1. 25 May, 2018 3 commits
  2. 07 May, 2018 1 commit
    • Tom Rini's avatar
      SPDX: Convert all of our single license tags to Linux Kernel style · 83d290c5
      Tom Rini authored
      
      
      When U-Boot started using SPDX tags we were among the early adopters and
      there weren't a lot of other examples to borrow from.  So we picked the
      area of the file that usually had a full license text and replaced it
      with an appropriate SPDX-License-Identifier: entry.  Since then, the
      Linux Kernel has adopted SPDX tags and they place it as the very first
      line in a file (except where shebangs are used, then it's second line)
      and with slightly different comment styles than us.
      
      In part due to community overlap, in part due to better tag visibility
      and in part for other minor reasons, switch over to that style.
      
      This commit changes all instances where we have a single declared
      license in the tag as both the before and after are identical in tag
      contents.  There's also a few places where I found we did not have a tag
      and have introduced one.
      Signed-off-by: Tom Rini's avatarTom Rini <trini@konsulko.com>
      83d290c5
  3. 17 Nov, 2017 2 commits
  4. 26 Mar, 2017 1 commit
    • Mario Six's avatar
      tpm: Add function to load keys via their parent's SHA1 hash · 0f4b2ba1
      Mario Six authored and Simon Glass's avatar Simon Glass committed
      
      
      If we want to load a key into a TPM, we need to know the designated parent
      key's handle, so that the TPM is able to insert the key at the correct place in
      the key hierarchy.
      
      However, if we want to load a key whose designated parent key we also
      previously loaded ourselves, we first need to memorize this parent key's handle
      (since the handles for the key are chosen at random when they are inserted into
      the TPM). If we are, however, unable to do so, for example if the parent key is
      loaded into the TPM during production, and its child key during the actual
      boot, we must find a different mechanism to identify the parent key.
      
      To solve this problem, we add a function that allows U-Boot to load a key into
      the TPM using their designated parent key's SHA1 hash, and the corresponding
      auth data.
      Signed-off-by: Mario Six's avatarMario Six <mario.six@gdsys.cc>
      Reviewed-by: Simon Glass's avatarSimon Glass <sjg@chromium.org>
      0f4b2ba1
  5. 01 Feb, 2017 1 commit
  6. 23 Oct, 2015 1 commit
  7. 31 Aug, 2015 3 commits
  8. 24 Jul, 2013 1 commit
  9. 16 Jul, 2013 1 commit
  10. 12 Apr, 2013 1 commit
    • Che-liang Chiou's avatar
      tpm: Add TPM command library · 8732b070
      Che-liang Chiou authored and Simon Glass's avatar Simon Glass committed
      
      
      TPM command library implements a subset of TPM commands defined in TCG
      Main Specification 1.2 that are useful for implementing secure boot.
      More TPM commands could be added out of necessity.
      
      You may exercise these commands through the 'tpm' command.  However, the
      raw TPM commands are too primitive for writing secure boot in command
      interpreter scripts; so the 'tpm' command also provides helper functions
      to make scripting easier.
      
      For example, to define a counter in TPM non-volatile storage and
      initialize it to zero:
      
      $ tpm init
      $ tpm startup TPM_ST_CLEAR
      $ tpm nv_define d 0x1001 0x1
      $ tpm nv_write d 0x1001 0
      
      And then increment the counter by one:
      
      $ tpm nv_read d 0x1001 i
      $ setexpr.l i $i + 1
      $ tpm nv_write d 0x1001 $i
      Signed-off-by: default avatarChe-Liang Chiou <clchiou@chromium.org>
      8732b070
  11. 07 Dec, 2011 1 commit
    • Vadim Bendebury's avatar
      Introduce generic TPM support in u-boot · 5e124724
      Vadim Bendebury authored and Wolfgang Denk's avatar Wolfgang Denk committed
      TPM (Trusted Platform Module) is an integrated circuit and
      software platform that provides computer manufacturers with the
      core components of a subsystem used to assure authenticity,
      integrity and confidentiality.
      
      This driver supports version 1.2 of the TCG (Trusted Computing
      Group) specifications.
      
      The TCG specification defines several so called localities in a
      TPM chip, to be controlled by different software layers. When
      used on a typical x86 platform during the firmware phase, only
      locality 0 can be accessed by the CPU, so this driver even while
      supporting the locality concept presumes that only locality zero
      is used.
      
      This implementation is loosely based on the article "Writing a
      TPM Device Driver" published on http://ptgmedia.pearsoncmg.com
      
      Compiling this driver with DEBUG defined will generate trace of
      all accesses to TMP registers.
      
      This driver has been tested and is being used in three different
      functional ChromeOS machines (Pinetrail and Sandy Bridge Inte...
      5e124724