summaryrefslogtreecommitdiffstats
path: root/src/security/tpm
Commit message (Expand)AuthorAgeFilesLines
* security/tpm: Add crypto agility supportPhilipp Deppenwiese2021-02-074-10/+58
* security/tpm: Add a Kconfig to disregard INVALID_POSTINIT on startupArthur Heymans2019-10-172-0/+14
* src/security: Remove unused #include <fmap.h>Elyes HAOUAS2019-09-151-1/+0
* Revert "security/tpm/tss/tcg-2.0: Add multi digits support to tlcl_extend()"Julius Werner2019-09-112-74/+7
* security/tpm: Use correct hash digest lengthsJacob Garber2019-09-072-7/+7
* security/tpm/tss/tcg-2.0: Add support for algorithmsFrans Hendriks2019-09-061-2/+23
* security/tpm/tss/tcg-2.0: Add multi digits support to tlcl_extend()Frans Hendriks2019-09-053-13/+88
* security/tpm/tss/tcg-2.0: Use tlcl_get_hash_size_from_algo() for hash sizeFrans Hendriks2019-09-034-7/+58
* Split MAYBE_STATIC to _BSS and _NONZERO variantsKyösti Mälkki2019-08-261-2/+2
* tpm/tspi: include vb2_sha for vb2_get_hash_algorithm_nameJoel Kitching2019-08-081-0/+1
* drivers/crb: Add CRB driver for TPM2 supportChristian Walter2019-07-311-2/+2
* security/tpm/tss/tcg-2.0: Add TPM2 function tlcl_getcapability()Frans Hendriks2019-07-194-0/+80
* security/tpm/tss/tcg-2.0/tss.c: Add debug message to tlcl_lib_init()Frans Hendriks2019-07-011-2/+7
* security/tpm/Makefile.inc: Remove VBOOT dependency for tss files in postcarFrans Hendriks2019-06-211-2/+2
* vboot: include vb2_sha.h when requiredJoel Kitching2019-05-091-0/+1
* security/tpm: Change POWER_OFF_ON_CR50_UPDATE so it can be disabledKeith Short2019-04-241-1/+1
* {src,util}: Correct typo in comment and debug stringFrans Hendriks2019-04-082-3/+3
* src: Use include <reset.h> when appropriateElyes HAOUAS2019-03-291-1/+0
* src: Use 'include <string.h>' when appropriateElyes HAOUAS2019-03-203-3/+0
* coreboot: Replace all IS_ENABLED(CONFIG_XXX) with CONFIG(XXX)Julius Werner2019-03-083-13/+13
* security/tpm: Fix TCPA log featurePhilipp Deppenwiese2019-03-074-49/+179
* security/vboot: Add measured boot modePhilipp Deppenwiese2019-02-251-5/+2
* coreboot: check Cr50 PM mode on normal bootKeith Short2019-02-135-3/+136
* tss/tcg-2.0: remove unnecessary break from marshaling codeJoel Kitching2019-01-171-1/+0
* src/security/tpm: query recovery mode from Cr50Keith Short2019-01-174-0/+31
* tss: implement tlcl_save_stateJoel Kitching2018-11-285-0/+57
* src: Add missing include <stdint.h>Elyes HAOUAS2018-11-013-0/+6
* security/tpm: Add function to measure a region deviceWerner Zeh2018-10-313-0/+82
* security/tpm: Fix references to tpm_setup functionJonathan Neuschäfer2018-10-301-3/+3
* src: Add missing include <stdint.h>Elyes HAOUAS2018-10-301-0/+2
* tpm2/tlcl_send_startup: should pass on TPM_E_INVALID_POSTINITJoel Kitching2018-10-241-3/+15
* tpm/tspi: clean up tpm_setup function flowJoel Kitching2018-10-181-38/+46
* tpm/tpm_setup: fail on invalid result from tlcl_resumeJoel Kitching2018-10-171-2/+17
* vc/google/chromeos/ec: remove EC hibernate in cr50 update pathAaron Durbin2018-10-151-6/+0
* Move compiler.h to commonlibNico Huber2018-10-081-1/+0
* tpm2/tlcl_send_startup: correct TPM2_Startup error logicJoel Kitching2018-10-051-7/+6
* security/tpm: Fix TPM 1.2 state machine issuesPhilipp Deppenwiese2018-08-211-17/+14
* cr50: Allow boards to disable powering off EC on cr50 updateDaisuke Nojiri2018-08-171-0/+6
* src: Fix typoElyes HAOUAS2018-08-101-1/+1
* security/tpm: Report tpm_unmarshal_response warningRichard Spiegel2018-08-081-0/+3
* security/tpm: Check for NULL pointerFurquan Shaikh2018-08-071-0/+4
* security/tpm: Improve TCPA log generationPhilipp Deppenwiese2018-08-032-27/+25
* security/tpm/tspi: Set return type of tcpa_log_add_table_entry as voidFurquan Shaikh2018-07-313-13/+10
* security/vboot: Enable TCPA log extensionPhilipp Deppenwiese2018-07-302-6/+16
* security/tpm: Add TCPA logging functionalityPhilipp Deppenwiese2018-07-283-8/+95
* security/tpm: Unify the coreboot TPM software stackPhilipp Deppenwiese2018-06-0421-849/+869
* security/tpm: Fix TPM software stack vulnerabilityzaolin2018-03-161-1/+4
* security/tpm: Move TSS stacks into sub-directoryPhilipp Deppenwiese2018-01-188-12/+14
* security/tpm: Change TPM naming for different layers.Philipp Deppenwiese2018-01-1811-36/+36
* security/tpm: Move tpm TSS and TSPI layer to security sectionPhilipp Deppenwiese2018-01-1814-0/+2794