summaryrefslogtreecommitdiff
path: root/firmware/lib/tpm_lite/tlcl.c
diff options
context:
space:
mode:
authorAndrey Pronin <apronin@google.com>2016-07-18 11:24:55 -0700
committerVadim Bendebury <vbendeb@chromium.org>2016-07-22 14:42:54 +0000
commitbea3f7979a4c3088da74accd1b68830214e0934d (patch)
tree99d3aefa513cf9b255c079d2945cd4b5c5f18832 /firmware/lib/tpm_lite/tlcl.c
parenta071c7697883e3a73570cf0c75fa5673cc83673d (diff)
downloadvboot-bea3f7979a4c3088da74accd1b68830214e0934d.tar.gz
tlcl: use different NV_Read authorizations for fw and userland
Let's use an earlier version of CL 360944 that relies on the global flag to decide if the platform authorization is to be used. As it turned out, we can't read NVRAM with empty password authorization if platform hierarchy is still enabled (as it is in firmware), so we keep platform authorization for firmware, and use empty password only for userland utilities, like tpmc. BRANCH=none BUG=chrome-os-partner:55531 TEST=Run 'initctl stop trunksd; tpmc read 0x1008 0xd" on kevin, verify that it returns the right output. Change-Id: Ic878ebde9086e803d2487d90c55c0f19001cf94b Signed-off-by: Andrey Pronin <apronin@google.com> Reviewed-on: https://chromium-review.googlesource.com/362520 Reviewed-by: Vadim Bendebury <vbendeb@chromium.org> Tested-by: Andrey Pronin <apronin@chromium.org> Commit-Queue: Vadim Bendebury <vbendeb@chromium.org>
Diffstat (limited to 'firmware/lib/tpm_lite/tlcl.c')
-rw-r--r--firmware/lib/tpm_lite/tlcl.c4
1 files changed, 4 insertions, 0 deletions
diff --git a/firmware/lib/tpm_lite/tlcl.c b/firmware/lib/tpm_lite/tlcl.c
index bf2d27f9..181b516a 100644
--- a/firmware/lib/tpm_lite/tlcl.c
+++ b/firmware/lib/tpm_lite/tlcl.c
@@ -152,6 +152,10 @@ uint32_t TlclLibClose(void) {
return VbExTpmClose();
}
+void TlclLibAccessAsUser(void) {
+ /* no-op for TPM1.2 */
+}
+
uint32_t TlclStartup(void) {
VBDEBUG(("TPM: Startup\n"));
return Send(tpm_startup_cmd.buffer);