mirror of
				https://git.proxmox.com/git/fwupd
				synced 2025-10-31 21:53:00 +00:00 
			
		
		
		
	 f56878ff88
			
		
	
	
		f56878ff88
		
	
	
	
	
		
			
			This indicates the GUID in some way contributed to the result decided. It also allows us to match the submitted HSI results back to a firmware stream on the LVFS, which allows us to allow vendors to see a subset of results for uploaded devices.
		
			
				
	
	
		
			74 lines
		
	
	
		
			1.9 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			74 lines
		
	
	
		
			1.9 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /*
 | |
|  * Copyright (C) 2019 Richard Hughes <richard@hughsie.com>
 | |
|  *
 | |
|  * SPDX-License-Identifier: LGPL-2.1+
 | |
|  */
 | |
| 
 | |
| #include "config.h"
 | |
| 
 | |
| #include <fwupdplugin.h>
 | |
| 
 | |
| #include "fu-tpm-device.h"
 | |
| 
 | |
| struct FuPluginData {
 | |
| 	FuDevice *tpm_device;
 | |
| 	gboolean has_tpm_v20;
 | |
| };
 | |
| 
 | |
| void
 | |
| fu_plugin_init(FuPlugin *plugin)
 | |
| {
 | |
| 	fu_plugin_alloc_data(plugin, sizeof(FuPluginData));
 | |
| 	fu_plugin_set_build_hash(plugin, FU_BUILD_HASH);
 | |
| 	fu_plugin_add_udev_subsystem(plugin, "tpm");
 | |
| 	fu_plugin_add_device_gtype(plugin, FU_TYPE_TPM_DEVICE);
 | |
| }
 | |
| 
 | |
| void
 | |
| fu_plugin_destroy(FuPlugin *plugin)
 | |
| {
 | |
| 	FuPluginData *data = fu_plugin_get_data(plugin);
 | |
| 	if (data->tpm_device != NULL)
 | |
| 		g_object_unref(data->tpm_device);
 | |
| }
 | |
| 
 | |
| void
 | |
| fu_plugin_device_added(FuPlugin *plugin, FuDevice *dev)
 | |
| {
 | |
| 	FuPluginData *data = fu_plugin_get_data(plugin);
 | |
| 	const gchar *family = fu_tpm_device_get_family(FU_TPM_DEVICE(dev));
 | |
| 
 | |
| 	g_set_object(&data->tpm_device, dev);
 | |
| 	if (g_strcmp0(family, "2.0") == 0)
 | |
| 		data->has_tpm_v20 = TRUE;
 | |
| 	fu_plugin_add_report_metadata(plugin, "TpmFamily", family);
 | |
| }
 | |
| 
 | |
| void
 | |
| fu_plugin_add_security_attrs(FuPlugin *plugin, FuSecurityAttrs *attrs)
 | |
| {
 | |
| 	FuPluginData *data = fu_plugin_get_data(plugin);
 | |
| 	g_autoptr(FwupdSecurityAttr) attr = NULL;
 | |
| 
 | |
| 	/* create attr */
 | |
| 	attr = fwupd_security_attr_new(FWUPD_SECURITY_ATTR_ID_TPM_VERSION_20);
 | |
| 	fwupd_security_attr_set_plugin(attr, fu_plugin_get_name(plugin));
 | |
| 	fwupd_security_attr_set_level(attr, FWUPD_SECURITY_ATTR_LEVEL_CRITICAL);
 | |
| 	fu_security_attrs_append(attrs, attr);
 | |
| 
 | |
| 	/* check exists, and in v2.0 mode */
 | |
| 	if (data->tpm_device == NULL) {
 | |
| 		fwupd_security_attr_set_result(attr, FWUPD_SECURITY_ATTR_RESULT_NOT_FOUND);
 | |
| 		return;
 | |
| 	}
 | |
| 	if (!data->has_tpm_v20) {
 | |
| 		fwupd_security_attr_set_result(attr, FWUPD_SECURITY_ATTR_RESULT_NOT_ENABLED);
 | |
| 		return;
 | |
| 	}
 | |
| 
 | |
| 	/* success */
 | |
| 	fwupd_security_attr_add_guids(attr, fu_device_get_guids(data->tpm_device));
 | |
| 	fwupd_security_attr_add_flag(attr, FWUPD_SECURITY_ATTR_FLAG_SUCCESS);
 | |
| 	fwupd_security_attr_set_result(attr, FWUPD_SECURITY_ATTR_RESULT_FOUND);
 | |
| }
 |