1.3 KiB
1.3 KiB
Eltan Security
Security
This code enables measured boot and verified boot support. Verified boot is available in coreboot, but based on ChromeOS. This vendorcode uses a small encryption library and leave much more space in flash for the payload.
Hashing Library
The library suppports SHA-1, SHA-256 and SHA-512. The required routines of
3rdparty/vboot/firmware/2lib
are used.
Measured boot
measured boot support will use TPM2 device if available. The items specified
in mb_log_list[]
will be measured.
Verified boot
verified boot support will use TPM2 device if available. The items specified in the next table will be verified:
bootblock_verify_list[]
verify_item_t romstage_verify_list[]
ram_stage_additional_list[]
ramstage_verify_list[]
payload_verify_list[]
oprom_verify_list[]
Enabling support
- Measured boot can be enabled using CONFIG_MBOOT
- Create mb_log_list table with list of item to measure
- Create tables bootblock_verify_list[], verify_item_t romstage_verify_list[], ram_stage_additional_list[], ramstage_verify_list[], payload_verify_list[], oprom_verify_list[]
- Verified boot can be enabled using CONFIG_VERIFIED_BOOT
- Added Kconfig values for verbose console output
Debugging
You can enable verbose console output in menuconfig.