40 lines
1.3 KiB
Markdown
40 lines
1.3 KiB
Markdown
|
# Eltan Security
|
||
|
|
||
|
## Security
|
||
|
This code enables measured boot and verified boot support.
|
||
|
Verified boot is available in coreboot, but based on ChromeOS. This vendorcode
|
||
|
uses a small encryption library and leave much more space in flash for the
|
||
|
payload.
|
||
|
|
||
|
## Hashing Library
|
||
|
The library suppports SHA-1, SHA-256 and SHA-512. The required routines of
|
||
|
`3rdparty/vboot/firmware/2lib` are used.
|
||
|
|
||
|
## Measured boot
|
||
|
measured boot support will use TPM2 device if available. The items specified
|
||
|
in `mb_log_list[]` will be measured.
|
||
|
|
||
|
## Verified boot
|
||
|
verified boot support will use TPM2 device if available. The items specified
|
||
|
in the next table will be verified:
|
||
|
* `bootblock_verify_list[]`
|
||
|
* `verify_item_t romstage_verify_list[]`
|
||
|
* `ram_stage_additional_list[]`
|
||
|
* `ramstage_verify_list[]`
|
||
|
* `payload_verify_list[]`
|
||
|
* `oprom_verify_list[]`
|
||
|
|
||
|
## Enabling support
|
||
|
|
||
|
* Measured boot can be enabled using **CONFIG_MBOOT**
|
||
|
* Create mb_log_list table with list of item to measure
|
||
|
* Create tables bootblock_verify_list[], verify_item_t romstage_verify_list[],
|
||
|
ram_stage_additional_list[], ramstage_verify_list[], payload_verify_list[],
|
||
|
oprom_verify_list[]
|
||
|
* Verified boot can be enabled using **CONFIG_VERIFIED_BOOT**
|
||
|
* Added Kconfig values for verbose console output
|
||
|
|
||
|
## Debugging
|
||
|
|
||
|
You can enable verbose console output in *menuconfig*.
|