diff options
author | Chris Engel <cjengel@us.ibm.com> | 2017-07-06 22:04:32 -0500 |
---|---|---|
committer | Daniel M. Crowell <dcrowell@us.ibm.com> | 2017-08-11 10:04:45 -0400 |
commit | a0e8246b27da999d4d8beba64994daef6333a442 (patch) | |
tree | e86e7042b4442112718aedf90703904a8c4510bf /src/include/usr/secureboot/trustedboot_reasoncodes.H | |
parent | f08b3735c1402f8fe9292822e1eb95b43357b4ce (diff) | |
download | talos-hostboot-a0e8246b27da999d4d8beba64994daef6333a442.tar.gz talos-hostboot-a0e8246b27da999d4d8beba64994daef6333a442.zip |
MFG support to validate TPM provisioning
Change-Id: I137b6f6c81cbcd3c2379e4ef34ddff021c3cd576
Reviewed-on: http://ralgit01.raleigh.ibm.com/gerrit1/42835
Reviewed-by: Nicholas E. Bofferding <bofferdn@us.ibm.com>
Tested-by: Jenkins Server <pfd-jenkins+hostboot@us.ibm.com>
Reviewed-by: Timothy R. Block <block@us.ibm.com>
Tested-by: Jenkins OP Build CI <op-jenkins+hostboot@us.ibm.com>
Tested-by: Jenkins OP HW <op-hw-jenkins+hostboot@us.ibm.com>
Reviewed-by: Stephen M. Cprek <smcprek@us.ibm.com>
Tested-by: FSP CI Jenkins <fsp-CI-jenkins+hostboot@us.ibm.com>
Reviewed-by: Michael Baiocchi <mbaiocch@us.ibm.com>
Reviewed-by: Daniel M. Crowell <dcrowell@us.ibm.com>
Diffstat (limited to 'src/include/usr/secureboot/trustedboot_reasoncodes.H')
-rw-r--r-- | src/include/usr/secureboot/trustedboot_reasoncodes.H | 2 |
1 files changed, 2 insertions, 0 deletions
diff --git a/src/include/usr/secureboot/trustedboot_reasoncodes.H b/src/include/usr/secureboot/trustedboot_reasoncodes.H index bdabee5c2..5663ba318 100644 --- a/src/include/usr/secureboot/trustedboot_reasoncodes.H +++ b/src/include/usr/secureboot/trustedboot_reasoncodes.H @@ -57,6 +57,7 @@ namespace TRUSTEDBOOT MOD_TPM_TPMDAEMON = 0x0B, MOD_TPM_SYNCRESPONSE = 0x0C, MOD_TPM_SEPARATOR = 0x0D, + MOD_TPM_CMD_GETCAPNVINDEX = 0x0E, MOD_TPMLOGMGR_INITIALIZE = 0x10, MOD_TPMLOGMGR_ADDEVENT = 0x11, @@ -90,6 +91,7 @@ namespace TRUSTEDBOOT RC_SEND_FAIL = SECURE_COMP_ID | 0xB2, RC_MSGRESPOND_FAIL = SECURE_COMP_ID | 0xB3, RC_UPDATE_SECURITY_CTRL_HWP_FAIL = SECURE_COMP_ID | 0xB4, + RC_TPM_NVINDEX_VALIDATE_FAIL = SECURE_COMP_ID | 0xB5, }; #ifdef __cplusplus } |