diff options
author | Chris Engel <cjengel@us.ibm.com> | 2016-06-03 16:44:29 -0500 |
---|---|---|
committer | Stephen Cprek <smcprek@us.ibm.com> | 2016-07-18 15:32:39 -0500 |
commit | 661c7e6a3ef2f76bfce68cb67f2f6d2d1c3d6f9b (patch) | |
tree | 33373da8433aae14fca1fb58a141cc0402d072c6 /src/include | |
parent | b3f6347ef52994c4d37ac5f361b21fe4d4658462 (diff) | |
download | talos-hostboot-661c7e6a3ef2f76bfce68cb67f2f6d2d1c3d6f9b.tar.gz talos-hostboot-661c7e6a3ef2f76bfce68cb67f2f6d2d1c3d6f9b.zip |
Trustedboot PCR Extend reworked to use task message queue
Removed TPM log manager and required functions from HBB and replaced
with a simple message queue
Change-Id: I5f5a418b6ea8c0228229e8c45523385b488e2b6b
RTC: 155519
ForwardPort: yes
Reviewed-on: http://ralgit01.raleigh.ibm.com/gerrit1/27133
Tested-by: Jenkins Server <pfd-jenkins+hostboot@us.ibm.com>
Tested-by: FSP CI Jenkins <fsp-CI-jenkins+hostboot@us.ibm.com>
Reviewed-by: Christopher J. Engel <cjengel@us.ibm.com>
Reviewed-by: Daniel M. Crowell <dcrowell@us.ibm.com>
Diffstat (limited to 'src/include')
-rw-r--r-- | src/include/usr/secureboot/trustedboot_reasoncodes.H | 6 | ||||
-rw-r--r-- | src/include/usr/secureboot/trustedbootif.H | 6 |
2 files changed, 10 insertions, 2 deletions
diff --git a/src/include/usr/secureboot/trustedboot_reasoncodes.H b/src/include/usr/secureboot/trustedboot_reasoncodes.H index 902b1cb26..bc2031080 100644 --- a/src/include/usr/secureboot/trustedboot_reasoncodes.H +++ b/src/include/usr/secureboot/trustedboot_reasoncodes.H @@ -53,6 +53,9 @@ namespace TRUSTEDBOOT MOD_TPM_CMD_PCREXTEND = 0x07, MOD_TPM_CMD_PCRREAD = 0x08, MOD_TPM_REPLAY_LOG = 0x09, + MOD_TPM_PCREXTEND = 0x0A, + MOD_TPM_TPMDAEMON = 0x0B, + MOD_TPM_SYNCRESPONSE = 0x0C, MOD_TPMLOGMGR_INITIALIZE = 0x10, MOD_TPMLOGMGR_ADDEVENT = 0x11, @@ -81,6 +84,9 @@ namespace TRUSTEDBOOT RC_TPM_COMMAND_FAIL = SECURE_COMP_ID | 0xAE, RC_TPM_INVALID_ARGS = SECURE_COMP_ID | 0xAF, RC_TPMLOGMGR_LOGWALKFAIL = SECURE_COMP_ID | 0xB0, + RC_PCREXTEND_SENDRECV_FAIL = SECURE_COMP_ID | 0xB1, + RC_PCREXTEND_SEND_FAIL = SECURE_COMP_ID | 0xB2, + RC_MSGRESPOND_FAIL = SECURE_COMP_ID | 0xB3, }; #ifdef __cplusplus } diff --git a/src/include/usr/secureboot/trustedbootif.H b/src/include/usr/secureboot/trustedbootif.H index 437227d36..27dd1e8d4 100644 --- a/src/include/usr/secureboot/trustedbootif.H +++ b/src/include/usr/secureboot/trustedbootif.H @@ -86,15 +86,17 @@ namespace TRUSTEDBOOT * @param[in] i_digest Digest value to write to PCR * @param[in] i_digestSize Byte size of i_digest data * @param[in] i_logMsg Null terminated log message, truncated at 128 chars + * @param[in] i_sendAsync Perform extension asynchronously, default true * @return errlHndl_t NULL if successful, otherwise a pointer to the * error log. * Digest will be right padded with zeros or truncated to match TPM digest * size being used */ errlHndl_t pcrExtend(TPM_Pcr i_pcr, - uint8_t* i_digest, + const uint8_t* i_digest, size_t i_digestSize, - const char* i_logMsg); + const char* i_logMsg, + bool i_sendAsync = true); /** * @brief Return a set of information related to every unique |