Performs a verified launch using Intel(R) TXT

Edit Package tboot
http://sourceforge.net/projects/tboot/

Trusted Boot (tboot) is an open source, pre-kernel/VMM module that uses
Intel(R) Trusted Execution Technology (Intel(R) TXT) to perform a measured
and verified launch of an OS kernel/VMM.

Refresh
Refresh
Source Files
Filename Size Changed
tboot-1.11.1.tar.gz 0000909429 888 KB
tboot-distributor.patch 0000000962 962 Bytes
tboot-grub2-fix-menu-in-xen-host-server.patch 0000004053 3.96 KB
tboot-grub2-fix-xen-submenu-name.patch 0000000826 826 Bytes
tboot-grub2-refuse-secure-boot.patch 0000002124 2.07 KB
tboot.changes 0000028010 27.4 KB
tboot.spec 0000003254 3.18 KB
Latest Revision
Dominique Leuenberger's avatar Dominique Leuenberger (dimstar_suse) accepted request 1063392 from Matthias Gerstner's avatar Matthias Gerstner (mgerstner) (revision 47)
- required update due to openSSL 3.0 deprecation errors in current version
- updated to v1.11.1 / 20230125:
      20230125: v1.11.1
      - Revert log memory range extension (caused memory overlaps and boot failures)
      20221223: v1.11.0
      - Fixed TPM handling to flush objects after integrity measurement (Intel PTT limitations)
      - Exteded low memory range for logs (HCC CPUs had issue with not enough memory)
      - "agile" removed from PCR Extend policy options (requested deprecation)
      - Added handling for flexible ACM Info Table format
      - lcptools: CPPFLAGS use by environment in build
      - lcptools: removed __DATE__ refs to make build reproducible
      - Only platform-matchin SINIT modules can be selected
      - txt-acminfo: Map TXT heap using mmap
      - Typo fix in man page
      20220304: v1.10.5
      - Fixed mlehash.c to bring back functionality and make it GCC12 compliant
      - Reverted change for replacing EFI memory to bring back Tboot in-memory logs
      20220224: v1.10.4
      - Fix hash printing for SHA384, SHA512 and SM3
      - Touch ups for GCC12
      - Set GDT to map CS and DS to 4GB before jumping to Linux
      - make efi_memmap_reserve handle gaps like e820_protect_region
      - Ensure that growth of Multiboot tags does not go beyond original area
      - Replace EFI memory map in Multiboot2 info
      - Fix endianness of pcr_info->pcr_selection.size_of_select
      -  Don't ignore locality in PCR file
      - Fix composite hashing algorithm for PCONF elements to match lcptools-1
      20211210: v1.10.3
      - Add UNI-VGA license information
      - Remove poly1305 object files on clean
Comments 0
openSUSE Build Service is sponsored by