#
tpm2
Here are 53 public repositories matching this topic...
wolfTPM is a highly portable TPM 2.0 library, designed for embedded use.
cryptography
embedded
i2c
ecc
secure
spi
tpm
tpm2
compact
trusted-platform-module
tis
wolfssl
low-resource
wolftpm
tpm2-library
secure-key-storage
tpm-interface-specification
-
Updated
Aug 24, 2020 - C
AndreasFuchsSIT
opened
Jan 18, 2019
The TpmTool utility is a simple cross-platform tool for accessing TPM2.0 Non-Volatile (NV) Spaces (Index Values) on compliant systems, with zero dependencies on any TPM2.0 stack. It provides the ability to enumerate, create, delete, query, and lock NV indices, as well as to read and write data stored in them.
-
Updated
Jun 15, 2020 - C++
OpenEmbedded layer for the use cases on secure boot, integrity and encryption
-
Updated
Jul 22, 2020 - BitBake
A C implementation of elliptic-curve-based Direct Anonymous Attestation (DAA) signatures. Created to support the Xaptum Edge Network Fabric, an IoT Network Solution.
-
Updated
Aug 11, 2020 - C
Provides agent and server plugins for SPIRE to allow TPM 2-based node attestation.
-
Updated
May 22, 2020 - Go
Adds an automated unlock function based on TPM policy installation
-
Updated
Aug 22, 2020 - Shell
Converged Security Suite for Intel platform security features
-
Updated
Aug 25, 2020 - Go
An extension to cryptsetup/LUKS that enables use of the TPM 2.0 via tpm2-tss
-
Updated
Feb 21, 2019 - Shell
OpenEmbedded/Poky-compatible reference implementation based on meta-secure-core
-
Updated
Dec 11, 2018 - Shell
yet another pack of scripts for TPM2+Luks
-
Updated
May 15, 2020 - Shell
A C implementation of the Trusted Transit protocol for securing Internet of Things (IoT) network traffic. Created to support the Xaptum Edge Network Fabric, an IoT Network Solution.
-
Updated
Jul 23, 2020 - C
zanebeckwith
commented
Nov 19, 2018
The functions in the marshal.c file convert from the C structures to on-the-wire format, and vice-versa. Currently, this code is only tested implicitly, by testing the higher-level functions that use the (un)marshaling code.
As a quick first step to testing this important code, we should add tests that simply create each of the tss2_tpm_types.h structs, marshals each one to a buffer, un-marsh
Prototype of accessing the TPM from within an Open Enclave enclave.
-
Updated
Sep 26, 2019 - C
Improve this page
Add a description, image, and links to the tpm2 topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the tpm2 topic, visit your repo's landing page and select "manage topics."
Environment
Board: APL UPSquared with PTT
OS: Ubuntu 20.04 (opensc 0.20.0-3)
tpm2-tss: 4.2.1 (tarball)
tpm2-pkcs11: 1.3.1 (tarball)
tpm2-tools: 4.1.3 (tarball)
tpm2-abrmd: Not installed
Token initialized with tpm2_ptool with label tpmhsm
Error message