Name | Modified | Size | Downloads / Week |
---|---|---|---|
Parent folder | |||
tpm-tools-1.2.5.1_0.1_armv4t.ipk | 2011-05-25 | 101.3 kB | |
trousers-0.3.4_0.1_armv4t.ipk | 2011-05-25 | 359.5 kB | |
tpm-binaries.tar.bz2 | 2011-05-25 | 418.3 kB | |
Totals: 3 Items | 879.2 kB | 0 |
The DBAMP's sourceforge (link) contains all the deliverables (also linked from the Milestone chart), Follow the Following steps to Run each of them on your Mobile (Neo FreeRunner). 1. Milestone 6 contains openmoko rootfs along with all the required libraries, Flash it to your device or Copy it to the memory card. 2. Milestone 5 contains the kernel (uImage.bin), Flash it to your device or Copy it to the First (FAT partition) partition of your memory card. 3. Milestone 3 contains the Userspace libraries and binaries for selinux, copy the contents of lib to /usr/lib folder of device and contents of bin to /usr/bin of device. 4. Milestone 8 contains MTM emulator and required utilities, use the Following method to install MTM emulator on openmoko. a. Extract tpm-binaries.tar.bz2 i. Copy *.h files to /usr/include folder of Device ii. *.so, *.l and *.la to /usr/lib folder of Device iii. The rest of Binaries to /usr/bin folder folder of Device iv. Copy tpmd_dev.ko from milestone 5 to /lib/../tpm on device b. Install the IPKs using the following command opkg install tpm-tools-1.2.5.1_0.1_armv4t.ipk opkg install trousers-0.3.4_0.1_armv4t.ipk 5. Milestone 10 contains ucon, the verifier module and the tpm's pcr read utility, use the following method to make it operational on Mobile device a. Copy UCON_Final.tar.bz2 and verification_jar.tar.bz2 and pcr_reader_java.zip to your home folder on device. b. Extract them c. To run ucon, change your directory to ucon_final and run the following command $java -jar ucon.jar Note: It will execute and will take some time, it will produce two types of logs, the more detail xml log (meta/log/usage_log.xml) and the log containing hashes (/var/ucon_hashes) d. Run the verifier, change the directory to verification and run the following command $java -jar verifier.jar It will execute and recalculate the hashes from the ucon_hashes file in /var/ and it will give u a final hash. e. Now we have to compare this hash store in PCR 11 of the TPM, to see that, change your directory to pcr_reader_java and run the following command $java -jar pcr_reader_java.jar Read the value of PCR11 and compare it with hash produced by verifier, if they are the same means that the log isn't tampered.