Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up

OSS implementation of the TCG TPM2 Software Stack (TSS2)

License

NotificationsYou must be signed in to change notification settings

tpm2-software/tpm2-tss

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Build StatusWindows Build statusFreeBSD Build statusCoverity ScanCoverage StatusCII Best PracticesTotal alertsLanguage grade: C/C++Documentation StatusFuzzing StatusGitter

Overview

This repository hosts source code implementing the Trusted Computing Group's (TCG) TPM2 Software Stack (TSS).This stack consists of the following layers from top to bottom:

NameLibraries                         Description                         Specifications
Feature API (FAPI)libtss2‑fapiHigh-level API for simple TPM usageTCG Feature API (FAPI) Specification,
TCG TSS 2.0 JSON Data Types and Policy Language Specification
Enhanced System API (ESAPI, sometimes ESYS)libtss2‑esys1-to-1 mapping of the TPM2 commands
  • Session handling
  • Tracks meta data for TPM objects
  • Asynchronous calls
TCG TSS 2.0 Enhanced System API (ESAPI) Specification
System API (SAPI, sometimes SYS)libtss2‑sys1-to-1 mapping of the TPM2 commands
  • Asynchronous calls
TCG TSS 2.0 System Level API (SAPI) Specification
Marshaling/Unmarshaling (MU)libtss2‑mu(Un)marshaling all data types in the TPM library specificationTCG TSS 2.0 Marshaling/Unmarshaling API Specification
TPM Command Transmission Interface (TCTI)libtss2‑tcti‑device
libtss2‑tcti‑tbs
libtss2‑tctildr
libtss2‑tcti‑swtpm
Standard API to transmit/receive TPM commands and responses

Seedoc/tcti.md
TCG TSS 2.0 TPM Command Transmission Interface (TCTI) API Specification
Basis for all implementations in this project. [1]TCG TSS 2.0 Overview and Common Structures Specification

[1] We currently deviate from the specification by increasing the value ofTPM2_NUM_PCR_BANKS from 3 to 16 to ensure compatibility with TPM2 implementations that have enabled a larger than typical number of PCR banks. This is expected to be included in a future revision of the specification.

Build and Installation Instructions:

Instructions to build and install tpm2-tss are available in theINSTALL file.

Getting in Touch:

If you're looking to discuss the source code in this project or get some questions answered you should join the TPM2 mailing list:

We also have an IRC channel set up onFreeNode called #tpm2.0-tss.You can also try GitterGitter

You can join a weekly online call atTPM.dev, where we are discussing the tpm2-tss stack, the tpm2-pkcs11 project and other Linux TPM2 & TSS2-Software.

In case you want to contribute to the project, please also have a look at theContribution Guidelines.

Documentation

The doxygen documentation can either be built by oneself (see theINSTALL file) or browsed directly ontpm2-tss.readthedocs.io.

Test Suite

This repository contains a test suite intended to exercise the TCTI, SAPI and ESAPI code.This test suite isnot intended to test a TPM implementation, so this test suite should only be run against a TPM simulator.If this test suite is executed against a TPM other than the software simulator it may cause damage to the TPM (NV storage wear out, etc.).You have been warned.

Simulator

The TPM library specification contains reference code sufficient to construct a software TPM 2.0 simulator.This code was provided by Microsoft and they provide a binary download for Windowshere.

There are two implementations that enable building and running this code on Linux.Issues building or running the simulator should be reported to respective project.

Software TPM

The Software TPM is an open-source TPM emulator with different front-end interfaces such as socket and character device. Its code is hostedon GitHub and building is faciliated by the GNU Autotools.The TCTI module for using this simulator is calledswtpm.

Since tpm2-tss v3.0 swtpm is the default simulator used by this project.

IBM's Software Simulator

IBM has also repackaged this code with a few Makefiles so that the Microsoft code can be built and run on Linux systems.The Linux version of the Microsoft TPM 2.0 simulator can be obtainedon SourceForge.Once you've downloaded and successfully built and execute the simulator it will, by default, be accepting connections on the localhost, TCP ports 2321 and 2322.The TCTI module for using this simulator is calledmssim.

Testing

To test the various TCTI, SAPI and ESAPI api calls, unit and integration tests canbe run by configuring the build to enable unit testing and running the "check"build target. It is recommended to use a simulator for testing, and thesimulator will be automatically launched by the tests. Please review thedependency list inINSTALL for dependencies when buildingthe test suite.

$ ./configure --enable-unit --enable-integration$ make -j$(nproc) check

This will generate a file called "test-suite.log" in the root of the builddirectory.

Please report failures in a Github 'issue' with a full log of the test run.

NOTE: The unit and integration tests can be enabled independently.The --enable-unit option controls unit tests, and --enable-integrationcontrols the integration tests.

Running tests on physical TPM device

To run integration tests on a physical TPM device, including a TPM hardwareor a software TPM implemented in platform firmware the configure scriptprovides two options.The first option is called --with-device and it is used to point to the TPMdevice interface exposed by the OS, for example:

  $ ./configure  --with-device=/dev/tpm0

The second option, --with-devicetests, enables a "class" of test.There are three classes:

  1. destructive - these tests can affect TPM capability or lifespan
  2. mandatory - these tests check all the functionality that is mandatoryper the TCG specification (default).
  3. optional - these tests are for functionality that is optional per theTCG specification.

For example to enable both mandatory and optional test cases during configureone needs to set this flag as follows:

  $ ./configure --with-devicetests="mandatory,optional"

Tht default value for the flag is "mandatory"Any combination of the three is valid.The two flags are only valid when the integration tests are enabled with--enable-integration flag.

After that the following command is used to run the test on the configuredTPM device:

  $ sudo make check-device

or

  $ sudo make check -j 1

Note: The tests can not be run in paralel.

Running valgrind check

The unit and integration tests can be run under the valgrind tool, whichperforms additional checks on the library and test code, such as memoryleak checks etc. The following command is used to run the tests undervalgrind:

$ make check-valgrind

This command will enable all valgrind "tools" and kick off as many testas they support. It is possible to enable different valgrindtools (checks) in more granularity. This can be controlled by invokingdifferent tools separately using check-valgrind-<tool>, for instance:

  $ make check-valgrind-memcheck

or

  $ make check-valgrind-drd

Currently the the following tools are supported:

memcheck - Performs memory related checks. This is the default tool.helgrind - Performs synchronization errors checks.drd - Performs thread related checks.sgcheck - Performs stack overrun related checks.

Note that the valgring tool can also be invoked manually using the standardlibtool:

  $ libtool exec valgrind --tool=memcheck --leak-check=full \    test/integration/esys-auto-session-flags.int

This allows for more control on what checks are performed.

Logging

While investigating issues it might be helpful to enable extra debug/traceoutput. It can be enabled separately for different components.The description how to do this can be found in thelogging file.

Fuzzing

All system API function calls can be tested using a fuzzing library.The description how to do this can be found in thefuzzing file.

Architecture/Block Diagram

SAPI library, TAB/RM, and Test Code Block Diagram:Architecture Block Diagram

Project Layout

|-- doc     : various bits of documentation\|-- include : header files installed in $(includedir)\|   +-- tss2      : all public headers for this project\|-- lib     : data files used by the build or installed into $(libdir)\|-- m4      : autoconf support macros\|-- man     : man pages\|-- script  : scripts used by the build or CI\|-- src     : all source files\|   |-- tss2-esys : enhanced system API (ESAPI) implementation\|   |   +-- api   : ESAPI TPM API implementation\|   |-- tss2-mu   : TPM2 type marshaling/unmarshaling (MU) API implementation\|   |-- tss2-sys  : system API (SAPI) implementation\|   |   +-- api   : SAPI public API implementation\|   |-- tss2-tcti : TCTI implementations for device and mssim\|   +-- util      : Internal utility library (e.g. logging framework)\+-- test    : test code\    |-- integration : integration test harness and test cases\    |-- tpmclient   : monolithic, legacy test application\    +-- unit        : unit tests

[8]ページ先頭

©2009-2025 Movatter.jp