MLK-20553-4 doc: imx: hab: Remove extra hab directory for a cleaner documentation structure

There is no need to have an extra hab directory under doc/imx/:

- doc/imx/hab/ahab/
- doc/imx/hab/habv4/

Remove extra hab directory for a cleaner documentation structure.

Signed-off-by: Breno Lima <breno.lima@nxp.com>
Reviewed-by: Ye Li <ye.li@nxp.com>
(cherry picked from commit 4568f4a4c8)
This commit is contained in:
Breno Lima 2018-12-09 21:08:49 -02:00 committed by Ye Li
parent cba7ec79bb
commit dac930e735
19 changed files with 12 additions and 12 deletions

View File

@ -168,7 +168,7 @@ The CSF contains all the commands that the AHAB executes during the secure
boot. These commands instruct the AHAB on which memory areas of the image boot. These commands instruct the AHAB on which memory areas of the image
to authenticate, which keys to install, use and etc. to authenticate, which keys to install, use and etc.
CSF examples are available under doc/imx/hab/ahab/csf_examples/ CSF examples are available under doc/imx/ahab/csf_examples/
directory. directory.
This csf_boot_image.txt file example should be updated with the offset values This csf_boot_image.txt file example should be updated with the offset values
@ -350,7 +350,7 @@ Keep in mind the offsets above to be used with CST/CSF
2.2 Creating the CSF description file for OS container image 2.2 Creating the CSF description file for OS container image
------------------------------------------------------------- -------------------------------------------------------------
CSF examples are available under doc/imx/hab/ahab/csf_examples/ CSF examples are available under doc/imx/ahab/csf_examples/
directory. directory.
This csf_linux_img.txt file example should be updated with the offset values This csf_linux_img.txt file example should be updated with the offset values

View File

@ -168,7 +168,7 @@ during the secure boot procedure. These commands instruct the AHAB code on
which memory areas of the image to authenticate, which keys to install, use which memory areas of the image to authenticate, which keys to install, use
and etc. and etc.
CSF examples are available under doc/imx/hab/ahab/csf_examples/ directory. CSF examples are available under doc/imx/ahab/csf_examples/ directory.
As explained in section above the mkimage log provides the container and As explained in section above the mkimage log provides the container and
signature block offsets used by the CSF description file: signature block offsets used by the CSF description file:
@ -351,7 +351,7 @@ The lifecycle value should now be 128 (0x80) OEM closed.
The procedure for authenticating the OS container is similar as in Non-SPL The procedure for authenticating the OS container is similar as in Non-SPL
targets, for a complete procedure please refer to mx8_mx8x_secure_boot.txt targets, for a complete procedure please refer to mx8_mx8x_secure_boot.txt
document available under doc/imx/hab/ahab/guides/ directory. document available under doc/imx/ahab/guides/ directory.
References: References:
[1] AN12212: "Software Solutions for Migration Guide from Aarch32 to [1] AN12212: "Software Solutions for Migration Guide from Aarch32 to

View File

@ -10,7 +10,7 @@ secure boot concept. Due to the multi-core architecture the Security
Controller (SECO) and System Control Unit (SCU) are heavily involved in Controller (SECO) and System Control Unit (SCU) are heavily involved in
the secure boot process. the secure boot process.
Step-by-step guides are available under doc/imx/hab/ahab/guides/ directory, Step-by-step guides are available under doc/imx/ahab/guides/ directory,
users familiar with AHAB architecture and CST PKI tree generation should users familiar with AHAB architecture and CST PKI tree generation should
refer to this directory instead. refer to this directory instead.
@ -167,7 +167,7 @@ The sequence below explains the i.MX8 and i.MX8x boot flow:
SCU by calling the sc_misc_seco_authenticate() API function. In current SCU by calling the sc_misc_seco_authenticate() API function. In current
U-Boot implementation the additional image can be the Linux Kernel binary U-Boot implementation the additional image can be the Linux Kernel binary
or the U-Boot proper and ATF. Details about current U-Boot implementation or the U-Boot proper and ATF. Details about current U-Boot implementation
can be found in AHAB guides included in doc/imx/hab/ahab/guides/ directory. can be found in AHAB guides included in doc/imx/ahab/guides/ directory.
2. Generating a PKI tree 2. Generating a PKI tree
------------------------- -------------------------
@ -297,5 +297,5 @@ Table Hash.
SRK_1_2_3_4_table.bin SRK_1_2_3_4_table.bin
The SRK_1_2_3_4_table.bin and SRK_1_2_3_4_fuse.bin files can be used in further The SRK_1_2_3_4_table.bin and SRK_1_2_3_4_fuse.bin files can be used in further
steps as explained in AHAB guides available under doc/imx/hab/ahab/guides/ steps as explained in AHAB guides available under doc/imx/ahab/guides/
directory. directory.

View File

@ -98,7 +98,7 @@ secure boot. These commands instruct the HAB on which memory areas
of the image to authenticate, which keys to install, use, etc... of the image to authenticate, which keys to install, use, etc...
CSF examples for encrypted boot are available under CSF examples for encrypted boot are available under
doc/imx/hab/habv4/csf_examples/ directory. doc/imx/habv4/csf_examples/ directory.
For both CSF, first part is same compared to the CSF used for For both CSF, first part is same compared to the CSF used for
the secure boot step. the secure boot step.

View File

@ -75,7 +75,7 @@ The CSF contains all the commands that the ROM executes during the secure
boot. These commands instruct the HAB on which memory areas of the image boot. These commands instruct the HAB on which memory areas of the image
to authenticate, which keys to install, use and etc. to authenticate, which keys to install, use and etc.
CSF examples are available under doc/imx/hab/habv4/csf_examples/ directory. CSF examples are available under doc/imx/habv4/csf_examples/ directory.
A build log containing the "Authenticate Data" parameters is available after A build log containing the "Authenticate Data" parameters is available after
the U-Boot build, the example below is a log for mx7dsabresd_defconfig target: the U-Boot build, the example below is a log for mx7dsabresd_defconfig target:

View File

@ -225,7 +225,7 @@ The CSF contains all the commands that the ROM executes during the secure
boot. These commands instruct the HAB code on which memory areas of the image boot. These commands instruct the HAB code on which memory areas of the image
to authenticate, which keys to install, use and etc. to authenticate, which keys to install, use and etc.
CSF examples are available under doc/imx/hab/habv4/csf_examples/ directory. CSF examples are available under doc/imx/habv4/csf_examples/ directory.
As explained in sections above the SPL is first authenticated by the ROM code As explained in sections above the SPL is first authenticated by the ROM code
and the root of trust is extended to the FIT image, hence two CSF files are and the root of trust is extended to the FIT image, hence two CSF files are

View File

@ -14,7 +14,7 @@ operations.
This feature is supported in i.MX 50, i.MX 53, i.MX 6, i.MX 7 series and This feature is supported in i.MX 50, i.MX 53, i.MX 6, i.MX 7 series and
i.MX 8M, i.MX 8MM devices. i.MX 8M, i.MX 8MM devices.
Step-by-step guides are available under doc/imx/hab/habv4/guides/ directory, Step-by-step guides are available under doc/imx/habv4/guides/ directory,
users familiar with HAB and CST PKI tree generation should refer to these users familiar with HAB and CST PKI tree generation should refer to these
documents instead. documents instead.
@ -252,7 +252,7 @@ Table Hash.
SRK4_sha256_2048_65537_v3_ca_crt.pem SRK4_sha256_2048_65537_v3_ca_crt.pem
The SRK_1_2_3_4_table.bin and SRK_1_2_3_4_fuse.bin files can be used in further The SRK_1_2_3_4_table.bin and SRK_1_2_3_4_fuse.bin files can be used in further
steps as explained in HAB guides available under doc/imx/hab/habv4/guides/ steps as explained in HAB guides available under doc/imx/habv4/guides/
directory. directory.
References: References: