/openbmc/openbmc/meta-arm/meta-arm/recipes-bsp/trusted-firmware-a/ |
H A D | trusted-firmware-a_%.bbappend | 1 COMPATIBLE_MACHINE:qemuarm64-secureboot = "qemuarm64-secureboot" 2 COMPATIBLE_MACHINE:qemuarm-secureboot = "qemuarm-secureboot" 4 #FIXME - clang fails to build tfa for qemuarm-secureboot, and possibly other 6 TOOLCHAIN:qemuarm-secureboot = "gcc" 9 FILESEXTRAPATHS:prepend:qemuarm64-secureboot := "${THISDIR}/files:" 10 SRC_URI:append:qemuarm64-secureboot = " \ 14 TFA_PLATFORM:qemuarm64-secureboot = "qemu" 15 TFA_PLATFORM:qemuarm-secureboot = "qemu" 19 TFA_SPD:qemuarm64-secureboot = "${@bb.utils.contains('MACHINE_FEATURES', 'arm-ffa', 'spmd', 'opteed… 21 EXTRA_OEMAKE:append:qemuarm64-secureboot = "${@bb.utils.contains('MACHINE_FEATURES', 'arm-ffa', ' C… [all …]
|
/openbmc/openbmc/meta-arm/meta-arm/recipes-kernel/linux/ |
H A D | linux-yocto%.bbappend | 3 FILESEXTRAPATHS:prepend:qemuarm64-secureboot = "${ARMFILESPATHS}" 4 SRC_URI:append:qemuarm64-secureboot = " \ 9 SRC_URI:append:qemuarm64-secureboot = "\ 13 FILESEXTRAPATHS:prepend:qemuarm-secureboot = "${ARMFILESPATHS}" 14 SRC_URI:append:qemuarm-secureboot = " \ 29 require ${@bb.utils.contains('MACHINE_FEATURES', 'uefi-secureboot', 'linux-yocto-uefi-secureboot.in…
|
/openbmc/openbmc/meta-arm/meta-arm/recipes-bsp/uefi/ |
H A D | edk2-firmware_%.bbappend | 1 COMPATIBLE_MACHINE:qemuarm64-secureboot = "qemuarm64-secureboot" 2 EDK2_PLATFORM:qemuarm64-secureboot = "ArmVirtQemu-AARCH64" 3 EDK2_PLATFORM_DSC:qemuarm64-secureboot = "ArmVirtPkg/ArmVirtQemu.dsc" 4 EDK2_BIN_NAME:qemuarm64-secureboot = "QEMU_EFI.fd"
|
/openbmc/openbmc/meta-arm/meta-arm/recipes-bsp/u-boot/ |
H A D | u-boot_%.bbappend | 3 SRC_URI:append:qemuarm64-secureboot = " file://qemuarm64.cfg" 4 SRC_URI:append:qemuarm-secureboot = " file://qemuarm.cfg" 6 require ${@bb.utils.contains('MACHINE_FEATURES', 'uefi-secureboot', 'u-boot-uefi-secureboot.inc', '…
|
H A D | u-boot-uefi-secureboot.inc | 3 SRC_URI += "file://uefi-secureboot.cfg"
|
/openbmc/linux/tools/testing/selftests/kexec/ |
H A D | test_kexec_load.sh | 29 secureboot=$? 35 if [ $secureboot -eq 1 ] && [ $arch_policy -eq 1 ]; then 42 if [ $secureboot -eq 1 ] && [ $arch_policy -eq 1 ] ; then
|
H A D | test_kexec_file_load.sh | 126 if [ $secureboot -eq 1 ] && [ $arch_policy -eq 1 ] && \ 226 secureboot=$?
|
/openbmc/linux/arch/powerpc/kernel/ |
H A D | secure_boot.c | 26 u32 secureboot; in is_ppc_secureboot_enabled() local 35 if (!of_property_read_u32(of_root, "ibm,secure-boot", &secureboot)) in is_ppc_secureboot_enabled() 36 enabled = (secureboot > 1); in is_ppc_secureboot_enabled()
|
/openbmc/openbmc/meta-arm/meta-arm/recipes-core/systemd/ |
H A D | systemd-boot_%.bbappend | 1 require ${@bb.utils.contains('MACHINE_FEATURES', 'uefi-secureboot', 'systemd-boot-uefi-secureboot.i…
|
/openbmc/openbmc-test-automation/openpower/ |
H A D | test_nmi_interface.robot | 7 Resource ../lib/secureboot/secureboot.robot 30 ... secureboot is disabled.
|
/openbmc/openbmc/meta-arm/meta-arm/recipes-security/packagegroups/ |
H A D | packagegroup-ts-tests.bb | 9 COMPATIBLE_MACHINE:qemuarm64-secureboot = "qemuarm64-secureboot"
|
/openbmc/openbmc/poky/meta/recipes-core/ovmf/ |
H A D | ovmf_git.bb | 6 LICENSE:class-target = "${@bb.utils.contains('PACKAGECONFIG', 'secureboot', 'BSD-2-Clause-Patent & … 15 PACKAGECONFIG[secureboot] = ",,," 213 if ${@bb.utils.contains('PACKAGECONFIG', 'secureboot', 'true', 'false', d)}; then 236 if ${@bb.utils.contains('PACKAGECONFIG', 'secureboot', 'true', 'false', d)}; then 254 DEPLOYDEP:class-target += " ${@bb.utils.contains('PACKAGECONFIG', 'secureboot', 'openssl-native:do_… 265 … ${@bb.utils.contains('PACKAGECONFIG', 'secureboot', 'ovmf.secboot ovmf.secboot.code', '', d)} \ 270 if ${@bb.utils.contains('PACKAGECONFIG', 'secureboot', 'true', 'false', d)}; then
|
/openbmc/openbmc/meta-arm/meta-arm/recipes-security/trusted-services/ |
H A D | trusted-services.inc | 10 COMPATIBLE_MACHINE:qemuarm64-secureboot = "qemuarm64-secureboot"
|
H A D | ts-sp-smm-gateway_%.bbappend | 3 EXTRA_OECMAKE:append:qemuarm64-secureboot = "-DMM_COMM_BUFFER_ADDRESS="0x00000000 0x42000000" \
|
H A D | libts_%.bbappend | 2 EXTRA_OECMAKE:append:qemuarm64-secureboot = "-DMM_COMM_BUFFER_ADDRESS=0x42000000 \
|
/openbmc/openbmc/poky/meta/classes-recipe/ |
H A D | uki.bbclass | 28 # - requires UEFI compatible firmware on target, e.g. qemuarm64-secureboot u-boot based 51 # see also qemuarm64-secureboot from meta-arm). Set variable 182 ukify_cmd += " --sign-kernel --secureboot-private-key='%s'" % (key) 185 ukify_cmd += " --secureboot-certificate='%s'" % (cert)
|
/openbmc/openbmc/meta-arm/meta-arm/recipes-security/optee-ftpm/ |
H A D | optee-ftpm_git.bb | 7 COMPATIBLE_MACHINE:qemuarm64-secureboot = "qemuarm64" 8 COMPATIBLE_MACHINE:qemuarm-secureboot = "qemuarm"
|
/openbmc/openbmc/meta-arm/meta-arm/recipes-security/optee/ |
H A D | optee-os_4.%.bbappend | 5 EXTRA_OEMAKE:append:qemuarm64-secureboot = "${@oe.utils.conditional('SP_PATHS', '', '', ' CFG_CORE_…
|
/openbmc/openbmc-test-automation/tools/ |
H A D | generate_test_document | 60 python3 -m robot.testdoc ./openpower/secureboot securebootdirectoryTCdocs.html\
|
/openbmc/openbmc/meta-arm/documentation/ |
H A D | trusted-services.md | 39 … examples in `meta-arm/recipes-security/optee/optee-os_%.bbappend` for qemuarm64-secureboot machine 43 …-arm/recipes-bsp/trusted-firmware-a/trusted-firmware-a_%.bbappend` for qemuarm64-secureboot machine
|
/openbmc/linux/drivers/firmware/efi/libstub/ |
H A D | Makefile | 70 lib-y := efi-stub-helper.o gop.o secureboot.o tpm.o \
|
/openbmc/linux/Documentation/ABI/testing/ |
H A D | sysfs-secvar | 5 secureboot, thereby secure variables. It exposes interface
|
/openbmc/linux/Documentation/admin-guide/ |
H A D | quickly-build-trimmed-linux.rst | 99 [:ref:`details<secureboot>`]
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/documentation/corstone1000/ |
H A D | user-guide.rst | 1504 ./$WORKSPACE/systemready-patch/embedded-a/corstone1000/secureboot/create_keys_and_sign.sh \
|
/openbmc/openbmc/poky/documentation/ref-manual/ |
H A D | classes.rst | 3435 - :term:`UKI_SB_CERT`: optional UEFI secureboot certificate matching the 3437 - :term:`UKI_SB_KEY`: optional UEFI secureboot private key to sign UKI with
|