security/tpm: Unify the coreboot TPM software stack
* Remove 2nd software stack in pc80 drivers directory. * Create TSPI interface for common usage. * Refactor TSS / TIS code base. * Add vendor tss (Cr50) directory. * Change kconfig options for TPM to TPM1. * Add user / board configuration with: * MAINBOARD_HAS_*_TPM # * BUS driver * MAINBOARD_HAS_TPM1 or MAINBOARD_HAS_TPM2 * Add kconfig TPM user selection (e.g. pluggable TPMs) * Fix existing headers and function calls. * Fix vboot for interface usage and antirollback mode. Change-Id: I7ec277e82a3c20c62a0548a1a2b013e6ce8f5b3f Signed-off-by: Philipp Deppenwiese <zaolin@das-labor.org> Reviewed-on: https://review.coreboot.org/24903 Tested-by: build bot (Jenkins) <no-reply@coreboot.org> Reviewed-by: Aaron Durbin <adurbin@chromium.org>
This commit is contained in:
committed by
Martin Roth
parent
961d31bdb3
commit
c07f8fbe6f
@ -13,7 +13,6 @@
|
||||
* GNU General Public License for more details.
|
||||
*/
|
||||
|
||||
#include <security/tpm/antirollback.h>
|
||||
#include <arch/exception.h>
|
||||
#include <assert.h>
|
||||
#include <bootmode.h>
|
||||
@ -27,6 +26,8 @@
|
||||
#include <security/vboot/misc.h>
|
||||
#include <security/vboot/vbnv.h>
|
||||
|
||||
#include "antirollback.h"
|
||||
|
||||
/* The max hash size to expect is for SHA512. */
|
||||
#define VBOOT_MAX_HASH_SIZE VB2_SHA512_DIGEST_SIZE
|
||||
|
||||
@ -53,16 +54,6 @@ void vb2ex_printf(const char *func, const char *fmt, ...)
|
||||
return;
|
||||
}
|
||||
|
||||
int vb2ex_tpm_clear_owner(struct vb2_context *ctx)
|
||||
{
|
||||
uint32_t rv;
|
||||
printk(BIOS_INFO, "Clearing TPM owner\n");
|
||||
rv = tpm_clear_and_reenable();
|
||||
if (rv)
|
||||
return VB2_ERROR_EX_TPM_CLEAR_OWNER;
|
||||
return VB2_SUCCESS;
|
||||
}
|
||||
|
||||
int vb2ex_read_resource(struct vb2_context *ctx,
|
||||
enum vb2_resource_index index,
|
||||
uint32_t offset,
|
||||
@ -290,8 +281,8 @@ static void save_if_needed(struct vb2_context *ctx)
|
||||
|
||||
static uint32_t extend_pcrs(struct vb2_context *ctx)
|
||||
{
|
||||
return tpm_extend_pcr(ctx, 0, BOOT_MODE_PCR) ||
|
||||
tpm_extend_pcr(ctx, 1, HWID_DIGEST_PCR);
|
||||
return vboot_extend_pcr(ctx, 0, BOOT_MODE_PCR) ||
|
||||
vboot_extend_pcr(ctx, 1, HWID_DIGEST_PCR);
|
||||
}
|
||||
|
||||
/**
|
||||
|
Reference in New Issue
Block a user