Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 2 additions & 2 deletions docs/common-coreboot-docs/checkbox.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

## Introduction

[Checkbox](https://checkbox.readthedocs.io/en/latest/) is a flexible test
[Checkbox](https://documentation.ubuntu.com/checkbox/stable/) is a flexible test
automation software. It’s the main tool used in Ubuntu Certification program.
This document describes the usage of Checkbox on Ubuntu 22.04, but it can work
on older versions of Ubuntu as well.
Expand Down Expand Up @@ -192,7 +192,7 @@ any results. Example of running one test plan:
```

For more details about these (and others) commands visit
[checkbox-cli](https://checkbox.readthedocs.io/en/latest/how-to/index.html).
[checkbox-cli](https://documentation.ubuntu.com/checkbox/stable/how-to/).

## Troubleshooting

Expand Down
3 changes: 2 additions & 1 deletion docs/common-coreboot-docs/dumping_logs.md
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,8 @@ with the firmware. This method requires Secure Boot to be disabled.

Options to get `cbmem` utility:

1. Download precompiled utility from [3mdeb cloud](https://cloud.3mdeb.com/index.php/s/zTqkJQdNtJDo5Nd/download)
1. Download precompiled utility from [3mdeb
cloud](https://cloud.3mdeb.com/index.php/s/5aed4HEwWbCiESZ/download)
2. Use [Dasharo Tools Suite](https://docs.dasharo.com/dasharo-tools-suite/releases#v110)
v1.1.0 or newer which has `cbmem` utility built in.
3. Compile `cbmem utility`. See procedure below.
Expand Down
2 changes: 1 addition & 1 deletion docs/projects/sovereign-boot-wizard.md
Original file line number Diff line number Diff line change
Expand Up @@ -320,7 +320,7 @@ Currently implemented set of functionalities can be validated using
page](https://github.com/Dasharo/meta-dts/releases) and place it, e.g. in
`$HOME` directory.
5. Obtain the Sovereign Boot [test data
image](https://cloud.3mdeb.com/index.php/s/DxMziEtRmpdwqBK/download)
image](https://cloud.3mdeb.com/index.php/s/o7JfpWTxidZiKpb/download)
(`svboot_test_data.img`) and place it, e.g. in `$HOME` directory.
6. Start the QEMU with the following command in separate window/tab in the
`open-source-firmware-validation` directory:
Expand Down
11 changes: 5 additions & 6 deletions docs/transparent-validation/muxpi/basic-validation.md
Original file line number Diff line number Diff line change
Expand Up @@ -19,8 +19,7 @@
## NanoPi setup

1. Prepare microSD card (minimum 8GB) for NanoPi NEO operating system.
1. Download and extract image -
[link](https://cloud.3mdeb.com/index.php/s/n42rLcAQ5cWcxgW/download)
1. Download and extract image - [link][nanopi-image].
1. Flash image into microSD card ([Etcher](https://www.balena.io/etcher/)
tool could be helpful)

Expand All @@ -32,8 +31,6 @@
1. Plug ETH cable to RJ45 NanoPi port.
1. Plug microUSB<->USB cable to muxPi and your machine.
1. Plug in power supply.
![](https://cloud.3mdeb.com/index.php/s/o3D5fwWbjscXDw9/preview)

1. Make sure that jumpers are correctly set according to image:

![](../../images/muxpi1.4_jumpers.jpg)
Expand Down Expand Up @@ -133,8 +130,7 @@ prepared by Tizen group (the code is not open yet, but this process is in
progress). To flash muxPi's microcontroller, follow steps below:

1. Make sure that VDD jumper is left open.
1. Download binary file -
[link](https://cloud.3mdeb.com/index.php/s/adnEZLgo2diXkdw/download).
1. Download binary file - [link][cortex-image].
1. Copy binary to nanoPi: `scp <path-to-file> root@192.168.4.XXX:/root/`
1. Update package lists (nanoPi): `apt-get update`
1. Install stm32flash utility (nanoPi): `sudo apt-get install stm32flash`
Expand Down Expand Up @@ -251,3 +247,6 @@ Minicom quick guide:
---

_Images source: [Wiki Tizen](http://web.archive.org/web/20230702190152/https://wiki.tizen.org/MuxPi)_

[nanopi-image]: https://cloud.3mdeb.com/index.php/s/Tda8wDTjrCY63gq/download
[cortex-image]: https://cloud.3mdeb.com/index.php/s/YZYYdfNf9wDDEq3/download
7 changes: 3 additions & 4 deletions docs/transparent-validation/muxpi/theory-of-operations.md
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@
Preparation of the muxPi's "heart":

1. Prepare microSD card (minimum 8GB) for NanoPi NEO operating system.
1. Download and extract image - [link][nanopi-image2]
1. Download and extract image - [link][nanopi-image]
1. Flash image into microSD card ([Etcher][etcher] tool could be helpful)
1. Insert card to NanoPi microSD slot.
1. Attach NanoPi to muxPi connectors.
Expand Down Expand Up @@ -567,8 +567,7 @@ uart --- Get current value of UART voltage or set if new value is given [in mill

_Images source: [Wiki Tizen](http://web.archive.org/web/20230702190152/https://wiki.tizen.org/MuxPi)_

[nanopi-image]: https://cloud.3mdeb.com/index.php/s/MENgScifExeeo6P/download
[nanopi-image2]: https://cloud.3mdeb.com/index.php/s/n42rLcAQ5cWcxgW/download
[cortex-binary]: https://cloud.3mdeb.com/index.php/s/adnEZLgo2diXkdw/download
[nanopi-image]: https://cloud.3mdeb.com/index.php/s/Tda8wDTjrCY63gq/download
[cortex-binary]: https://cloud.3mdeb.com/index.php/s/YZYYdfNf9wDDEq3/download
[etcher]: https://www.balena.io/etcher/
[usb-m]: http://web.archive.org/web/20230702190152/https://wiki.tizen.org/MuxPi#USB-M
Original file line number Diff line number Diff line change
Expand Up @@ -12,8 +12,7 @@
[Generic test setup: OS preparation](../generic-test-setup.md#os-preparation).
1. Proceed with the
[Generic test setup: OS post installation steps](../generic-test-setup.md#post-installation).gi
1. Download `cbmem` from the
[cloud](https://cloud.3mdeb.com/index.php/s/zTqkJQdNtJDo5Nd) to the DUT.
1. Download `cbmem` from the [cloud][cbmem] to the DUT.
1. Disable Secure Boot.

## CBMEM001.201 coreboot booting time measure after coldboot (Ubuntu)
Expand All @@ -33,8 +32,7 @@ results and specify the platform stability.

1. Proceed with the
[Test cases common documentation](#test-cases-common-documentation) section.
1. Download `cbmem` from the
[cloud](https://cloud.3mdeb.com/index.php/s/zTqkJQdNtJDo5Nd) to the DUT.
1. Download `cbmem` from the [cloud][cbmem] to the DUT.
1. Disable Secure Boot.

**Test steps**
Expand All @@ -57,3 +55,5 @@ The test is fully automated. Refer to https://github.com/Dasharo/open-source-fir
## CBMEM003.201 coreboot booting time measure after system reboot (Ubuntu)

The test is fully automated. Refer to https://github.com/Dasharo/open-source-firmware-validation/tree/develop

[cbmem]: https://cloud.3mdeb.com/index.php/s/5aed4HEwWbCiESZ
Original file line number Diff line number Diff line change
Expand Up @@ -57,8 +57,7 @@ functional.

1. Proceed with the
[Test cases common documentation](#test-cases-common-documentation) section.
1. Download `cbmem` and `flashrom` from <https://cloud.3mdeb.com/index.php/s/zTqkJQdNtJDo5Nd>
to the DUT.
1. Download [`cbmem`][cbmem] and [`flashrom`][flashrom] to the DUT.
1. Disable Secure Boot.

**Test steps**
Expand Down Expand Up @@ -128,8 +127,7 @@ proceed to boot from Slot A.

1. Proceed with the
[Test cases common documentation](#test-cases-common-documentation) section.
1. Download `cbmem` and `flashrom` from <https://cloud.3mdeb.com/index.php/s/zTqkJQdNtJDo5Nd>
to the DUT.
1. Download [`cbmem`][cbmem] and [`flashrom`][flashrom] to the DUT.
1. Disable Secure Boot.

**Test steps**
Expand Down Expand Up @@ -168,11 +166,9 @@ should revert to booting from the recovery slot.

1. Proceed with the
[Test cases common documentation](#test-cases-common-documentation) section.
1. Download `cbmem` and `flashrom` from <https://cloud.3mdeb.com/index.php/s/zTqkJQdNtJDo5Nd>
to the DUT.
1. Download [`cbmem`][cbmem] and [`flashrom`][flashrom] to the DUT.
1. Disable Secure Boot.
1. Obtain [coreboot binary](https://cloud.3mdeb.com/index.php/s/DAn2sdk3osSxG8A)
signed with wrong vboot keys.
1. Obtain coreboot binary signed with wrong vboot keys.

**Test steps**

Expand Down Expand Up @@ -307,8 +303,7 @@ displayed.

1. Proceed with the
[Test cases common documentation](#test-cases-common-documentation) section.
1. Download `cbmem` and `flashrom` from <https://cloud.3mdeb.com/index.php/s/zTqkJQdNtJDo5Nd>
to the DUT.
1. Download [`cbmem`][cbmem] and [`flashrom`][flashrom] to the DUT.
1. Disable Secure Boot.
1. Slot A is flashed with an binary with wrong-signed vboot keys.
1. Obtain the correct `coreboot binary` appropriate for the DUT.
Expand Down Expand Up @@ -342,3 +337,6 @@ displayed.
```bash
VB2:vb2_check_recovery() Recovery reason from previous boot: 0x0 / 0x0
```

[cbmem]: https://cloud.3mdeb.com/index.php/s/5aed4HEwWbCiESZ/download
[flashrom]: https://cloud.3mdeb.com/index.php/s/CttXYWdT8Y2ewQC/download
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ to verify that the implemented Boot Guard mechanism works correctly.
1. Proceed with the
[Generic test setup: OS post installation steps](../generic-test-setup.md#post-installation).
1. Download `cbmem` from the
[cloud](https://cloud.3mdeb.com/index.php/s/zTqkJQdNtJDo5Nd) to the DUT.
[cloud](https://cloud.3mdeb.com/index.php/s/5aed4HEwWbCiESZ) to the DUT.
1. Disable Secure Boot.

**Test steps**
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -69,8 +69,7 @@ of PCIe 5.0 firmware by Dasharo works.

1. Proceed with the
[Test cases common documentation](#test-cases-common-documentation) section.
1. Download `cbmem` from the
[cloud](https://cloud.3mdeb.com/index.php/s/zTqkJQdNtJDo5Nd) to the DUT.
1. Download `cbmem` from the [cloud][cbmem] to the DUT.
1. Disable Secure Boot.

**Test steps**
Expand Down Expand Up @@ -185,3 +184,5 @@ If there are no errors printed nearby concerning the HSPHY, test pass.
## MNE006.201 Check Intel ME version (Ubuntu)

The test is fully automated. Refer to https://github.com/Dasharo/open-source-firmware-validation/tree/develop

[cbmem]: https://cloud.3mdeb.com/index.php/s/5aed4HEwWbCiESZ/download
Original file line number Diff line number Diff line change
Expand Up @@ -12,8 +12,7 @@
[Generic test setup: OS preparation](../generic-test-setup.md#os-preparation).
1. Proceed with the
[Generic test setup: OS post installation steps](../generic-test-setup.md#post-installation).
1. Download `cbmem` from the
[cloud](https://cloud.3mdeb.com/index.php/s/zTqkJQdNtJDo5Nd) to the DUT.
1. Download [`cbmem`][cbmem] and [`flashrom`][flashrom] to the DUT.
1. Disable Secure Boot.

## EDP001.001 Enable early Boot DMA Protection support
Expand All @@ -33,8 +32,7 @@ DMA transactions by configuring VT-D/IOMMU should be active.

1. Proceed with the
[Test cases common documentation](#test-cases-common-documentation) section.
1. Download `cbmem` from the
[cloud](https://cloud.3mdeb.com/index.php/s/zTqkJQdNtJDo5Nd) to the DUT.
1. Download [`cbmem`][cbmem] and [`flashrom`][flashrom] to the DUT.
1. Disable Secure Boot.

**Test steps**
Expand Down Expand Up @@ -129,8 +127,7 @@ PCIe devices DMA transactions by configuring VT-D/IOMMU should be non-active.

1. Proceed with the
[Test cases common documentation](#test-cases-common-documentation) section.
1. Download `cbmem` from the
[cloud](https://cloud.3mdeb.com/index.php/s/zTqkJQdNtJDo5Nd) to the DUT.
1. Download [`cbmem`][cbmem] and [`flashrom`][flashrom] to the DUT.
1. Disable Secure Boot.

**Test steps**
Expand Down Expand Up @@ -167,3 +164,5 @@ Example output with unwanted results:
[INFO ] Setting DMA protection [0x100000000 - 0x00000008afc00000]
[INFO ] Successfully enabled VT-d PMR DMA protection
```

[cbmem]: https://cloud.3mdeb.com/index.php/s/5aed4HEwWbCiESZ/download
Original file line number Diff line number Diff line change
Expand Up @@ -122,11 +122,6 @@ vendor/Dasharo firmware is shown.
| 79 | usb/storage-preinserted-disk/by-uuid/3bb6b676-1c4d-4ffb-8ede-e68f513fcdf1| YES | YES |
| 80 | usb/storage-preinserted-disk/by-uuid/452E-652F | YES | YES |

### Logs from tests

Logs are available under this
[link](https://cloud.3mdeb.com/index.php/s/rrERogJkmGe9N8a).

## Summary

Test results are the same for vendor and dasharo firmware, with no differences.
38 changes: 19 additions & 19 deletions docs/variants/novacustom_nv4x_tgl/releases.md
Original file line number Diff line number Diff line change
Expand Up @@ -542,9 +542,9 @@ using [this key](https://raw.githubusercontent.com/3mdeb/3mdeb-secpack/master/cu
[sha256][v0.5.0_sha]{ .md-button }
[sha256.sig][v0.5.0_sig]{ .md-button }

[v0.5.0_rom]:https://cloud.3mdeb.com/index.php/s/ywZtKFR3J3Y3sbG
[v0.5.0_sha]:https://cloud.3mdeb.com/index.php/s/6BeLRkSaawB42T6
[v0.5.0_sig]:https://cloud.3mdeb.com/index.php/s/xM8FcCsMc8kfmKB
[v0.5.0_rom]:https://cloud.3mdeb.com/index.php/s/MtTMrPjHARQSsjH
[v0.5.0_sha]:https://cloud.3mdeb.com/index.php/s/7AdXD2eQjC3F7pf
[v0.5.0_sig]:https://cloud.3mdeb.com/index.php/s/7AdXD2eQjC3F7pf

### SBOM (Software Bill of Materials)

Expand Down Expand Up @@ -583,9 +583,9 @@ using [this key](https://raw.githubusercontent.com/3mdeb/3mdeb-secpack/master/cu
[sha256][v0.4.0_sha]{ .md-button }
[sha256.sig][v0.4.0_sig]{ .md-button }

[v0.4.0_rom]:https://cloud.3mdeb.com/index.php/s/MZnCrbWqaKPc8st
[v0.4.0_sha]:https://cloud.3mdeb.com/index.php/s/2SkwmGFoyAf2e7d
[v0.4.0_sig]:https://cloud.3mdeb.com/index.php/s/HZxynzX3zDscTXr
[v0.4.0_rom]:https://cloud.3mdeb.com/index.php/s/T36bBoyooKnErq9
[v0.4.0_sha]:https://cloud.3mdeb.com/index.php/s/7iemJtrt3ddJnsf
[v0.4.0_sig]:https://cloud.3mdeb.com/index.php/s/7iemJtrt3ddJnsf

### SBOM (Software Bill of Materials)

Expand Down Expand Up @@ -617,9 +617,9 @@ using [this key](https://raw.githubusercontent.com/3mdeb/3mdeb-secpack/master/cu
[sha256][v0.3.0_sha]{ .md-button }
[sha256.sig][v0.3.0_sig]{ .md-button }

[v0.3.0_rom]:https://cloud.3mdeb.com/index.php/s/D7atioMH5Ega6JZ
[v0.3.0_sha]:https://cloud.3mdeb.com/index.php/s/j7RxnDWEzreD6w3
[v0.3.0_sig]:https://cloud.3mdeb.com/index.php/s/NLbgZiyiMFRyZt7
[v0.3.0_rom]:https://cloud.3mdeb.com/index.php/s/xyFQPt3to5Xqqe2
[v0.3.0_sha]:https://cloud.3mdeb.com/index.php/s/f9e4rQJJ6A7xyz9
[v0.3.0_sig]:https://cloud.3mdeb.com/index.php/s/QewpkteprxTZ25m

### SBOM (Software Bill of Materials)

Expand Down Expand Up @@ -652,9 +652,9 @@ using [this key](https://raw.githubusercontent.com/3mdeb/3mdeb-secpack/master/cu
[sha256][v0.2.1_sha]{ .md-button }
[sha256.sig][v0.2.1_sig]{ .md-button }

[v0.2.1_rom]:https://cloud.3mdeb.com/index.php/s/9f9S9zNHZDYW8NM
[v0.2.1_sha]:https://cloud.3mdeb.com/index.php/s/q7aZz4LFA6B5byD
[v0.2.1_sig]:https://cloud.3mdeb.com/index.php/s/YnNXcyQyfKkabDG
[v0.2.1_rom]:https://cloud.3mdeb.com/index.php/s/rBx3ZM6dCo8ZWnT
[v0.2.1_sha]:https://cloud.3mdeb.com/index.php/s/G7xEmAEwpyDs88t
[v0.2.1_sig]:https://cloud.3mdeb.com/index.php/s/CbrHc3pT9nwWrde

### SBOM (Software Bill of Materials)

Expand Down Expand Up @@ -693,9 +693,9 @@ using [this key](https://raw.githubusercontent.com/3mdeb/3mdeb-secpack/master/cu
[sha256][v0.2.0_sha]{ .md-button }
[sha256.sig][v0.2.0_sig]{ .md-button }

[v0.2.0_rom]:https://cloud.3mdeb.com/index.php/s/BnWwH7X8RYinm7x
[v0.2.0_sha]:https://cloud.3mdeb.com/index.php/s/xrwfNdC9PnfoMEL
[v0.2.0_sig]:https://cloud.3mdeb.com/index.php/s/yWitrxMRrCHYPE4
[v0.2.0_rom]:https://cloud.3mdeb.com/index.php/s/TwpYgYrqTY9AbBQ
[v0.2.0_sha]:https://cloud.3mdeb.com/index.php/s/xKaQHCKn6RGjsrA
[v0.2.0_sig]:https://cloud.3mdeb.com/index.php/s/xmR6SxrfbpGNQBR

### SBOM (Software Bill of Materials)

Expand All @@ -722,10 +722,10 @@ using [this key](https://raw.githubusercontent.com/3mdeb/3mdeb-secpack/master/cu

[All in one zip][v0.1.2_aio]

[v0.1.2_rom]:https://cloud.3mdeb.com/index.php/s/zzWBdLkF78Ax6pP/download
[v0.1.2_sha]:https://cloud.3mdeb.com/index.php/s/mYzWRma6CYQpZg6/download
[v0.1.2_sig]:https://cloud.3mdeb.com/index.php/s/d6bsNzpnWyqLbqC/download
[v0.1.2_aio]:https://cloud.3mdeb.com/index.php/s/LXQizpTxg7C9g94/download
[v0.1.2_rom]:https://cloud.3mdeb.com/index.php/s/oQe2zjQyiMFfLpB
[v0.1.2_sha]:https://cloud.3mdeb.com/index.php/s/d3mEyBjkoQpywB5
[v0.1.2_sig]:https://cloud.3mdeb.com/index.php/s/42jatQBgcEQjZnq
[v0.1.2_aio]:https://cloud.3mdeb.com/index.php/s/kxbLbPSG4CgfB8S

### SBOM (Software Bill of Materials)

Expand Down
2 changes: 1 addition & 1 deletion docs/variants/novacustom_v560tnx/releases.md
Original file line number Diff line number Diff line change
Expand Up @@ -119,7 +119,7 @@ using [this key](https://raw.githubusercontent.com/3mdeb/3mdeb-secpack/master/cu
+ [License](https://chromium.googlesource.com/chromiumos/platform/vboot_reference/+/f1f70f46/LICENSE)
- [Intel Management Engine version v18.0.10.2285](https://github.com/Dasharo/dasharo-blobs/blob/8dce7604/novacustom/v5x0tnx/me.bin)
+ [License](https://github.com/Dasharo/dasharo-blobs/blob/main/licenses/pv%20intel%20obl%20software%20license%20agreement%2011.2.2017.pdf)
- [Intel Firmware Support Package for Meteor Lake-H version 2024/04/30 v4122_12](https://github.com/Dasharo/dasharo-blobs/tree/8dce7604/novacustom/v5x0tnx/MeteorLakeFspBinPkg)
- [Intel Firmware Support Package for Meteor Lake-H version 2024/04/30 v4122_12](https://github.com/intel/FSP/tree/e276be95bac39f7f56a6755c0da105bcce283bfa/MeteorLakeFspBinPkg/IoT/MeteorLake)
+ [License](https://github.com/Dasharo/dasharo-blobs/blob/main/licenses/pv%20intel%20obl%20software%20license%20agreement%2011.2.2017.pdf)
- [Intel Flash Descriptor version v1.0](https://github.com/Dasharo/dasharo-blobs/blob/8dce7604/novacustom/v5x0tnx/descriptor.bin)
+ [License](https://github.com/Dasharo/dasharo-blobs/blob/main/licenses/pv%20intel%20obl%20software%20license%20agreement%2011.2.2017.pdf)
Expand Down
18 changes: 9 additions & 9 deletions docs/variants/talos_2/releases.md
Original file line number Diff line number Diff line change
Expand Up @@ -248,25 +248,25 @@ using [this key](https://raw.githubusercontent.com/3mdeb/3mdeb-secpack/master/cu
[sha256][v0.4.0_bootblock_sha]{ .md-button }
[sha256.sig][v0.4.0_bootblock_sig]{ .md-button }

[v0.4.0_bootblock_rom]: https://cloud.3mdeb.com/index.php/s/54MDtRgBNEmyKo6
[v0.4.0_bootblock_sha]: https://cloud.3mdeb.com/index.php/s/DwpWdgfZyD9StBW
[v0.4.0_bootblock_sig]: https://cloud.3mdeb.com/index.php/s/5xawXEissBZN6rT
[v0.4.0_bootblock_rom]: https://cloud.3mdeb.com/index.php/s/wLTKyH86idYMLfW
[v0.4.0_bootblock_sha]: https://cloud.3mdeb.com/index.php/s/mRkb6kj4B9Dm9Ak
[v0.4.0_bootblock_sig]: https://cloud.3mdeb.com/index.php/s/geeofbZsrjef8bT

[dasharo_talos_2_coreboot.rom.signed.ecc][v0.4.0_coreboot_rom]{ .md-button }
[sha256][v0.4.0_coreboot_sha]{ .md-button }
[sha256.sig][v0.4.0_coreboot_sig]{ .md-button }

[v0.4.0_coreboot_rom]: https://cloud.3mdeb.com/index.php/s/5Pbw5EtmNimrdrj
[v0.4.0_coreboot_sha]: https://cloud.3mdeb.com/index.php/s/TNcLAz3CZo4QzeD
[v0.4.0_coreboot_sig]: https://cloud.3mdeb.com/index.php/s/9Fr6Kn57mP2bbwS
[v0.4.0_coreboot_rom]: https://cloud.3mdeb.com/index.php/s/qn3xJGM6LpSBbRd
[v0.4.0_coreboot_sha]: https://cloud.3mdeb.com/index.php/s/H5NAFpSkbb7aDj6
[v0.4.0_coreboot_sig]: https://cloud.3mdeb.com/index.php/s/cge3Qiro5AY4Tnt

[zImage_v0.4.0.bundled][v0.4.0_bundled_rom]{ .md-button }
[sha256][v0.4.0_bundled_sha]{ .md-button }
[sha256.sig][v0.4.0_bundled_sig]{ .md-button }

[v0.4.0_bundled_rom]: https://cloud.3mdeb.com/index.php/s/o5RE7oj4r9kFXS2
[v0.4.0_bundled_sha]: https://cloud.3mdeb.com/index.php/s/FgeHfa4LzcZK6Pj
[v0.4.0_bundled_sig]: https://cloud.3mdeb.com/index.php/s/awNSefJrN4d2tAD
[v0.4.0_bundled_rom]: https://cloud.3mdeb.com/index.php/s/99jaA4PNoGSQ9M2
[v0.4.0_bundled_sha]: https://cloud.3mdeb.com/index.php/s/CmzScS7dGPePXKs
[v0.4.0_bundled_sig]: https://cloud.3mdeb.com/index.php/s/yQDjCgJwjoiwbyP

To verify binary integrity with hash and signature please follow the
instructions in [Dasharo release signature verification](../../guides/signature-verification.md)
Expand Down
8 changes: 0 additions & 8 deletions docs/variants/talos_2/tpm-support.md
Original file line number Diff line number Diff line change
Expand Up @@ -102,11 +102,3 @@ TPM2 log entry 9:
SHA1: cd32830f83a4f74b75d7feac6c03bd3ad8d553f5
Event data: BOOTKERNEL
```

## Additional information

The Module is available at the official
[3mdeb store](https://shop.3mdeb.com/shop/modules/tpm-1-2-compatible-with-raptor-computing-systems-talos-ii-mainboard/).

You can also buy the product by mailing us at:
[shopping@3mdeb.com](mailto:shopping@3mdeb.com).
Loading