Re: [PATCH] implement policy_pcr commands to lock NV-indexes behind a PCR

2024-03-05 Thread Ilias Apalodimas
On Tue, 20 Feb 2024 at 07:59, niek.nooij...@omron.com wrote: > > Hi there > > After the NV-memory read/write code I'm here again for another patch. > This time I implemented code to allow an NV-index to be locked behind a PCR > value. > This can be used together with the new measured-boot code al

Re: [PATCH] implement policy_pcr commands to lock NV-indexes behind a PCR

2024-03-05 Thread Ilias Apalodimas
Nooijens / OC-IAB PBD-C DEVEL 1-1 > CC: Dan Carpenter ; u-boot@lists.denx.de > > 件名: Re: [PATCH] implement policy_pcr commands to lock NV-indexes behind a PCR > > [ilias.apalodi...@linaro.org > からのメールを受け取る頻度は高くありません。これが問題である可能性の理由については、https://aka.ms/LearnAboutSenderIdentificatio

Re: [PATCH] implement policy_pcr commands to lock NV-indexes behind a PCR

2024-02-22 Thread niek.nooij...@omron.com
- 1]++; > + > + u32 authorization = TPM2_RS_PW; > + > +     if (session_handle != NULL) > +       authorization = *session_handle; > + else > +   nonce_size = 0; //cannot use nonce when using password > authorization > + > + uint offset = TPM2_HD

Re: [PATCH] implement policy_pcr commands to lock NV-indexes behind a PCR

2024-02-21 Thread niek.nooij...@omron.com
+ offset + nonce_size + count, 0); +  if (ret)    return TPM_LIB_ERROR; diff --git a/lib/tpm_api.c b/lib/tpm_api.c index 39a5121e30..5875e7b085 100644 --- a/lib/tpm_api.c +++ b/lib/tpm_api.c @@ -128,7 +128,7 @@ u32 tpm_nv_read_value(struct udevice *dev, u32 in

Re: [PATCH] implement policy_pcr commands to lock NV-indexes behind a PCR

2024-02-21 Thread Ilias Apalodimas
ion = TPM2_RS_PW; > + > +     if (session_handle != NULL) > +       authorization = *session_handle; > + else > +   nonce_size = 0; //cannot use nonce when using password > authorization > + > + uint offset = TPM2_HDR_LEN + 8 + 4 + 6; > + uint len =

Re: [PATCH] implement policy_pcr commands to lock NV-indexes behind a PCR

2024-02-20 Thread Dan Carpenter
I'm kind of new to u-boot and I'm not really able to review this code as well as I should. But also I can't apply the patch. It seems white space damaged? The kernel has a good document on how to do this. I'm pretty sure u-boot does as well but I'm new. https://www.kernel.org/doc/Documentation/