]> git.ipfire.org Git - thirdparty/u-boot.git/blame - doc/README.esbc_validate
usb: dwc3: add dis_u2_freeclk_exists_quirk
[thirdparty/u-boot.git] / doc / README.esbc_validate
CommitLineData
83d290c5 1SPDX-License-Identifier: GPL-2.0+
47151e4b 2/*
3 * (C) Copyright 2015
47151e4b 4 */
5
6esbc_validate command
7========================================
8
91. esbc_validate command is meant for validating header and
10 signature of images (Boot Script and ESBC uboot client).
11 SHA-256 and RSA operations are performed using SEC block in HW.
12 This command works on both PBL based and Non PBL based Freescale
13 platforms.
14 Command usage:
15 esbc_validate img_hdr_addr [pub_key_hash]
16 esbc_validate hdr_addr <hash_val>
17 Validates signature using RSA verification.
18 $hdr_addr Address of header of the image to be validated.
19 $hash_val -Optional. It provides Hash of public/srk key to be
20 used to verify signature.
21
222. ESBC uboot client can be linux. Additionally, rootfs and device
23 tree blob can also be signed.
243. In the event of header or signature failure in validation,
25 ITS and ITF bits determine further course of action.
264. In case of soft failure, appropriate error is dumped on console.
275. In case of hard failure, SoC is issued RESET REQUEST after
28 dumping error on the console.
296. KEY REVOCATION Feature:
30 QorIQ platforms like B4/T4 have support of srk key table and key
31 revocation in ISBC code in Silicon.
32 The srk key table allows the user to have a key table with multiple
33 keys and revoke any key in case of particular key gets compromised.
34 In case the ISBC code uses the key revocation and srk key table to
35 verify the u-boot code, the subsequent chain of trust should also
36 use the same.
376. ISBC KEY EXTENSION Feature:
38 This feature allows large number of keys to be used for esbc validation
39 of images. A set of public keys is being signed and validated by ISBC
40 which can be further used for esbc validation of images.