/openbmc/openbmc-test-automation/lib/secureboot/ |
H A D | secureboot.robot | 12 [Documentation] Enable or disable TPM Policy. 16 # tpm_policy Enable-1 or Disable-0. 23 Set And Verify TPM Policy 24 [Documentation] Enable or disable and verify TPM Policy. 28 # tpm_policy Enable-1 or Disable-0.
|
/openbmc/openbmc/meta-security/meta-tpm/recipes-tpm2/ibmtpm2tss/ |
H A D | ibmtpm2tss_2.2.0.bb | 1 SUMMARY = "IBM's Software TPM 2.0 TSS" 2 DESCRIPTION = "This is a user space TSS for TPM 2.0. It implements the \ 6 It comes with over 110 'TPM tools' samples that can be used for scripted \ 8 It also comes with a web based TPM interface, suitable for a demo to an \ 10 basic TPM management." 12 LICENSE = "BSD-2-Clause" 13 SECTION = "securty/tpm" 21 file://0001-utils-12-Makefile.am-expand-wildcards-in-prereqs.patch \ 27 EXTRA_OECONF = "--disable-tpm-1.2"
|
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-support/strongswan/ |
H A D | strongswan_5.9.14.bb | 6 LICENSE = "GPL-2.0-only" 8 DEPENDS = "flex-native flex bison-native" 9 DEPENDS:append = "${@bb.utils.contains('DISTRO_FEATURES', 'tpm2', ' tpm2-tss', '', d)}" 11 SRC_URI = "https://download.strongswan.org/strongswan-${PV}.tar.bz2 \ 16 UPSTREAM_CHECK_REGEX = "strongswan-(?P<pver>\d+(\.\d+)+)\.tar" 19 --without-lib-prefix \ 20 --with-dev-headers=${includedir}/strongswan \ 23 …s.contains('DISTRO_FEATURES', 'systemd', '--with-systemdsystemunitdir=${systemd_unitdir}/system/',… 26 ${@bb.utils.contains('DISTRO_FEATURES', 'systemd', 'systemd-charon', 'charon', d)} \ 28 …${@bb.utils.contains('DISTRO_FEATURES', 'ima', 'tnc-imc imc-hcd imc-os imc-scanner imc-attestation… [all …]
|
/openbmc/linux/drivers/pwm/ |
H A D | pwm-imx-tpm.c | 1 // SPDX-License-Identifier: GPL-2.0 3 * Copyright 2018-2019 NXP. 6 * - The TPM counter and period counter are shared between 9 * - Changes to polarity cannot be latched at the time of the 11 * - Changing period and duty cycle together isn't atomic, 49 * together as a 2-bit field here. 57 #define PWM_IMX_TPM_MOD_MOD GENMASK(PWM_IMX_TPM_MOD_WIDTH - 1, 0) 92 struct imx_tpm_pwm_chip *tpm = to_imx_tpm_pwm_chip(chip); in pwm_imx_tpm_round_state() local 96 rate = clk_get_rate(tpm->clk); in pwm_imx_tpm_round_state() 97 tmp = (u64)state->period * rate; in pwm_imx_tpm_round_state() [all …]
|
/openbmc/linux/drivers/clocksource/ |
H A D | timer-imx-tpm.c | 1 // SPDX-License-Identifier: GPL-2.0+ 13 #include "timer-of.h" 42 /* channel disable */ in tpm_timer_disable() 107 return (now - prev) >= delta ? -ETIME : 0; in tpm_set_next_event() 130 evt->event_handler(evt); in tpm_timer_interrupt() 138 .name = "i.MX TPM Timer", 167 "imx-tpm", in tpm_clocksource_init() 179 GENMASK(counter_width - 1, in tpm_clockevent_init() 190 pr_err("tpm: failed to get ipg clk\n"); in tpm_timer_init() 191 return -ENODEV; in tpm_timer_init() [all …]
|
/openbmc/openbmc/meta-security/meta-tpm/recipes-tpm2/tpm2-tss-engine/files/ |
H A D | 0001-Configure-Allow-disabling-of-digest-sign-operations.patch | 4 Subject: [PATCH 1/2] Configure: Allow disabling of digest-sign operations 6 Since the digest-sign operations perform the hash on the TPM and 12 Upstream-Status: Backport 13 Signed-off-by: Andreas Fuchs <andreas.fuchs@infineon.com> 14 Signed-off-by: Armin Kuster <akuster808@gmail.com> 16 --- 17 configure.ac | 10 ++++++++-- 18 1 file changed, 8 insertions(+), 2 deletions(-) 20 diff --git a/configure.ac b/configure.ac 22 --- a/configure.ac [all …]
|
/openbmc/openbmc/meta-security/meta-tpm/recipes-tpm2/tpm2-tss/ |
H A D | tpm2-tss_4.1.3.bb | 3 LICENSE = "BSD-2-Clause" 5 SECTION = "tpm" 7 DEPENDS = "autoconf-archive-native openssl" 9 SRC_URI = "https://github.com/tpm2-software/${BPN}/releases/download/${PV}/${BPN}-${PV}.tar.gz \ 15 UPSTREAM_CHECK_URI = "https://github.com/tpm2-software/${BPN}/releases" 22 PACKAGECONFIG[oxygen] = ",--disable-doxygen-doc, " 23 PACKAGECONFIG[fapi] = "--enable-fapi,--disable-fapi,curl json-c util-linux-libuuid " 24 PACKAGECONFIG[policy] = "--enable-policy,--disable-policy,json-c util-linux-libuuid " 26 EXTRA_OECONF += "--enable-static --with-udevrulesdir=${nonarch_base_libdir}/udev/rules.d/" 27 EXTRA_OECONF += "--runstatedir=/run" [all …]
|
/openbmc/u-boot/drivers/tpm/ |
H A D | tpm2_tis_core.c | 1 // SPDX-License-Identifier: GPL-2.0 5 * Based on the Linux TIS core interface and U-Boot original SPI TPM driver 10 #include <tpm-v2.h> 20 return -ENOSPC; in tpm_tis_get_desc() 24 dev->name, chip->vend_dev & 0xFFFF, in tpm_tis_get_desc() 25 chip->vend_dev >> 16, chip->rid, in tpm_tis_get_desc() 26 (chip->is_open ? "open" : "closed")); in tpm_tis_get_desc() 30 * tpm_tis_check_locality - Check the current TPM locality 32 * @dev: TPM device 40 struct tpm_tis_phy_ops *phy_ops = chip->phy_ops; in tpm_tis_check_locality() [all …]
|
/openbmc/linux/drivers/char/tpm/ |
H A D | tpm_infineon.c | 1 // SPDX-License-Identifier: GPL-2.0-only 9 * Sirrix AG - security technologies <tpmdd@sirrix.com> and 10 * Applied Data Security Group, Ruhr-University Bochum, Germany 11 * Project-Homepage: http://www.trust.rub.de/projects/linux-device-driver-infineon-tpm/ 16 #include "tpm.h" 19 /* maximum number of WTX-packages */ 21 /* msleep-Time for WTX-packages */ 23 /* msleep-Time --> Interval to check status register */ 25 /* gives number of max. msleep()-calls before throwing timeout */ 84 /* TPM header definitions */ [all …]
|
H A D | tpm_tis_i2c_cr50.c | 1 // SPDX-License-Identifier: GPL-2.0 5 * Based on Infineon TPM driver by Peter Huewe. 10 * - Use an interrupt for transaction status instead of hardcoded delays. 11 * - Must use write+wait+read read protocol. 12 * - All 4 bytes of status register must be read/written at once. 13 * - Burst count max is 63 bytes, and burst count behaves slightly differently 15 * - When reading from FIFO the full burstcnt must be read instead of just 32 #define TPM_CR50_TIMEOUT_NOIRQ_MS 20 /* Timeout for TPM ready without IRQ */ 45 * struct tpm_i2c_cr50_priv_data - Driver private data. 60 * tpm_cr50_i2c_int_handler() - cr50 interrupt handler. [all …]
|
H A D | tpm_tis_core.c | 1 // SPDX-License-Identifier: GPL-2.0-only 10 * Maintained by: <tpmdd-devel@lists.sourceforge.net> 12 * Device driver for TCG/TCPA TPM (trusted platform module). 15 * This device driver implements the TPM interface as defined in 16 * the TCG TPM Interface Spec version 1.2, revision 1.0. 28 #include "tpm.h" 38 u8 status = chip->ops->status(chip); in wait_for_tpm_stat_cond() 43 if (check_cancel && chip->ops->req_canceled(chip, status)) { in wait_for_tpm_stat_cond() 68 struct tpm_tis_data *priv = dev_get_drvdata(&chip->dev); in wait_for_tpm_stat() 77 status = chip->ops->status(chip); in wait_for_tpm_stat() [all …]
|
/openbmc/u-boot/cmd/ |
H A D | tpm_test.c | 1 // SPDX-License-Identifier: GPL-2.0+ 9 #include <tpm-v1.h> 10 #include "tpm-user-utils.h" 45 static uint32_t tpm_get_flags(struct udevice *dev, uint8_t *disable, in tpm_get_flags() argument 54 if (disable) in tpm_get_flags() 55 *disable = pflags.disable; in tpm_get_flags() 60 debug("TPM: Got flags disable=%d, deactivated=%d, nvlocked=%d\n", in tpm_get_flags() 61 pflags.disable, pflags.deactivated, pflags.nv_locked); in tpm_get_flags() 68 debug("TPM: Write lock 0x%x\n", index); in tpm_nv_write_value_lock() 127 uint8_t disable = 0, deactivated = 0; in test_enable() local [all …]
|
H A D | tpm-v1.c | 1 // SPDX-License-Identifier: GPL-2.0+ 11 #include <tpm-common.h> 12 #include <tpm-v1.h> 13 #include "tpm-user-utils.h" 281 puts("tpm response:\n"); in do_tpm_raw_transfer() 547 return -1; in TPM_COMMAND_NO_ARG() 557 /* fetch list of already loaded resources in the TPM */ in TPM_COMMAND_NO_ARG() 562 return -1; in TPM_COMMAND_NO_ARG() 573 return -1; in TPM_COMMAND_NO_ARG() 624 return -1; in do_tpm_list() [all …]
|
/openbmc/u-boot/include/ |
H A D | tpm-v1.h | 1 /* SPDX-License-Identifier: GPL-2.0+ */ 10 #include <tpm-common.h> 114 * TPM return codes as defined in the TCG Main specification 115 * (TPM Main Part 2 Structures; Specification version 1.2) 121 /* TPM-defined fatal error codes */ 220 /* TPM-defined non-fatal errors */ 229 u8 disable; member 288 * @param dev TPM device 289 * @param mode TPM startup mode 297 * @param dev TPM device [all …]
|
H A D | tpm-v2.h | 1 /* SPDX-License-Identifier: GPL-2.0+ */ 9 * https://trustedcomputinggroup.org/resource/tss-overview-common-structures-specification/ 17 #include <tpm-common.h> 32 #define TPM2_MAX_TPM_PROPERTIES ((TPM2_MAX_CAP_BUFFER - sizeof(u32) /* TPM2_CAP */ - \ 61 * rev 1.00, 2020-05-01 220 * struct TCG_EfiSpecIdEventAlgorithmSize - hashing algorithm information 236 * struct TCG_EfiSpecIDEventStruct - content of the event log header 489 * struct tcg2_event_log - Container for managing the platform event log 506 * @dev TPM device 528 * @dev TPM device [all …]
|
/openbmc/u-boot/board/gdsys/a38x/ |
H A D | controlcenterdc.c | 1 // SPDX-License-Identifier: GPL-2.0+ 10 #include <tpm-v1.h> 13 #include <asm-generic/gpio.h> 16 #include "../arch/arm/mach-mvebu/serdes/a38x/high_speed_env_spec.h" 39 printf("Could not find TPM (ret=%d)\n", rc); in get_tpm() 48 * be used by the DDR3 init code in the SPL U-Boot version to configure 97 if (!request_gpio_by_name(&gpio, "pca9698@22", 31, "fpga-program-gpio")) { in board_pex_config() 110 if (!request_gpio_by_name(&gpio, "pca9698@22", 19, "fpga-done-gpio")) { in board_pex_config() 120 /* disable FPGA reset */ in board_pex_config() 121 if (!request_gpio_by_name(&gpio, "gpio@18100", 6, "cpu-to-fpga-reset")) { in board_pex_config() [all …]
|
/openbmc/openbmc/poky/meta/recipes-support/gnutls/ |
H A D | gnutls_3.8.8.bb | 7 LICENSE = "GPL-3.0-or-later & LGPL-2.1-or-later" 8 LICENSE:${PN} = "LGPL-2.1-or-later" 9 LICENSE:${PN}-xx = "LGPL-2.1-or-later" 10 LICENSE:${PN}-bin = "GPL-3.0-or-later" 11 LICENSE:${PN}-openssl = "GPL-3.0-or-later" 21 SRC_URI = "https://www.gnupg.org/ftp/gcrypt/gnutls/v${SHRT_VER}/gnutls-${PV}.tar.xz \ 23 file://0001-Creating-.hmac-file-should-be-excuted-in-target-envi.patch \ 24 file://run-ptest \ 25 file://Add-ptest-support.patch \ 30 inherit autotools texinfo pkgconfig gettext lib_package gtk-doc ptest [all …]
|
/openbmc/qemu/docs/specs/ |
H A D | tpm.rst | 1 .. _tpm-device: 4 QEMU TPM Device 7 Guest-side hardware interface 11 ------------- 13 The QEMU TPM emulation implements a TPM TIS hardware interface 15 Specific TPM Interface Specification (TIS)", Specification Version 20 0xfed40000-0xfed44fff available to the guest operating system. 22 QEMU files related to TPM TIS interface: 23 - ``hw/tpm/tpm_tis_common.c`` 24 - ``hw/tpm/tpm_tis_isa.c`` [all …]
|
/openbmc/linux/arch/arm/boot/dts/marvell/ |
H A D | armada-385-clearfog-gtr.dtsi | 1 // SPDX-License-Identifier: (GPL-2.0 OR MIT) 5 * Rabeeh Khoury <rabeeh@solid-run.com>, based on Russell King clearfog work 9 SERDES mapping - 10 0. SATA1 on CON18, or optionally mini PCIe CON3 - PCIe0 12 2. SATA0 on CON17, or optionally mini PCIe CON4 - PCIe1 14 4. mini PCIe CON2 - PCIe2 17 USB 2.0 mapping - 18 0. USB 2.0 - 0 USB pins header CON12 19 1. USB 2.0 - 1 mini PCIe CON2 20 2. USB 2.0 - 2 to USB 3.0 connector (used with SERDES #3) [all …]
|
/openbmc/linux/Documentation/arch/x86/ |
H A D | intel_txt.rst | 6 Technology (Intel(R) TXT), defines platform-level enhancements that 13 - Provides dynamic root of trust for measurement (DRTM) 14 - Data protection in case of improper shutdown 15 - Measurement and verification of launched environment 18 non-vPro systems. It is currently available on desktop systems 30 - LinuxTAG 2008: 31 http://www.linuxtag.org/2008/en/conf/events/vp-donnerstag.html 33 - TRUST2008: 34 http://www.trust-conference.eu/downloads/Keynote-Speakers/ 35 3_David-Grawrock_The-Front-Door-of-Trusted-Computing.pdf [all …]
|
/openbmc/linux/security/integrity/ima/ |
H A D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 24 If your system has a TPM chip, then IMA also maintains 26 TPM hardware, so that the TPM can prove to a third party 39 TPM PCRs are only reset on a hard reboot. In order to validate 40 a TPM's quote after a soft boot, the IMA measurement list of the 51 IMA_MEASURE_PCR_IDX determines the TPM PCR register index 70 limited to 255 characters. The 'ima-ng' measurement list 76 bool "ima-ng (default)" 78 bool "ima-sig" 83 default "ima-ng" if IMA_NG_TEMPLATE [all …]
|
/openbmc/openbmc/meta-security/meta-tpm/recipes-tpm2/tpm2-abrmd/ |
H A D | tpm2-abrmd_3.0.0.bb | 3 broker (TAB) & Resource Manager (RM) spec from the TCG. The daemon (tpm2-abrmd) \ 5 in the code we use `tpm2-abrmd` and `tabrmd` interchangeably. \ 7 SECTION = "security/tpm" 9 LICENSE = "BSD-2-Clause" 12 DEPENDS = "autoconf-archive dbus glib-2.0 tpm2-tss glib-2.0-native \ 13 libtss2 libtss2-mu libtss2-tcti-device libtss2-tcti-mssim" 16 https://github.com/tpm2-software/${BPN}/releases/download/${PV}/${BPN}-${PV}.tar.gz \ 17 file://tpm2-abrmd-init.sh \ 18 file://tpm2-abrmd.default \ 23 UPSTREAM_CHECK_URI = "https://github.com/tpm2-software/${BPN}/releases" [all …]
|
/openbmc/webui-vue/src/views/Operations/ServerPowerOperations/ |
H A D | BootSettings.vue | 2 <div class="form-background p-3"> 3 <b-form novalidate @submit.prevent="handleSubmit"> 4 <b-form-group 8 label-for="boot-option" 9 class="mb-3" 11 <b-form-select 12 id="boot-option" 13 v-model="form.bootOption" 18 </b-form-select> 19 </b-form-group> [all …]
|
/openbmc/openbmc/meta-google/conf/distro/ |
H A D | gbmc.conf | 1 require conf/distro/openbmc-phosphor.conf 2 require conf/distro/include/phosphor-isolation.inc 3 require conf/distro/include/phosphor-no-webui.inc 8 DISTRO_VERSION = "gbmc-release-${GBMC_VERSION}" 22 # Required to get entity-manager to build with FruDevice service 23 DISTRO_FEATURES:append = " ipmi-fru" 25 # Disable u-boot shell for prod builds 26 DISTRO_FEATURES:append:prod = " disable-u-boot-shell" 30 SANITY_TESTED_DISTROS:append = " Debian-rodete \n debian-rodete \n " 32 VIRTUAL-RUNTIME_bmc-update ??= "inplace-gbmc-update" [all …]
|
/openbmc/linux/arch/arm64/boot/dts/freescale/ |
H A D | imx8mm-phyboard-polis-rdk.dts | 1 // SPDX-License-Identifier: GPL-2.0 7 /dts-v1/; 9 #include <dt-bindings/interrupt-controller/irq.h> 10 #include <dt-bindings/leds/common.h> 11 #include <dt-bindings/phy/phy-imx8-pcie.h> 12 #include "imx8mm-phycore-som.dtsi" 15 model = "PHYTEC phyBOARD-Polis-i.MX8MM RDK"; 16 compatible = "phytec,imx8mm-phyboard-polis-rdk", 17 "phytec,imx8mm-phycore-som", "fsl,imx8mm"; 20 stdout-path = &uart3; [all …]
|