Home
last modified time | relevance | path

Searched hist:"7 ccefbca3b09679bb6803a4c4677d2e76ae895d3" (Results 1 – 2 of 2) sorted by relevance

/rk3399_ARM-atf/docs/
H A Dglobal_substitutions.txt7ccefbca3b09679bb6803a4c4677d2e76ae895d3 Mon Apr 03 12:50:59 UTC 2023 Manish V Badarkhe <Manish.Badarkhe@arm.com> docs(threat-model): add a notes related to the Measured Boot

TF-A currently does not have any TPM2 driver for extending
measurements into a discrete TPM chip. In TPM-based attestation
scheme, measurements are just stored into a TCG-compatible event
log buffer in secure memory.

In light of the fact that Event Log measurements are taken by BL1 and
BL2, we need to trust these components to store genuine measurements,
and the Generic Threat Model always mitigates against attacks on these
components, therefore, there is no explicit document for the Measured
Boot threat model at this time is needed.

Change-Id: I41b037b2f5956d327b53cd834345e5aefdcfb5ef
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
H A Dglossary.rst7ccefbca3b09679bb6803a4c4677d2e76ae895d3 Mon Apr 03 12:50:59 UTC 2023 Manish V Badarkhe <Manish.Badarkhe@arm.com> docs(threat-model): add a notes related to the Measured Boot

TF-A currently does not have any TPM2 driver for extending
measurements into a discrete TPM chip. In TPM-based attestation
scheme, measurements are just stored into a TCG-compatible event
log buffer in secure memory.

In light of the fact that Event Log measurements are taken by BL1 and
BL2, we need to trust these components to store genuine measurements,
and the Generic Threat Model always mitigates against attacks on these
components, therefore, there is no explicit document for the Measured
Boot threat model at this time is needed.

Change-Id: I41b037b2f5956d327b53cd834345e5aefdcfb5ef
Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>