From: Igor Opaniuk Date: Fri, 9 Feb 2024 19:20:45 +0000 (+0100) Subject: doc: android: avb: sync usage details X-Git-Url: http://git.dujemihanovic.xyz/img/%7B%7B%20.RelPermalink%20%7D%7D?a=commitdiff_plain;h=e2f6270f2da844d598555702d3af4f2e3fae3f9f;p=u-boot.git doc: android: avb: sync usage details Sync usage info with the one cmd/avb.c. Signed-off-by: Igor Opaniuk Reviewed-by: Mattijs Korpershoek Link: https://lore.kernel.org/r/20240209192045.3961832-8-igor.opaniuk@foundries.io Signed-off-by: Mattijs Korpershoek --- diff --git a/doc/android/avb2.rst b/doc/android/avb2.rst index a072119574..4aca7a5c66 100644 --- a/doc/android/avb2.rst +++ b/doc/android/avb2.rst @@ -38,16 +38,22 @@ AVB 2.0 U-Boot shell commands Provides CLI interface to invoke AVB 2.0 verification + misc. commands for different testing purposes:: - avb init - initialize avb 2.0 for - avb verify - run verification process using hash data from vbmeta structure + avb init - initialize avb 2 for avb read_rb - read rollback index at location avb write_rb - write rollback index to avb is_unlocked - returns unlock status of the device - avb get_uuid - read and print uuid of partition + avb get_uuid - read and print uuid of partition avb read_part - read bytes from - partition to buffer + partition to buffer + avb read_part_hex - read bytes from + partition and print to stdout avb write_part - write bytes to - by using data from + by using data from + avb read_pvalue - read a persistent value + avb write_pvalue - write a persistent value + avb verify [slot_suffix] - run verification process using hash data + from vbmeta structure + [slot_suffix] - _a, _b, etc (if vbmeta partition is slotted) Partitions tampering (example) ------------------------------