summaryrefslogtreecommitdiffstats
path: root/src/security/tpm
Commit message (Expand)AuthorAgeFilesLines
* src: Remove redundant <rules.h> and <commonlib/bsd/compiler.h>Elyes HAOUAS2022-01-121-1/+0
* cbfs: Remove deprecated APIsJulius Werner2021-12-061-1/+0
* cbfs | tspi: Join hash calculation for verification and measurementJulius Werner2021-12-034-78/+31
* security/tpm/tcg-2.0: Handle TPM_RC_NV_RANGE return codeKarthikeyan Ramasubramanian2021-11-173-0/+5
* src/mainboard to src/security: Fix spelling errorsMartin Roth2021-10-053-4/+4
* security/tpm/tspi/crtm.c: Fix early initArthur Heymans2021-06-211-0/+4
* security/tpm/tspi: Reduce scope of tspi_init_crtmArthur Heymans2021-06-162-19/+17
* tpm/tss: Remove local variablePatrick Georgi2021-06-151-2/+1
* security/tpm/tss/tcg-2.0: Add `tlcl_set_bits()`Aseda Aboagye2021-06-104-0/+49
* Apply more uses for Kconfig TPMKyösti Mälkki2021-05-301-2/+2
* tpm: Remove USER_TPMx options, make TPM1/TPM2 menuconfig visibleJulius Werner2021-05-272-39/+30
* Add Kconfig TPMKyösti Mälkki2021-05-261-0/+5
* security/tpm/tspi: Always measure the cache to pcrArthur Heymans2021-05-211-1/+1
* security/tpm/tspi/crtm: Fix FMAP TPM PCRArthur Heymans2021-05-212-1/+2
* src/security/tpm: Deal with zero length tlcl writesPatrick Georgi2021-05-131-1/+2
* security/tpm: Add option to init TPM in bootblockArthur Heymans2021-05-062-1/+13
* security/tpm/crtm: Measure FMAP into TPMArthur Heymans2021-05-051-0/+11
* security/tpm/tss/vendor/cr50: Introduce vendor sub-command to reset ECKarthikeyan Ramasubramanian2021-03-053-0/+42
* security/tpm/tss/vendor/cr50/cr50.c: Fix typoElyes HAOUAS2021-02-091-1/+1
* security/tpm/tss/tcg-1.2/tss.c: Use __func__Elyes HAOUAS2021-01-191-2/+2
* cbfs: Move more stuff into cbfs_boot_lookup()Julius Werner2020-12-022-12/+8
* security/tpm/tspi/crtm: Add line break to debug messagesFrans Hendriks2020-10-261-2/+2
* src/security: Drop unneeded empty linesElyes HAOUAS2020-09-215-7/+0
* security/tpm/tss/tcg-2.0: add const to marshalling functionsCaveh Jalali2020-09-212-30/+30
* drivers/spi/tpm: Enable long cr50 ready pulses for Tiger Lake systemsJes Klinke2020-08-201-0/+7
* security/tpm/tss/tcg-1.2/tss.c: Drop dead codeAngel Pons2020-07-091-5/+0
* drivers/pc80/tpm: Remove LPC_TPMKyösti Mälkki2020-07-041-1/+1
* security/tpm: Change wording of variable namesDuncan Laurie2020-06-171-7/+7
* src: Remove redundant includesElyes HAOUAS2020-06-022-2/+0
* Remove MAYBE_STATIC_BSS and ENV_STAGE_HAS_BSS_SECTIONKyösti Mälkki2020-05-261-2/+2
* security/tpm: Use SPDX identifiersJacob Garber2020-05-2510-51/+19
* security/tpm/tspi: Fix handling of white space delimited listharshit2020-05-192-5/+6
* src: Remove unused 'include <string.h>'Elyes HAOUAS2020-05-181-1/+0
* treewide: Remove "this file is part of" linesPatrick Georgi2020-05-1111-11/+0
* security: tcg-2.0: Ignore data payload for errors, fix Cr50 boot modeJulius Werner2020-05-083-8/+17
* {security,soc}/*/Kconfig: Replace GPLv2 long form headers with SPDX headerElyes HAOUAS2020-05-082-24/+4
* drivers/spi/tpm: Add support for non CR50 SPI TPM2Patrick Rudolph2020-04-281-10/+18
* vboot: Add permission check for kernel spaceDaisuke Nojiri2020-04-232-0/+24
* TPM: Add tlcl_cr50_get_boot_modednojiri2020-04-174-0/+40
* src/security: Use SPDX for GPL-2.0-only filesAngel Pons2020-04-049-117/+18
* security/tpm: Fix compile-time elimination for SEPARATE_VERSTAGEJulius Werner2020-04-011-2/+12
* security/tpm: Include mrc.bin in CRTM if presentBill XIE2020-03-312-2/+6
* security/vboot: Decouple measured boot from verified bootBill XIE2020-03-317-39/+356
* src (minus soc and mainboard): Remove copyright noticesPatrick Georgi2020-03-179-18/+0
* treewide: Replace uses of "Nehalem"Angel Pons2020-03-151-1/+1
* security/tpm/tss: Add ClearControl FunctionChristian Walter2020-02-044-0/+50
* src/security: Fix typosElyes HAOUAS2020-01-101-1/+1
* src/security: Remove unused <stdlib.h>Elyes HAOUAS2019-12-192-2/+0
* security/tpm: Drop CAR_GLOBAL_MIGRATION supportArthur Heymans2019-11-295-37/+27
* security/tpm: Add a Kconfig to disregard INVALID_POSTINIT on startupArthur Heymans2019-10-172-0/+14