Searched refs:key (Results 1 – 23 of 23) sorted by relevance
| /doc/tutorials/ |
| A D | acrn-secure-boot-with-grub.rst | 56 enabled. Here's an example of generating a GPG signing key:: 59 gpg --homedir keys --gen-key 60 gpg --homedir keys --export > boot.key 62 The :command:`gpg --gen-key` generates a public and private key pair. 118 GPG key and create the :file:`grub.init.cfg.sig`:: 129 verification. The public key ``boot.key`` is no longer required. 155 --pubkey ./boot.key \ 197 **must** be signed with the same GPG key. 232 sign-efi-sig-list -k PK.key -c PK.crt PK PK.esl PK.auth 234 sign-efi-sig-list -k KEK.key -c KEK.crt db db.esl db.auth [all …]
|
| A D | create-up2-images.sh | 123 [ -e .cleanup ] && tac .cleanup | while read key val; do 124 case $key in 172 --sign-key)
|
| A D | waag-secure-boot.rst | 19 <https://docs.microsoft.com/en-us/windows-hardware/manufacture/desktop/windows-secure-boot-key-crea… 28 - Generate a Self-Signed Certificate as PK from a new key using the 35 $ openssl req -newkey rsa:2048 -nodes -keyout PKpriv.key -x509 -days 365 -out PK.crt 36 Generating a 2048 bit RSA private key 39 writing new private key to 'PKpriv.key' 57 key, using the ``openssl req`` command, for example:: 59 openssl req -key testpriv.key -new -x509 -days 365 -out PK.crt 134 Microsoft documents explain `how to use Microsoft tools to generate a secure boot key 135 <https://docs.microsoft.com/en-us/windows-hardware/manufacture/desktop/secure-boot-key-generation-a… 386 Private key is NOT exportable
|
| A D | run_kata_containers.rst | 46 #. Run the following commands to add Docker's official GPG key, 52 $ curl -fsSL https://download.docker.com/linux/ubuntu/gpg | sudo apt-key add -
|
| A D | using_windows_as_user_vm.rst | 150 #. When the display reads **Press any key to boot from CD or DVD** on the 151 monitor, press any key in the terminal on the **Host** side.
|
| A D | acrn_configuration_tool.rst | 10 ACRN configuration consists of the following key components.
|
| A D | rtvm_performance_tips.rst | 11 near bare-metal performance by configuring certain key technologies and 20 Here are some key technologies that can significantly improve
|
| A D | 0001-devstack-installation-for-acrn.patch | 133 ENABLED_SERVICES=key
|
| A D | realtime_performance_tuning.rst | 16 a key source of performance degradation in virtual machines. During the runtime
|
| /doc/ |
| A D | conf.py | 103 key, val = [x.strip() for x in line.split('=', 2)] variable 104 if key == 'MAJOR_VERSION': 106 if key == 'MINOR_VERSION': 108 if key == 'EXTRA_VERSION':
|
| A D | glossary.rst | 122 post-launched real-time VM by configuring certain key technologies or
|
| A D | acrn.doxyfile | 1584 # search using the keyboard; to jump to the search box use <access key> + S 1585 # (what the <access key> is depends on the OS and browser, but it is typically 1587 # key> to jump into the search results window, the results can be navigated
|
| /doc/developer-guides/hld/ |
| A D | hld-security.rst | 180 public key cryptography with PKCS1.5 padding. 191 The CSE FW image is signed with an Intel RSA private key. All other 193 partners are responsible for image signing, ensuring the key strength 194 meets security requirements, and storing the secret RSA private key 243 #. Generate keys (PK/KEK/DB) with a key generation tool such as Ubuntu 245 BIOS. ``db.key`` and ``db.crt`` will be used to sign the User VM 254 #. Sign the User VM images with ``db.key`` and ``db.crt``. 572 the root key for its guest VMs. `Xen Advisories 769 secure storage encryption, keystore master key, and HMAC keys. 1017 authentication key, VrKey). [all …]
|
| A D | ivshmem-hld.rst | 198 and decryption, secure key exchange, true random number generation, and 209 - Implement necessary flows for key lifecycle management, including wrapping, 210 revocation, and migration, depending on the crypto key type and 211 requirements for key persistence across system and power management events.
|
| A D | hld-virtio-devices.rst | 45 highlights virtio key concepts. Second, this section will describe 73 highlight several key virtio concepts important to ACRN: 231 key components in ACRN, including Device Model (DM), Hypervisor 365 The key data structures for VBS-U are listed as follows, and their 392 The ``struct virtio_common`` is a key data structure to be manipulated by 393 DM, and DM finds other key data structures through it. The ``struct 400 The key data structures for vhost are listed as follows.
|
| A D | atkbdc-virt-hld.rst | 36 …Name (_HID, EisaId ("PNP0303") /* IBM Enhanced Keyboard (101/102-key, PS/2 Mouse) */) // _HID: Har…
|
| A D | hv-config.rst | 20 Some key files, which can be found under the build directory of the hypervisor,
|
| A D | hv-console.rst | 85 "Unknown escaping key" message and the active vUART exits escaping mode.
|
| A D | hld-trace-log.rst | 44 key locations to get a picture of what is going on inside the
|
| A D | hld-overview.rst | 61 features to enhance its real-time performance to meet hard-RT key performance
|
| /doc/scripts/ |
| A D | sign_image.sh | 27 (sbsign --key $SIGN_KEY --cert $SIGN_CRT --output $file $file) && (echo "sign $file succeed")
|
| A D | filter-known-issues.py | 219 exclude_ranges = sorted(exclude_ranges, key=lambda r: r[0])
|
| /doc/introduction/ |
| A D | index.rst | 11 operating systems, and software tools and applications. Virtualization is key to 56 ACRN has these key capabilities and benefits:
|
Completed in 61 milliseconds