On Tue, 20 Feb 2024 at 07:59, niek.nooij...@omron.com
wrote:
>
> Hi there
>
> After the NV-memory read/write code I'm here again for another patch.
> This time I implemented code to allow an NV-index to be locked behind a PCR
> value.
> This can be used together with the new measured-boot code al
Nooijens / OC-IAB PBD-C DEVEL 1-1
> CC: Dan Carpenter ; u-boot@lists.denx.de
>
> 件名: Re: [PATCH] implement policy_pcr commands to lock NV-indexes behind a PCR
>
> [ilias.apalodi...@linaro.org
> からのメールを受け取る頻度は高くありません。これが問題である可能性の理由については、https://aka.ms/LearnAboutSenderIdentificatio
- 1]++;
> +
> + u32 authorization = TPM2_RS_PW;
> +
> + if (session_handle != NULL)
> + authorization = *session_handle;
> + else
> + nonce_size = 0; //cannot use nonce when using password
> authorization
> +
> + uint offset = TPM2_HD
+ offset + nonce_size + count, 0);
+
if (ret)
return TPM_LIB_ERROR;
diff --git a/lib/tpm_api.c b/lib/tpm_api.c
index 39a5121e30..5875e7b085 100644
--- a/lib/tpm_api.c
+++ b/lib/tpm_api.c
@@ -128,7 +128,7 @@ u32 tpm_nv_read_value(struct udevice *dev, u32 in
ion = TPM2_RS_PW;
> +
> + if (session_handle != NULL)
> + authorization = *session_handle;
> + else
> + nonce_size = 0; //cannot use nonce when using password
> authorization
> +
> + uint offset = TPM2_HDR_LEN + 8 + 4 + 6;
> + uint len =
I'm kind of new to u-boot and I'm not really able to review this code
as well as I should.
But also I can't apply the patch. It seems white space damaged? The
kernel has a good document on how to do this. I'm pretty sure u-boot
does as well but I'm new.
https://www.kernel.org/doc/Documentation/
6 matches
Mail list logo