.. _device-tree/ibm,secureboot: ibm,secureboot ============== The ``ìbm,secureboot`` node provides secure boot and trusted boot information up to the target OS. Further information can be found in :ref:`stb-overview`. Required properties ------------------- .. code-block:: none compatible: Either one of the following values: ibm,secureboot-v1 : The container-verification-code is stored in a secure ROM memory. ibm,secureboot-v2 : The container-verification-code is stored in a reserved memory. It described by the ibm,cvc child node. secure-enabled: this property exists when the firmware stack is booting in secure mode (hardware secure boot jumper asserted). trusted-enabled: this property exists when the firmware stack is booting in trusted mode. hw-key-hash: hash of the three hardware public keys trusted by the platformw owner. This is used to verify if a firmware code is signed with trusted keys. hw-key-hash-size: hw-key-hash size Obsolete properties ------------------- .. code-block:: none hash-algo: Superseded by the hw-key-hash-size property in 'ibm,secureboot-v2'. Example ------- .. code-block:: dts ibm,secureboot { compatible = "ibm,secureboot-v2"; secure-enabled; trusted-enabled; hw-key-hash-size = <0x40>; hw-key-hash = <0x40d487ff 0x7380ed6a 0xd54775d5 0x795fea0d 0xe2f541fe 0xa9db06b8 0x466a42a3 0x20e65f75 0xb4866546 0x0017d907 0x515dc2a5 0xf9fc5095 0x4d6ee0c9 0xb67d219d 0xfb708535 0x1d01d6d1>; phandle = <0x100000fd>; linux,phandle = <0x100000fd>; };