| /openbmc/openbmc/meta-security/meta-tpm/recipes-core/packagegroup/ |
| H A D | packagegroup-security-tpm.bb | 8 PACKAGES = "packagegroup-security-tpm" 10 SUMMARY:packagegroup-security-tpm = "Security TPM support" 11 RDEPENDS:packagegroup-security-tpm = " \ 12 tpm-tools \ 15 tpm-quote-tools \ 18 openssl-tpm-engine \ 25 kernel-module-tpm-atmel \ 26 kernel-module-tpm-infineon \ 27 kernel-module-tpm-nsc \ 31 kernel-module-tpm-atmel \ [all …]
|
| H A D | packagegroup-security-tpm-i2c.bb | 8 PACKAGES = "packagegroup-security-tpm-i2c" 10 SUMMARY:packagegroup-security-tpm-i2c = "Security TPM i2c support" 11 RDEPENDS:packagegroup-security-tpm-i2c = " \ 12 ${@bb.utils.contains('MACHINE_FEATURES', 'tpm', 'packagegroup-security-tpm', '', d)} \ 14 kernel-module-tpm-i2c-atmel \ 15 kernel-module-tpm-i2c-infineon \ 16 kernel-module-tpm-i2c-nuvoton \ 17 kernel-module-tpm-st33zp24 \ 18 kernel-module-tpm-st33zp24-i2c \
|
| /openbmc/u-boot/drivers/tpm/ |
| H A D | tpm2_tis_sandbox.c | 68 struct sandbox_tpm2 *tpm = dev_get_priv(dev); in sandbox_tpm2_check_session() local 161 if (!pw_sz && !tpm->pw_sz[*hierarchy]) in sandbox_tpm2_check_session() 175 if (pw_sz != tpm->pw_sz[*hierarchy] || in sandbox_tpm2_check_session() 176 strncmp(pw, tpm->pw[*hierarchy], tpm->pw_sz[*hierarchy])) { in sandbox_tpm2_check_session() 186 struct sandbox_tpm2 *tpm = dev_get_priv(dev); in sandbox_tpm2_check_readyness() local 190 if (!tpm->init_done || tpm->startup_done) in sandbox_tpm2_check_readyness() 195 if (!tpm->init_done || !tpm->startup_done) in sandbox_tpm2_check_readyness() 200 if (!tpm->startup_done) in sandbox_tpm2_check_readyness() 205 if (!tpm->tests_done) in sandbox_tpm2_check_readyness() 239 struct sandbox_tpm2 *tpm = dev_get_priv(dev); in sandbox_tpm2_extend() local [all …]
|
| H A D | Kconfig | 32 The usual tpm operations and the 'tpm' command can be used to talk 41 The usual tpm operations and the 'tpm' command can be used to talk 65 The usual tpm operations and the 'tpm' command can be used to talk 76 available using the 'tpm' command, too. 83 The usual tpm operations and the 'tpm' command can be used to talk 92 The usual tpm operations and the 'tpm' command can be used to talk 101 The functionality is available via the 'tpm' command as well. 109 The functionality is available via the 'tpm' command as well. 116 The functionality is available via the 'tpm' command as well. 144 The usual TPM operations and the 'tpm' command can be used to talk [all …]
|
| H A D | tpm_tis_sandbox.c | 183 struct tpm_state *tpm = dev_get_priv(dev); in sandbox_tpm_xfer() local 253 memcpy(&tpm->nvdata[seq].data, sendbuf + 22, length); in sandbox_tpm_xfer() 254 tpm->nvdata[seq].present = true; in sandbox_tpm_xfer() 283 } else if (!tpm->nvdata[seq].present) { in sandbox_tpm_xfer() 288 sizeof(uint32_t), &tpm->nvdata[seq].data, in sandbox_tpm_xfer() 329 struct tpm_state *tpm = dev_get_priv(dev); in sandbox_tpm_probe() local 331 memcpy(tpm, &g_state, sizeof(*tpm)); in sandbox_tpm_probe()
|
| /openbmc/openbmc/meta-security/meta-tpm/recipes-tpm1/tpm-tools/files/ |
| H A D | 04-fix-FTBFS-clang.patch | 7 tpm-tools_1.3.9.1-0.1.debian.tar 11 --- tpm-tools-1.3.8/src/tpm_mgmt/tpm_present.c 2012-05-17 21:49:58.000000000 +0400 12 +++ tpm-tools-1.3.8-my/src/tpm_mgmt/tpm_present.c 2014-06-29 01:01:11.502081468 +0400 22 --- tpm-tools-1.3.8/src/tpm_mgmt/tpm_takeownership.c 2010-09-30 21:28:09.000000000 +0400 23 +++ tpm-tools-1.3.8-my/src/tpm_mgmt/tpm_takeownership.c 2014-06-29 01:01:51.069373655 +0400 33 --- tpm-tools-1.3.8/src/tpm_mgmt/tpm_nvwrite.c 2011-08-17 16:20:35.000000000 +0400 34 +++ tpm-tools-1.3.8-my/src/tpm_mgmt/tpm_nvwrite.c 2014-06-29 01:02:45.836397172 +0400 44 --- tpm-tools-1.3.8/src/data_mgmt/data_protect.c 2012-05-17 21:49:58.000000000 +0400 45 +++ tpm-tools-1.3.8-my/src/data_mgmt/data_protect.c 2014-06-29 01:03:49.863254459 +0400
|
| /openbmc/qemu/qapi/ |
| H A D | tpm.json | 16 # @tpm-tis: TPM TIS model 18 # @tpm-crb: TPM CRB model (since 2.12) 20 # @tpm-spapr: TPM SPAPR model (since 5.0) 24 { 'enum': 'TpmModel', 'data': [ 'tpm-tis', 'tpm-crb', 'tpm-spapr' ], 28 # @query-tpm-models: 39 { 'command': 'query-tpm-models', 'returns': ['TpmModel'], 57 # @query-tpm-types: 68 { 'command': 'query-tpm-types', 'returns': ['TpmType'], 163 # @query-tpm: 187 { 'command': 'query-tpm', 'returns': ['TPMInfo'],
|
| /openbmc/openbmc/meta-security/meta-tpm/recipes-tpm1/openssl-tpm-engine/ |
| H A D | openssl-tpm-engine_0.5.0.bb | 3 SECTION = "security/tpm" 12 file://0001-create-tpm-key-support-well-known-key-option.patch \ 14 file://0003-tpm-openssl-tpm-engine-parse-an-encrypted-tpm-SRK-pa.patch \ 15 file://0004-tpm-openssl-tpm-engine-change-variable-c-type-from-c.patch \ 49 FILES:${PN}-staticdev += "${libdir}/ssl/engines-3/tpm.la" 56 ${libdir}/ssl/engines-3/tpm.so* \ 57 ${libdir}/engines-3/tpm.so* \ 59 ${prefix}/local/ssl/lib/engines-3/tpm.so* \
|
| /openbmc/u-boot/board/gdsys/a38x/ |
| H A D | hre.c | 101 static int get_tpm_nv_size(struct udevice *tpm, uint32_t index, uint32_t *size) in get_tpm_nv_size() argument 108 err = tpm_get_capability(tpm, TPM_CAP_NV_INDEX, index, in get_tpm_nv_size() 138 static int find_key(struct udevice *tpm, const uint8_t auth[20], in find_key() argument 151 err = tpm_get_capability(tpm, TPM_CAP_HANDLE, TPM_RT_KEY, buf, in find_key() 163 err = tpm_get_pub_key_oiap(tpm, key_handles[i], auth, buf, in find_key() 183 static int read_common_data(struct udevice *tpm) in read_common_data() argument 190 if (get_tpm_nv_size(tpm, NV_COMMON_DATA_INDEX, &size) || in read_common_data() 193 err = tpm_nv_read_value(tpm, NV_COMMON_DATA_INDEX, in read_common_data() 253 static struct h_reg *access_hreg(struct udevice *tpm, uint8_t spec, in access_hreg() argument 271 hre_tpm_err = tpm_pcr_read(tpm, HREG_IDX(spec), in access_hreg() [all …]
|
| H A D | controlcenterdc.c | 278 struct udevice *tpm; in last_stage_init() local 284 ret = get_tpm(&tpm); in last_stage_init() 285 if (ret || tpm_init(tpm) || tpm_startup(tpm, TPM_ST_CLEAR) || in last_stage_init() 286 tpm_continue_self_test(tpm)) { in last_stage_init() 292 flush_keys(tpm); in last_stage_init() 293 load_and_run_keyprog(tpm); in last_stage_init()
|
| H A D | keyprogram.c | 15 int flush_keys(struct udevice *tpm) in flush_keys() argument 24 err = tpm_get_capability(tpm, TPM_CAP_HANDLE, TPM_RT_KEY, buf, in flush_keys() 31 err = tpm_flush_specific(tpm, get_unaligned_be32(ptr), in flush_keys() 126 int load_and_run_keyprog(struct udevice *tpm) in load_and_run_keyprog() argument 149 if (hre_run_program(tpm, prog->code, prog->code_size)) { in load_and_run_keyprog()
|
| H A D | keyprogram.h | 10 int load_and_run_keyprog(struct udevice *tpm); 11 int flush_keys(struct udevice *tpm);
|
| /openbmc/u-boot/board/gdsys/p1022/ |
| H A D | controlcenterd-id.c | 262 static int get_tpm_nv_size(struct udevice *tpm, uint32_t index, uint32_t *size) in get_tpm_nv_size() argument 269 err = tpm_get_capability(tpm, TPM_CAP_NV_INDEX, index, in get_tpm_nv_size() 298 static int find_key(struct udevice *tpm, const uint8_t auth[20], in find_key() argument 311 err = tpm_get_capability(tpm, TPM_CAP_HANDLE, TPM_RT_KEY, buf, in find_key() 323 err = tpm_get_pub_key_oiap(tpm, key_handles[i], auth, buf, in find_key() 342 static int read_common_data(struct udevice *tpm) in read_common_data() argument 349 if (get_tpm_nv_size(tpm, NV_COMMON_DATA_INDEX, &size) || in read_common_data() 352 err = tpm_nv_read_value(tpm, NV_COMMON_DATA_INDEX, in read_common_data() 486 static struct h_reg *access_hreg(struct udevice *tpm, uint8_t spec, in access_hreg() argument 504 hre_tpm_err = tpm_pcr_read(tpm, HREG_IDX(spec), in access_hreg() [all …]
|
| /openbmc/openbmc/meta-security/meta-tpm/classes/ |
| H A D | sanity-meta-tpm.bbclass | 5 if 'tpm' not in e.data.getVar('DISTRO_FEATURES').split() and \ 8 bb.warn("You have included the meta-tpm layer, but \ 9 'tpm or tpm2' has not been enabled in your DISTRO_FEATURES. Some bbappend files \ 10 and preferred version setting may not take effect. See the meta-tpm README \ 11 for details on enabling tpm support.")
|
| /openbmc/openbmc/meta-security/meta-tpm/ |
| H A D | README.md | 1 meta-tpm layer 5 to have 'tpm' in DISTRO_FEATURES to have effect. 8 DISTRO_FEATURES:append = " tpm" 10 If meta-tpm is included, but tpm is not enabled as a 13 You have included the meta-tpm layer, but 14 'tpm' has not been enabled in your DISTRO_FEATURES. Some bbappend files 40 Adding the meta-tpm layer to your build 48 location of the meta-tpm layer to bblayers.conf, along with any 54 /path/to/layer/meta-tpm \
|
| /openbmc/openbmc/meta-security/meta-tpm/recipes-core/images/ |
| H A D | security-tpm-image.bb | 1 DESCRIPTION = "A small image for building a tpm image for testing" 8 packagegroup-security-tpm \ 18 export IMAGE_BASENAME = "security-tpm-image"
|
| /openbmc/openbmc/meta-security/meta-tpm/recipes-tpm1/tpm-tools/ |
| H A D | tpm-tools_1.3.9.2.bb | 1 SUMMARY = "The tpm-tools package contains commands to allow the platform administrator the ability … 3 The tpm-tools package contains commands to allow the platform administrator \ 8 SECTION = "tpm" 17 git://git.code.sf.net/p/trousers/tpm-tools;branch=master \ 18 file://tpm-tools-extendpcr.patch \
|
| /openbmc/qemu/tests/qapi-schema/ |
| H A D | returns-bad-type.json | 4 'human-monitor-command', 'query-tpm-models', 'guest-get-time' ] } } 9 { 'enum': 'TpmModel', 'data': [ 'tpm-tis' ] } 10 { 'command': 'query-tpm-models', 'returns': ['TpmModel'] }
|
| /openbmc/qemu/tests/qtest/ |
| H A D | meson.build | 83 (config_all_devices.has_key('CONFIG_TPM_CRB') ? ['tpm-crb-test'] : []) + \ 84 (config_all_devices.has_key('CONFIG_TPM_CRB') ? ['tpm-crb-swtpm-test'] : []) + \ 85 (config_all_devices.has_key('CONFIG_TPM_TIS_ISA') ? ['tpm-tis-test'] : []) + \ 86 (config_all_devices.has_key('CONFIG_TPM_TIS_ISA') ? ['tpm-tis-swtpm-test'] : []) + \ 245 (config_all_devices.has_key('CONFIG_TPM_TIS_I2C') ? ['tpm-tis-i2c-test'] : []) + \ 259 …['tpm-tis-device-test', 'tpm-tis-device-swtpm-test'] : []) + … 264 config_all_devices.has_key('CONFIG_TPM_TIS_I2C') ? ['tpm-tis-i2c-test'] : []) + \ 345 tpmemu_files = ['tpm-emu.c', 'tpm-util.c', 'tpm-tests.c'] 375 'bios-tables-test': [io, 'boot-sector.c', 'acpi-utils.c', 'tpm-emu.c'], 386 'tpm-crb-swtpm-test': [io, tpmemu_files], [all …]
|
| /openbmc/openbmc/meta-security/meta-tpm/recipes-tpm1/trousers/files/ |
| H A D | trousers-udev.rules | 1 # trousers daemon expects tpm device to be owned by tss user & group 2 KERNEL=="tpm[0-9]*", MODE="0600", OWNER="tss", GROUP="tss"
|
| /openbmc/qemu/docs/specs/ |
| H A D | tpm.rst | 23 - ``hw/tpm/tpm_tis_common.c`` 24 - ``hw/tpm/tpm_tis_isa.c`` 25 - ``hw/tpm/tpm_tis_sysbus.c`` 26 - ``hw/tpm/tpm_tis_i2c.c`` 27 - ``hw/tpm/tpm_tis.h`` 49 - ``hw/tpm/tpm_crb.c`` 54 pSeries (ppc64) machines offer a tpm-spapr device model. 57 - ``hw/tpm/tpm_spapr.c`` 62 The bios/firmware may read the ``"etc/tpm/config"`` fw_cfg entry for 192 - ``include/hw/acpi/tpm.h`` [all …]
|
| /openbmc/openbmc/meta-security/recipes-core/images/ |
| H A D | security-test-image.bb | 9 ${@bb.utils.contains("BBFILE_COLLECTIONS", "tpm-layer", "packagegroup-security-tpm","", d)} \ 10 ${@bb.utils.contains("BBFILE_COLLECTIONS", "tpm-layer", "packagegroup-security-tpm2","", d)} \
|
| /openbmc/openbmc/meta-security/meta-tpm/recipes-tpm1/tpm-quote-tools/ |
| H A D | tpm-quote-tools_1.0.4.bb | 12 SECTION = "security/tpm" 16 DEPENDS = "libtspi tpm-tools" 18 SRC_URI = "git://git.code.sf.net/p/tpmquotetools/tpm-quote-tools;branch=master"
|
| /openbmc/openbmc/meta-security/meta-tpm/recipes-kernel/linux/ |
| H A D | linux-yocto_tpm.inc | 4 ${@bb.utils.contains('MACHINE_FEATURES', 'tpm', 'file://tpm.scc', '', d)} \
|
| /openbmc/qemu/docs/system/arm/ |
| H A D | xenpvh.rst | 8 When TPM is enabled, this machine also creates a tpm-tis-device at a 9 user input tpm base address, adds a TPM emulator and connects to a 14 can be found in the :ref:`tpm-device` section. 36 -tpmdev emulator,id=tpm0,chardev=chrtpm -machine tpm-base-addr=0x0C000000
|