Searched full:tpm (Results 1 – 25 of 31) sorted by relevance
12
| /Documentation/devicetree/bindings/tpm/ |
| D | tcg,tpm-tis-i2c.yaml | 4 $id: http://devicetree.org/schemas/tpm/tcg,tpm-tis-i2c.yaml# 14 for accessing a TPM chip. It can be transported over various buses, 16 TCG PC Client Specific TPM Interface Specification (TIS) 17 …https://trustedcomputinggroup.org/resource/pc-client-work-group-pc-client-specific-tpm-interface-s… 21 TCG PC Client Platform TPM Profile Specification for TPM 2.0 (PTP) 22 https://trustedcomputinggroup.org/resource/pc-client-platform-tpm-profile-ptp-specification/ 24 Recent TPM 2.0 chips conform to this generic interface, others use a 30 - description: Generic TPM 2.0 chips conforming to TCG PTP interface 36 - const: tcg,tpm-tis-i2c 38 - description: TPM 1.2 and 2.0 chips with vendor-specific I²C interface [all …]
|
| D | tcg,tpm-tis-mmio.yaml | 4 $id: http://devicetree.org/schemas/tpm/tcg,tpm-tis-mmio.yaml# 14 for accessing a TPM chip. It can be transported over various buses, 16 TCG PC Client Specific TPM Interface Specification (TIS) 17 …https://trustedcomputinggroup.org/resource/pc-client-work-group-pc-client-specific-tpm-interface-s… 25 - socionext,synquacer-tpm-mmio 26 - const: tcg,tpm-tis-mmio 34 - $ref: tpm-common.yaml# 44 tpm@90000 { 45 compatible = "atmel,at97sc3204", "tcg,tpm-tis-mmio";
|
| D | google,cr50.yaml | 4 $id: http://devicetree.org/schemas/tpm/google,cr50.yaml# 17 The chip provides several functions, including TPM 2.0 like functionality. 19 TCG PC Client Platform TPM Profile Specification for TPM 2.0 (PTP), sec 6: 20 https://trustedcomputinggroup.org/resource/pc-client-platform-tpm-profile-ptp-specification/ 27 - $ref: tpm-common.yaml# 31 - $ref: tcg,tpm-tis-i2c.yaml#/properties/reg 45 tpm@0 { 58 tpm@50 {
|
| D | microsoft,ftpm.yaml | 4 $id: http://devicetree.org/schemas/tpm/microsoft,ftpm.yaml# 20 Microsoft's firmware-based TPM 2.0 (fTPM) leverages ARM TrustZone to overcome 24 https://www.microsoft.com/en-us/research/publication/ftpm-software-implementation-tpm-chip/ 25 https://github.com/Microsoft/ms-tpm-20-ref/tree/main/Samples/ARM32-FirmwareTPM 37 - $ref: tpm-common.yaml# 43 tpm {
|
| D | tpm-common.yaml | 4 $id: http://devicetree.org/schemas/tpm/tpm-common.yaml# 14 pattern: '^tpm(@[0-9a-f]+)?$' 21 description: human readable string describing the device, e.g. "tpm" 39 present when the TPM is left powered on between suspend and resume 44 description: Reset controller to reset the TPM 48 description: Output GPIO pin to reset the TPM
|
| D | tcg,tpm_tis-spi.yaml | 4 $id: http://devicetree.org/schemas/tpm/tcg,tpm_tis-spi.yaml# 14 for accessing a TPM chip. It can be transported over various buses, 16 TCG PC Client Specific TPM Interface Specification (TIS) 17 …https://trustedcomputinggroup.org/resource/pc-client-work-group-pc-client-specific-tpm-interface-s… 30 - $ref: tpm-common.yaml# 54 tpm@0 { 68 tpm@0 {
|
| D | ibm,vtpm.yaml | 4 $id: http://devicetree.org/schemas/tpm/ibm,vtpm.yaml# 13 Virtual TPM is used on IBM POWER7+ and POWER8 systems running POWERVM. 16 without the physical TPM hardware. The TPM functionality is provided by 81 - $ref: tpm-common.yaml# 91 tpm@30000003 {
|
| /Documentation/security/tpm/ |
| D | tpm_vtpm_proxy.rst | 2 Virtual TPM Proxy Driver for Linux Containers 14 The goal of this work is to provide TPM functionality to each Linux 15 container. This allows programs to interact with a TPM in a container 16 the same way they interact with a TPM on the physical system. Each 17 container gets its own unique, emulated, software TPM. 22 To make an emulated software TPM available to each container, the container 23 management stack needs to create a device pair consisting of a client TPM 27 is passed to the TPM emulator. Software inside the container can then send 28 TPM commands using the character device and the emulator will receive the 31 To support this, the virtual TPM proxy driver provides a device ``/dev/vtpmx`` [all …]
|
| D | tpm-security.rst | 3 TPM Security 7 use of the TPM reasonably robust in the face of external snooping and 9 in the literature). The current security document is for TPM 2.0. 14 The TPM is usually a discrete chip attached to a PC via some type of 16 PTT, which is a software TPM running inside a software environment 19 hardware TPM, which is the use case discussed here. 24 The current state of the art for snooping the `TPM Genie`_ hardware 27 successfully demonstrated against the `Windows Bitlocker TPM`_ system. 28 Most recently the same `attack against TPM based Linux disk 32 evaporate. However, the goal of this document is to protect TPM [all …]
|
| D | xen-tpmfront.rst | 2 Virtual TPM interface for Xen 9 Linux, and a basic understanding of the TPM and vTPM concepts. 14 The goal of this work is to provide a TPM functionality to a virtual guest 16 a TPM in a virtual system the same way they interact with a TPM on the physical 17 system. Each guest gets its own unique, emulated, software TPM. However, each 19 which seals the secrets to the Physical TPM. If the process of creating each of 21 the chain of trust rooted in the hardware TPM to virtual machines in Xen. Each 66 | Hardware TPM | 74 Linux kernel virtual TPM frontend driver. This driver 78 Mini-os TPM backend driver. The Linux frontend driver [all …]
|
| D | tpm_tis.rst | 4 TPM FIFO interface driver 18 tpm_tis comes from the TPM Interface Specification, which is the hardware 19 interface specification for TPM 1.x chips. 21 Communication is based on a 20 KiB buffer shared by the TPM chip through a 24 sets of registers for communication between the CPU and TPM. These 27 When the kernel wants to send commands to the TPM chip, it first reserves 40 in section 3.2 of the TCG PC Client Platform TPM Profile Specification. 45 TCG PC Client Platform TPM Profile (PTP) Specification 46 https://trustedcomputinggroup.org/resource/pc-client-platform-tpm-profile-ptp-specification/
|
| D | tpm_ftpm_tee.rst | 2 Firmware TPM Driver 12 environment. The driver allows programs to interact with the TPM in the same 13 way they would interact with a hardware TPM. 18 The driver acts as a thin layer that passes commands to and from a TPM 26 userspace which will enable userspace to communicate with the firmware TPM
|
| D | tpm_event_log.rst | 4 TPM Event Log 7 This document briefly describes what TPM log is and how it is handed 47 configuration table so that the TPM driver can later on skip these events when 55 - [2] The final concatenation is done in drivers/char/tpm/eventlog/efi.c
|
| D | index.rst | 8 tpm-security
|
| /Documentation/ABI/stable/ |
| D | sysfs-class-tpm | 1 What: /sys/class/tpm/tpmX/device/ 5 Description: The device/ directory under a specific TPM instance exposes 6 the properties of that TPM chip 9 What: /sys/class/tpm/tpmX/device/active 13 Description: The "active" property prints a '1' if the TPM chip is accepting 14 commands. An inactive TPM chip still contains all the state of 17 commands. See the TPM Main Specification part 2, Structures, 21 What: /sys/class/tpm/tpmX/device/cancel 26 pending TPM command. Writing any value to cancel will call the 27 TPM vendor specific cancel operation. [all …]
|
| /Documentation/devicetree/bindings/timer/ |
| D | nxp,tpm-timer.yaml | 4 $id: http://devicetree.org/schemas/timer/nxp,tpm-timer.yaml# 7 title: NXP Low Power Timer/Pulse Width Modulation Module (TPM) 13 The Timer/PWM Module (TPM) supports input capture, output compare, 17 power modes. TPM can support global counter bus where one TPM drives 23 - const: fsl,imx7ulp-tpm 25 - const: fsl,imx8ulp-tpm 26 - const: fsl,imx7ulp-tpm 36 - description: SoC TPM ipg clock 37 - description: SoC TPM per clock 59 compatible = "fsl,imx7ulp-tpm";
|
| /Documentation/ABI/testing/ |
| D | sysfs-driver-ppi | 1 What: /sys/class/tpm/tpmX/ppi/ 7 Presence Interface). Only if TPM is supported by BIOS, this 18 What: /sys/class/tpm/tpmX/ppi/version 26 What: /sys/class/tpm/tpmX/ppi/request 36 What: /sys/class/tpm/tpmX/ppi/response 45 What: /sys/class/tpm/tpmX/ppi/transition_action 55 What: /sys/class/tpm/tpmX/ppi/tcg_operations 66 What: /sys/class/tpm/tpmX/ppi/vs_operations
|
| D | sysfs-driver-ccp | 73 whether the HSP TPM has been activated.
|
| /Documentation/security/keys/ |
| D | trusted-encrypted.rst | 28 (1) TPM (Trusted Platform Module: hardware device) 30 Rooted to Storage Root Key (SRK) which never leaves the TPM that 55 (1) TPM 76 (1) TPM 79 values, and only unsealed by the TPM, if PCRs and blob integrity 103 (1) TPM 139 * TPM: hardware device based RNG 141 Keys are generated within the TPM. Strength of random numbers may vary 182 Trusted Keys usage: TPM 185 TPM 1.2: By default, trusted keys are sealed under the SRK, which has the [all …]
|
| D | ecryptfs.rst | 13 to support other mechanisms like public key cryptography, PKCS#11 and TPM based
|
| /Documentation/devicetree/bindings/pwm/ |
| D | imx-tpm-pwm.yaml | 4 $id: http://devicetree.org/schemas/pwm/imx-tpm-pwm.yaml# 7 title: Freescale i.MX TPM PWM controller 15 The TPM counter and period counter are shared between multiple
|
| /Documentation/security/ |
| D | index.rst | 18 tpm/index
|
| /Documentation/arch/x86/ |
| D | intel_txt.rst | 112 tboot then verifies certain aspects of the environment (e.g. TPM NV 129 - This policy is rooted in TPM NV and is described in the tboot 175 has been restored, it will restore the TPM PCRs and then 181 authentication code) over and then seal with the TPM. On resume 196 In BIOS, the user must enable: TPM, TXT, VT-x, VT-d. Not all BIOSes
|
| /Documentation/crypto/ |
| D | asymmetric-keys.rst | 32 a TPM) that might be used to both retain the relevant key and perform 34 merely be an interface to the TPM driver. 43 system (for example, a TPM). 72 only keys of the specified subtype (e.g. tpm) will be matched. For 75 keyctl search @s asymmetric tpm:5acc2142 245 - Pointer to TPM key.
|
| /Documentation/admin-guide/ |
| D | kernel-parameters.rst | 170 TPM TPM drivers are enabled.
|
12