Home
last modified time | relevance | path

Searched full:tpm (Results 1 – 25 of 146) sorted by relevance

123456

/freebsd/sys/contrib/device-tree/Bindings/tpm/
H A Dtcg,tpm-tis-i2c.yaml4 $id: http://devicetree.org/schemas/tpm/tcg,tpm-tis-i2c.yaml#
14 for accessing a TPM chip. It can be transported over various buses,
16 TCG PC Client Specific TPM Interface Specification (TIS)
17 …https://trustedcomputinggroup.org/resource/pc-client-work-group-pc-client-specific-tpm-interface-s…
21 TCG PC Client Platform TPM Profile Specification for TPM 2.0 (PTP)
22 https://trustedcomputinggroup.org/resource/pc-client-platform-tpm-profile-ptp-specification/
24 Recent TPM 2.0 chips conform to this generic interface, others use a
30 - description: Generic TPM 2.0 chips conforming to TCG PTP interface
36 - const: tcg,tpm-tis-i2c
38 - description: TPM 1.2 and 2.0 chips with vendor-specific I²C interface
[all …]
H A Dtcg,tpm_tis-spi.yaml4 $id: http://devicetree.org/schemas/tpm/tcg,tpm_tis-spi.yaml#
14 for accessing a TPM chip. It can be transported over various buses,
16 TCG PC Client Specific TPM Interface Specification (TIS)
17 …https://trustedcomputinggroup.org/resource/pc-client-work-group-pc-client-specific-tpm-interface-s…
30 - $ref: tpm-common.yaml#
54 tpm@0 {
68 tpm@0 {
H A Dibm,vtpm.yaml4 $id: http://devicetree.org/schemas/tpm/ibm,vtpm.yaml#
13 Virtual TPM is used on IBM POWER7+ and POWER8 systems running POWERVM.
16 without the physical TPM hardware. The TPM functionality is provided by
81 - $ref: tpm-common.yaml#
91 tpm@30000003 {
/freebsd/usr.sbin/bhyve/
H A Dtpm_emul_passthru.c34 struct tpm_passthru *tpm; in tpm_passthru_init() local
37 tpm = calloc(1, sizeof(struct tpm_passthru)); in tpm_passthru_init()
38 if (tpm == NULL) { in tpm_passthru_init()
39 warnx("%s: failed to allocate tpm passthru", __func__); in tpm_passthru_init()
44 tpm->fd = open(path, O_RDWR); in tpm_passthru_init()
45 if (tpm->fd < 0) { in tpm_passthru_init()
46 warnx("%s: unable to open tpm device \"%s\"", __func__, path); in tpm_passthru_init()
50 *sc = tpm; in tpm_passthru_init()
59 struct tpm_passthru *tpm; in tpm_passthru_execute_cmd() local
67 tpm = sc; in tpm_passthru_execute_cmd()
[all …]
H A Dtpm_emul_swtpm.c38 struct tpm_swtpm *tpm; in tpm_swtpm_init() local
42 tpm = calloc(1, sizeof (struct tpm_swtpm)); in tpm_swtpm_init()
43 if (tpm == NULL) { in tpm_swtpm_init()
54 tpm->fd = socket(PF_UNIX, SOCK_STREAM | SOCK_CLOEXEC, 0); in tpm_swtpm_init()
55 if (tpm->fd < 0) { in tpm_swtpm_init()
56 warnx("%s: unable to open tpm socket", __func__); in tpm_swtpm_init()
64 if (connect(tpm->fd, (struct sockaddr *)&tpm_addr, sizeof (tpm_addr)) == in tpm_swtpm_init()
66 warnx("%s: unable to connect to tpm socket \"%s\"", __func__, in tpm_swtpm_init()
71 *sc = tpm; in tpm_swtpm_init()
80 struct tpm_swtpm *tpm; in tpm_swtpm_execute_cmd() local
[all …]
H A Dtpm_device.c25 #define TPM_ACPI_DEVICE_NAME "TPM"
46 const struct tpm_device *const tpm = acpi_device_get_softc(dev); in tpm_build_acpi_table() local
48 if (tpm->intf->build_acpi_table == NULL) { in tpm_build_acpi_table()
52 return (tpm->intf->build_acpi_table(tpm->intf_sc, tpm->vm_ctx)); in tpm_build_acpi_table()
60 const struct tpm_device *const tpm = acpi_device_get_softc(dev); in tpm_write_dsdt() local
61 const struct tpm_ppi *const ppi = tpm->ppi; in tpm_write_dsdt()
70 error = ppi->write_dsdt_regions(tpm->ppi_sc); in tpm_write_dsdt()
89 error = ppi->write_dsdt_dsm(tpm->ppi_sc); in tpm_write_dsdt()
147 warnx("%s: unsupported tpm version %s", __func__, value); in tpm_device_create()
174 warnx("TPM emulation \"%s\" not found", value); in tpm_device_create()
[all …]
H A Dbhyve_config.5141 advanced features, such as TPM emulation, are exposed only via FwCfg.
287 a boot ROM, and, optionally, a TPM module, a fwcfg type,
600 .Ss TPM Device Settings
601 The TPM device stores its configuration under a top-level
602 .Va tpm
603 node rather than under the LPC TPM device's node.
604 Only one TPM device is supported.
606 .Va tpm :
607 .Bl -column "tpm.version" "Format" "Default"
609 .It Va tpm.path Ta string Ta Ta
[all …]
H A Dtpm_intf_crb.c46 #define TPM_CRB_LOG_AREA_FWCFG_NAME "etc/tpm/log"
218 warnx("%s: invalid cmd [%16lx/%8x] outside of TPM " in tpm_crb_thread()
228 warnx("%s: invalid rsp [%16lx/%8x] outside of TPM " in tpm_crb_thread()
251 * Do a basic sanity check of the TPM request header. We'll need in tpm_crb_thread()
252 * the TPM request length for execute_cmd() below. in tpm_crb_thread()
257 warnx("%s: invalid TPM request header", __func__); in tpm_crb_thread()
262 * A TPM command can take multiple seconds to execute. As we've in tpm_crb_thread()
271 * tpm. To avoid reading old data from the command buffer which in tpm_crb_thread()
275 * response has a size of rsp_size (e.g. if the tpm returned an in tpm_crb_thread()
374 /* TODO: cancel the tpm command */ in tpm_crb_mem_handler()
[all …]
H A Dbhyve.8234 the TPM module
235 .Cm tpm ,
438 optionally, a TPM module, a fwcfg type, and the debug/test device.
631 .Ss TPM device backends
635 .Ar type Ns \&, Ns Ar path Ns Op Cm \&, Ns Ar tpm-device-options
639 Emulate a TPM device.
644 Use a physical TPM device.
647 needs to point to a valid TPM device path, i.e.
661 .Ar tpm-device-options
665 Version of the TPM device according to the TCG specification.
H A Dtpm_ppi_qemu.c30 #define TPM_PPI_FWCFG_FILE "etc/tpm/config"
254 * Function 2 - Submit TPM Operation Request to Pre-OS Environment in tpm_ppi_write_dsdt_dsm()
277 * Function 3 - Get Pending TPM Operation Request By the OS in tpm_ppi_write_dsdt_dsm()
325 * Function 5 - Return TPM Operation Response to OS Environment in tpm_ppi_write_dsdt_dsm()
338 * 0x00000001..0x000000FF - Corresponding TPM error code in tpm_ppi_write_dsdt_dsm()
363 * Function 7 - Submit TPM Operation Request to Pre-OS Environment 2 in tpm_ppi_write_dsdt_dsm()
/freebsd/sys/contrib/device-tree/Bindings/timer/
H A Dnxp,tpm-timer.yaml4 $id: http://devicetree.org/schemas/timer/nxp,tpm-timer.yaml#
7 title: NXP Low Power Timer/Pulse Width Modulation Module (TPM)
13 The Timer/PWM Module (TPM) supports input capture, output compare,
17 power modes. TPM can support global counter bus where one TPM drives
23 - const: fsl,imx7ulp-tpm
25 - const: fsl,imx8ulp-tpm
26 - const: fsl,imx7ulp-tpm
36 - description: SoC TPM ipg clock
37 - description: SoC TPM per clock
59 compatible = "fsl,imx7ulp-tpm";
/freebsd/sys/contrib/xen/io/
H A Dtpmif.h4 * TPM I/O interface for Xen guest OSes.
68 * TPM I/O interface for Xen guest OSes, v2
72 * This protocol emulates the request/response behavior of a TPM using a Xen
73 * shared memory interface. All interaction with the TPM is at the direction
74 * of the frontend, since a TPM (hardware or virtual) is a passive device -
77 * The frontend sends a request to the TPM by populating the shared page with
84 * The TPM can either finish the command (changing state to TPMIF_STATE_FINISH)
85 * or can cancel the command and change the state to TPMIF_STATE_IDLE. The TPM
88 * TPM may cancel a command if the interface is seized by another locality.
90 * The TPM command format is defined by the TCG, and is available at
[all …]
/freebsd/share/man/man4/
H A Dtpm.420 .Nm tpm
27 .Cd "device tpm"
39 .Cd hint.tpm.0.at="isa"
40 .Cd hint.tpm.0.maddr="0xfed40000"
41 .Cd hint.tpm.0.msize="0x5000"
42 .Cd hint.tpm.1.at="isa"
43 .Cd hint.tpm.1.maddr="0xfed40000"
44 .Cd hint.tpm.1.msize="0x1000"
48 driver provides support for various trusted platform modules (TPM) that can
84 .Lk "https://trustedcomputinggroup.org/resource/tpm-main-specification/" .
/freebsd/sys/contrib/device-tree/Bindings/security/tpm/
H A Dtpm-i2c.txt1 * Device Tree Bindings for I2C based Trusted Platform Module(TPM)
6 - label : human readable string describing the device, eg. "tpm"
13 - powered-while-suspended: present when the TPM is left powered on between
17 Example (for OpenPower Systems with Nuvoton TPM 2.0 on I2C)
20 tpm@57 {
22 label = "tpm";
H A Dtpm_tis_mmio.txt3 The TCG defines multi vendor standard for accessing a TPM chip, this
4 is the standard protocol defined to access the TPM via MMIO. Typically
7 Refer to the 'TCG PC Client Specific TPM Interface Specification (TIS)' TCG
13 "tcg,tpm-tis-mmio". Valid chip strings are:
21 compatible = "atmel,at97sc3204", "tcg,tpm-tis-mmio";
H A Dgoogle,cr50.txt4 functions, including TPM-like functionality. It communicates over
14 tpm@0 {
/freebsd/sys/modules/tpm/
H A DMakefile1 .PATH: ${SRCTOP}/sys/dev/tpm
3 KMOD= tpm
10 SRCS+= tpm.c
15 #TPM 2.0
/freebsd/sys/dev/tpm/
H A Dtpm_if.m29 #include <dev/tpm/tpm20.h>
31 INTERFACE tpm;
34 # Transfer data to the TPM data buffer
48 # Read 4 bytes (host endian) from a TPM register
H A Dtpm.c40 #include <dev/tpm/tpmvar.h>
144 .d_name = "tpm",
190 * FreeBSD specific code for probing and attaching TPM to device tree.
196 BUS_ADD_CHILD(parent, ISA_ORDER_SPECULATIVE, "tpm", 0);
241 if ((sc->sc_init)(sc, irq, "tpm")) { in tpm_attach()
255 UID_ROOT, GID_WHEEL, 0600, "tpm"); in tpm_attach()
287 /* Probe TPM using TIS 1.2 interface. */
299 printf("tpm: caps=%b\n", r, TPM_CAPBITS); in tpm_tis12_probe()
304 printf("tpm: caps too low (caps=%b)\n", r, TPM_CAPBITS); in tpm_tis12_probe()
357 /* Setup TPM using TIS 1.2 interface. */
[all …]
H A Dtpm_acpi.c62 /*In some case, TPM existence is found only in TPCA header*/
75 "tpm", tpm_acpi_methods, sizeof(struct tpm_softc),
78 DRIVER_MODULE(tpm, acpi, tpm_acpi_driver, 0, 0);
/freebsd/sys/conf/
H A Dfiles.i386
/freebsd/contrib/libfido2/src/
H A Dtpm.c9 * Trusted Platform Module (TPM) 2.0 attestation support. Documentation
10 * references are relative to revision 01.38 of the TPM 2.0 specification.
38 #define TPMA_SENSITIVE 0x00000020 /* data originates within tpm */
67 uint32_t reset_count; /* obfuscated by tpm */
68 uint32_t restart_count; /* obfuscated by tpm */
77 tpm_sha256_name_t signer; /* full tpm path of signing key */
80 uint64_t fwversion; /* obfuscated by tpm */
82 tpm_sha256_name_t qual_name; /* full tpm path of attested key */
/freebsd/sys/contrib/device-tree/Bindings/pwm/
H A Dimx-tpm-pwm.yaml4 $id: http://devicetree.org/schemas/pwm/imx-tpm-pwm.yaml#
7 title: Freescale i.MX TPM PWM controller
15 The TPM counter and period counter are shared between multiple
/freebsd/contrib/llvm-project/llvm/lib/IR/
H A DLegacyPassManager.cpp885 const PassInfo *PInf = TPM->findAnalysisPassInfo(PI); in recordAvailableAnalysis()
894 AnalysisUsage *AnUsage = TPM->findAnalysisUsage(P); in preserveHigherLevelAnalysis()
914 AnalysisUsage *AnUsage = TPM->findAnalysisUsage(P); in verifyPreservedAnalysis()
928 AnalysisUsage *AnUsage = TPM->findAnalysisUsage(P); in removeNotPreservedAnalysis()
978 // If this is a on the fly manager then it does not have TPM. in removeDeadPasses()
979 if (!TPM) in removeDeadPasses()
982 TPM->collectLastUses(DeadPasses, P); in removeDeadPasses()
1007 if (const PassInfo *PInf = TPM->findAnalysisPassInfo(PI)) { in freePass()
1071 TPM->setLastUser(LastUses, P); in add()
1075 TPM->setLastUser(TransferLastUses, My_PM); in add()
[all …]
/freebsd/lib/libsecureboot/
H A Dvepcr.c34 * to feed to a TPM pcr register - hence the name ve_pcr.
36 * NOTE: in the current standard the TPM pcr register size is for SHA1,
39 * before feeding to TPM.
59 * Real TPM registers only hold a SHA1 hash

123456