summaryrefslogtreecommitdiffstats
path: root/docs/tpm_quick_ref.md
diff options
context:
space:
mode:
authornodir <nodir@chromium.org>2015-08-25 10:15:24 -0700
committerCommit bot <commit-bot@chromium.org>2015-08-25 17:16:40 +0000
commit06cbaa02cafe10687a9316178528b9bb94820575 (patch)
treed8d31244a4c74b1e0828873d54e9807835246bbe /docs/tpm_quick_ref.md
parent92b5c2cc13a9302a02fd13c923390b6249c6454b (diff)
downloadchromium_src-06cbaa02cafe10687a9316178528b9bb94820575.zip
chromium_src-06cbaa02cafe10687a9316178528b9bb94820575.tar.gz
chromium_src-06cbaa02cafe10687a9316178528b9bb94820575.tar.bz2
A batch of docs style fixes.
R=andybons@chromium.org BUG=524256 Review URL: https://codereview.chromium.org/1319543002 Cr-Commit-Position: refs/heads/master@{#345360}
Diffstat (limited to 'docs/tpm_quick_ref.md')
-rw-r--r--docs/tpm_quick_ref.md63
1 files changed, 31 insertions, 32 deletions
diff --git a/docs/tpm_quick_ref.md b/docs/tpm_quick_ref.md
index 4aa0bbf..296e4a8 100644
--- a/docs/tpm_quick_ref.md
+++ b/docs/tpm_quick_ref.md
@@ -1,32 +1,31 @@
-# Introduction
-
-This page is meant to help keep track of [TPM](Glossary.md) use across the system. It may not be up-to-date at any given point, but it's a wiki so you know what to do.
-
-# Details
-
- * TPM ownership management:
-> > http://git.chromium.org/gitweb/?p=chromiumos/platform/cryptohome.git;a=blob;f=README.tpm
-
- * TPM\_Clear is done (as in vboot\_reference) but in the firmware code itself on switch between dev and verified modes and in recovery. (TODO: link code)
-
- * TPM owner password clearing (triggered at sign-in by chrome):
-> > http://git.chromium.org/gitweb/?p=chromium/chromium.git;a=blob;f=chrome/browser/chromeos/login/login_utils.cc;h=9c4564e074c650bd91c27243c589d603740793bb;hb=HEAD#l861
-
- * PCR extend (no active use elsewhere):
-> > http://git.chromium.org/gitweb/?p=chromiumos/platform/vboot_reference.git;a=blob;f=firmware/lib/tpm_bootmode.c
-
- * NVRAM use for OS rollback attack protection:
-> > http://git.chromium.org/gitweb/?p=chromiumos/platform/vboot_reference.git;a=blob;f=firmware/lib/rollback_index.c
-
- * Tamper evident storage:
-> > http://git.chromium.org/gitweb/?p=chromiumos/platform/cryptohome.git;a=blob;f=README.lockbox
-
- * Tamper-evident storage for avoiding runtime device management mode changes:
-> > http://git.chromium.org/gitweb/?p=chromium/chromium.git;a=blob;f=chrome/browser/chromeos/login/enrollment/enterprise_enrollment_screen.cc
-
- * User key/passphrase and cached data protection:
-> > http://git.chromium.org/gitweb/?p=chromiumos/platform/cryptohome.git;a=blob;f=README.homedirs
-
- * A TPM in a Chrome device has an EK certificate that is signed by an intermediate certificate authority that is dedicated to the specific TPMs allocated for use in Chrome devices. OS-level self-validation of the platform TPM should be viable with this or chaining any other trust expectations.
-
- * TPM is used for per-user certificate storage (NSS+PKCS#11) using opencryptoki but soon to be replaced by chaps. Update links here when chaps stabilizes (Each user's pkcs#11 key store is kept in their homedir to ensure it is tied to the local user account) This functionality includes VPN and 802.1x-related keypairs. \ No newline at end of file
+# TPM Quick ref
+
+TODO: this page looks very outdated. glossary.md does not exist,
+git.chromium.org does not exist. Delete it?
+
+This page is meant to help keep track of TPM use across the system. It may not
+be up-to-date at any given point, but it's a wiki so you know what to do.
+
+## Details
+
+* [TPM ownership management](http://git.chromium.org/gitweb/?p=chromiumos/platform/cryptohome.git;a=blob;f=README.tpm)
+* TPM_Clear is done (as in vboot_reference) but in the firmware code itself on
+ switch between dev and verified modes and in recovery. (TODO: link code)
+* [TPM owner password clearing](http://git.chromium.org/gitweb/?p=chromium/chromium.git;a=blob;f=chrome/browser/chromeos/login/login_utils.cc;h=9c4564e074c650bd91c27243c589d603740793bb;hb=HEAD#l861)
+ (triggered at sign-in by chrome):
+* [PCR extend](http://git.chromium.org/gitweb/?p=chromiumos/platform/vboot_reference.git;a=blob;f=firmware/lib/tpm_bootmode.c)
+ (no active use elsewhere):
+* [NVRAM use for OS rollback attack protection](http://git.chromium.org/gitweb/?p=chromiumos/platform/vboot_reference.git;a=blob;f=firmware/lib/rollback_index.c)
+* [Tamper evident storage](http://git.chromium.org/gitweb/?p=chromiumos/platform/cryptohome.git;a=blob;f=README.lockbox)
+* [Tamper-evident storage for avoiding runtime device management mode changes](http://git.chromium.org/gitweb/?p=chromium/chromium.git;a=blob;f=chrome/browser/chromeos/login/enrollment/enterprise_enrollment_screen.cc)
+* [User key/passphrase and cached data protection](http://git.chromium.org/gitweb/?p=chromiumos/platform/cryptohome.git;a=blob;f=README.homedirs)
+* A TPM in a Chrome device has an EK certificate that is signed by an
+ intermediate certificate authority that is dedicated to the specific TPMs
+ allocated for use in Chrome devices. OS-level self-validation of the
+ platform TPM should be viable with this or chaining any other trust
+ expectations.
+* TPM is used for per-user certificate storage (NSS+PKCS#11) using
+ opencryptoki but soon to be replaced by chaps. Update links here when chaps
+ stabilizes (Each user's pkcs#11 key store is kept in their homedir to ensure
+ it is tied to the local user account). This functionality includes VPN and
+ 802.1x-related keypairs.