Home
last modified time | relevance | path

Searched +full:- +full:- +full:disable +full:- +full:tpm (Results 1 – 25 of 125) sorted by relevance

12345

/openbmc/openbmc-test-automation/lib/secureboot/
H A Dsecureboot.robot12 [Documentation] Enable or disable TPM Policy.
16 # tpm_policy Enable-1 or Disable-0.
23 Set And Verify TPM Policy
24 [Documentation] Enable or disable and verify TPM Policy.
28 # tpm_policy Enable-1 or Disable-0.
/openbmc/openbmc/meta-security/meta-tpm/recipes-tpm2/ibmtpm2tss/
H A Dibmtpm2tss_2.2.0.bb1 SUMMARY = "IBM's Software TPM 2.0 TSS"
2 DESCRIPTION = "This is a user space TSS for TPM 2.0. It implements the \
6 It comes with over 110 'TPM tools' samples that can be used for scripted \
8 It also comes with a web based TPM interface, suitable for a demo to an \
10 basic TPM management."
12 LICENSE = "BSD-2-Clause"
13 SECTION = "securty/tpm"
21 file://0001-utils-12-Makefile.am-expand-wildcards-in-prereqs.patch \
27 EXTRA_OECONF = "--disable-tpm-1.2"
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-support/strongswan/
H A Dstrongswan_5.9.14.bb6 LICENSE = "GPL-2.0-only"
8 DEPENDS = "flex-native flex bison-native"
9 DEPENDS:append = "${@bb.utils.contains('DISTRO_FEATURES', 'tpm2', ' tpm2-tss', '', d)}"
11 SRC_URI = "https://download.strongswan.org/strongswan-${PV}.tar.bz2 \
16 UPSTREAM_CHECK_REGEX = "strongswan-(?P<pver>\d+(\.\d+)+)\.tar"
19 --without-lib-prefix \
20 --with-dev-headers=${includedir}/strongswan \
23 …s.contains('DISTRO_FEATURES', 'systemd', '--with-systemdsystemunitdir=${systemd_unitdir}/system/',…
26 ${@bb.utils.contains('DISTRO_FEATURES', 'systemd', 'systemd-charon', 'charon', d)} \
28 …${@bb.utils.contains('DISTRO_FEATURES', 'ima', 'tnc-imc imc-hcd imc-os imc-scanner imc-attestation…
[all …]
/openbmc/linux/drivers/pwm/
H A Dpwm-imx-tpm.c1 // SPDX-License-Identifier: GPL-2.0
3 * Copyright 2018-2019 NXP.
6 * - The TPM counter and period counter are shared between
9 * - Changes to polarity cannot be latched at the time of the
11 * - Changing period and duty cycle together isn't atomic,
49 * together as a 2-bit field here.
57 #define PWM_IMX_TPM_MOD_MOD GENMASK(PWM_IMX_TPM_MOD_WIDTH - 1, 0)
92 struct imx_tpm_pwm_chip *tpm = to_imx_tpm_pwm_chip(chip); in pwm_imx_tpm_round_state() local
96 rate = clk_get_rate(tpm->clk); in pwm_imx_tpm_round_state()
97 tmp = (u64)state->period * rate; in pwm_imx_tpm_round_state()
[all …]
/openbmc/linux/drivers/clocksource/
H A Dtimer-imx-tpm.c1 // SPDX-License-Identifier: GPL-2.0+
13 #include "timer-of.h"
42 /* channel disable */ in tpm_timer_disable()
107 return (now - prev) >= delta ? -ETIME : 0; in tpm_set_next_event()
130 evt->event_handler(evt); in tpm_timer_interrupt()
138 .name = "i.MX TPM Timer",
167 "imx-tpm", in tpm_clocksource_init()
179 GENMASK(counter_width - 1, in tpm_clockevent_init()
190 pr_err("tpm: failed to get ipg clk\n"); in tpm_timer_init()
191 return -ENODEV; in tpm_timer_init()
[all …]
/openbmc/openbmc/meta-security/meta-tpm/recipes-tpm2/tpm2-tss-engine/files/
H A D0001-Configure-Allow-disabling-of-digest-sign-operations.patch4 Subject: [PATCH 1/2] Configure: Allow disabling of digest-sign operations
6 Since the digest-sign operations perform the hash on the TPM and
12 Upstream-Status: Backport
13 Signed-off-by: Andreas Fuchs <andreas.fuchs@infineon.com>
14 Signed-off-by: Armin Kuster <akuster808@gmail.com>
16 ---
17 configure.ac | 10 ++++++++--
18 1 file changed, 8 insertions(+), 2 deletions(-)
20 diff --git a/configure.ac b/configure.ac
22 --- a/configure.ac
[all …]
/openbmc/openbmc/meta-security/meta-tpm/recipes-tpm2/tpm2-tss/
H A Dtpm2-tss_4.1.3.bb3 LICENSE = "BSD-2-Clause"
5 SECTION = "tpm"
7 DEPENDS = "autoconf-archive-native openssl"
9 SRC_URI = "https://github.com/tpm2-software/${BPN}/releases/download/${PV}/${BPN}-${PV}.tar.gz \
15 UPSTREAM_CHECK_URI = "https://github.com/tpm2-software/${BPN}/releases"
22 PACKAGECONFIG[oxygen] = ",--disable-doxygen-doc, "
23 PACKAGECONFIG[fapi] = "--enable-fapi,--disable-fapi,curl json-c util-linux-libuuid "
24 PACKAGECONFIG[policy] = "--enable-policy,--disable-policy,json-c util-linux-libuuid "
26 EXTRA_OECONF += "--enable-static --with-udevrulesdir=${nonarch_base_libdir}/udev/rules.d/"
27 EXTRA_OECONF += "--runstatedir=/run"
[all …]
/openbmc/u-boot/drivers/tpm/
H A Dtpm2_tis_core.c1 // SPDX-License-Identifier: GPL-2.0
5 * Based on the Linux TIS core interface and U-Boot original SPI TPM driver
10 #include <tpm-v2.h>
20 return -ENOSPC; in tpm_tis_get_desc()
24 dev->name, chip->vend_dev & 0xFFFF, in tpm_tis_get_desc()
25 chip->vend_dev >> 16, chip->rid, in tpm_tis_get_desc()
26 (chip->is_open ? "open" : "closed")); in tpm_tis_get_desc()
30 * tpm_tis_check_locality - Check the current TPM locality
32 * @dev: TPM device
40 struct tpm_tis_phy_ops *phy_ops = chip->phy_ops; in tpm_tis_check_locality()
[all …]
/openbmc/linux/drivers/char/tpm/
H A Dtpm_infineon.c1 // SPDX-License-Identifier: GPL-2.0-only
9 * Sirrix AG - security technologies <tpmdd@sirrix.com> and
10 * Applied Data Security Group, Ruhr-University Bochum, Germany
11 * Project-Homepage: http://www.trust.rub.de/projects/linux-device-driver-infineon-tpm/
16 #include "tpm.h"
19 /* maximum number of WTX-packages */
21 /* msleep-Time for WTX-packages */
23 /* msleep-Time --> Interval to check status register */
25 /* gives number of max. msleep()-calls before throwing timeout */
84 /* TPM header definitions */
[all …]
H A Dtpm_tis_i2c_cr50.c1 // SPDX-License-Identifier: GPL-2.0
5 * Based on Infineon TPM driver by Peter Huewe.
10 * - Use an interrupt for transaction status instead of hardcoded delays.
11 * - Must use write+wait+read read protocol.
12 * - All 4 bytes of status register must be read/written at once.
13 * - Burst count max is 63 bytes, and burst count behaves slightly differently
15 * - When reading from FIFO the full burstcnt must be read instead of just
32 #define TPM_CR50_TIMEOUT_NOIRQ_MS 20 /* Timeout for TPM ready without IRQ */
45 * struct tpm_i2c_cr50_priv_data - Driver private data.
60 * tpm_cr50_i2c_int_handler() - cr50 interrupt handler.
[all …]
H A Dtpm_tis_core.c1 // SPDX-License-Identifier: GPL-2.0-only
10 * Maintained by: <tpmdd-devel@lists.sourceforge.net>
12 * Device driver for TCG/TCPA TPM (trusted platform module).
15 * This device driver implements the TPM interface as defined in
16 * the TCG TPM Interface Spec version 1.2, revision 1.0.
28 #include "tpm.h"
38 u8 status = chip->ops->status(chip); in wait_for_tpm_stat_cond()
43 if (check_cancel && chip->ops->req_canceled(chip, status)) { in wait_for_tpm_stat_cond()
68 struct tpm_tis_data *priv = dev_get_drvdata(&chip->dev); in wait_for_tpm_stat()
77 status = chip->ops->status(chip); in wait_for_tpm_stat()
[all …]
/openbmc/u-boot/cmd/
H A Dtpm_test.c1 // SPDX-License-Identifier: GPL-2.0+
9 #include <tpm-v1.h>
10 #include "tpm-user-utils.h"
45 static uint32_t tpm_get_flags(struct udevice *dev, uint8_t *disable, in tpm_get_flags() argument
54 if (disable) in tpm_get_flags()
55 *disable = pflags.disable; in tpm_get_flags()
60 debug("TPM: Got flags disable=%d, deactivated=%d, nvlocked=%d\n", in tpm_get_flags()
61 pflags.disable, pflags.deactivated, pflags.nv_locked); in tpm_get_flags()
68 debug("TPM: Write lock 0x%x\n", index); in tpm_nv_write_value_lock()
127 uint8_t disable = 0, deactivated = 0; in test_enable() local
[all …]
H A Dtpm-v1.c1 // SPDX-License-Identifier: GPL-2.0+
11 #include <tpm-common.h>
12 #include <tpm-v1.h>
13 #include "tpm-user-utils.h"
281 puts("tpm response:\n"); in do_tpm_raw_transfer()
547 return -1; in TPM_COMMAND_NO_ARG()
557 /* fetch list of already loaded resources in the TPM */ in TPM_COMMAND_NO_ARG()
562 return -1; in TPM_COMMAND_NO_ARG()
573 return -1; in TPM_COMMAND_NO_ARG()
624 return -1; in do_tpm_list()
[all …]
/openbmc/u-boot/include/
H A Dtpm-v1.h1 /* SPDX-License-Identifier: GPL-2.0+ */
10 #include <tpm-common.h>
114 * TPM return codes as defined in the TCG Main specification
115 * (TPM Main Part 2 Structures; Specification version 1.2)
121 /* TPM-defined fatal error codes */
220 /* TPM-defined non-fatal errors */
229 u8 disable; member
288 * @param dev TPM device
289 * @param mode TPM startup mode
297 * @param dev TPM device
[all …]
H A Dtpm-v2.h1 /* SPDX-License-Identifier: GPL-2.0+ */
9 * https://trustedcomputinggroup.org/resource/tss-overview-common-structures-specification/
17 #include <tpm-common.h>
32 #define TPM2_MAX_TPM_PROPERTIES ((TPM2_MAX_CAP_BUFFER - sizeof(u32) /* TPM2_CAP */ - \
61 * rev 1.00, 2020-05-01
220 * struct TCG_EfiSpecIdEventAlgorithmSize - hashing algorithm information
236 * struct TCG_EfiSpecIDEventStruct - content of the event log header
489 * struct tcg2_event_log - Container for managing the platform event log
506 * @dev TPM device
528 * @dev TPM device
[all …]
/openbmc/u-boot/board/gdsys/a38x/
H A Dcontrolcenterdc.c1 // SPDX-License-Identifier: GPL-2.0+
10 #include <tpm-v1.h>
13 #include <asm-generic/gpio.h>
16 #include "../arch/arm/mach-mvebu/serdes/a38x/high_speed_env_spec.h"
39 printf("Could not find TPM (ret=%d)\n", rc); in get_tpm()
48 * be used by the DDR3 init code in the SPL U-Boot version to configure
97 if (!request_gpio_by_name(&gpio, "pca9698@22", 31, "fpga-program-gpio")) { in board_pex_config()
110 if (!request_gpio_by_name(&gpio, "pca9698@22", 19, "fpga-done-gpio")) { in board_pex_config()
120 /* disable FPGA reset */ in board_pex_config()
121 if (!request_gpio_by_name(&gpio, "gpio@18100", 6, "cpu-to-fpga-reset")) { in board_pex_config()
[all …]
/openbmc/openbmc/poky/meta/recipes-support/gnutls/
H A Dgnutls_3.8.8.bb7 LICENSE = "GPL-3.0-or-later & LGPL-2.1-or-later"
8 LICENSE:${PN} = "LGPL-2.1-or-later"
9 LICENSE:${PN}-xx = "LGPL-2.1-or-later"
10 LICENSE:${PN}-bin = "GPL-3.0-or-later"
11 LICENSE:${PN}-openssl = "GPL-3.0-or-later"
21 SRC_URI = "https://www.gnupg.org/ftp/gcrypt/gnutls/v${SHRT_VER}/gnutls-${PV}.tar.xz \
23 file://0001-Creating-.hmac-file-should-be-excuted-in-target-envi.patch \
24 file://run-ptest \
25 file://Add-ptest-support.patch \
30 inherit autotools texinfo pkgconfig gettext lib_package gtk-doc ptest
[all …]
/openbmc/qemu/docs/specs/
H A Dtpm.rst1 .. _tpm-device:
4 QEMU TPM Device
7 Guest-side hardware interface
11 -------------
13 The QEMU TPM emulation implements a TPM TIS hardware interface
15 Specific TPM Interface Specification (TIS)", Specification Version
20 0xfed40000-0xfed44fff available to the guest operating system.
22 QEMU files related to TPM TIS interface:
23 - ``hw/tpm/tpm_tis_common.c``
24 - ``hw/tpm/tpm_tis_isa.c``
[all …]
/openbmc/linux/arch/arm/boot/dts/marvell/
H A Darmada-385-clearfog-gtr.dtsi1 // SPDX-License-Identifier: (GPL-2.0 OR MIT)
5 * Rabeeh Khoury <rabeeh@solid-run.com>, based on Russell King clearfog work
9 SERDES mapping -
10 0. SATA1 on CON18, or optionally mini PCIe CON3 - PCIe0
12 2. SATA0 on CON17, or optionally mini PCIe CON4 - PCIe1
14 4. mini PCIe CON2 - PCIe2
17 USB 2.0 mapping -
18 0. USB 2.0 - 0 USB pins header CON12
19 1. USB 2.0 - 1 mini PCIe CON2
20 2. USB 2.0 - 2 to USB 3.0 connector (used with SERDES #3)
[all …]
/openbmc/linux/Documentation/arch/x86/
H A Dintel_txt.rst6 Technology (Intel(R) TXT), defines platform-level enhancements that
13 - Provides dynamic root of trust for measurement (DRTM)
14 - Data protection in case of improper shutdown
15 - Measurement and verification of launched environment
18 non-vPro systems. It is currently available on desktop systems
30 - LinuxTAG 2008:
31 http://www.linuxtag.org/2008/en/conf/events/vp-donnerstag.html
33 - TRUST2008:
34 http://www.trust-conference.eu/downloads/Keynote-Speakers/
35 3_David-Grawrock_The-Front-Door-of-Trusted-Computing.pdf
[all …]
/openbmc/linux/security/integrity/ima/
H A DKconfig1 # SPDX-License-Identifier: GPL-2.0-only
24 If your system has a TPM chip, then IMA also maintains
26 TPM hardware, so that the TPM can prove to a third party
39 TPM PCRs are only reset on a hard reboot. In order to validate
40 a TPM's quote after a soft boot, the IMA measurement list of the
51 IMA_MEASURE_PCR_IDX determines the TPM PCR register index
70 limited to 255 characters. The 'ima-ng' measurement list
76 bool "ima-ng (default)"
78 bool "ima-sig"
83 default "ima-ng" if IMA_NG_TEMPLATE
[all …]
/openbmc/openbmc/meta-security/meta-tpm/recipes-tpm2/tpm2-abrmd/
H A Dtpm2-abrmd_3.0.0.bb3 broker (TAB) & Resource Manager (RM) spec from the TCG. The daemon (tpm2-abrmd) \
5 in the code we use `tpm2-abrmd` and `tabrmd` interchangeably. \
7 SECTION = "security/tpm"
9 LICENSE = "BSD-2-Clause"
12 DEPENDS = "autoconf-archive dbus glib-2.0 tpm2-tss glib-2.0-native \
13 libtss2 libtss2-mu libtss2-tcti-device libtss2-tcti-mssim"
16 https://github.com/tpm2-software/${BPN}/releases/download/${PV}/${BPN}-${PV}.tar.gz \
17 file://tpm2-abrmd-init.sh \
18 file://tpm2-abrmd.default \
23 UPSTREAM_CHECK_URI = "https://github.com/tpm2-software/${BPN}/releases"
[all …]
/openbmc/webui-vue/src/views/Operations/ServerPowerOperations/
H A DBootSettings.vue2 <div class="form-background p-3">
3 <b-form novalidate @submit.prevent="handleSubmit">
4 <b-form-group
8 label-for="boot-option"
9 class="mb-3"
11 <b-form-select
12 id="boot-option"
13 v-model="form.bootOption"
18 </b-form-select>
19 </b-form-group>
[all …]
/openbmc/openbmc/meta-google/conf/distro/
H A Dgbmc.conf1 require conf/distro/openbmc-phosphor.conf
2 require conf/distro/include/phosphor-isolation.inc
3 require conf/distro/include/phosphor-no-webui.inc
8 DISTRO_VERSION = "gbmc-release-${GBMC_VERSION}"
22 # Required to get entity-manager to build with FruDevice service
23 DISTRO_FEATURES:append = " ipmi-fru"
25 # Disable u-boot shell for prod builds
26 DISTRO_FEATURES:append:prod = " disable-u-boot-shell"
30 SANITY_TESTED_DISTROS:append = " Debian-rodete \n debian-rodete \n "
32 VIRTUAL-RUNTIME_bmc-update ??= "inplace-gbmc-update"
[all …]
/openbmc/linux/arch/arm64/boot/dts/freescale/
H A Dimx8mm-phyboard-polis-rdk.dts1 // SPDX-License-Identifier: GPL-2.0
7 /dts-v1/;
9 #include <dt-bindings/interrupt-controller/irq.h>
10 #include <dt-bindings/leds/common.h>
11 #include <dt-bindings/phy/phy-imx8-pcie.h>
12 #include "imx8mm-phycore-som.dtsi"
15 model = "PHYTEC phyBOARD-Polis-i.MX8MM RDK";
16 compatible = "phytec,imx8mm-phyboard-polis-rdk",
17 "phytec,imx8mm-phycore-som", "fsl,imx8mm";
20 stdout-path = &uart3;
[all …]

12345