Граф коммитов

7 Коммитов

Автор SHA1 Сообщение Дата
Ashvinkumar Parmar cf70eca74e Merged PR 3286: Run uncrustify on cerberus-core repo
Run uncrustify on cerberus-core repo

Uncrustify Configuration file run from cerberus-core root directory,
Uncructify format run cerberus-core except below directories,

external\
projects\
cmake\

Related work items: #3970
2024-05-16 05:19:56 +00:00
Christopher Weimer 8301db49ef Update manifest verification to support any type of signature.
The manifest verification flow needs to support keys other than RSA.  Decouple the manifest key management and verification handling from the specific type of signature used for the verification.  This allows RSA, ECC, or any other type of key to be used for manifest verification.

The generic signature_verification API has been enhanced with additional APIs and status codes to allow for proper abstraction of verification flows.  Also, generally decouple any users of these APIs from underlying crypto engine status codes to make it easy to scale to different implementations.
2022-09-28 18:48:32 +00:00
Akram Hamdy 727767553d Merged PR 2104: Re-attest after CFM activation during CFM updates
Currently any CFM activation request will result in resetting of all the attestation statuses of components, and restarting attestation to all components, even before new CFM is activated. If the CFM activation request is done as part of a CFM update, then re-attestation would have started before the new CFM was activated. With this change, the following happens:

1) If CFM activation is sent outside of a CFM update, to signal to Cerberus to restart attestation, then a notification is sent to attestation_requester when CFM activation fails
2) If CFM activation is sent as part of a CFM update, then a notification is sent to attestation_requester when CFM update is complete and new CFM is activated

Related work items: #1696
2022-07-11 20:26:59 +00:00
Akram Hamdy a636f817e3 Merged PR 1870: Enable component attestation
1) Enable component attestation in image using both SPDM and Cerberus Challenge Protocol
2) Rewrite attestation_master so that it is no longer an interface.
3) Add SPDM command interface
4) Rename attestation modules
5) Add SPDM requester code

Related work items: #305, #430, #516
2022-06-15 22:50:04 +00:00
Christopher Weimer 4ec162a5dc Support run-time update of PCD and revert to bypass mode.
Workflows that involved a PCD or clearing out PFMs to revert a device to bypass mode previously have required either a device reset (PCD) or an AC cycle (bypass mode).  This update modifies these workflows to allow them to be applied at run-time.

1. When updating or clearing a PCD, the device will automatically reset to apply the new configuration.  This is similar to how the device resets after a firmware update.
2. Support clearing out a PCD using an 'empty' manifest in the same way that a device can be put into bypass mode using an 'empty' PFM.
3. Modify host processor reset workflows to handle an 'empty' PFM.  In these cases, erase all PFMs for the port and configure the SPI filter for bypass mode.
4. Remove assumptions in host processor reset workflows about SPI filter configuration based on PFM state.  This is necessary to support token-based revert to bypass flows without an AC cycle.
5. Refactored the system reset handling to decouple it from the firmware update flow.
2021-03-26 18:37:22 +00:00
Atul Shah e43841a929 Merged PR 1240: Add PFM/CFM/PCD Id and platform ID measurement to TCG log
This PR adds new pcr measurements to the TCG log. A measurement of PFM, CFM and PCD IDs is added to the PCR store.
Also, measurements of PFM and PCD platform IDs is added to PCR store.

Related work items: #457, #481
2020-05-01 20:10:22 -07:00
Chris Weimer b27831ad06 Initial release of Cerberus source code. 2020-03-02 17:58:57 -08:00