On 05/07/12 05:59 AM, Albert ARIBAUD wrote:
Hi Albert,
Thanks for responding, I realize most people are probably away on summer
holiday.
Can't speak for Wolfgang of course, but my main question would be why
would U-Boot need to identify users when its payload OS can do this
with much more
Hi Richard,
On Mon, 9 Jul 2012 09:50:05 -0400, Richard Retanubun
richardretanu...@ruggedcom.com wrote:
On 05/07/12 05:59 AM, Albert ARIBAUD wrote:
Hi Albert,
Thanks for responding, I realize most people are probably away on
summer holiday.
Actually some of them are at a U-Boot developer's
Thanks for responding, I realize most people are probably away on
summer holiday.
Actually some of them are at a U-Boot developer's meeting in Geneva.
Uh-oh... Is it safe to place such a high concentration of hacker brains
so close to CERN? :)
The primary concern here is the power of u-boot
Hi Richard,
On Mon, 9 Jul 2012 10:55:18 -0400, Richard Retanubun
richardretanu...@ruggedcom.com wrote:
Thanks for responding, I realize most people are probably away on
summer holiday.
Actually some of them are at a U-Boot developer's meeting in Geneva.
Uh-oh... Is it safe to place
Dear Richard Retanubun,
In message 4ffae18d.3080...@ruggedcom.com you wrote:
Thus, we aim to add the ability uboot to identify users, much like the
payload OS does
before granting access to its CLI (if the user interrupts the boot process).
You are opening a can of worms here, and I bet you
Hi Richard,
On Wed, 27 Jun 2012 10:46:57 -0400, Richard Retanubun
richardretanu...@ruggedcom.com wrote:
Hello,
I am working on a project to allow uboot to authenticate users by
using the same sha256_crypt function that Linux user-space use for
libcrypt [ref]
Hello,
I am working on a project to allow uboot to authenticate users by using the
same sha256_crypt function that Linux user-space use for libcrypt
[ref] http://www.akkadia.org/drepper/SHA-crypt.txt
We chose sha256 because uboot already have support for doing sha256 hashes, I
am wondering
7 matches
Mail list logo