7 #define TPM_PCR_BOOT_MODE "VBOOT: boot mode"
8 #define TPM_PCR_GBB_HWID_NAME "VBOOT: GBB HWID"
16 ctx->flags |= VB2_CONTEXT_SECDATA_WANTS_REBOOT;
22 enum vb2_pcr_digest which_digest)
28 rv = vb2api_get_pcr_digest(ctx, which_digest,
buffer, &size);
29 if (rv != VB2_SUCCESS)
32 return VB2_ERROR_UNKNOWN;
46 "Buffer needs to be able to fit at least a SHA256");
47 enum vb2_hash_algorithm algo =
CONFIG(TPM1) ? VB2_HASH_SHA1 : VB2_HASH_SHA256;
49 switch (which_digest) {
59 return VB2_ERROR_UNKNOWN;
_Static_assert(sizeof(hls_t)==HLS_SIZE, "HLS_SIZE must equal to sizeof(hls_t)")
u8 buffer[C2P_BUFFER_MAXSIZE]
#define TPM_PCR_BOOT_MODE
#define TPM_PCR_GBB_HWID_NAME
vb2_error_t vboot_extend_pcr(struct vb2_context *ctx, int pcr, enum vb2_pcr_digest which_digest)
uint32_t vboot_setup_tpm(struct vb2_context *ctx)
uint32_t tpm_extend_pcr(int pcr, enum vb2_hash_algorithm digest_algo, const uint8_t *digest, size_t digest_len, const char *name)
Ask vboot for a digest and extend a TPM PCR with it.
uint32_t tpm_setup(int s3flag)
Start the TPM and establish the root of trust.
#define TPM_PCR_MINIMUM_DIGEST_SIZE
#define TPM_E_MUST_REBOOT