summaryrefslogtreecommitdiff
path: root/firmware/include/tpm2_tss_constants.h
diff options
context:
space:
mode:
authorStephen Barber <smbarber@chromium.org>2016-08-04 16:05:01 -0700
committerchrome-bot <chrome-bot@chromium.org>2016-08-21 14:04:08 -0700
commit5d996696083b544179da32ece60247b166a17d57 (patch)
tree2ab4a0fb6ae10a18a391cc5278559f80e7716bf3 /firmware/include/tpm2_tss_constants.h
parent16f1b29e76ebcd72bc9081b982c4afbf1619fc95 (diff)
downloadvboot-5d996696083b544179da32ece60247b166a17d57.tar.gz
tlcl: add implementations for GetOwnership and Read/WriteLock
mount-encrypted needs to be aware of TPM ownership status, and will also want to issue a read lock for the early access NVRAM index. BRANCH=none BUG=chromium:625037 TEST=mount-encrypted shows ownership at boot with kevin Change-Id: I42f43f91d892137e1c46c7cacd88e3b749ce7f04 Reviewed-on: https://chromium-review.googlesource.com/366443 Commit-Ready: Andrey Pronin <apronin@chromium.org> Tested-by: Stephen Barber <smbarber@chromium.org> Reviewed-by: Andrey Pronin <apronin@chromium.org>
Diffstat (limited to 'firmware/include/tpm2_tss_constants.h')
-rw-r--r--firmware/include/tpm2_tss_constants.h5
1 files changed, 5 insertions, 0 deletions
diff --git a/firmware/include/tpm2_tss_constants.h b/firmware/include/tpm2_tss_constants.h
index bee607be..7b1ab7b6 100644
--- a/firmware/include/tpm2_tss_constants.h
+++ b/firmware/include/tpm2_tss_constants.h
@@ -25,6 +25,7 @@
#define TPM2_Startup ((TPM_CC)0x00000144)
#define TPM2_Shutdown ((TPM_CC)0x00000145)
#define TPM2_NV_Read ((TPM_CC)0x0000014E)
+#define TPM2_NV_ReadLock ((TPM_CC)0x0000014F)
#define TPM2_GetCapability ((TPM_CC)0x0000017A)
/* TCG Spec defined, verify for TPM2.
@@ -111,6 +112,10 @@ struct tpm2_nv_write_cmd {
uint16_t offset;
};
+struct tpm2_nv_read_lock_cmd {
+ TPMI_RH_NV_INDEX nvIndex;
+};
+
struct tpm2_nv_write_lock_cmd {
TPMI_RH_NV_INDEX nvIndex;
};