/Linux-v5.10/drivers/char/tpm/ |
D | Kconfig | 3 # TPM device configuration 7 tristate "TPM Hardware Support" 13 If you have a TPM security chip in your system, which 21 will be called tpm. If unsure, say N. 23 1) For more TPM drivers enable CONFIG_PNP, CONFIG_ACPI 31 bool "TPM HW Random Number Generator support" 35 This setting exposes the TPM's Random Number Generator as a hwrng 36 device. This allows the kernel to collect randomness from the TPM at 37 boot, and provides the TPM randomines in /dev/hwrng. 44 TCG TIS TPM core driver. It implements the TPM TCG TIS logic and hooks [all …]
|
D | Makefile | 3 # Makefile for the kernel tpm device drivers. 5 obj-$(CONFIG_TCG_TPM) += tpm.o 6 tpm-y := tpm-chip.o 7 tpm-y += tpm-dev-common.o 8 tpm-y += tpm-dev.o 9 tpm-y += tpm-interface.o 10 tpm-y += tpm1-cmd.o 11 tpm-y += tpm2-cmd.o 12 tpm-y += tpmrm-dev.o 13 tpm-y += tpm2-space.o [all …]
|
D | tpm1-cmd.c | 12 * Device driver for TCG/TCPA TPM (trusted platform module). 23 #include "tpm.h" 31 * TCG Specification TPM Main Part 2 TPM Structures Section 17. The 283 * @chip: TPM chip to use. 284 * @ordinal: TPM command ordinal. 315 * tpm_startup() - turn on the TPM 316 * @chip: TPM chip to use 318 * Normally the firmware should start the TPM. This function is provided as a 320 * example when a TPM emulator is used. 329 dev_info(&chip->dev, "starting up the TPM manually\n"); in tpm1_startup() [all …]
|
D | tpm-interface.c | 14 * Device driver for TCG/TCPA TPM (trusted platform module). 17 * Note, the TPM chip is not interrupt driven (only polling) 30 #include "tpm.h" 33 * Bug workaround - some TPM's don't flush the most 44 * @chip: TPM chip to use. 45 * @ordinal: TPM command ordinal. 137 * tpm_transmit - Internal kernel interface to transmit TPM commands. 138 * @chip: a TPM chip to use 139 * @buf: a TPM command buffer 140 * @bufsiz: length of the TPM command buffer [all …]
|
D | tpm_vtpm_proxy.c | 24 #include "tpm.h" 43 size_t req_len; /* length of queued TPM request */ 44 size_t resp_len; /* length of queued TPM response */ 47 struct work_struct work; /* task that retrieves TPM timeouts */ 62 * vtpm_proxy_fops_read - Read TPM commands on 'server side' 117 * vtpm_proxy_fops_write - Write TPM responses on 'server side' 211 *@proxy_dev: tpm proxy device 221 /* no more TPM responses -- wake up anyone waiting for them */ in vtpm_proxy_fops_undo_open() 254 * Functions invoked by the core TPM driver to send TPM commands to 259 * Called when core TPM driver reads TPM responses from 'server side' [all …]
|
D | tpm2-cmd.c | 14 #include "tpm.h" 49 * @ordinal: TPM command ordinal. 120 * @chip: TPM chip to use. 121 * @ordinal: TPM command ordinal. 154 * @chip: TPM chip to use. 229 * @chip: TPM chip to use. 278 * tpm2_get_random() - get random bytes from the TPM RNG 286 * -errno otherwise (positive TPM return codes are masked to -EIO) 345 * @chip: TPM chip to use 384 * -errno or a TPM return code otherwise [all …]
|
D | tpm-chip.c | 15 * TPM chip management routines. 26 #include "tpm.h" 93 * tpm_chip_start() - power on the TPM 94 * @chip: a TPM chip to use 126 * tpm_chip_stop() - power off the TPM 127 * @chip: a TPM chip to use 194 * tpm_default_chip() - find a TPM chip and get a reference to it 221 * tpm_find_get_ops() - find and reserve a TPM chip 224 * Finds a TPM chip and reserves its class device and operations. The chip must 226 * This function is for internal use only. It supports existing TPM callers [all …]
|
D | tpm_i2c_atmel.c | 3 * ATMEL I2C TPM AT97SC3204T 11 * Teddy Reed determined the basic I2C command flow, unlike other I2C TPM 12 * devices the raw TCG formatted TPM command data is written via I2C and then 13 * raw TCG formatted TPM command data is returned via I2C. 23 #include "tpm.h" 104 dev_err(&chip->dev, "TPM operation cancellation was requested, but is not supported"); in i2c_atmel_cancel() 113 /* The TPM fails the I2C read until it is ready, so we do the entire in i2c_atmel_read_status() 120 /* Once the TPM has completed the command the command remains readable in i2c_atmel_read_status() 176 * information seems to be read via TPM commands. Thus we rely on the in i2c_atmel_probe() 177 * TPM startup process in the common code to detect the device. */ in i2c_atmel_probe() [all …]
|
D | tpm_ftpm_tee.c | 5 * Implements a firmware TPM as described here: 6 * https://www.microsoft.com/en-us/research/publication/ftpm-software-implementation-tpm-chip/ 9 * https://github.com/microsoft/ms-tpm-20-ref/tree/master/Samples/ARM32-FirmwareTPM/optee_ta/fTPM 17 #include <linux/tpm.h> 20 #include "tpm.h" 28 …* https://github.com/microsoft/ms-tpm-20-ref/blob/master/Samples/ARM32-FirmwareTPM/optee_ta/fTPM/i… 36 * @chip: the tpm_chip description as specified in driver/char/tpm/tpm.h. 64 * ftpm_tee_tpm_op_send() - send TPM commands through the TEE shared memory. 65 * @chip: the tpm_chip description as specified in driver/char/tpm/tpm.h 150 dev_err(&chip->dev, "%s: tpm response header too small\n", in ftpm_tee_tpm_op_send() [all …]
|
/Linux-v5.10/drivers/pwm/ |
D | pwm-imx-tpm.c | 6 * - The TPM counter and period counter are shared between 92 struct imx_tpm_pwm_chip *tpm = to_imx_tpm_pwm_chip(chip); in pwm_imx_tpm_round_state() local 96 rate = clk_get_rate(tpm->clk); in pwm_imx_tpm_round_state() 139 struct imx_tpm_pwm_chip *tpm = to_imx_tpm_pwm_chip(chip); in pwm_imx_tpm_get_state() local 144 state->period = tpm->real_period; in pwm_imx_tpm_get_state() 147 rate = clk_get_rate(tpm->clk); in pwm_imx_tpm_get_state() 148 val = readl(tpm->base + PWM_IMX_TPM_SC); in pwm_imx_tpm_get_state() 150 tmp = readl(tpm->base + PWM_IMX_TPM_CnV(pwm->hwpwm)); in pwm_imx_tpm_get_state() 155 val = readl(tpm->base + PWM_IMX_TPM_CnSC(pwm->hwpwm)); in pwm_imx_tpm_get_state() 175 struct imx_tpm_pwm_chip *tpm = to_imx_tpm_pwm_chip(chip); in pwm_imx_tpm_apply_hw() local [all …]
|
/Linux-v5.10/Documentation/ABI/stable/ |
D | sysfs-class-tpm | 1 What: /sys/class/tpm/tpmX/device/ 5 Description: The device/ directory under a specific TPM instance exposes 6 the properties of that TPM chip 9 What: /sys/class/tpm/tpmX/device/active 13 Description: The "active" property prints a '1' if the TPM chip is accepting 14 commands. An inactive TPM chip still contains all the state of 17 commands. See the TPM Main Specification part 2, Structures, 21 What: /sys/class/tpm/tpmX/device/cancel 26 pending TPM command. Writing any value to cancel will call the 27 TPM vendor specific cancel operation. [all …]
|
/Linux-v5.10/Documentation/security/tpm/ |
D | tpm_vtpm_proxy.rst | 2 Virtual TPM Proxy Driver for Linux Containers 14 The goal of this work is to provide TPM functionality to each Linux 15 container. This allows programs to interact with a TPM in a container 16 the same way they interact with a TPM on the physical system. Each 17 container gets its own unique, emulated, software TPM. 22 To make an emulated software TPM available to each container, the container 23 management stack needs to create a device pair consisting of a client TPM 27 is passed to the TPM emulator. Software inside the container can then send 28 TPM commands using the character device and the emulator will receive the 31 To support this, the virtual TPM proxy driver provides a device ``/dev/vtpmx`` [all …]
|
D | xen-tpmfront.rst | 2 Virtual TPM interface for Xen 9 Linux, and a basic understanding of the TPM and vTPM concepts. 14 The goal of this work is to provide a TPM functionality to a virtual guest 16 a TPM in a virtual system the same way they interact with a TPM on the physical 17 system. Each guest gets its own unique, emulated, software TPM. However, each 19 which seals the secrets to the Physical TPM. If the process of creating each of 21 the chain of trust rooted in the hardware TPM to virtual machines in Xen. Each 66 | Hardware TPM | 74 Linux kernel virtual TPM frontend driver. This driver 78 Mini-os TPM backend driver. The Linux frontend driver [all …]
|
D | tpm_ftpm_tee.rst | 2 Firmware TPM Driver 12 environment. The driver allows programs to interact with the TPM in the same 13 way they would interact with a hardware TPM. 18 The driver acts as a thin layer that passes commands to and from a TPM 26 userspace which will enable userspace to communicate with the firmware TPM
|
/Linux-v5.10/drivers/char/tpm/st33zp24/ |
D | i2c.c | 3 * STMicroelectronics TPM I2C Linux driver for TPM ST33ZP24 14 #include <linux/tpm.h> 17 #include "../tpm.h" 31 * @param: tpm_register, the tpm tis register where the data should be written 48 * @param: tpm_register, the tpm tis register where the data should be read 49 * @param: tpm_data, the TPM response 50 * @param: tpm_size, tpm TPM response size to read. 70 * @param: tpm_register, the tpm tis register where the data should be written 86 * @param: tpm_register, the tpm tis register where the data should be read 87 * @param: tpm_data, the TPM response [all …]
|
D | st33zp24.c | 3 * STMicroelectronics TPM Linux driver for TPM ST33ZP24 21 #include "../tpm.h" 65 * @param: tpm_dev, the tpm device device. 80 * @param: chip, the tpm_chip description as specified in driver/char/tpm/tpm.h 93 * @param: chip, the tpm chip description 107 * @param: chip, the tpm chip description 126 * request_locality request the TPM locality 160 * @param: chip, the tpm chip description. 232 * @param: chip, the tpm chip description 237 * @return: the tpm status, 0 if success, -ETIME if timeout is reached. [all …]
|
D | spi.c | 3 * STMicroelectronics TPM SPI Linux driver for TPM ST33ZP24 14 #include <linux/tpm.h> 17 #include "../tpm.h" 43 * TPM command can be up to 2048 byte, A TPM response can be up to 50 * 2048 (for the TPM command) + 1024 (for the TPM answer). We need 96 * @param: tpm_register, the tpm tis register where the data should be written 139 * @param: tpm_register, the tpm tis register where the data should be read 140 * @param: tpm_data, the TPM response 141 * @param: tpm_size, tpm TPM response size to read. 180 * @param: tpm_register, the tpm tis register where the data should be read [all …]
|
D | Kconfig | 6 TPM1.2 logic and hooks into the TPM kernel APIs. Physical layers will 13 tristate "STMicroelectronics TPM Interface Specification 1.2 Interface (I2C)" 17 This module adds support for the STMicroelectronics TPM security chip 23 tristate "STMicroelectronics TPM Interface Specification 1.2 Interface (SPI)" 27 This module adds support for the STMicroelectronics TPM security chip
|
/Linux-v5.10/security/integrity/ima/ |
D | ima_init.c | 28 * Calculate the boot aggregate, a hash over tpm registers 0-7, 29 * assuming a TPM chip exists, and zeroes if the TPM chip does not 33 * If a tpm chip does not exist, indicate the core root of trust is 62 * With TPM 2.0 hash agility, TPM chips could support multiple TPM in ima_add_boot_aggregate() 66 * Use the same hash algorithm for reading the TPM PCRs as for in ima_add_boot_aggregate() 69 * TCG required banks - SHA256 for TPM 2.0, SHA1 for TPM 1.2. in ima_add_boot_aggregate() 70 * Ultimately select SHA1 also for TPM 2.0 if the SHA256 PCR bank in ima_add_boot_aggregate() 119 pr_info("No TPM chip found, activating TPM-bypass!\n"); in ima_init() 132 /* It can be called before ima_init_digests(), it does not use TPM. */ in ima_init()
|
/Linux-v5.10/Documentation/devicetree/bindings/timer/ |
D | nxp,tpm-timer.yaml | 4 $id: http://devicetree.org/schemas/timer/nxp,tpm-timer.yaml# 7 title: NXP Low Power Timer/Pulse Width Modulation Module (TPM) 13 The Timer/PWM Module (TPM) supports input capture, output compare, 17 power modes. TPM can support global counter bus where one TPM drives 22 const: fsl,imx7ulp-tpm 32 - description: SoC TPM ipg clock 33 - description: SoC TPM per clock 55 compatible = "fsl,imx7ulp-tpm";
|
/Linux-v5.10/include/uapi/linux/ |
D | vtpm_proxy.h | 24 * enum vtpm_proxy_flags - flags for the proxy TPM 25 * @VTPM_PROXY_FLAG_TPM2: the proxy TPM uses TPM 2.0 protocol 34 * @flags: flags for the proxy TPM 35 * @tpm_num: index of the TPM device 36 * @fd: the file descriptor used by the proxy TPM 37 * @major: the major number of the TPM device 38 * @minor: the minor number of the TPM device
|
/Linux-v5.10/Documentation/ABI/testing/ |
D | sysfs-driver-ppi | 1 What: /sys/class/tpm/tpmX/ppi/ 7 Presence Interface). Only if TPM is supported by BIOS, this 18 What: /sys/class/tpm/tpmX/ppi/version 26 What: /sys/class/tpm/tpmX/ppi/request 36 What: /sys/class/tpm/tpmX/ppi/response 45 What: /sys/class/tpm/tpmX/ppi/transition_action 55 What: /sys/class/tpm/tpmX/ppi/tcg_operations 66 What: /sys/class/tpm/tpmX/ppi/vs_operations
|
/Linux-v5.10/Documentation/devicetree/bindings/security/tpm/ |
D | tpm-i2c.txt | 1 * Device Tree Bindings for I2C based Trusted Platform Module(TPM) 6 - label : human readable string describing the device, eg. "tpm" 13 - powered-while-suspended: present when the TPM is left powered on between 17 Example (for OpenPower Systems with Nuvoton TPM 2.0 on I2C) 20 tpm@57 { 22 label = "tpm";
|
D | tpm_tis_mmio.txt | 3 The TCG defines multi vendor standard for accessing a TPM chip, this 4 is the standard protocol defined to access the TPM via MMIO. Typically 7 Refer to the 'TCG PC Client Specific TPM Interface Specification (TIS)' TCG 13 "tcg,tpm-tis-mmio". Valid chip strings are: 21 compatible = "atmel,at97sc3204", "tcg,tpm-tis-mmio";
|
/Linux-v5.10/Documentation/security/keys/ |
D | trusted-encrypted.rst | 9 of a Trusted Platform Module (TPM) chip for greater security, while Encrypted 13 Trusted Keys use a TPM both to generate and to seal the keys. Keys are sealed 14 under a 2048 bit RSA key in the TPM, and optionally sealed to specified PCR 15 (integrity measurement) values, and only unsealed by the TPM, if PCRs and blob 21 TPM 1.2 28 TPM 2.0 56 TPM 1.2: default 0x40000000 (SRK) 57 TPM 2.0: no default; must be passed every time 66 hash= hash algorithm name as a string. For TPM 1.x the only 67 allowed value is sha1. For TPM 2.x the allowed values [all …]
|