1
# SOME DESCRIPTIVE TITLE.
2
# Copyright (C) YEAR THE PACKAGE'S COPYRIGHT HOLDER
3
# This file is distributed under the same license as the PACKAGE package.
4
# FIRST AUTHOR <EMAIL@ADDRESS>, YEAR.
9
"Project-Id-Version: PACKAGE VERSION\n"
10
"Report-Msgid-Bugs-To: \n"
11
"POT-Creation-Date: 2016-03-07 15:08+0800\n"
12
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
13
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
14
"Language-Team: LANGUAGE <LL@li.org>\n"
17
"Content-Type: text/plain; charset=CHARSET\n"
18
"Content-Transfer-Encoding: 8bit\n"
21
msgid "Plainbox Provider for TPM (trusted platform module)"
25
#: ../units/category.pxu:21
26
msgid "TPM (Trusted Platform Module)"
30
#: ../units/lenovo.pxu:23
31
msgid "Clear ownership of TPM chip (Lenovo)"
35
#: ../units/lenovo.pxu:24
37
"Some Lenovo laptops lock out physical presence attribute before BIOS hands "
38
"off control to the operating system. In order to perform subsequent tests "
39
"you will need to clear the TPM (Trusted Platform Module) chip on the DUT "
40
"(Device Under Test)."
44
#: ../units/lenovo.pxu:24
46
"CAUTION: Do not clear the TPM chip on production machine where it may\n"
47
" hold encryption keys to your valuable data! Doing so will render "
53
#: ../units/lenovo.pxu:24
54
msgid "Please only perform this step if:"
58
#: ../units/lenovo.pxu:24
60
" - You DO NOT know the owner password of the TPM chip\n"
61
" - You intend to execute this TPM test suite\n"
62
" - There is no valuable data that may be encrypted with the aid of the TPM "
67
#: ../units/lenovo.pxu:39
69
"To clear the TPM chip now, write down the following instructions and exit "
70
"the testing application."
74
#: ../units/lenovo.pxu:39 ../units/tpm.pxu:97
75
msgid "INSTRUCTIONS FOR CLEARING THE TPM CHIP:"
79
#: ../units/lenovo.pxu:39
81
" - Commence the test to power the machine off.\n"
82
" - Press and hold the F1 key on your keyboard.\n"
83
" - Power the machine on.\n"
84
" - Wait for the system to enter BIOS.\n"
85
" - Navigate to TPM menu, the precise location may depend on your BIOS "
87
" and the make and model of your DUT. On some models it is under the\n"
88
" following menu: Security / Clear Security Chip. This menu is *NOT* "
90
" under normal conditions.\n"
91
" - Ensure that the Clear Security Chip option is present and enabled.\n"
92
" - Save BIOS settings and restart the machine\n"
93
" - Let the machine boot\n"
94
" - Restart the testing application"
98
#: ../units/manifest.pxu:21
103
#: ../units/sysfs.pxu:23
104
msgid "Count the number of visible TPM chips in sysfs"
108
#: ../units/sysfs.pxu:24
110
"This job just counts the number of visible TPM chips in as reported by tpm-"
111
"sysfs-resource tool. The only resource attribute is 'count'"
115
#: ../units/sysfs.pxu:35
116
msgid "Collect TPM information from sysfs"
120
#: ../units/sysfs.pxu:36
122
"This job collects all the available TPM information from /sys/class/tpm/*/"
127
#: ../units/sysfs.pxu:53
128
msgid "Collect TPM information from sysfs (after taking ownership)"
132
#: ../units/sysfs.pxu:70
133
msgid "Collect TPM information from sysfs (after clearing ownership)"
137
#: ../units/sysfs.pxu:71
139
"This job collects all the available TPM information from /sys/class/tpm/*/"
140
"device/*. Distinct files present there are converted to attributes of "
145
#: ../units/sysfs.pxu:86
146
msgid "Collect DMI information from sysfs"
150
#: ../units/sysfs.pxu:87
152
"This job collects all the available DMI information from /sys/class/dmi/id/"
153
"*. The main purpose of including this job is to allow the provider to "
154
"include vendor-specific quirks by looking at the sysfs_dmi.bios_vendor "
159
#: ../units/test-plan.pxu:21
160
msgid "TPM (Trusted Platform Module) Smoke Tests"
164
#: ../units/test-plan.pxu:22
166
"This test plan contains simple tests for the TPM chip. The tests will ensure "
167
"that the TPM chip is present, is visible by the OS and that ownership over "
168
"the chip can be taken."
172
#: ../units/test-plan.pxu:22
173
msgid "After testing, a number of logs are collected for additional analysis."
177
#: ../units/test-plan.pxu:55
178
msgid "Collect TPM (Trusted Platform Module) Information"
182
#: ../units/test-plan.pxu:56
184
"This test plan contains a selection of jobs that collect various bits of "
185
"information about a TPM chip. They are designed to run with an owned TPM "
186
"chip that uses well-known (20 zero bytes) owner key."
190
#: ../units/test-plan.pxu:56
192
"This test plan is not interactive, apart from the manifest collection step."
196
#: ../units/tpm.pxu:22
197
msgid "Use BIOS to activate a disabled TPM chip"
201
#: ../units/tpm.pxu:55
202
msgid "Use BIOS to activate an inactive TPM chip"
206
#: ../units/tpm.pxu:56
207
msgid "This job will reconfigure the TPM chip to be in the Active state."
211
#: ../units/tpm.pxu:58
213
" - Commence the test to restart the machine\n"
214
" - Enter BIOS using machine-specific hot-key (typically F1, F2, or delete)\n"
215
" - Navigate to TPM menu, the precise location may depend on your BIOS "
217
" and the make and model of your DUT. On some models it is under the\n"
218
" following menu: Security / Security Chip.\n"
219
" - Change the current setting to Active\n"
220
" - Save BIOS settings\n"
221
" - Power the machine off (NOTE: a reboot may not be sufficient)\n"
222
" - Power the machine back on again\n"
223
" - Let the machine boot\n"
224
" - Restart the testing application"
228
#: ../units/tpm.pxu:88
229
msgid "Clear ownership of the TPM chip"
233
#: ../units/tpm.pxu:89
235
"This job tries to automatically clear the ownership of an owned TPM chip. It "
236
"uses well-known owner secret (20 bytes of zeros)."
240
#: ../units/tpm.pxu:89
242
"NOTE: The actual TPM chip will be cleared after the machine reboots. After "
243
"reboot the TPM will be in the default state: unowned, disabled and inactive. "
244
"Subsequent jobs will instruct test operator to enter BIOS and re-enable the "
249
#: ../units/tpm.pxu:97
251
" - Commence the test to reboot the machine\n"
252
" - Let the machine boot\n"
253
" - Restart the testing application"
257
#: ../units/tpm.pxu:113
258
msgid "Re-enable TPM chip in BIOS (after clearing ownership)"
262
#: ../units/tpm.pxu:114
264
"This job will re-enable the TPM chip in the BIOS after having cleared the "
269
#: ../units/tpm.pxu:116
271
"To enable the TPM chip in the BIOS, write down the following instructions "
272
"and exit the testing application."
276
#: ../units/tpm.pxu:116
277
msgid "INSTRUCTIONS FOR ENABLING THE TPM CHIP:"
281
#: ../units/tpm.pxu:116
283
" - Commence the test to restart the machine\n"
284
" - Enter BIOS using machine-specific hot-key (typically F1, F2, or delete)\n"
285
" - Navigate to TPM menu, the precise location may depend on your BIOS "
287
" and the make and model of your DUT. On some models it is under the\n"
288
" following menu: Security / Security Chip.\n"
289
" - Change the current setting to Active. If it is already in the active "
291
" then set it to Disabled and then back to Active. This might be a bug in "
293
" - Save BIOS settings\n"
294
" - Power the machine off (NOTE: a reboot may not be sufficient)\n"
295
" - Power the machine back on again\n"
296
" - Let the machine boot\n"
297
" - Restart the testing application"
301
#: ../units/tpm.pxu:144
302
msgid "Take ownership of the TPM chip"
306
#: ../units/tpm.pxu:145
308
"This job tries to automatically take the ownership of an unowned TPM chip. "
309
"It uses well-known owner and SRK secretes (20 bytes of zeros)."
313
#: ../units/tpm.pxu:159
314
msgid "Collect the output of tpm_version"
318
#: ../units/tpm.pxu:160
320
"This job collects the output of \"tpm_version\" for inspection by a "
321
"Certification engineer."
325
#: ../units/tpm.pxu:171
326
msgid "Collect the output of tpm_selftest"
330
#: ../units/tpm.pxu:172
332
"This job collects the output of \"tpm_selftest\" for inspection by the "
333
"Certification engineer."
337
#: ../units/tpm.pxu:183
338
msgid "Collect the output of tpm_setactive --status --well-known"
342
#: ../units/tpm.pxu:184
344
"This simply collects the output of \"tpm_setactive --status --well-known\" "
345
"for inspection by a Certification engineer."
349
#: ../units/tpm.pxu:195
350
msgid "Collect the output of tpm_nvinfo"
354
#: ../units/tpm.pxu:196
356
"This simply collects the output of \"tpm_nvinfo\" for inspection by a "
357
"Certification engineer."
361
#: ../units/tpm.pxu:206
362
msgid "Collect the output of tpm_restrictpubek --status --well-known"
366
#: ../units/tpm.pxu:207
368
"This simply collects the output of \"tpm_restrictpubek --status --well-known"
369
"\" for inspection by a Certification engineer."
373
#: ../units/tpm.pxu:217
374
msgid "Collect the output of tpm_restrictsrk --status --well-known"
378
#: ../units/tpm.pxu:218
380
"This simply collects the output of \"tpm_restrictsrk --status --well-known\" "
381
"for inspection by a Certification engineer."
385
#: ../units/tpm.pxu:228
386
msgid "Collect the output of tpm_setclearable--status --well-known"
390
#: ../units/tpm.pxu:229
392
"This simply collects the output of \"tpm_setclearable --status --well-known"
393
"\" for inspection by a Certification engineer."
397
#: ../units/tpm.pxu:239
398
msgid "Collect the output of tpm_setenable --status --well-known"
402
#: ../units/tpm.pxu:240
404
"This simply collects the output of \"tpm_setenable --status --well-known\" "
405
"for inspection by a Certification engineer."
409
#: ../units/tpm.pxu:250
410
msgid "Collect the output of tpm_setownable --status --well-known"
414
#: ../units/tpm.pxu:251
416
"This simply collects the output of \"tpm_setownable --status --well-known\" "
417
"for inspection by a Certification engineer."
421
#: ../units/tpm.pxu:261
422
msgid "Collect the output of tpm_setpresence --status --well-known"
426
#: ../units/tpm.pxu:262
428
"This simply collects the output of \"tpm_setpresence --status --well-known\" "
429
"for inspection by a Certification engineer."
433
#: ../units/tpm.pxu:272
434
msgid "Collect the output of tpm_getpubek --well-known"
438
#: ../units/tpm.pxu:273
440
"This simply collects the output of \"tpm_getpubek --well-known\" for "
441
"inspection by a Certification engineer."
445
#: ../units/unused.pxu:5
446
msgid "Detect presence of TPM chip"
450
#: ../units/unused.pxu:6
452
"BIOS configuration may be preventing the OS from detecting and interacting "
453
"with the TPM chip. TPM chips can be in one of three BIOS states: - Active "
454
"(functional) - Inactive (visible but not functional) - Disabled (not visible "
455
"and not functional)"
459
#: ../units/unused.pxu:6
461
"This resource job describes the BIOS setting of the TPM chip. The output is "
462
"always a resource with one record. The record contains only one key:"
466
#: ../units/unused.pxu:6
467
msgid "setting: Active|Inactive|Disabled"