Home
last modified time | relevance | path

Searched refs:attestation (Results 1 – 25 of 34) sorted by relevance

12

/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/trusted-firmware-a/
H A Dtrusted-firmware-a-fvp-base.inc29 # Configure measured boot if the attestation SP is deployed.
39 EXTRA_OEMAKE += "${@bb.utils.contains('MACHINE_FEATURES', 'ts-attestation',\
53 TFA_DEBUG := "${@bb.utils.contains('MACHINE_FEATURES', 'ts-attestation', '0',\
56 TFA_MBEDTLS := "${@bb.utils.contains('MACHINE_FEATURES', 'ts-attestation',\
/openbmc/openbmc/meta-arm/meta-arm/recipes-security/trusted-services/
H A Dts-sp-attestation_git.bb1 DESCRIPTION = "Trusted Services attestation service provider"
8 OECMAKE_SOURCEPATH="${S}/deployments/attestation/config/${TS_SP_IAT_CONFIG}-${TS_ENV}"
/openbmc/linux/Documentation/virt/coco/
H A Dsev-guest.rst78 The SNP_GET_REPORT ioctl can be used to query the attestation report from the
80 provided by the SEV-SNP firmware to query the attestation report.
118 firmware to get the attestation report.
120 On success, the snp_ext_report_resp.data will contain the attestation report
136 binaries will be measured as part of the SEV-SNP attestation report.
143 SEV-SNP attestation report.
152 Otherwise, guest owner attestation provides no assurance that the kernel wasn't
H A Dtdx-guest.rst32 The TDX_CMD_GET_REPORT0 IOCTL can be used by the attestation software to get
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-support/strongswan/
H A Dstrongswan_6.0.0.bb28 ….contains('DISTRO_FEATURES', 'ima', 'tnc-imc imc-hcd imc-os imc-scanner imc-attestation', '', d)} \
29 ….contains('DISTRO_FEATURES', 'ima', 'tnc-imv imv-hcd imv-os imv-scanner imv-attestation', '', d)} \
71 PACKAGECONFIG[imc-attestation] = "--enable-imc-attestation,--disable-imc-attestation,,"
80 PACKAGECONFIG[imv-attestation] = "--enable-imv-attestation,--disable-imv-attestation,,"
/openbmc/openbmc/meta-security/meta-tpm/recipes-tpm1/tpm-quote-tools/
H A Dtpm-quote-tools_1.0.4.bb2 for TPM based attestation using the TPM quote mechanism. \
5 for TPM based attestation using the TPM quote mechanism. The manual \
/openbmc/docs/designs/
H A Dredfish-spdm-attestation.md16 It would be useful to add SPDM attestation support in BMCWeb, which provides
17 unified interface for device security attestation in data centers, and provide a
26 It is designed for secure attestation of devices. GitHub repo
30 adds support for doing SPDM-based device attestation over Redfish API.
34 This feature aims at supporting SPDM attestation through Redfish API and
44 attestation results over D-Bus.
50 There are three type of information we will need from an attestation daemon on
53 1. Basic information, like attestation protocol, enablement status, update
59 So far, phosphor-dbus-interfaces lacks interfaces defined for attestation
67 including the protocol to measure the integrity, last updated time, attestation
[all …]
/openbmc/openbmc/meta-arm/meta-arm/recipes-security/optee/
H A Doptee-os-ts.inc34 DEPENDS:append = "${@bb.utils.contains('MACHINE_FEATURES', 'ts-attestation', \
35 ' ts-sp-attestation', '' , d)}"
36 SP_PATHS:append = "${@bb.utils.contains('MACHINE_FEATURES', 'ts-attestation', \
/openbmc/qemu/qapi/
H A Dmisc-target.json242 # The struct describes attestation report for a Secure Encrypted
245 # @data: guest attestation report (base64 encoded)
254 # @query-sev-attestation-report:
256 # This command is used to get the SEV attestation report, and is
272 { 'command': 'query-sev-attestation-report',
/openbmc/openbmc/meta-google/recipes-phosphor/network/
H A Dphosphor-network_%.bbappend2 # bypassing attestation.
/openbmc/linux/drivers/virt/coco/tdx-guest/
H A DKconfig6 the TDX module to request the TDX guest details like attestation
/openbmc/linux/Documentation/security/tpm/
H A Dtpm_event_log.rst20 The main application for this is remote attestation and the reason why
25 therefore, attestation is typically more useful when the PCR contents
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-security/trusted-services/corstone1000/
H A D0007-plat-corstone1000-Initialize-capsule-update-provider.patch55 #include <service/attestation/provider/attest_provider.h>
56 #include <service/attestation/provider/serializer/packed-c/packedc_attest_provider_serializer.h>
H A D0001-Add-stub-capsule-update-service-components.patch287 "components/service/attestation/key_mngr/local"
288 "components/service/attestation/reporter/psa_ipc"
/openbmc/linux/drivers/virt/coco/sev-guest/
H A DKconfig13 attestation report and more.
/openbmc/qemu/docs/system/i386/
H A Damd-memory-encryption.rst35 images and provide a measurement than can be used as an attestation of a
65 for the attestation.
85 to the guest owner as an attestation that the memory and VMSAs were encrypted
87 confidential information until it can verify the attestation measurement.
89 attestation measurement can be verified by comparing it to what the guest owner
203 in the attestation report. See the SEV-SNP spec for further details.
H A Dnitro-enclave.rst11 for cryptographic attestation. The parent instance VM always has CID 3 while
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/libfido2/
H A Dlibfido2_1.15.0.bb3 communicate with a FIDO device over USB, and to verify attestation and \
/openbmc/openbmc/meta-arm/meta-arm/recipes-security/packagegroups/
H A Dpackagegroup-ts-tests.bb25 ${@bb.utils.contains('MACHINE_FEATURES', 'ts-attestation', 'ts-psa-iat-api-test', '' , d)} \
/openbmc/linux/Documentation/arch/x86/
H A Dtdx.rst218 server may want to use attestation to verify that the guest is the
230 At TDX guest runtime, the attestation process is used to attest to these
233 The attestation process consists of two steps: TDREPORT generation and
242 provided by attestation service so the TDREPORT can be verified uniquely.
246 After getting the TDREPORT, the second step of the attestation process
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/libspdm/
H A Dlibspdm_3.6.0.bb3 Data Models (SPDM). This is used to enable authentication, attestation and key exchange to \
/openbmc/linux/Documentation/virt/
H A Dne_overview.rst77 These crypto measurements are included in a signed attestation document
80 the attestation doc.
/openbmc/linux/tools/arch/x86/intel_sdsi/
H A Dintel_sdsi.c62 uint64_t attestation:1; member
276 …printf(" Attestation: %s\n", !!s->regs.en_features.attestation ? "Enabled" : "Di… in sdsi_read_reg()
/openbmc/qemu/docs/specs/
H A Dspdm.rst5 SPDM enables authentication, attestation and key exchange to assist in
/openbmc/docs/designs/oem/google/
H A Droot_of_trust.md31 - Be able to execute RoT actions (attestation etc) from the API.

12