diff options
author | Stephen Barber <smbarber@chromium.org> | 2016-08-04 16:05:01 -0700 |
---|---|---|
committer | chrome-bot <chrome-bot@chromium.org> | 2016-08-21 14:04:08 -0700 |
commit | 5d996696083b544179da32ece60247b166a17d57 (patch) | |
tree | 2ab4a0fb6ae10a18a391cc5278559f80e7716bf3 /firmware/include/tpm2_tss_constants.h | |
parent | 16f1b29e76ebcd72bc9081b982c4afbf1619fc95 (diff) | |
download | vboot-5d996696083b544179da32ece60247b166a17d57.tar.gz |
tlcl: add implementations for GetOwnership and Read/WriteLock
mount-encrypted needs to be aware of TPM ownership status, and
will also want to issue a read lock for the early access NVRAM
index.
BRANCH=none
BUG=chromium:625037
TEST=mount-encrypted shows ownership at boot with kevin
Change-Id: I42f43f91d892137e1c46c7cacd88e3b749ce7f04
Reviewed-on: https://chromium-review.googlesource.com/366443
Commit-Ready: Andrey Pronin <apronin@chromium.org>
Tested-by: Stephen Barber <smbarber@chromium.org>
Reviewed-by: Andrey Pronin <apronin@chromium.org>
Diffstat (limited to 'firmware/include/tpm2_tss_constants.h')
-rw-r--r-- | firmware/include/tpm2_tss_constants.h | 5 |
1 files changed, 5 insertions, 0 deletions
diff --git a/firmware/include/tpm2_tss_constants.h b/firmware/include/tpm2_tss_constants.h index bee607be..7b1ab7b6 100644 --- a/firmware/include/tpm2_tss_constants.h +++ b/firmware/include/tpm2_tss_constants.h @@ -25,6 +25,7 @@ #define TPM2_Startup ((TPM_CC)0x00000144) #define TPM2_Shutdown ((TPM_CC)0x00000145) #define TPM2_NV_Read ((TPM_CC)0x0000014E) +#define TPM2_NV_ReadLock ((TPM_CC)0x0000014F) #define TPM2_GetCapability ((TPM_CC)0x0000017A) /* TCG Spec defined, verify for TPM2. @@ -111,6 +112,10 @@ struct tpm2_nv_write_cmd { uint16_t offset; }; +struct tpm2_nv_read_lock_cmd { + TPMI_RH_NV_INDEX nvIndex; +}; + struct tpm2_nv_write_lock_cmd { TPMI_RH_NV_INDEX nvIndex; }; |