fwupd/plugins/tpm-eventlog
Mario Limonciello fe862a1d1b tpm-eventlog: Always look at all supported algorithms
This will effectively mean that both sha1 and sha256 results are
sent back to uefi plugin for analysis.
2020-06-17 15:01:34 -05:00
..
tests Add a new plugin that can parse the TPM event log 2019-12-06 15:05:16 +00:00
fu-plugin-tpm-eventlog.c tpm-eventlog: Do not return a security attr if there is no TPM device 2020-05-18 15:43:23 -05:00
fu-self-test.c tpm-eventlog: Always look at all supported algorithms 2020-06-17 15:01:34 -05:00
fu-tpm-eventlog-common.c tpm-eventlog: Replay the TPM event log to get the PCRx values 2020-02-04 11:54:27 +00:00
fu-tpm-eventlog-common.h tpm-eventlog: Replay the TPM event log to get the PCRx values 2020-02-04 11:54:27 +00:00
fu-tpm-eventlog-device.c tpm-eventlog: Replay the TPM event log to get the PCRx values 2020-02-04 11:54:27 +00:00
fu-tpm-eventlog-device.h tpm-eventlog: Replay the TPM event log to get the PCRx values 2020-02-04 11:54:27 +00:00
fu-tpm-eventlog-parser.c tpm-eventlog: Always look at all supported algorithms 2020-06-17 15:01:34 -05:00
fu-tpm-eventlog-parser.h tpm-eventlog: Always look at all supported algorithms 2020-06-17 15:01:34 -05:00
fu-tpm-eventlog.c tpm-eventlog: Always look at all supported algorithms 2020-06-17 15:01:34 -05:00
meson.build trivial: add some better descriptions for man pages 2020-02-20 09:34:10 -06:00
README.md trivial: Document the use of vendor-id in each plugin 2019-12-11 18:10:44 +00:00

TPM Event Log Support

Introduction

The TPM Event Log records which events are registered for the PCR0 hash, which may help in explaining why PCR0 values are differing for some firmware.

The device exposed is not upgradable in any way and is just for debugging. The created device will be a child device of the system TPM device, which may or may not be upgradable.

Vendor ID Security

The device is not upgradable and thus requires no vendor ID set.