| /openbmc/openbmc/meta-arm/meta-arm-bsp/documentation/corstone1000/ |
| H A D | software-architecture.rst | 126 of the software which is being already verified in the previous stages. 144 - The BL1_2 does not use the post-quantum LMS verification. The BL2 is verified by 174 - In case of Corstone-1000, the TF-A BL2 image, can be trusted because it has been verified 192 verified with the Root of Trust Public Key.
|
| /openbmc/qemu/docs/specs/ |
| H A D | sev-guest-firmware.rst | 23 verified. If that is found, two bytes at 0xffffffce are the entire
|
| /openbmc/openbmc-test-automation/lib/ |
| H A D | bmc_ipv6_utils.robot | 55 # ipv6 IPv6 address to be verified (e.g. "2001::1234:1234"). 385 # ipv6_addr IPv6 address to be verified. 386 # prefix_len PrefixLength value to be verified.
|
| /openbmc/openbmc/meta-openembedded/meta-multimedia/recipes-multimedia/mycroft/files/ |
| H A D | 0001-Remove-python-venv.patch | 31 - # verified functional.
|
| /openbmc/docs/designs/ |
| H A D | sol-sysrq.md | 110 The SysRq in SOL could be verified in both ipmitool SOL and WebUI SOL. In SOL
|