diff options
| author | Ilya Smirnov <ismirno@us.ibm.com> | 2019-01-03 15:09:17 -0600 |
|---|---|---|
| committer | Daniel M. Crowell <dcrowell@us.ibm.com> | 2019-01-10 14:53:38 -0600 |
| commit | 26f7f6d12b118253c3ba841dacedf34beaa93ff9 (patch) | |
| tree | ecd52e5bb661460a1ffc90979436b804321cde40 /src/usr/secureboot/trusted/base | |
| parent | 21f75b9e4475b92665e4dd8ca182108dab53045f (diff) | |
| download | talos-hostboot-26f7f6d12b118253c3ba841dacedf34beaa93ff9.tar.gz talos-hostboot-26f7f6d12b118253c3ba841dacedf34beaa93ff9.zip | |
Trustedboot: GetRandom API Changes
New Secure Multinode Comm protocol calls for generation of
random number that is 32 bytes in size. This commit extends
the existing GetRandom API to be able to accept a size of
the random number to be generated by TPM.
Change-Id: Ic6fc1705594f51f121ff75aaa489d6d32fe41409
RTC: 202364
Reviewed-on: http://rchgit01.rchland.ibm.com/gerrit1/70116
Tested-by: Jenkins Server <pfd-jenkins+hostboot@us.ibm.com>
Tested-by: Jenkins OP Build CI <op-jenkins+hostboot@us.ibm.com>
Tested-by: Jenkins OP HW <op-hw-jenkins+hostboot@us.ibm.com>
Reviewed-by: Nicholas E. Bofferding <bofferdn@us.ibm.com>
Tested-by: FSP CI Jenkins <fsp-CI-jenkins+hostboot@us.ibm.com>
Reviewed-by: Michael Baiocchi <mbaiocch@us.ibm.com>
Reviewed-by: Daniel M. Crowell <dcrowell@us.ibm.com>
Diffstat (limited to 'src/usr/secureboot/trusted/base')
| -rw-r--r-- | src/usr/secureboot/trusted/base/trustedbootMsg.H | 5 |
1 files changed, 3 insertions, 2 deletions
diff --git a/src/usr/secureboot/trusted/base/trustedbootMsg.H b/src/usr/secureboot/trusted/base/trustedbootMsg.H index b327d6375..95a52a6e4 100644 --- a/src/usr/secureboot/trusted/base/trustedbootMsg.H +++ b/src/usr/secureboot/trusted/base/trustedbootMsg.H @@ -5,7 +5,7 @@ /* */ /* OpenPOWER HostBoot Project */ /* */ -/* Contributors Listed Below - COPYRIGHT 2016,2018 */ +/* Contributors Listed Below - COPYRIGHT 2016,2019 */ /* [+] International Business Machines Corp. */ /* */ /* */ @@ -76,7 +76,8 @@ namespace TRUSTEDBOOT struct GetRandomMsgData { TARGETING::Target* i_pTpm; // the TPM to obtain random data from - uint64_t o_randNum; // the random data is populated here + size_t i_randNumSize; // the size (in bytes) of the rand number + uint8_t* o_randNum; // the random data is populated here }; // Trustedboot message class |

