/freebsd/sys/contrib/device-tree/Bindings/tpm/ |
H A D | tcg,tpm-tis-i2c.yaml | 4 $id: http://devicetree.org/schemas/tpm/tcg,tpm-tis-i2c.yaml# 14 for accessing a TPM chip. It can be transported over various buses, 16 TCG PC Client Specific TPM Interface Specification (TIS) 17 …https://trustedcomputinggroup.org/resource/pc-client-work-group-pc-client-specific-tpm-interface-s… 21 TCG PC Client Platform TPM Profile Specification for TPM 2.0 (PTP) 22 https://trustedcomputinggroup.org/resource/pc-client-platform-tpm-profile-ptp-specification/ 24 Recent TPM 2.0 chips conform to this generic interface, others use a 30 - description: Generic TPM 2.0 chips conforming to TCG PTP interface 36 - const: tcg,tpm-tis-i2c 38 - description: TPM 1.2 and 2.0 chips with vendor-specific I²C interface [all …]
|
H A D | tcg,tpm_tis-spi.yaml | 4 $id: http://devicetree.org/schemas/tpm/tcg,tpm_tis-spi.yaml# 14 for accessing a TPM chip. It can be transported over various buses, 16 TCG PC Client Specific TPM Interface Specification (TIS) 17 …https://trustedcomputinggroup.org/resource/pc-client-work-group-pc-client-specific-tpm-interface-s… 30 - $ref: tpm-common.yaml# 54 tpm@0 { 68 tpm@0 {
|
H A D | ibm,vtpm.yaml | 4 $id: http://devicetree.org/schemas/tpm/ibm,vtpm.yaml# 13 Virtual TPM is used on IBM POWER7+ and POWER8 systems running POWERVM. 16 without the physical TPM hardware. The TPM functionality is provided by 81 - $ref: tpm-common.yaml# 91 tpm@30000003 {
|
/freebsd/usr.sbin/bhyve/ |
H A D | tpm_emul_passthru.c | 34 struct tpm_passthru *tpm; in tpm_passthru_init() local 37 tpm = calloc(1, sizeof(struct tpm_passthru)); in tpm_passthru_init() 38 if (tpm == NULL) { in tpm_passthru_init() 39 warnx("%s: failed to allocate tpm passthru", __func__); in tpm_passthru_init() 44 tpm->fd = open(path, O_RDWR); in tpm_passthru_init() 45 if (tpm->fd < 0) { in tpm_passthru_init() 46 warnx("%s: unable to open tpm device \"%s\"", __func__, path); in tpm_passthru_init() 50 *sc = tpm; in tpm_passthru_init() 59 struct tpm_passthru *tpm; in tpm_passthru_execute_cmd() local 67 tpm = sc; in tpm_passthru_execute_cmd() [all …]
|
H A D | tpm_emul_swtpm.c | 38 struct tpm_swtpm *tpm; in tpm_swtpm_init() local 42 tpm = calloc(1, sizeof (struct tpm_swtpm)); in tpm_swtpm_init() 43 if (tpm == NULL) { in tpm_swtpm_init() 54 tpm->fd = socket(PF_UNIX, SOCK_STREAM | SOCK_CLOEXEC, 0); in tpm_swtpm_init() 55 if (tpm->fd < 0) { in tpm_swtpm_init() 56 warnx("%s: unable to open tpm socket", __func__); in tpm_swtpm_init() 64 if (connect(tpm->fd, (struct sockaddr *)&tpm_addr, sizeof (tpm_addr)) == in tpm_swtpm_init() 66 warnx("%s: unable to connect to tpm socket \"%s\"", __func__, in tpm_swtpm_init() 71 *sc = tpm; in tpm_swtpm_init() 80 struct tpm_swtpm *tpm; in tpm_swtpm_execute_cmd() local [all …]
|
H A D | tpm_device.c | 25 #define TPM_ACPI_DEVICE_NAME "TPM" 46 const struct tpm_device *const tpm = acpi_device_get_softc(dev); in tpm_build_acpi_table() local 48 if (tpm->intf->build_acpi_table == NULL) { in tpm_build_acpi_table() 52 return (tpm->intf->build_acpi_table(tpm->intf_sc, tpm->vm_ctx)); in tpm_build_acpi_table() 60 const struct tpm_device *const tpm = acpi_device_get_softc(dev); in tpm_write_dsdt() local 61 const struct tpm_ppi *const ppi = tpm->ppi; in tpm_write_dsdt() 70 error = ppi->write_dsdt_regions(tpm->ppi_sc); in tpm_write_dsdt() 89 error = ppi->write_dsdt_dsm(tpm->ppi_sc); in tpm_write_dsdt() 147 warnx("%s: unsupported tpm version %s", __func__, value); in tpm_device_create() 174 warnx("TPM emulation \"%s\" not found", value); in tpm_device_create() [all …]
|
H A D | bhyve_config.5 | 141 advanced features, such as TPM emulation, are exposed only via FwCfg. 287 a boot ROM, and, optionally, a TPM module, a fwcfg type, 600 .Ss TPM Device Settings 601 The TPM device stores its configuration under a top-level 602 .Va tpm 603 node rather than under the LPC TPM device's node. 604 Only one TPM device is supported. 606 .Va tpm : 607 .Bl -column "tpm.version" "Format" "Default" 609 .It Va tpm.path Ta string Ta Ta [all …]
|
H A D | tpm_intf_crb.c | 46 #define TPM_CRB_LOG_AREA_FWCFG_NAME "etc/tpm/log" 218 warnx("%s: invalid cmd [%16lx/%8x] outside of TPM " in tpm_crb_thread() 228 warnx("%s: invalid rsp [%16lx/%8x] outside of TPM " in tpm_crb_thread() 251 * Do a basic sanity check of the TPM request header. We'll need in tpm_crb_thread() 252 * the TPM request length for execute_cmd() below. in tpm_crb_thread() 257 warnx("%s: invalid TPM request header", __func__); in tpm_crb_thread() 262 * A TPM command can take multiple seconds to execute. As we've in tpm_crb_thread() 271 * tpm. To avoid reading old data from the command buffer which in tpm_crb_thread() 275 * response has a size of rsp_size (e.g. if the tpm returned an in tpm_crb_thread() 374 /* TODO: cancel the tpm command */ in tpm_crb_mem_handler() [all …]
|
H A D | bhyve.8 | 234 the TPM module 235 .Cm tpm , 438 optionally, a TPM module, a fwcfg type, and the debug/test device. 631 .Ss TPM device backends 635 .Ar type Ns \&, Ns Ar path Ns Op Cm \&, Ns Ar tpm-device-options 639 Emulate a TPM device. 644 Use a physical TPM device. 647 needs to point to a valid TPM device path, i.e. 661 .Ar tpm-device-options 665 Version of the TPM device according to the TCG specification.
|
H A D | tpm_ppi_qemu.c | 30 #define TPM_PPI_FWCFG_FILE "etc/tpm/config" 254 * Function 2 - Submit TPM Operation Request to Pre-OS Environment in tpm_ppi_write_dsdt_dsm() 277 * Function 3 - Get Pending TPM Operation Request By the OS in tpm_ppi_write_dsdt_dsm() 325 * Function 5 - Return TPM Operation Response to OS Environment in tpm_ppi_write_dsdt_dsm() 338 * 0x00000001..0x000000FF - Corresponding TPM error code in tpm_ppi_write_dsdt_dsm() 363 * Function 7 - Submit TPM Operation Request to Pre-OS Environment 2 in tpm_ppi_write_dsdt_dsm()
|
/freebsd/sys/contrib/device-tree/Bindings/timer/ |
H A D | nxp,tpm-timer.yaml | 4 $id: http://devicetree.org/schemas/timer/nxp,tpm-timer.yaml# 7 title: NXP Low Power Timer/Pulse Width Modulation Module (TPM) 13 The Timer/PWM Module (TPM) supports input capture, output compare, 17 power modes. TPM can support global counter bus where one TPM drives 23 - const: fsl,imx7ulp-tpm 25 - const: fsl,imx8ulp-tpm 26 - const: fsl,imx7ulp-tpm 36 - description: SoC TPM ipg clock 37 - description: SoC TPM per clock 59 compatible = "fsl,imx7ulp-tpm";
|
/freebsd/sys/contrib/xen/io/ |
H A D | tpmif.h | 4 * TPM I/O interface for Xen guest OSes. 68 * TPM I/O interface for Xen guest OSes, v2 72 * This protocol emulates the request/response behavior of a TPM using a Xen 73 * shared memory interface. All interaction with the TPM is at the direction 74 * of the frontend, since a TPM (hardware or virtual) is a passive device - 77 * The frontend sends a request to the TPM by populating the shared page with 84 * The TPM can either finish the command (changing state to TPMIF_STATE_FINISH) 85 * or can cancel the command and change the state to TPMIF_STATE_IDLE. The TPM 88 * TPM may cancel a command if the interface is seized by another locality. 90 * The TPM command format is defined by the TCG, and is available at [all …]
|
/freebsd/share/man/man4/ |
H A D | tpm.4 | 20 .Nm tpm 27 .Cd "device tpm" 39 .Cd hint.tpm.0.at="isa" 40 .Cd hint.tpm.0.maddr="0xfed40000" 41 .Cd hint.tpm.0.msize="0x5000" 42 .Cd hint.tpm.1.at="isa" 43 .Cd hint.tpm.1.maddr="0xfed40000" 44 .Cd hint.tpm.1.msize="0x1000" 48 driver provides support for various trusted platform modules (TPM) that can 84 .Lk "https://trustedcomputinggroup.org/resource/tpm-main-specification/" .
|
/freebsd/sys/contrib/device-tree/Bindings/security/tpm/ |
H A D | tpm-i2c.txt | 1 * Device Tree Bindings for I2C based Trusted Platform Module(TPM) 6 - label : human readable string describing the device, eg. "tpm" 13 - powered-while-suspended: present when the TPM is left powered on between 17 Example (for OpenPower Systems with Nuvoton TPM 2.0 on I2C) 20 tpm@57 { 22 label = "tpm";
|
H A D | tpm_tis_mmio.txt | 3 The TCG defines multi vendor standard for accessing a TPM chip, this 4 is the standard protocol defined to access the TPM via MMIO. Typically 7 Refer to the 'TCG PC Client Specific TPM Interface Specification (TIS)' TCG 13 "tcg,tpm-tis-mmio". Valid chip strings are: 21 compatible = "atmel,at97sc3204", "tcg,tpm-tis-mmio";
|
H A D | google,cr50.txt | 4 functions, including TPM-like functionality. It communicates over 14 tpm@0 {
|
/freebsd/sys/modules/tpm/ |
H A D | Makefile | 1 .PATH: ${SRCTOP}/sys/dev/tpm 3 KMOD= tpm 10 SRCS+= tpm.c 15 #TPM 2.0
|
/freebsd/sys/dev/tpm/ |
H A D | tpm_if.m | 29 #include <dev/tpm/tpm20.h> 31 INTERFACE tpm; 34 # Transfer data to the TPM data buffer 48 # Read 4 bytes (host endian) from a TPM register
|
H A D | tpm.c | 40 #include <dev/tpm/tpmvar.h> 144 .d_name = "tpm", 190 * FreeBSD specific code for probing and attaching TPM to device tree. 196 BUS_ADD_CHILD(parent, ISA_ORDER_SPECULATIVE, "tpm", 0); 241 if ((sc->sc_init)(sc, irq, "tpm")) { in tpm_attach() 255 UID_ROOT, GID_WHEEL, 0600, "tpm"); in tpm_attach() 287 /* Probe TPM using TIS 1.2 interface. */ 299 printf("tpm: caps=%b\n", r, TPM_CAPBITS); in tpm_tis12_probe() 304 printf("tpm: caps too low (caps=%b)\n", r, TPM_CAPBITS); in tpm_tis12_probe() 357 /* Setup TPM using TIS 1.2 interface. */ [all …]
|
H A D | tpm_acpi.c | 62 /*In some case, TPM existence is found only in TPCA header*/ 75 "tpm", tpm_acpi_methods, sizeof(struct tpm_softc), 78 DRIVER_MODULE(tpm, acpi, tpm_acpi_driver, 0, 0);
|
/freebsd/sys/conf/ |
H A D | files.i386 |
|
/freebsd/contrib/libfido2/src/ |
H A D | tpm.c | 9 * Trusted Platform Module (TPM) 2.0 attestation support. Documentation 10 * references are relative to revision 01.38 of the TPM 2.0 specification. 38 #define TPMA_SENSITIVE 0x00000020 /* data originates within tpm */ 67 uint32_t reset_count; /* obfuscated by tpm */ 68 uint32_t restart_count; /* obfuscated by tpm */ 77 tpm_sha256_name_t signer; /* full tpm path of signing key */ 80 uint64_t fwversion; /* obfuscated by tpm */ 82 tpm_sha256_name_t qual_name; /* full tpm path of attested key */
|
/freebsd/sys/contrib/device-tree/Bindings/pwm/ |
H A D | imx-tpm-pwm.yaml | 4 $id: http://devicetree.org/schemas/pwm/imx-tpm-pwm.yaml# 7 title: Freescale i.MX TPM PWM controller 15 The TPM counter and period counter are shared between multiple
|
/freebsd/contrib/llvm-project/llvm/lib/IR/ |
H A D | LegacyPassManager.cpp | 885 const PassInfo *PInf = TPM->findAnalysisPassInfo(PI); in recordAvailableAnalysis() 894 AnalysisUsage *AnUsage = TPM->findAnalysisUsage(P); in preserveHigherLevelAnalysis() 914 AnalysisUsage *AnUsage = TPM->findAnalysisUsage(P); in verifyPreservedAnalysis() 928 AnalysisUsage *AnUsage = TPM->findAnalysisUsage(P); in removeNotPreservedAnalysis() 978 // If this is a on the fly manager then it does not have TPM. in removeDeadPasses() 979 if (!TPM) in removeDeadPasses() 982 TPM->collectLastUses(DeadPasses, P); in removeDeadPasses() 1007 if (const PassInfo *PInf = TPM->findAnalysisPassInfo(PI)) { in freePass() 1071 TPM->setLastUser(LastUses, P); in add() 1075 TPM->setLastUser(TransferLastUses, My_PM); in add() [all …]
|
/freebsd/lib/libsecureboot/ |
H A D | vepcr.c | 34 * to feed to a TPM pcr register - hence the name ve_pcr. 36 * NOTE: in the current standard the TPM pcr register size is for SHA1, 39 * before feeding to TPM. 59 * Real TPM registers only hold a SHA1 hash
|