Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(331)

Unified Diff: docs/tpm_quick_ref.md

Issue 1319543002: A batch of docs style fixes. (Closed) Base URL: https://chromium.googlesource.com/chromium/src@master
Patch Set: Created 5 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « no previous file | docs/updating_clang.md » ('j') | docs/updating_clang_format_binaries.md » ('J')
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: docs/tpm_quick_ref.md
diff --git a/docs/tpm_quick_ref.md b/docs/tpm_quick_ref.md
index 4aa0bbf9816ed7261f340ece2a409bbda3a4e081..3ba39ea975e8d383b8f894f87c1b8149749176ff 100644
--- a/docs/tpm_quick_ref.md
+++ b/docs/tpm_quick_ref.md
@@ -1,32 +1,31 @@
-# Introduction
-
-This page is meant to help keep track of [TPM](Glossary.md) use across the system. It may not be up-to-date at any given point, but it's a wiki so you know what to do.
-
-# Details
-
- * TPM ownership management:
-> > http://git.chromium.org/gitweb/?p=chromiumos/platform/cryptohome.git;a=blob;f=README.tpm
-
- * TPM\_Clear is done (as in vboot\_reference) but in the firmware code itself on switch between dev and verified modes and in recovery. (TODO: link code)
-
- * TPM owner password clearing (triggered at sign-in by chrome):
-> > http://git.chromium.org/gitweb/?p=chromium/chromium.git;a=blob;f=chrome/browser/chromeos/login/login_utils.cc;h=9c4564e074c650bd91c27243c589d603740793bb;hb=HEAD#l861
-
- * PCR extend (no active use elsewhere):
-> > http://git.chromium.org/gitweb/?p=chromiumos/platform/vboot_reference.git;a=blob;f=firmware/lib/tpm_bootmode.c
-
- * NVRAM use for OS rollback attack protection:
-> > http://git.chromium.org/gitweb/?p=chromiumos/platform/vboot_reference.git;a=blob;f=firmware/lib/rollback_index.c
-
- * Tamper evident storage:
-> > http://git.chromium.org/gitweb/?p=chromiumos/platform/cryptohome.git;a=blob;f=README.lockbox
-
- * Tamper-evident storage for avoiding runtime device management mode changes:
-> > http://git.chromium.org/gitweb/?p=chromium/chromium.git;a=blob;f=chrome/browser/chromeos/login/enrollment/enterprise_enrollment_screen.cc
-
- * User key/passphrase and cached data protection:
-> > http://git.chromium.org/gitweb/?p=chromiumos/platform/cryptohome.git;a=blob;f=README.homedirs
-
- * A TPM in a Chrome device has an EK certificate that is signed by an intermediate certificate authority that is dedicated to the specific TPMs allocated for use in Chrome devices. OS-level self-validation of the platform TPM should be viable with this or chaining any other trust expectations.
-
- * TPM is used for per-user certificate storage (NSS+PKCS#11) using opencryptoki but soon to be replaced by chaps. Update links here when chaps stabilizes (Each user's pkcs#11 key store is kept in their homedir to ensure it is tied to the local user account) This functionality includes VPN and 802.1x-related keypairs.
+# TPM Quick ref
+
+TODO: this page looks very outdated. glossary.md does not exist,
+git.chromium.org does not exist. Delete it?
+
+This page is meant to help keep track of TPM use across the system. It may not
+be up-to-date at any given point, but it's a wiki so you know what to do.
+
+## Details
+
+* [TPM ownership management(http://git.chromium.org/gitweb/?p=chromiumos/platform/cryptohome.git;a=blob;f=README.tpm)
Bons 2015/08/25 16:51:01 missing ]
nodir 2015/08/25 17:05:04 Done.
+* TPM_Clear is done (as in vboot_reference) but in the firmware code itself on
+ switch between dev and verified modes and in recovery. (TODO: link code)
+* [TPM owner password clearing](http://git.chromium.org/gitweb/?p=chromium/chromium.git;a=blob;f=chrome/browser/chromeos/login/login_utils.cc;h=9c4564e074c650bd91c27243c589d603740793bb;hb=HEAD#l861)
+ (triggered at sign-in by chrome):
+* [PCR extend](http://git.chromium.org/gitweb/?p=chromiumos/platform/vboot_reference.git;a=blob;f=firmware/lib/tpm_bootmode.c)
+ (no active use elsewhere):
+* [NVRAM use for OS rollback attack protection](http://git.chromium.org/gitweb/?p=chromiumos/platform/vboot_reference.git;a=blob;f=firmware/lib/rollback_index.c)
+* [Tamper evident storage](http://git.chromium.org/gitweb/?p=chromiumos/platform/cryptohome.git;a=blob;f=README.lockbox)
+* [Tamper-evident storage for avoiding runtime device management mode changes](http://git.chromium.org/gitweb/?p=chromium/chromium.git;a=blob;f=chrome/browser/chromeos/login/enrollment/enterprise_enrollment_screen.cc)
+* [User key/passphrase and cached data protection](http://git.chromium.org/gitweb/?p=chromiumos/platform/cryptohome.git;a=blob;f=README.homedirs)
+* A TPM in a Chrome device has an EK certificate that is signed by an
+ intermediate certificate authority that is dedicated to the specific TPMs
+ allocated for use in Chrome devices. OS-level self-validation of the
+ platform TPM should be viable with this or chaining any other trust
+ expectations.
+* TPM is used for per-user certificate storage (NSS+PKCS#11) using
+ opencryptoki but soon to be replaced by chaps. Update links here when chaps
+ stabilizes (Each user's pkcs#11 key store is kept in their homedir to ensure
+ it is tied to the local user account) This functionality includes VPN and
Bons 2015/08/25 16:51:01 lose the extra space between ) and T
nodir 2015/08/25 17:05:04 Done.
+ 802.1x-related keypairs.
« no previous file with comments | « no previous file | docs/updating_clang.md » ('j') | docs/updating_clang_format_binaries.md » ('J')

Powered by Google App Engine
This is Rietveld 408576698