Go to file
Thomas Lamprecht 8d2f9bdc35 bump version to 0.9.6+pve1
Signed-off-by: Thomas Lamprecht <t.lamprecht@proxmox.com>
2023-05-25 16:28:00 +02:00
.github/ISSUE_TEMPLATE github: Update issues templates 2020-12-27 22:52:39 -05:00
debian bump version to 0.9.6+pve1 2023-05-25 16:28:00 +02:00
dist rpm/debian: Add 0.9.6 entry in changelog 2023-02-28 15:57:55 -05:00
include build-sys: Build libtpms v0.9.6 2023-02-28 15:57:55 -05:00
m4 build-sys: Require only autoconf 2.63 for older systems 2019-06-20 13:08:39 -04:00
man man3: Fix errors in code example in TPMLIB_RegisterCallbacks 2021-07-22 13:21:45 -04:00
src tpm2: Check size of buffer before accessing it (CVE-2023-1017 & -1018) 2023-02-28 15:57:55 -05:00
tests tests: fuzz: Store initialized permall state blob 2021-07-22 22:23:16 -04:00
.gitignore git: Fix erroneous gitignore entries 2021-09-02 13:50:24 -04:00
.travis.yml Travis: Install libjson-glib-dev and drop a few python dependencies 2021-05-29 19:44:34 -04:00
autogen.sh build-sys: add a simple autogen.sh 2018-05-26 07:41:18 -04:00
bootstrap.sh Remove config.h.in 2014-06-30 15:04:15 -04:00
CHANGES CHANGES: Updated CHANGES document for 0.9.6 2023-02-28 15:57:55 -05:00
configure.ac build-sys: Build libtpms v0.9.6 2023-02-28 15:57:55 -05:00
CREDITS Add CREDITS file 2013-10-31 16:37:33 -04:00
DCO1.1.txt Replace the CLA with the DCO, simply requiring a Signed-off-by: 2016-12-21 11:09:38 -05:00
GNUmakefile fixup packaging make file 2023-05-25 16:28:00 +02:00
INSTALL Fix many misspellings 2021-03-02 08:20:25 -05:00
libtpms.pc.in build-sys: add with_tpm1/with_tpm2 variables to .pc 2021-08-06 08:04:37 -04:00
LICENSE Extend license texts with TPM 2 specifics 2018-06-15 18:07:47 -04:00
Makefile.am configure: support --with-pkgconfigdir 2021-02-09 13:33:15 -05:00
README docs: Update README to include CXX=clang++ for fuzzer build 2019-11-16 15:41:09 -05:00

What is libtpms?
----------------

Libtpms is a library that targets the integration of TPM functionality
into hypervisors, primarily into Qemu. Libtpms provides a very narrow
public API for this purpose so that integration is possible. Only the
minimum of necessary APIs are made publicly available.

It is assumed that the user of libtpms is familiar with the concepts
of the Trusted Platform Module (TPM). For the interaction with libtpms
it is necessary to know how to construct valid TPM commands and to
be able to parse their results. It is not within the scope of libtpms's
documentation to provide background on this. See the section on references
below.


What files does the libtpms package provide?
--------------------------------------------

The main libtpms package provides the following files:

/usr/lib64/libtpms.so.0
/usr/lib64/libtpms.so.0.5.1
/usr/share/doc/libtpms-0.5.1
/usr/share/doc/libtpms-0.5.1/CHANGES
/usr/share/doc/libtpms-0.5.1/LICENSE
/usr/share/doc/libtpms-0.5.1/README

Applications can link with -ltpms.


What files does the libtpms development package provide?
--------------------------------------------------------

The libtpms development package (libtpms-devel) provides the following
include files for applications to use:

tpm_error.h
tpm_library.h
tpm_memory.h
tpm_nvfilename.h
tpm_tis.h
tpm_types.h

These files contain the data structures, data types and API calls supported
by libtpms. It is recommended to not use any other API calls than those
provided in these include files.

All APIs are described in man pages. The man pages are part of the libtpms
development package as well:

TPMLIB_DecodeBlob
TPMLIB_GetTPMProperty
TPMLIB_GetVersion
TPMLIB_MainInit
TPMLIB_Process
TPMLIB_RegisterCallbacks
TPMLIB_Terminate
TPMLIB_VolatileAll_Store
TPM_Free
TPM_IO_Hash_Data
TPM_IO_Hash_End
TPM_IO_Hash_Start
TPM_IO_TpmEstablished_Get
TPM_Malloc
TPM_Realloc


How to contribute?
------------------
The mailing list for libtpms is libtpms@googlegroups.com.

For patch submissions, please use a Signed-off-by: <your email> to indicate
agreement to the DCO1.1.txt.


Fuzzing
-------
Initial fuzzing is possible with clang & libfuzzer.

You have to configure the project with --enable-fuzzer
(--enable-sanitizer can also help spot more issues). Then you can
build fuzz and run it with the testing corpus.

Fuzz testing is known to work with Fedora 28 or later. It requires that the
'clang' package is installed.

Ex:
$ ./configure --with-openssl --with-tpm2 --enable-sanitizers --enable-fuzzer \
    CC=clang CXX=clang++
$ make && make -C tests fuzz
$ tests/run-fuzzer.sh

oss-fuzz builds with its own fuzzer flags, and set $LIB_FUZZING_ENGINE
to be linked with. The script run by oss-fuzz is tests/oss-fuzz.sh.

Maintainers
-----------
libtpms is currently being maintained by Stefan Berger <stefanb@us.ibm.com>.

References:
-----------

Documentation about the Trusted Platform Module (TPM) can be downloaded
from the Trusted Computing Group's website at

http://www.trustedcomputinggroup.org