/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/trusted-firmware-a/ |
H A D | trusted-firmware-a-fvp-base.inc | 29 # Configure measured boot if the attestation SP is deployed. 39 EXTRA_OEMAKE += "${@bb.utils.contains('MACHINE_FEATURES', 'ts-attestation',\ 53 TFA_DEBUG := "${@bb.utils.contains('MACHINE_FEATURES', 'ts-attestation', '0',\ 56 TFA_MBEDTLS := "${@bb.utils.contains('MACHINE_FEATURES', 'ts-attestation',\
|
/openbmc/openbmc/meta-arm/meta-arm/recipes-security/trusted-services/ |
H A D | ts-sp-attestation_git.bb | 1 DESCRIPTION = "Trusted Services attestation service provider" 8 OECMAKE_SOURCEPATH="${S}/deployments/attestation/config/${TS_SP_IAT_CONFIG}-${TS_ENV}"
|
/openbmc/linux/Documentation/virt/coco/ |
H A D | sev-guest.rst | 78 The SNP_GET_REPORT ioctl can be used to query the attestation report from the 80 provided by the SEV-SNP firmware to query the attestation report. 118 firmware to get the attestation report. 120 On success, the snp_ext_report_resp.data will contain the attestation report 136 binaries will be measured as part of the SEV-SNP attestation report. 143 SEV-SNP attestation report. 152 Otherwise, guest owner attestation provides no assurance that the kernel wasn't
|
H A D | tdx-guest.rst | 32 The TDX_CMD_GET_REPORT0 IOCTL can be used by the attestation software to get
|
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-support/strongswan/ |
H A D | strongswan_6.0.0.bb | 28 ….contains('DISTRO_FEATURES', 'ima', 'tnc-imc imc-hcd imc-os imc-scanner imc-attestation', '', d)} \ 29 ….contains('DISTRO_FEATURES', 'ima', 'tnc-imv imv-hcd imv-os imv-scanner imv-attestation', '', d)} \ 71 PACKAGECONFIG[imc-attestation] = "--enable-imc-attestation,--disable-imc-attestation,," 80 PACKAGECONFIG[imv-attestation] = "--enable-imv-attestation,--disable-imv-attestation,,"
|
/openbmc/openbmc/meta-security/meta-tpm/recipes-tpm1/tpm-quote-tools/ |
H A D | tpm-quote-tools_1.0.4.bb | 2 for TPM based attestation using the TPM quote mechanism. \ 5 for TPM based attestation using the TPM quote mechanism. The manual \
|
/openbmc/docs/designs/ |
H A D | redfish-spdm-attestation.md | 16 It would be useful to add SPDM attestation support in BMCWeb, which provides 17 unified interface for device security attestation in data centers, and provide a 26 It is designed for secure attestation of devices. GitHub repo 30 adds support for doing SPDM-based device attestation over Redfish API. 34 This feature aims at supporting SPDM attestation through Redfish API and 44 attestation results over D-Bus. 50 There are three type of information we will need from an attestation daemon on 53 1. Basic information, like attestation protocol, enablement status, update 59 So far, phosphor-dbus-interfaces lacks interfaces defined for attestation 67 including the protocol to measure the integrity, last updated time, attestation [all …]
|
/openbmc/openbmc/meta-arm/meta-arm/recipes-security/optee/ |
H A D | optee-os-ts.inc | 34 DEPENDS:append = "${@bb.utils.contains('MACHINE_FEATURES', 'ts-attestation', \ 35 ' ts-sp-attestation', '' , d)}" 36 SP_PATHS:append = "${@bb.utils.contains('MACHINE_FEATURES', 'ts-attestation', \
|
/openbmc/qemu/qapi/ |
H A D | misc-target.json | 242 # The struct describes attestation report for a Secure Encrypted 245 # @data: guest attestation report (base64 encoded) 254 # @query-sev-attestation-report: 256 # This command is used to get the SEV attestation report, and is 272 { 'command': 'query-sev-attestation-report',
|
/openbmc/openbmc/meta-google/recipes-phosphor/network/ |
H A D | phosphor-network_%.bbappend | 2 # bypassing attestation.
|
/openbmc/linux/drivers/virt/coco/tdx-guest/ |
H A D | Kconfig | 6 the TDX module to request the TDX guest details like attestation
|
/openbmc/linux/Documentation/security/tpm/ |
H A D | tpm_event_log.rst | 20 The main application for this is remote attestation and the reason why 25 therefore, attestation is typically more useful when the PCR contents
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-security/trusted-services/corstone1000/ |
H A D | 0007-plat-corstone1000-Initialize-capsule-update-provider.patch | 55 #include <service/attestation/provider/attest_provider.h> 56 #include <service/attestation/provider/serializer/packed-c/packedc_attest_provider_serializer.h>
|
H A D | 0001-Add-stub-capsule-update-service-components.patch | 287 "components/service/attestation/key_mngr/local" 288 "components/service/attestation/reporter/psa_ipc"
|
/openbmc/linux/drivers/virt/coco/sev-guest/ |
H A D | Kconfig | 13 attestation report and more.
|
/openbmc/qemu/docs/system/i386/ |
H A D | amd-memory-encryption.rst | 35 images and provide a measurement than can be used as an attestation of a 65 for the attestation. 85 to the guest owner as an attestation that the memory and VMSAs were encrypted 87 confidential information until it can verify the attestation measurement. 89 attestation measurement can be verified by comparing it to what the guest owner 203 in the attestation report. See the SEV-SNP spec for further details.
|
H A D | nitro-enclave.rst | 11 for cryptographic attestation. The parent instance VM always has CID 3 while
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/libfido2/ |
H A D | libfido2_1.15.0.bb | 3 communicate with a FIDO device over USB, and to verify attestation and \
|
/openbmc/openbmc/meta-arm/meta-arm/recipes-security/packagegroups/ |
H A D | packagegroup-ts-tests.bb | 25 ${@bb.utils.contains('MACHINE_FEATURES', 'ts-attestation', 'ts-psa-iat-api-test', '' , d)} \
|
/openbmc/linux/Documentation/arch/x86/ |
H A D | tdx.rst | 218 server may want to use attestation to verify that the guest is the 230 At TDX guest runtime, the attestation process is used to attest to these 233 The attestation process consists of two steps: TDREPORT generation and 242 provided by attestation service so the TDREPORT can be verified uniquely. 246 After getting the TDREPORT, the second step of the attestation process
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/libspdm/ |
H A D | libspdm_3.6.0.bb | 3 Data Models (SPDM). This is used to enable authentication, attestation and key exchange to \
|
/openbmc/linux/Documentation/virt/ |
H A D | ne_overview.rst | 77 These crypto measurements are included in a signed attestation document 80 the attestation doc.
|
/openbmc/linux/tools/arch/x86/intel_sdsi/ |
H A D | intel_sdsi.c | 62 uint64_t attestation:1; member 276 …printf(" Attestation: %s\n", !!s->regs.en_features.attestation ? "Enabled" : "Di… in sdsi_read_reg()
|
/openbmc/qemu/docs/specs/ |
H A D | spdm.rst | 5 SPDM enables authentication, attestation and key exchange to assist in
|
/openbmc/docs/designs/oem/google/ |
H A D | root_of_trust.md | 31 - Be able to execute RoT actions (attestation etc) from the API.
|