Fixed bad context tests for receive calls and code for receive calls.

Changed LocalTpmReceive to use CommonReceiveChecks

Added code for NULL pointer test for Finalize and
fixed errors in Finalize code.
6 files changed
tree: 86ddc74144511734b2b18b544e8ce4ad9c831930
  1. common/
  2. resourcemgr/
  3. sysapi/
  4. tcti/
  5. test/
  6. .gitattributes
  7. .gitignore
  8. bootstrap
  9. buildwindows.md
  10. ChangeLog
  11. configure.ac
  12. INSTALL
  13. Makefile.am
  14. README.md
  15. Readme.pdf
  16. run.md
  17. simulator.md
  18. tss.sln
  19. tss.vcxproj
README.md

TPM (Trusted Platform Module) 2.0 Software Stack (TSS):

This stack consists of the following layers from top to bottom:

  • Feature API (FAPI), see specification 0.12, (published but still in progress and unimplemented)
  • Enhanced System API (ESAPI), (specification in progress and unimplemented)
  • System API (SAPI), see 1.0 specification, (public, 0.97 implementation complete). This layer implements the system layer API level of the TSS 2.0 specification. These functions can be used to access all TPM 2.0 functions as described in Part 3 of the TPM 2.0 specification. The usefulness of this code extends to all users of the TPM, even those not planning to use the upper layers of the TSS.
  • TPM Command Transmission Interface (TCTI), used by SAPI to communicate with next lower layer (either the TAB/RM or TPM 2.0 device driver), see SAPI specification
  • Trusted Access Broker/Resource Manager (TAB/RM), see 0.91 specification, (public, implementation complete). This layer sits between the system API library code and the TPM. It is a daemon that handles all multi-process coordination and manages the TPM's internal resources transparently to applications.

Since the FAPI and ESAPI haven't been implemented yet, this repository only contains the SAPI and layers below it, plus a test application for exercising the SAPI.

The test application, tpmclient, tests many of the commands against the TPM 2.0 simulator. The tpmclient application can be altered and used as a sandbox to test and develop any TPM 2.0 command sequences, and provides an excellent development and learning vehicle.

Build and Installation Instructions:

Run Instructions

Architecture and Code Layout

Resources

TPM 2.0 specifications can be found at Trusted Computing Group.