- e966595 treewide: Remove "ERROR: "/"WARN: " prefixes from log messages by Julius Werner · 2 years, 6 months ago
- 4ad0420 security/tpm/tss/tcg-2.0: Add `tlcl_set_bits()` by Aseda Aboagye · 3 years, 2 months ago
- ba7b90e security/tpm/tss/vendor/cr50: Introduce vendor sub-command to reset EC by Karthikeyan Ramasubramanian · 3 years, 5 months ago
- c07fb75 security/tpm/tss/tcg-2.0: add const to marshalling functions by Caveh Jalali · 3 years, 10 months ago
- fa8f567 security/tpm: Use SPDX identifiers by Jacob Garber · 4 years, 2 months ago
- 71a1314 security: tcg-2.0: Ignore data payload for errors, fix Cr50 boot mode by Julius Werner · 4 years, 2 months ago
- 622c6b8 TPM: Add tlcl_cr50_get_boot_mode by dnojiri · 4 years, 3 months ago
- c9ac0bc security/tpm/tss: Add ClearControl Function by Christian Walter · 4 years, 6 months ago
- 94b5030 src/security: Remove unused <stdlib.h> by Elyes HAOUAS · 4 years, 8 months ago
- 0ca944b security/tpm: Drop CAR_GLOBAL_MIGRATION support by Arthur Heymans · 4 years, 8 months ago
- aa771cb security/tpm/tss/tcg-2.0: Add support for algorithms by Frans Hendriks · 4 years, 11 months ago
- 7e220ca security/tpm/tss/tcg-2.0: Use tlcl_get_hash_size_from_algo() for hash size by Frans Hendriks · 5 years ago
- 589eff7 security/tpm/tss/tcg-2.0: Add TPM2 function tlcl_getcapability() by Frans Hendriks · 5 years ago
- 8bd5c99 {src,util}: Correct typo in comment and debug string by Frans Hendriks · 6 years ago
- e0f3400 coreboot: check Cr50 PM mode on normal boot by Keith Short · 5 years ago
- dc8fd37 tss/tcg-2.0: remove unnecessary break from marshaling code by Joel Kitching · 6 years ago
- e371d42 src/security/tpm: query recovery mode from Cr50 by Keith Short · 6 years ago
- 2e690ee tss: implement tlcl_save_state by Joel Kitching · 6 years ago
- 3d45000 src: Fix typo by Elyes HAOUAS · 6 years ago
- 248c60a security/tpm: Report tpm_unmarshal_response warning by Richard Spiegel · 6 years ago
- c07f8fb security/tpm: Unify the coreboot TPM software stack by Philipp Deppenwiese · 6 years ago
- 86391f1 security/tpm: Move TSS stacks into sub-directory by Philipp Deppenwiese · 7 years ago[Renamed from src/security/tpm/tcg-2.0/tss_marshaling.c]
- d88fb36 security/tpm: Change TPM naming for different layers. by Philipp Deppenwiese · 7 years ago[Renamed (99%) from src/security/tpm/tcg-2.0/tpm2_marshaling.c]
- 64e2d19 security/tpm: Move tpm TSS and TSPI layer to security section by Philipp Deppenwiese · 7 years ago[Renamed from src/lib/tpm2_marshaling.c]
- ee049fa drivers/i2c/tpm: use iobuf library for marshaling commands by Aaron Durbin · 7 years ago
- 021ec28 cr50: add unmarshaling of vendor commands and process 'enable_update' by Vadim Bendebury · 7 years ago
- eeb7737 vboot/tpm2: enable nvmem commits on cr50 when writing firmware secdata by Aaron Durbin · 7 years ago
- 06f12f9 lib/tpm2_marshaling: fix in correct buffer space semantics by Aaron Durbin · 7 years ago
- f56c778 google/chromeos: disable platform hierarchy on resume for TPM2 by Aaron Durbin · 8 years ago
- 4a56076 tpm2: Fix tlcl and marshaling code for CAR usage by Duncan Laurie · 8 years ago
- f706020 Provide CAR decoration for tpm2 statics by Victor Prupis · 8 years ago
- f5ef699 tpm2: implement and use pcr_extend command by Vadim Bendebury · 8 years ago
- 4c0851c tpm2: implement locking firmware rollback counter by Vadim Bendebury · 8 years ago
- 6acb9a6 tpm2: add TPM_Clear command processing by Vadim Bendebury · 8 years ago
- ebba4d7 tpm2: refactor session header marshalling by Vadim Bendebury · 8 years ago
- d9137d5 tpm2: clean up tpm_marshal_command() by Vadim Bendebury · 8 years ago
- bc92710 tpm2: avoid comparison between signed and unsigned ints by Vadim Bendebury · 8 years ago
- 627afc2 tpm2: add marshaling/unmarshaling layer by Vadim Bendebury · 8 years ago