f054f3a3 | 08-Mar-2023 |
Eddie James <eajames@linux.ibm.com> |
tpm: Support boot measurements
Add TPM2 functions to support boot measurement. This includes starting up the TPM, initializing/appending the event log, and measuring the U-Boot version. Much of the
tpm: Support boot measurements
Add TPM2 functions to support boot measurement. This includes starting up the TPM, initializing/appending the event log, and measuring the U-Boot version. Much of the code was used in the EFI subsystem, so remove it there and use the common functions.
Signed-off-by: Eddie James <eajames@linux.ibm.com> Link: https://lore.kernel.org/r/20230308212537.1725343-4-eajames@linux.ibm.com Signed-off-by: Joel Stanley <joel@jms.id.au>
show more ...
|
edd88824 | 18-Feb-2023 |
Ilias Apalodimas <ilias.apalodimas@linaro.org> |
tpm: add a function that performs selftest + startup
As described in [0] if a command requires use of an untested algorithm or functional module, the TPM performs the test and then completes the com
tpm: add a function that performs selftest + startup
As described in [0] if a command requires use of an untested algorithm or functional module, the TPM performs the test and then completes the command actions.
Since we don't check for TPM_RC_NEEDS_TEST (which is the return code of the TPM in that case) and even if we would, it would complicate our TPM code for no apparent reason, add a wrapper function that performs both the selftest and the startup sequence of the TPM.
It's worth noting that this is implemented on TPMv2.0. The code for 1.2 would look similar, but I don't have a device available to test.
[0] https://trustedcomputinggroup.org/wp-content/uploads/TPM-Rev-2.0-Part-1-Architecture-01.07-2014-03-13.pdf §12.3 Self-test modes
Signed-off-by: Ilias Apalodimas <ilias.apalodimas@linaro.org> Reviewed-by: Simon Glass <sjg@chromium.org> Link: https://lore.kernel.org/r/20230218152741.528191-1-ilias.apalodimas@linaro.org Signed-off-by: Joel Stanley <joel@jms.id.au>
show more ...
|
45e7dfa9 | 16-Feb-2021 |
Joel Stanley <joel@jms.id.au> |
hash: Allow for SHA512 hardware implementations
Similar to support for SHA1 and SHA256, allow the use of hardware hashing engine by enabling the algorithm and setting CONFIG_SHA_HW_ACCEL / CONFIG_S
hash: Allow for SHA512 hardware implementations
Similar to support for SHA1 and SHA256, allow the use of hardware hashing engine by enabling the algorithm and setting CONFIG_SHA_HW_ACCEL / CONFIG_SHA_PROG_HW_ACCEL.
(cherry picked from commit a479f103dc1c801d0c6fe90bbaf99ae1700a84dc) Signed-off-by: Joel Stanley <joel@jms.id.au>
show more ...
|
d0bd8761 | 19-Mar-2019 |
Heinrich Schuchardt <xypron.glpk@gmx.de> |
efi_selftest: fix test_hii_string_get_string()
The check testing the string result of get_string() returned the wrong result. The result was ignored.
Use efi_st_strcmp_16_8() for the string compari
efi_selftest: fix test_hii_string_get_string()
The check testing the string result of get_string() returned the wrong result. The result was ignored.
Use efi_st_strcmp_16_8() for the string comparison.
Signed-off-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
show more ...
|
1646e092 | 19-Mar-2019 |
Heinrich Schuchardt <xypron.glpk@gmx.de> |
efi_loader: superfluous conversion in efi_file_open()
printf("%ls", ..) expects u16 * as argument to print. There is not need for a conversion to wchar_t *.
Signed-off-by: Heinrich Schuchardt <xypr
efi_loader: superfluous conversion in efi_file_open()
printf("%ls", ..) expects u16 * as argument to print. There is not need for a conversion to wchar_t *.
Signed-off-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
show more ...
|
d5974af7 | 19-Mar-2019 |
Heinrich Schuchardt <xypron.glpk@gmx.de> |
efi_loader: remove superfluous check in efi_setup_loaded_image()
It does not make any sense to check if a pointer is NULL if we have dereferenced it before.
Reported-by: Coverity (CID 185827) Signe
efi_loader: remove superfluous check in efi_setup_loaded_image()
It does not make any sense to check if a pointer is NULL if we have dereferenced it before.
Reported-by: Coverity (CID 185827) Signed-off-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
show more ...
|
e7dae584 | 19-Mar-2019 |
Heinrich Schuchardt <xypron.glpk@gmx.de> |
efi_loader: missing return in efi_get_next_variable_name()
Add a missing return statement in efi_get_next_variable_name().
Reported-by: Coverity (CID 185834) Signed-off-by: Heinrich Schuchardt <xyp
efi_loader: missing return in efi_get_next_variable_name()
Add a missing return statement in efi_get_next_variable_name().
Reported-by: Coverity (CID 185834) Signed-off-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
show more ...
|
bd3b7478 | 19-Mar-2019 |
Heinrich Schuchardt <xypron.glpk@gmx.de> |
efi_loader: endless loop in add_strings_package()
Avoid an endless loop in add_strings_package().
Suggested-by: Takahiro Akashi <takahiro.akashi@linaro.org> Reported-by: Coverity (CID 185833) Signe
efi_loader: endless loop in add_strings_package()
Avoid an endless loop in add_strings_package().
Suggested-by: Takahiro Akashi <takahiro.akashi@linaro.org> Reported-by: Coverity (CID 185833) Signed-off-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
show more ...
|
e616100e | 11-Mar-2019 |
Heinrich Schuchardt <xypron.glpk@gmx.de> |
efi_loader: fix build error for freestanding.o
Since commit f51a226436a87 ("efi_loader: provide freestanding library") in parallel builds errors
lib/efi_selftest/../efi_loader/efi_freestanding.
efi_loader: fix build error for freestanding.o
Since commit f51a226436a87 ("efi_loader: provide freestanding library") in parallel builds errors
lib/efi_selftest/../efi_loader/efi_freestanding.o: file not recognized: File truncated
occur. Obviously make cannot correctly sequence parallel builds with a dependency like ../efi_loader/efi_freestanding.o.
Fixes: f51a226436a87 ("efi_loader: provide freestanding library") Signed-off-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
show more ...
|