Fixing typos to make the whole message clearer.
On Sun, Apr 14, 2024 at 01:03:04AM +0200, Enrico Mioso wrote:
> On Fri, Apr 12, 2024 at 05:30:35PM -0400, Michael Richardson wrote:
> >
> > Daniel Golle wrote:
> > >> In the first PDF, there is mention of:
> > >> Security Support 2 *
On Fri, Apr 12, 2024 at 05:30:35PM -0400, Michael Richardson wrote:
>
> Daniel Golle wrote:
> >> In the first PDF, there is mention of:
> >> Security Support 2 * 256-bit multi-key on OTP eFuse
> >> Support 64 version OTP eFuse for anti-rollback
>
> > Those features require
W dniu 13.04.2024 o 16:05, Tomasz Maciej Nowak pisze:
> From: Tomasz Maciej Nowak
>
> Dell/SonicWall APL26-0AE (marketed as SonicPoint ACe) is a dual band
> wireless access point.
>
> Specification
> SoC: QualcommAtheros QCA9550
> RAM: 256 MB DDR2
> Flash: 32 MB SPI NOR
> WIFI: 2.4 GHz 3T3R
From: Tomasz Maciej Nowak
Dell/SonicWall APL26-0AE (marketed as SonicPoint ACe) is a dual band
wireless access point.
Specification
SoC: QualcommAtheros QCA9550
RAM: 256 MB DDR2
Flash: 32 MB SPI NOR
WIFI: 2.4 GHz 3T3R integrated
5 GHz 3T3R QCA9890 oversized Mini PCIe card
Ethernet: 2x
Michael Richardson writes:
> Having orange and red pieces "secured" *does* mean that u-boot updates would
> have to come from openwrt.
Does it? Is it possible to modify the BL2 to verify signatures of the
BL31 and BL32 stages only?
If not, is it feasible to deploy an automated fip.bin signer,