On 8/2/10 5:02 AM, Hans-Joerg Hoexer wrote:
Hi,

we have developed a driver tpm(4) for various TPMs for OpenBSD 4.7 and
FreeBSD 8.0 and have ported and updated several third party packages to
enable use of TPMs on Open- and FreeBSD.  This enables applications like
OpenSSH to generate and store private keys inside a TPM.


(TPM being trusted Platform Module for those like me that had to look it up).

This is nice to have.. now we just need someone to take it on and
shepherd it into -current (and 8.x ).
(ENOTIME here)

Moving to -current as that is where it should be put in first..
and a lot of developers don't read hackers.




The supported TPMs are:

- Atmel 97SC3203
- Broadcom BCM0102
- Infineon SLB 9635 TT 1.2
- Intel INTC0102
- Sinosun SNS SSX35
- STM ST19WP18
- Winbond WEC WPCT200

The supported third party packages are:

- openCryptoki 2.3.1:  An PKCS#11 implementation, including support
   for TPMs.  OpenSSH can use this library to generate and store private
   RSA keys inside a TPM.
- openssl_tpm_engine 0.4.1:  An openssl engine supporting TPMs.
- tpm-emulator 0.7.0:  An emulator providing the functionality of a TPM.
   Used for development purposes.
- tpm-tools 1.3.5:  Various tools for managing a TPM, including key
   generation.
- trousers 0.3.5:  An implementation of the Trusted Software Stack.
   This is the backend libary for the afore mentioned packages.
- trousers testsuite 0.2:  A testsuite for trousers.
- TrustedGRUB 1.1.4:  An TPM enabled version of grub, including support
   for natively booting OpenBSD.

A patch including the driver tpm(4) is attached, more information,
full source code and patches for third party packages can be found at
http://bsssd.sourceforge.net.

Regards,
HJ.


_______________________________________________
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"

Reply via email to