fwupd/plugins/tpm-eventlog
2020-10-26 12:05:20 -05:00
..
fu-plugin-tpm-eventlog.c Export FwupdPlugin so we can convey enumerated system errors to the end user 2020-10-13 15:56:49 +01:00
fu-self-test.c Install the installed tests 2020-08-28 10:10:43 -05:00
fu-tpm-eventlog-common.c tpm-eventlog: Replay the TPM event log to get the PCRx values 2020-02-04 11:54:27 +00:00
fu-tpm-eventlog-common.h tpm-eventlog: Replay the TPM event log to get the PCRx values 2020-02-04 11:54:27 +00:00
fu-tpm-eventlog-device.c tpm-eventlog: Replay the TPM event log to get the PCRx values 2020-02-04 11:54:27 +00:00
fu-tpm-eventlog-device.h tpm-eventlog: Replay the TPM event log to get the PCRx values 2020-02-04 11:54:27 +00:00
fu-tpm-eventlog-parser.c tpm-eventlog: Always look at all supported algorithms 2020-06-17 15:01:34 -05:00
fu-tpm-eventlog-parser.h tpm-eventlog: Always look at all supported algorithms 2020-06-17 15:01:34 -05:00
fu-tpm-eventlog.c trivial: Fix some typos spotted by codespell 2020-09-24 10:48:26 +01:00
meson.build Install the installed tests 2020-08-28 10:10:43 -05:00
README.md Add external interface messages 2020-10-26 12:05:20 -05:00

TPM Event Log Support

Introduction

The TPM Event Log records which events are registered for the PCR0 hash, which may help in explaining why PCR0 values are differing for some firmware.

The device exposed is not upgradable in any way and is just for debugging. The created device will be a child device of the system TPM device, which may or may not be upgradable.

Vendor ID Security

The device is not upgradable and thus requires no vendor ID set.

External interface access

This plugin requires read only access to /sys/kernel/security/tpm0/binary_bios_measurements.