summaryrefslogtreecommitdiff
path: root/utility/tpmc.c
diff options
context:
space:
mode:
authorAndrey Pronin <apronin@google.com>2016-07-18 11:24:55 -0700
committerVadim Bendebury <vbendeb@chromium.org>2016-07-22 14:42:54 +0000
commitbea3f7979a4c3088da74accd1b68830214e0934d (patch)
tree99d3aefa513cf9b255c079d2945cd4b5c5f18832 /utility/tpmc.c
parenta071c7697883e3a73570cf0c75fa5673cc83673d (diff)
downloadvboot-bea3f7979a4c3088da74accd1b68830214e0934d.tar.gz
tlcl: use different NV_Read authorizations for fw and userland
Let's use an earlier version of CL 360944 that relies on the global flag to decide if the platform authorization is to be used. As it turned out, we can't read NVRAM with empty password authorization if platform hierarchy is still enabled (as it is in firmware), so we keep platform authorization for firmware, and use empty password only for userland utilities, like tpmc. BRANCH=none BUG=chrome-os-partner:55531 TEST=Run 'initctl stop trunksd; tpmc read 0x1008 0xd" on kevin, verify that it returns the right output. Change-Id: Ic878ebde9086e803d2487d90c55c0f19001cf94b Signed-off-by: Andrey Pronin <apronin@google.com> Reviewed-on: https://chromium-review.googlesource.com/362520 Reviewed-by: Vadim Bendebury <vbendeb@chromium.org> Tested-by: Andrey Pronin <apronin@chromium.org> Commit-Queue: Vadim Bendebury <vbendeb@chromium.org>
Diffstat (limited to 'utility/tpmc.c')
-rw-r--r--utility/tpmc.c1
1 files changed, 1 insertions, 0 deletions
diff --git a/utility/tpmc.c b/utility/tpmc.c
index 76a63e02..8d2ed241 100644
--- a/utility/tpmc.c
+++ b/utility/tpmc.c
@@ -512,6 +512,7 @@ int main(int argc, char* argv[]) {
}
TlclLibInit();
+ TlclLibAccessAsUser();
for (c = command_table; c < command_table + n_commands; c++) {
if (strcmp(cmd, c->name) == 0 || strcmp(cmd, c->abbr) == 0) {