Home
last modified time | relevance | path

Searched refs:tpm (Results 1 – 25 of 138) sorted by relevance

123456

/openbmc/openbmc/meta-security/meta-tpm/recipes-core/packagegroup/
H A Dpackagegroup-security-tpm.bb8 PACKAGES = "packagegroup-security-tpm"
10 SUMMARY:packagegroup-security-tpm = "Security TPM support"
11 RDEPENDS:packagegroup-security-tpm = " \
12 tpm-tools \
15 tpm-quote-tools \
18 openssl-tpm-engine \
25 kernel-module-tpm-atmel \
26 kernel-module-tpm-infineon \
27 kernel-module-tpm-nsc \
31 kernel-module-tpm-atmel \
[all …]
H A Dpackagegroup-security-tpm-i2c.bb8 PACKAGES = "packagegroup-security-tpm-i2c"
10 SUMMARY:packagegroup-security-tpm-i2c = "Security TPM i2c support"
11 RDEPENDS:packagegroup-security-tpm-i2c = " \
12 ${@bb.utils.contains('MACHINE_FEATURES', 'tpm', 'packagegroup-security-tpm', '', d)} \
14 kernel-module-tpm-i2c-atmel \
15 kernel-module-tpm-i2c-infineon \
16 kernel-module-tpm-i2c-nuvoton \
17 kernel-module-tpm-st33zp24 \
18 kernel-module-tpm-st33zp24-i2c \
/openbmc/u-boot/drivers/tpm/
H A Dtpm2_tis_sandbox.c68 struct sandbox_tpm2 *tpm = dev_get_priv(dev); in sandbox_tpm2_check_session() local
161 if (!pw_sz && !tpm->pw_sz[*hierarchy]) in sandbox_tpm2_check_session()
175 if (pw_sz != tpm->pw_sz[*hierarchy] || in sandbox_tpm2_check_session()
176 strncmp(pw, tpm->pw[*hierarchy], tpm->pw_sz[*hierarchy])) { in sandbox_tpm2_check_session()
186 struct sandbox_tpm2 *tpm = dev_get_priv(dev); in sandbox_tpm2_check_readyness() local
190 if (!tpm->init_done || tpm->startup_done) in sandbox_tpm2_check_readyness()
195 if (!tpm->init_done || !tpm->startup_done) in sandbox_tpm2_check_readyness()
200 if (!tpm->startup_done) in sandbox_tpm2_check_readyness()
205 if (!tpm->tests_done) in sandbox_tpm2_check_readyness()
239 struct sandbox_tpm2 *tpm = dev_get_priv(dev); in sandbox_tpm2_extend() local
[all …]
H A DKconfig32 The usual tpm operations and the 'tpm' command can be used to talk
41 The usual tpm operations and the 'tpm' command can be used to talk
65 The usual tpm operations and the 'tpm' command can be used to talk
76 available using the 'tpm' command, too.
83 The usual tpm operations and the 'tpm' command can be used to talk
92 The usual tpm operations and the 'tpm' command can be used to talk
101 The functionality is available via the 'tpm' command as well.
109 The functionality is available via the 'tpm' command as well.
116 The functionality is available via the 'tpm' command as well.
144 The usual TPM operations and the 'tpm' command can be used to talk
[all …]
H A Dtpm_tis_sandbox.c183 struct tpm_state *tpm = dev_get_priv(dev); in sandbox_tpm_xfer() local
253 memcpy(&tpm->nvdata[seq].data, sendbuf + 22, length); in sandbox_tpm_xfer()
254 tpm->nvdata[seq].present = true; in sandbox_tpm_xfer()
283 } else if (!tpm->nvdata[seq].present) { in sandbox_tpm_xfer()
288 sizeof(uint32_t), &tpm->nvdata[seq].data, in sandbox_tpm_xfer()
329 struct tpm_state *tpm = dev_get_priv(dev); in sandbox_tpm_probe() local
331 memcpy(tpm, &g_state, sizeof(*tpm)); in sandbox_tpm_probe()
/openbmc/openbmc/meta-security/meta-tpm/recipes-tpm1/tpm-tools/files/
H A D04-fix-FTBFS-clang.patch7 tpm-tools_1.3.9.1-0.1.debian.tar
11 --- tpm-tools-1.3.8/src/tpm_mgmt/tpm_present.c 2012-05-17 21:49:58.000000000 +0400
12 +++ tpm-tools-1.3.8-my/src/tpm_mgmt/tpm_present.c 2014-06-29 01:01:11.502081468 +0400
22 --- tpm-tools-1.3.8/src/tpm_mgmt/tpm_takeownership.c 2010-09-30 21:28:09.000000000 +0400
23 +++ tpm-tools-1.3.8-my/src/tpm_mgmt/tpm_takeownership.c 2014-06-29 01:01:51.069373655 +0400
33 --- tpm-tools-1.3.8/src/tpm_mgmt/tpm_nvwrite.c 2011-08-17 16:20:35.000000000 +0400
34 +++ tpm-tools-1.3.8-my/src/tpm_mgmt/tpm_nvwrite.c 2014-06-29 01:02:45.836397172 +0400
44 --- tpm-tools-1.3.8/src/data_mgmt/data_protect.c 2012-05-17 21:49:58.000000000 +0400
45 +++ tpm-tools-1.3.8-my/src/data_mgmt/data_protect.c 2014-06-29 01:03:49.863254459 +0400
/openbmc/qemu/qapi/
H A Dtpm.json16 # @tpm-tis: TPM TIS model
18 # @tpm-crb: TPM CRB model (since 2.12)
20 # @tpm-spapr: TPM SPAPR model (since 5.0)
24 { 'enum': 'TpmModel', 'data': [ 'tpm-tis', 'tpm-crb', 'tpm-spapr' ],
28 # @query-tpm-models:
39 { 'command': 'query-tpm-models', 'returns': ['TpmModel'],
57 # @query-tpm-types:
68 { 'command': 'query-tpm-types', 'returns': ['TpmType'],
163 # @query-tpm:
187 { 'command': 'query-tpm', 'returns': ['TPMInfo'],
/openbmc/openbmc/meta-security/meta-tpm/recipes-tpm1/openssl-tpm-engine/
H A Dopenssl-tpm-engine_0.5.0.bb3 SECTION = "security/tpm"
12 file://0001-create-tpm-key-support-well-known-key-option.patch \
14 file://0003-tpm-openssl-tpm-engine-parse-an-encrypted-tpm-SRK-pa.patch \
15 file://0004-tpm-openssl-tpm-engine-change-variable-c-type-from-c.patch \
49 FILES:${PN}-staticdev += "${libdir}/ssl/engines-3/tpm.la"
56 ${libdir}/ssl/engines-3/tpm.so* \
57 ${libdir}/engines-3/tpm.so* \
59 ${prefix}/local/ssl/lib/engines-3/tpm.so* \
/openbmc/u-boot/board/gdsys/a38x/
H A Dhre.c101 static int get_tpm_nv_size(struct udevice *tpm, uint32_t index, uint32_t *size) in get_tpm_nv_size() argument
108 err = tpm_get_capability(tpm, TPM_CAP_NV_INDEX, index, in get_tpm_nv_size()
138 static int find_key(struct udevice *tpm, const uint8_t auth[20], in find_key() argument
151 err = tpm_get_capability(tpm, TPM_CAP_HANDLE, TPM_RT_KEY, buf, in find_key()
163 err = tpm_get_pub_key_oiap(tpm, key_handles[i], auth, buf, in find_key()
183 static int read_common_data(struct udevice *tpm) in read_common_data() argument
190 if (get_tpm_nv_size(tpm, NV_COMMON_DATA_INDEX, &size) || in read_common_data()
193 err = tpm_nv_read_value(tpm, NV_COMMON_DATA_INDEX, in read_common_data()
253 static struct h_reg *access_hreg(struct udevice *tpm, uint8_t spec, in access_hreg() argument
271 hre_tpm_err = tpm_pcr_read(tpm, HREG_IDX(spec), in access_hreg()
[all …]
H A Dcontrolcenterdc.c278 struct udevice *tpm; in last_stage_init() local
284 ret = get_tpm(&tpm); in last_stage_init()
285 if (ret || tpm_init(tpm) || tpm_startup(tpm, TPM_ST_CLEAR) || in last_stage_init()
286 tpm_continue_self_test(tpm)) { in last_stage_init()
292 flush_keys(tpm); in last_stage_init()
293 load_and_run_keyprog(tpm); in last_stage_init()
H A Dkeyprogram.c15 int flush_keys(struct udevice *tpm) in flush_keys() argument
24 err = tpm_get_capability(tpm, TPM_CAP_HANDLE, TPM_RT_KEY, buf, in flush_keys()
31 err = tpm_flush_specific(tpm, get_unaligned_be32(ptr), in flush_keys()
126 int load_and_run_keyprog(struct udevice *tpm) in load_and_run_keyprog() argument
149 if (hre_run_program(tpm, prog->code, prog->code_size)) { in load_and_run_keyprog()
H A Dkeyprogram.h10 int load_and_run_keyprog(struct udevice *tpm);
11 int flush_keys(struct udevice *tpm);
/openbmc/u-boot/board/gdsys/p1022/
H A Dcontrolcenterd-id.c262 static int get_tpm_nv_size(struct udevice *tpm, uint32_t index, uint32_t *size) in get_tpm_nv_size() argument
269 err = tpm_get_capability(tpm, TPM_CAP_NV_INDEX, index, in get_tpm_nv_size()
298 static int find_key(struct udevice *tpm, const uint8_t auth[20], in find_key() argument
311 err = tpm_get_capability(tpm, TPM_CAP_HANDLE, TPM_RT_KEY, buf, in find_key()
323 err = tpm_get_pub_key_oiap(tpm, key_handles[i], auth, buf, in find_key()
342 static int read_common_data(struct udevice *tpm) in read_common_data() argument
349 if (get_tpm_nv_size(tpm, NV_COMMON_DATA_INDEX, &size) || in read_common_data()
352 err = tpm_nv_read_value(tpm, NV_COMMON_DATA_INDEX, in read_common_data()
486 static struct h_reg *access_hreg(struct udevice *tpm, uint8_t spec, in access_hreg() argument
504 hre_tpm_err = tpm_pcr_read(tpm, HREG_IDX(spec), in access_hreg()
[all …]
/openbmc/openbmc/meta-security/meta-tpm/classes/
H A Dsanity-meta-tpm.bbclass5 if 'tpm' not in e.data.getVar('DISTRO_FEATURES').split() and \
8 bb.warn("You have included the meta-tpm layer, but \
9 'tpm or tpm2' has not been enabled in your DISTRO_FEATURES. Some bbappend files \
10 and preferred version setting may not take effect. See the meta-tpm README \
11 for details on enabling tpm support.")
/openbmc/openbmc/meta-security/meta-tpm/
H A DREADME.md1 meta-tpm layer
5 to have 'tpm' in DISTRO_FEATURES to have effect.
8 DISTRO_FEATURES:append = " tpm"
10 If meta-tpm is included, but tpm is not enabled as a
13 You have included the meta-tpm layer, but
14 'tpm' has not been enabled in your DISTRO_FEATURES. Some bbappend files
40 Adding the meta-tpm layer to your build
48 location of the meta-tpm layer to bblayers.conf, along with any
54 /path/to/layer/meta-tpm \
/openbmc/openbmc/meta-security/meta-tpm/recipes-core/images/
H A Dsecurity-tpm-image.bb1 DESCRIPTION = "A small image for building a tpm image for testing"
8 packagegroup-security-tpm \
18 export IMAGE_BASENAME = "security-tpm-image"
/openbmc/openbmc/meta-security/meta-tpm/recipes-tpm1/tpm-tools/
H A Dtpm-tools_1.3.9.2.bb1 SUMMARY = "The tpm-tools package contains commands to allow the platform administrator the ability …
3 The tpm-tools package contains commands to allow the platform administrator \
8 SECTION = "tpm"
17 git://git.code.sf.net/p/trousers/tpm-tools;branch=master \
18 file://tpm-tools-extendpcr.patch \
/openbmc/qemu/tests/qapi-schema/
H A Dreturns-bad-type.json4 'human-monitor-command', 'query-tpm-models', 'guest-get-time' ] } }
9 { 'enum': 'TpmModel', 'data': [ 'tpm-tis' ] }
10 { 'command': 'query-tpm-models', 'returns': ['TpmModel'] }
/openbmc/qemu/tests/qtest/
H A Dmeson.build83 (config_all_devices.has_key('CONFIG_TPM_CRB') ? ['tpm-crb-test'] : []) + \
84 (config_all_devices.has_key('CONFIG_TPM_CRB') ? ['tpm-crb-swtpm-test'] : []) + \
85 (config_all_devices.has_key('CONFIG_TPM_TIS_ISA') ? ['tpm-tis-test'] : []) + \
86 (config_all_devices.has_key('CONFIG_TPM_TIS_ISA') ? ['tpm-tis-swtpm-test'] : []) + \
245 (config_all_devices.has_key('CONFIG_TPM_TIS_I2C') ? ['tpm-tis-i2c-test'] : []) + \
259 …['tpm-tis-device-test', 'tpm-tis-device-swtpm-test'] : []) + …
264 config_all_devices.has_key('CONFIG_TPM_TIS_I2C') ? ['tpm-tis-i2c-test'] : []) + \
345 tpmemu_files = ['tpm-emu.c', 'tpm-util.c', 'tpm-tests.c']
375 'bios-tables-test': [io, 'boot-sector.c', 'acpi-utils.c', 'tpm-emu.c'],
386 'tpm-crb-swtpm-test': [io, tpmemu_files],
[all …]
/openbmc/openbmc/meta-security/meta-tpm/recipes-tpm1/trousers/files/
H A Dtrousers-udev.rules1 # trousers daemon expects tpm device to be owned by tss user & group
2 KERNEL=="tpm[0-9]*", MODE="0600", OWNER="tss", GROUP="tss"
/openbmc/qemu/docs/specs/
H A Dtpm.rst23 - ``hw/tpm/tpm_tis_common.c``
24 - ``hw/tpm/tpm_tis_isa.c``
25 - ``hw/tpm/tpm_tis_sysbus.c``
26 - ``hw/tpm/tpm_tis_i2c.c``
27 - ``hw/tpm/tpm_tis.h``
49 - ``hw/tpm/tpm_crb.c``
54 pSeries (ppc64) machines offer a tpm-spapr device model.
57 - ``hw/tpm/tpm_spapr.c``
62 The bios/firmware may read the ``"etc/tpm/config"`` fw_cfg entry for
192 - ``include/hw/acpi/tpm.h``
[all …]
/openbmc/openbmc/meta-security/recipes-core/images/
H A Dsecurity-test-image.bb9 ${@bb.utils.contains("BBFILE_COLLECTIONS", "tpm-layer", "packagegroup-security-tpm","", d)} \
10 ${@bb.utils.contains("BBFILE_COLLECTIONS", "tpm-layer", "packagegroup-security-tpm2","", d)} \
/openbmc/openbmc/meta-security/meta-tpm/recipes-tpm1/tpm-quote-tools/
H A Dtpm-quote-tools_1.0.4.bb12 SECTION = "security/tpm"
16 DEPENDS = "libtspi tpm-tools"
18 SRC_URI = "git://git.code.sf.net/p/tpmquotetools/tpm-quote-tools;branch=master"
/openbmc/openbmc/meta-security/meta-tpm/recipes-kernel/linux/
H A Dlinux-yocto_tpm.inc4 ${@bb.utils.contains('MACHINE_FEATURES', 'tpm', 'file://tpm.scc', '', d)} \
/openbmc/qemu/docs/system/arm/
H A Dxenpvh.rst8 When TPM is enabled, this machine also creates a tpm-tis-device at a
9 user input tpm base address, adds a TPM emulator and connects to a
14 can be found in the :ref:`tpm-device` section.
36 -tpmdev emulator,id=tpm0,chardev=chrtpm -machine tpm-base-addr=0x0C000000

123456