diff --git a/docs/common-coreboot-docs/checkbox.md b/docs/common-coreboot-docs/checkbox.md index 015e459da9..623d8bfd7b 100644 --- a/docs/common-coreboot-docs/checkbox.md +++ b/docs/common-coreboot-docs/checkbox.md @@ -2,7 +2,7 @@ ## Introduction -[Checkbox](https://checkbox.readthedocs.io/en/latest/) is a flexible test +[Checkbox](https://documentation.ubuntu.com/checkbox/stable/) is a flexible test automation software. It’s the main tool used in Ubuntu Certification program. This document describes the usage of Checkbox on Ubuntu 22.04, but it can work on older versions of Ubuntu as well. @@ -192,7 +192,7 @@ any results. Example of running one test plan: ``` For more details about these (and others) commands visit -[checkbox-cli](https://checkbox.readthedocs.io/en/latest/how-to/index.html). +[checkbox-cli](https://documentation.ubuntu.com/checkbox/stable/how-to/). ## Troubleshooting diff --git a/docs/common-coreboot-docs/dumping_logs.md b/docs/common-coreboot-docs/dumping_logs.md index ada7bc0a44..8f537cbe7a 100644 --- a/docs/common-coreboot-docs/dumping_logs.md +++ b/docs/common-coreboot-docs/dumping_logs.md @@ -25,7 +25,8 @@ with the firmware. This method requires Secure Boot to be disabled. Options to get `cbmem` utility: -1. Download precompiled utility from [3mdeb cloud](https://cloud.3mdeb.com/index.php/s/zTqkJQdNtJDo5Nd/download) +1. Download precompiled utility from [3mdeb + cloud](https://cloud.3mdeb.com/index.php/s/5aed4HEwWbCiESZ/download) 2. Use [Dasharo Tools Suite](https://docs.dasharo.com/dasharo-tools-suite/releases#v110) v1.1.0 or newer which has `cbmem` utility built in. 3. Compile `cbmem utility`. See procedure below. diff --git a/docs/projects/sovereign-boot-wizard.md b/docs/projects/sovereign-boot-wizard.md index bc8dba67c1..b0c76f8cca 100644 --- a/docs/projects/sovereign-boot-wizard.md +++ b/docs/projects/sovereign-boot-wizard.md @@ -320,7 +320,7 @@ Currently implemented set of functionalities can be validated using page](https://github.com/Dasharo/meta-dts/releases) and place it, e.g. in `$HOME` directory. 5. Obtain the Sovereign Boot [test data - image](https://cloud.3mdeb.com/index.php/s/DxMziEtRmpdwqBK/download) + image](https://cloud.3mdeb.com/index.php/s/o7JfpWTxidZiKpb/download) (`svboot_test_data.img`) and place it, e.g. in `$HOME` directory. 6. Start the QEMU with the following command in separate window/tab in the `open-source-firmware-validation` directory: diff --git a/docs/transparent-validation/muxpi/basic-validation.md b/docs/transparent-validation/muxpi/basic-validation.md index 107810aaf4..83d98bcf0f 100644 --- a/docs/transparent-validation/muxpi/basic-validation.md +++ b/docs/transparent-validation/muxpi/basic-validation.md @@ -19,8 +19,7 @@ ## NanoPi setup 1. Prepare microSD card (minimum 8GB) for NanoPi NEO operating system. -1. Download and extract image - - [link](https://cloud.3mdeb.com/index.php/s/n42rLcAQ5cWcxgW/download) +1. Download and extract image - [link][nanopi-image]. 1. Flash image into microSD card ([Etcher](https://www.balena.io/etcher/) tool could be helpful) @@ -32,8 +31,6 @@ 1. Plug ETH cable to RJ45 NanoPi port. 1. Plug microUSB<->USB cable to muxPi and your machine. 1. Plug in power supply. -![](https://cloud.3mdeb.com/index.php/s/o3D5fwWbjscXDw9/preview) - 1. Make sure that jumpers are correctly set according to image: ![](../../images/muxpi1.4_jumpers.jpg) @@ -133,8 +130,7 @@ prepared by Tizen group (the code is not open yet, but this process is in progress). To flash muxPi's microcontroller, follow steps below: 1. Make sure that VDD jumper is left open. -1. Download binary file - -[link](https://cloud.3mdeb.com/index.php/s/adnEZLgo2diXkdw/download). +1. Download binary file - [link][cortex-image]. 1. Copy binary to nanoPi: `scp root@192.168.4.XXX:/root/` 1. Update package lists (nanoPi): `apt-get update` 1. Install stm32flash utility (nanoPi): `sudo apt-get install stm32flash` @@ -251,3 +247,6 @@ Minicom quick guide: --- _Images source: [Wiki Tizen](http://web.archive.org/web/20230702190152/https://wiki.tizen.org/MuxPi)_ + +[nanopi-image]: https://cloud.3mdeb.com/index.php/s/Tda8wDTjrCY63gq/download +[cortex-image]: https://cloud.3mdeb.com/index.php/s/YZYYdfNf9wDDEq3/download diff --git a/docs/transparent-validation/muxpi/theory-of-operations.md b/docs/transparent-validation/muxpi/theory-of-operations.md index 2cb9357f77..1d3ef706bc 100644 --- a/docs/transparent-validation/muxpi/theory-of-operations.md +++ b/docs/transparent-validation/muxpi/theory-of-operations.md @@ -11,7 +11,7 @@ Preparation of the muxPi's "heart": 1. Prepare microSD card (minimum 8GB) for NanoPi NEO operating system. -1. Download and extract image - [link][nanopi-image2] +1. Download and extract image - [link][nanopi-image] 1. Flash image into microSD card ([Etcher][etcher] tool could be helpful) 1. Insert card to NanoPi microSD slot. 1. Attach NanoPi to muxPi connectors. @@ -567,8 +567,7 @@ uart --- Get current value of UART voltage or set if new value is given [in mill _Images source: [Wiki Tizen](http://web.archive.org/web/20230702190152/https://wiki.tizen.org/MuxPi)_ -[nanopi-image]: https://cloud.3mdeb.com/index.php/s/MENgScifExeeo6P/download -[nanopi-image2]: https://cloud.3mdeb.com/index.php/s/n42rLcAQ5cWcxgW/download -[cortex-binary]: https://cloud.3mdeb.com/index.php/s/adnEZLgo2diXkdw/download +[nanopi-image]: https://cloud.3mdeb.com/index.php/s/Tda8wDTjrCY63gq/download +[cortex-binary]: https://cloud.3mdeb.com/index.php/s/YZYYdfNf9wDDEq3/download [etcher]: https://www.balena.io/etcher/ [usb-m]: http://web.archive.org/web/20230702190152/https://wiki.tizen.org/MuxPi#USB-M diff --git a/docs/unified-test-documentation/dasharo-performance/400-coreboot-boot-measure.md b/docs/unified-test-documentation/dasharo-performance/400-coreboot-boot-measure.md index 392a95b6ab..a9c6d55830 100644 --- a/docs/unified-test-documentation/dasharo-performance/400-coreboot-boot-measure.md +++ b/docs/unified-test-documentation/dasharo-performance/400-coreboot-boot-measure.md @@ -12,8 +12,7 @@ [Generic test setup: OS preparation](../generic-test-setup.md#os-preparation). 1. Proceed with the [Generic test setup: OS post installation steps](../generic-test-setup.md#post-installation).gi -1. Download `cbmem` from the - [cloud](https://cloud.3mdeb.com/index.php/s/zTqkJQdNtJDo5Nd) to the DUT. +1. Download `cbmem` from the [cloud][cbmem] to the DUT. 1. Disable Secure Boot. ## CBMEM001.201 coreboot booting time measure after coldboot (Ubuntu) @@ -33,8 +32,7 @@ results and specify the platform stability. 1. Proceed with the [Test cases common documentation](#test-cases-common-documentation) section. -1. Download `cbmem` from the - [cloud](https://cloud.3mdeb.com/index.php/s/zTqkJQdNtJDo5Nd) to the DUT. +1. Download `cbmem` from the [cloud][cbmem] to the DUT. 1. Disable Secure Boot. **Test steps** @@ -57,3 +55,5 @@ The test is fully automated. Refer to https://github.com/Dasharo/open-source-fir ## CBMEM003.201 coreboot booting time measure after system reboot (Ubuntu) The test is fully automated. Refer to https://github.com/Dasharo/open-source-firmware-validation/tree/develop + +[cbmem]: https://cloud.3mdeb.com/index.php/s/5aed4HEwWbCiESZ diff --git a/docs/unified-test-documentation/dasharo-security/201-verified-boot.md b/docs/unified-test-documentation/dasharo-security/201-verified-boot.md index cefe982b0f..c69c2484de 100644 --- a/docs/unified-test-documentation/dasharo-security/201-verified-boot.md +++ b/docs/unified-test-documentation/dasharo-security/201-verified-boot.md @@ -57,8 +57,7 @@ functional. 1. Proceed with the [Test cases common documentation](#test-cases-common-documentation) section. -1. Download `cbmem` and `flashrom` from - to the DUT. +1. Download [`cbmem`][cbmem] and [`flashrom`][flashrom] to the DUT. 1. Disable Secure Boot. **Test steps** @@ -128,8 +127,7 @@ proceed to boot from Slot A. 1. Proceed with the [Test cases common documentation](#test-cases-common-documentation) section. -1. Download `cbmem` and `flashrom` from - to the DUT. +1. Download [`cbmem`][cbmem] and [`flashrom`][flashrom] to the DUT. 1. Disable Secure Boot. **Test steps** @@ -168,11 +166,9 @@ should revert to booting from the recovery slot. 1. Proceed with the [Test cases common documentation](#test-cases-common-documentation) section. -1. Download `cbmem` and `flashrom` from - to the DUT. +1. Download [`cbmem`][cbmem] and [`flashrom`][flashrom] to the DUT. 1. Disable Secure Boot. -1. Obtain [coreboot binary](https://cloud.3mdeb.com/index.php/s/DAn2sdk3osSxG8A) - signed with wrong vboot keys. +1. Obtain coreboot binary signed with wrong vboot keys. **Test steps** @@ -307,8 +303,7 @@ displayed. 1. Proceed with the [Test cases common documentation](#test-cases-common-documentation) section. -1. Download `cbmem` and `flashrom` from - to the DUT. +1. Download [`cbmem`][cbmem] and [`flashrom`][flashrom] to the DUT. 1. Disable Secure Boot. 1. Slot A is flashed with an binary with wrong-signed vboot keys. 1. Obtain the correct `coreboot binary` appropriate for the DUT. @@ -342,3 +337,6 @@ displayed. ```bash VB2:vb2_check_recovery() Recovery reason from previous boot: 0x0 / 0x0 ``` + +[cbmem]: https://cloud.3mdeb.com/index.php/s/5aed4HEwWbCiESZ/download +[flashrom]: https://cloud.3mdeb.com/index.php/s/CttXYWdT8Y2ewQC/download diff --git a/docs/unified-test-documentation/dasharo-security/207-boot-guard-support.md b/docs/unified-test-documentation/dasharo-security/207-boot-guard-support.md index ad67c3ffe3..bfd4b93493 100644 --- a/docs/unified-test-documentation/dasharo-security/207-boot-guard-support.md +++ b/docs/unified-test-documentation/dasharo-security/207-boot-guard-support.md @@ -25,7 +25,7 @@ to verify that the implemented Boot Guard mechanism works correctly. 1. Proceed with the [Generic test setup: OS post installation steps](../generic-test-setup.md#post-installation). 1. Download `cbmem` from the - [cloud](https://cloud.3mdeb.com/index.php/s/zTqkJQdNtJDo5Nd) to the DUT. + [cloud](https://cloud.3mdeb.com/index.php/s/5aed4HEwWbCiESZ) to the DUT. 1. Disable Secure Boot. **Test steps** diff --git a/docs/unified-test-documentation/dasharo-security/20F-me-neuter.md b/docs/unified-test-documentation/dasharo-security/20F-me-neuter.md index 21ef4a2feb..731161d26b 100644 --- a/docs/unified-test-documentation/dasharo-security/20F-me-neuter.md +++ b/docs/unified-test-documentation/dasharo-security/20F-me-neuter.md @@ -69,8 +69,7 @@ of PCIe 5.0 firmware by Dasharo works. 1. Proceed with the [Test cases common documentation](#test-cases-common-documentation) section. -1. Download `cbmem` from the - [cloud](https://cloud.3mdeb.com/index.php/s/zTqkJQdNtJDo5Nd) to the DUT. +1. Download `cbmem` from the [cloud][cbmem] to the DUT. 1. Disable Secure Boot. **Test steps** @@ -185,3 +184,5 @@ If there are no errors printed nearby concerning the HSPHY, test pass. ## MNE006.201 Check Intel ME version (Ubuntu) The test is fully automated. Refer to https://github.com/Dasharo/open-source-firmware-validation/tree/develop + +[cbmem]: https://cloud.3mdeb.com/index.php/s/5aed4HEwWbCiESZ/download diff --git a/docs/unified-test-documentation/dasharo-security/20L-early-boot-dma-protection.md b/docs/unified-test-documentation/dasharo-security/20L-early-boot-dma-protection.md index bd3f63fb92..5e82e72e52 100644 --- a/docs/unified-test-documentation/dasharo-security/20L-early-boot-dma-protection.md +++ b/docs/unified-test-documentation/dasharo-security/20L-early-boot-dma-protection.md @@ -12,8 +12,7 @@ [Generic test setup: OS preparation](../generic-test-setup.md#os-preparation). 1. Proceed with the [Generic test setup: OS post installation steps](../generic-test-setup.md#post-installation). -1. Download `cbmem` from the - [cloud](https://cloud.3mdeb.com/index.php/s/zTqkJQdNtJDo5Nd) to the DUT. +1. Download [`cbmem`][cbmem] and [`flashrom`][flashrom] to the DUT. 1. Disable Secure Boot. ## EDP001.001 Enable early Boot DMA Protection support @@ -33,8 +32,7 @@ DMA transactions by configuring VT-D/IOMMU should be active. 1. Proceed with the [Test cases common documentation](#test-cases-common-documentation) section. -1. Download `cbmem` from the - [cloud](https://cloud.3mdeb.com/index.php/s/zTqkJQdNtJDo5Nd) to the DUT. +1. Download [`cbmem`][cbmem] and [`flashrom`][flashrom] to the DUT. 1. Disable Secure Boot. **Test steps** @@ -129,8 +127,7 @@ PCIe devices DMA transactions by configuring VT-D/IOMMU should be non-active. 1. Proceed with the [Test cases common documentation](#test-cases-common-documentation) section. -1. Download `cbmem` from the - [cloud](https://cloud.3mdeb.com/index.php/s/zTqkJQdNtJDo5Nd) to the DUT. +1. Download [`cbmem`][cbmem] and [`flashrom`][flashrom] to the DUT. 1. Disable Secure Boot. **Test steps** @@ -167,3 +164,5 @@ Example output with unwanted results: [INFO ] Setting DMA protection [0x100000000 - 0x00000008afc00000] [INFO ] Successfully enabled VT-d PMR DMA protection ``` + +[cbmem]: https://cloud.3mdeb.com/index.php/s/5aed4HEwWbCiESZ/download diff --git a/docs/variants/novacustom_nv4x_tgl/compatibility-check-results-ubuntu.md b/docs/variants/novacustom_nv4x_tgl/compatibility-check-results-ubuntu.md index 02772f550c..f16cdd5450 100644 --- a/docs/variants/novacustom_nv4x_tgl/compatibility-check-results-ubuntu.md +++ b/docs/variants/novacustom_nv4x_tgl/compatibility-check-results-ubuntu.md @@ -122,11 +122,6 @@ vendor/Dasharo firmware is shown. | 79 | usb/storage-preinserted-disk/by-uuid/3bb6b676-1c4d-4ffb-8ede-e68f513fcdf1| YES | YES | | 80 | usb/storage-preinserted-disk/by-uuid/452E-652F | YES | YES | -### Logs from tests - -Logs are available under this -[link](https://cloud.3mdeb.com/index.php/s/rrERogJkmGe9N8a). - ## Summary Test results are the same for vendor and dasharo firmware, with no differences. diff --git a/docs/variants/novacustom_nv4x_tgl/releases.md b/docs/variants/novacustom_nv4x_tgl/releases.md index 4b0a75bf2f..b8e5ed3f6b 100644 --- a/docs/variants/novacustom_nv4x_tgl/releases.md +++ b/docs/variants/novacustom_nv4x_tgl/releases.md @@ -542,9 +542,9 @@ using [this key](https://raw.githubusercontent.com/3mdeb/3mdeb-secpack/master/cu [sha256][v0.5.0_sha]{ .md-button } [sha256.sig][v0.5.0_sig]{ .md-button } -[v0.5.0_rom]:https://cloud.3mdeb.com/index.php/s/ywZtKFR3J3Y3sbG -[v0.5.0_sha]:https://cloud.3mdeb.com/index.php/s/6BeLRkSaawB42T6 -[v0.5.0_sig]:https://cloud.3mdeb.com/index.php/s/xM8FcCsMc8kfmKB +[v0.5.0_rom]:https://cloud.3mdeb.com/index.php/s/MtTMrPjHARQSsjH +[v0.5.0_sha]:https://cloud.3mdeb.com/index.php/s/7AdXD2eQjC3F7pf +[v0.5.0_sig]:https://cloud.3mdeb.com/index.php/s/7AdXD2eQjC3F7pf ### SBOM (Software Bill of Materials) @@ -583,9 +583,9 @@ using [this key](https://raw.githubusercontent.com/3mdeb/3mdeb-secpack/master/cu [sha256][v0.4.0_sha]{ .md-button } [sha256.sig][v0.4.0_sig]{ .md-button } -[v0.4.0_rom]:https://cloud.3mdeb.com/index.php/s/MZnCrbWqaKPc8st -[v0.4.0_sha]:https://cloud.3mdeb.com/index.php/s/2SkwmGFoyAf2e7d -[v0.4.0_sig]:https://cloud.3mdeb.com/index.php/s/HZxynzX3zDscTXr +[v0.4.0_rom]:https://cloud.3mdeb.com/index.php/s/T36bBoyooKnErq9 +[v0.4.0_sha]:https://cloud.3mdeb.com/index.php/s/7iemJtrt3ddJnsf +[v0.4.0_sig]:https://cloud.3mdeb.com/index.php/s/7iemJtrt3ddJnsf ### SBOM (Software Bill of Materials) @@ -617,9 +617,9 @@ using [this key](https://raw.githubusercontent.com/3mdeb/3mdeb-secpack/master/cu [sha256][v0.3.0_sha]{ .md-button } [sha256.sig][v0.3.0_sig]{ .md-button } -[v0.3.0_rom]:https://cloud.3mdeb.com/index.php/s/D7atioMH5Ega6JZ -[v0.3.0_sha]:https://cloud.3mdeb.com/index.php/s/j7RxnDWEzreD6w3 -[v0.3.0_sig]:https://cloud.3mdeb.com/index.php/s/NLbgZiyiMFRyZt7 +[v0.3.0_rom]:https://cloud.3mdeb.com/index.php/s/xyFQPt3to5Xqqe2 +[v0.3.0_sha]:https://cloud.3mdeb.com/index.php/s/f9e4rQJJ6A7xyz9 +[v0.3.0_sig]:https://cloud.3mdeb.com/index.php/s/QewpkteprxTZ25m ### SBOM (Software Bill of Materials) @@ -652,9 +652,9 @@ using [this key](https://raw.githubusercontent.com/3mdeb/3mdeb-secpack/master/cu [sha256][v0.2.1_sha]{ .md-button } [sha256.sig][v0.2.1_sig]{ .md-button } -[v0.2.1_rom]:https://cloud.3mdeb.com/index.php/s/9f9S9zNHZDYW8NM -[v0.2.1_sha]:https://cloud.3mdeb.com/index.php/s/q7aZz4LFA6B5byD -[v0.2.1_sig]:https://cloud.3mdeb.com/index.php/s/YnNXcyQyfKkabDG +[v0.2.1_rom]:https://cloud.3mdeb.com/index.php/s/rBx3ZM6dCo8ZWnT +[v0.2.1_sha]:https://cloud.3mdeb.com/index.php/s/G7xEmAEwpyDs88t +[v0.2.1_sig]:https://cloud.3mdeb.com/index.php/s/CbrHc3pT9nwWrde ### SBOM (Software Bill of Materials) @@ -693,9 +693,9 @@ using [this key](https://raw.githubusercontent.com/3mdeb/3mdeb-secpack/master/cu [sha256][v0.2.0_sha]{ .md-button } [sha256.sig][v0.2.0_sig]{ .md-button } -[v0.2.0_rom]:https://cloud.3mdeb.com/index.php/s/BnWwH7X8RYinm7x -[v0.2.0_sha]:https://cloud.3mdeb.com/index.php/s/xrwfNdC9PnfoMEL -[v0.2.0_sig]:https://cloud.3mdeb.com/index.php/s/yWitrxMRrCHYPE4 +[v0.2.0_rom]:https://cloud.3mdeb.com/index.php/s/TwpYgYrqTY9AbBQ +[v0.2.0_sha]:https://cloud.3mdeb.com/index.php/s/xKaQHCKn6RGjsrA +[v0.2.0_sig]:https://cloud.3mdeb.com/index.php/s/xmR6SxrfbpGNQBR ### SBOM (Software Bill of Materials) @@ -722,10 +722,10 @@ using [this key](https://raw.githubusercontent.com/3mdeb/3mdeb-secpack/master/cu [All in one zip][v0.1.2_aio] -[v0.1.2_rom]:https://cloud.3mdeb.com/index.php/s/zzWBdLkF78Ax6pP/download -[v0.1.2_sha]:https://cloud.3mdeb.com/index.php/s/mYzWRma6CYQpZg6/download -[v0.1.2_sig]:https://cloud.3mdeb.com/index.php/s/d6bsNzpnWyqLbqC/download -[v0.1.2_aio]:https://cloud.3mdeb.com/index.php/s/LXQizpTxg7C9g94/download +[v0.1.2_rom]:https://cloud.3mdeb.com/index.php/s/oQe2zjQyiMFfLpB +[v0.1.2_sha]:https://cloud.3mdeb.com/index.php/s/d3mEyBjkoQpywB5 +[v0.1.2_sig]:https://cloud.3mdeb.com/index.php/s/42jatQBgcEQjZnq +[v0.1.2_aio]:https://cloud.3mdeb.com/index.php/s/kxbLbPSG4CgfB8S ### SBOM (Software Bill of Materials) diff --git a/docs/variants/novacustom_v560tnx/releases.md b/docs/variants/novacustom_v560tnx/releases.md index 308868ab16..edf3688729 100644 --- a/docs/variants/novacustom_v560tnx/releases.md +++ b/docs/variants/novacustom_v560tnx/releases.md @@ -119,7 +119,7 @@ using [this key](https://raw.githubusercontent.com/3mdeb/3mdeb-secpack/master/cu + [License](https://chromium.googlesource.com/chromiumos/platform/vboot_reference/+/f1f70f46/LICENSE) - [Intel Management Engine version v18.0.10.2285](https://github.com/Dasharo/dasharo-blobs/blob/8dce7604/novacustom/v5x0tnx/me.bin) + [License](https://github.com/Dasharo/dasharo-blobs/blob/main/licenses/pv%20intel%20obl%20software%20license%20agreement%2011.2.2017.pdf) -- [Intel Firmware Support Package for Meteor Lake-H version 2024/04/30 v4122_12](https://github.com/Dasharo/dasharo-blobs/tree/8dce7604/novacustom/v5x0tnx/MeteorLakeFspBinPkg) +- [Intel Firmware Support Package for Meteor Lake-H version 2024/04/30 v4122_12](https://github.com/intel/FSP/tree/e276be95bac39f7f56a6755c0da105bcce283bfa/MeteorLakeFspBinPkg/IoT/MeteorLake) + [License](https://github.com/Dasharo/dasharo-blobs/blob/main/licenses/pv%20intel%20obl%20software%20license%20agreement%2011.2.2017.pdf) - [Intel Flash Descriptor version v1.0](https://github.com/Dasharo/dasharo-blobs/blob/8dce7604/novacustom/v5x0tnx/descriptor.bin) + [License](https://github.com/Dasharo/dasharo-blobs/blob/main/licenses/pv%20intel%20obl%20software%20license%20agreement%2011.2.2017.pdf) diff --git a/docs/variants/talos_2/releases.md b/docs/variants/talos_2/releases.md index 45ec2aed77..b0336169fe 100644 --- a/docs/variants/talos_2/releases.md +++ b/docs/variants/talos_2/releases.md @@ -248,25 +248,25 @@ using [this key](https://raw.githubusercontent.com/3mdeb/3mdeb-secpack/master/cu [sha256][v0.4.0_bootblock_sha]{ .md-button } [sha256.sig][v0.4.0_bootblock_sig]{ .md-button } -[v0.4.0_bootblock_rom]: https://cloud.3mdeb.com/index.php/s/54MDtRgBNEmyKo6 -[v0.4.0_bootblock_sha]: https://cloud.3mdeb.com/index.php/s/DwpWdgfZyD9StBW -[v0.4.0_bootblock_sig]: https://cloud.3mdeb.com/index.php/s/5xawXEissBZN6rT +[v0.4.0_bootblock_rom]: https://cloud.3mdeb.com/index.php/s/wLTKyH86idYMLfW +[v0.4.0_bootblock_sha]: https://cloud.3mdeb.com/index.php/s/mRkb6kj4B9Dm9Ak +[v0.4.0_bootblock_sig]: https://cloud.3mdeb.com/index.php/s/geeofbZsrjef8bT [dasharo_talos_2_coreboot.rom.signed.ecc][v0.4.0_coreboot_rom]{ .md-button } [sha256][v0.4.0_coreboot_sha]{ .md-button } [sha256.sig][v0.4.0_coreboot_sig]{ .md-button } -[v0.4.0_coreboot_rom]: https://cloud.3mdeb.com/index.php/s/5Pbw5EtmNimrdrj -[v0.4.0_coreboot_sha]: https://cloud.3mdeb.com/index.php/s/TNcLAz3CZo4QzeD -[v0.4.0_coreboot_sig]: https://cloud.3mdeb.com/index.php/s/9Fr6Kn57mP2bbwS +[v0.4.0_coreboot_rom]: https://cloud.3mdeb.com/index.php/s/qn3xJGM6LpSBbRd +[v0.4.0_coreboot_sha]: https://cloud.3mdeb.com/index.php/s/H5NAFpSkbb7aDj6 +[v0.4.0_coreboot_sig]: https://cloud.3mdeb.com/index.php/s/cge3Qiro5AY4Tnt [zImage_v0.4.0.bundled][v0.4.0_bundled_rom]{ .md-button } [sha256][v0.4.0_bundled_sha]{ .md-button } [sha256.sig][v0.4.0_bundled_sig]{ .md-button } -[v0.4.0_bundled_rom]: https://cloud.3mdeb.com/index.php/s/o5RE7oj4r9kFXS2 -[v0.4.0_bundled_sha]: https://cloud.3mdeb.com/index.php/s/FgeHfa4LzcZK6Pj -[v0.4.0_bundled_sig]: https://cloud.3mdeb.com/index.php/s/awNSefJrN4d2tAD +[v0.4.0_bundled_rom]: https://cloud.3mdeb.com/index.php/s/99jaA4PNoGSQ9M2 +[v0.4.0_bundled_sha]: https://cloud.3mdeb.com/index.php/s/CmzScS7dGPePXKs +[v0.4.0_bundled_sig]: https://cloud.3mdeb.com/index.php/s/yQDjCgJwjoiwbyP To verify binary integrity with hash and signature please follow the instructions in [Dasharo release signature verification](../../guides/signature-verification.md) diff --git a/docs/variants/talos_2/tpm-support.md b/docs/variants/talos_2/tpm-support.md index b1f5f6edb4..8abee0795f 100644 --- a/docs/variants/talos_2/tpm-support.md +++ b/docs/variants/talos_2/tpm-support.md @@ -102,11 +102,3 @@ TPM2 log entry 9: SHA1: cd32830f83a4f74b75d7feac6c03bd3ad8d553f5 Event data: BOOTKERNEL ``` - -## Additional information - -The Module is available at the official -[3mdeb store](https://shop.3mdeb.com/shop/modules/tpm-1-2-compatible-with-raptor-computing-systems-talos-ii-mainboard/). - -You can also buy the product by mailing us at: -[shopping@3mdeb.com](mailto:shopping@3mdeb.com).