1. 4ad0420 security/tpm/tss/tcg-2.0: Add `tlcl_set_bits()` by Aseda Aboagye · 3 years, 3 months ago
  2. ba7b90e security/tpm/tss/vendor/cr50: Introduce vendor sub-command to reset EC by Karthikeyan Ramasubramanian · 3 years, 6 months ago
  3. c07fb75 security/tpm/tss/tcg-2.0: add const to marshalling functions by Caveh Jalali · 4 years ago
  4. fa8f567 security/tpm: Use SPDX identifiers by Jacob Garber · 4 years, 3 months ago
  5. 71a1314 security: tcg-2.0: Ignore data payload for errors, fix Cr50 boot mode by Julius Werner · 4 years, 3 months ago
  6. 622c6b8 TPM: Add tlcl_cr50_get_boot_mode by dnojiri · 4 years, 4 months ago
  7. c9ac0bc security/tpm/tss: Add ClearControl Function by Christian Walter · 4 years, 7 months ago
  8. 94b5030 src/security: Remove unused <stdlib.h> by Elyes HAOUAS · 4 years, 9 months ago
  9. 0ca944b security/tpm: Drop CAR_GLOBAL_MIGRATION support by Arthur Heymans · 4 years, 9 months ago
  10. aa771cb security/tpm/tss/tcg-2.0: Add support for algorithms by Frans Hendriks · 5 years ago
  11. 7e220ca security/tpm/tss/tcg-2.0: Use tlcl_get_hash_size_from_algo() for hash size by Frans Hendriks · 5 years ago
  12. 589eff7 security/tpm/tss/tcg-2.0: Add TPM2 function tlcl_getcapability() by Frans Hendriks · 5 years ago
  13. 8bd5c99 {src,util}: Correct typo in comment and debug string by Frans Hendriks · 6 years ago
  14. e0f3400 coreboot: check Cr50 PM mode on normal boot by Keith Short · 6 years ago
  15. dc8fd37 tss/tcg-2.0: remove unnecessary break from marshaling code by Joel Kitching · 6 years ago
  16. e371d42 src/security/tpm: query recovery mode from Cr50 by Keith Short · 6 years ago
  17. 2e690ee tss: implement tlcl_save_state by Joel Kitching · 6 years ago
  18. 3d45000 src: Fix typo by Elyes HAOUAS · 6 years ago
  19. 248c60a security/tpm: Report tpm_unmarshal_response warning by Richard Spiegel · 6 years ago
  20. c07f8fb security/tpm: Unify the coreboot TPM software stack by Philipp Deppenwiese · 6 years ago
  21. 86391f1 security/tpm: Move TSS stacks into sub-directory by Philipp Deppenwiese · 7 years ago[Renamed from src/security/tpm/tcg-2.0/tss_marshaling.c]
  22. d88fb36 security/tpm: Change TPM naming for different layers. by Philipp Deppenwiese · 7 years ago[Renamed (99%) from src/security/tpm/tcg-2.0/tpm2_marshaling.c]
  23. 64e2d19 security/tpm: Move tpm TSS and TSPI layer to security section by Philipp Deppenwiese · 7 years ago[Renamed from src/lib/tpm2_marshaling.c]
  24. ee049fa drivers/i2c/tpm: use iobuf library for marshaling commands by Aaron Durbin · 7 years ago
  25. 021ec28 cr50: add unmarshaling of vendor commands and process 'enable_update' by Vadim Bendebury · 7 years ago
  26. eeb7737 vboot/tpm2: enable nvmem commits on cr50 when writing firmware secdata by Aaron Durbin · 7 years ago
  27. 06f12f9 lib/tpm2_marshaling: fix in correct buffer space semantics by Aaron Durbin · 7 years ago
  28. f56c778 google/chromeos: disable platform hierarchy on resume for TPM2 by Aaron Durbin · 8 years ago
  29. 4a56076 tpm2: Fix tlcl and marshaling code for CAR usage by Duncan Laurie · 8 years ago
  30. f706020 Provide CAR decoration for tpm2 statics by Victor Prupis · 8 years ago
  31. f5ef699 tpm2: implement and use pcr_extend command by Vadim Bendebury · 8 years ago
  32. 4c0851c tpm2: implement locking firmware rollback counter by Vadim Bendebury · 8 years ago
  33. 6acb9a6 tpm2: add TPM_Clear command processing by Vadim Bendebury · 8 years ago
  34. ebba4d7 tpm2: refactor session header marshalling by Vadim Bendebury · 8 years ago
  35. d9137d5 tpm2: clean up tpm_marshal_command() by Vadim Bendebury · 8 years ago
  36. bc92710 tpm2: avoid comparison between signed and unsigned ints by Vadim Bendebury · 8 years ago
  37. 627afc2 tpm2: add marshaling/unmarshaling layer by Vadim Bendebury · 8 years ago