coreboot/src/vendorcode
Vadim Bendebury 5f082d6a9b vboot2: tpm2 factory initialization.
This patch adds a TPM2 specific path in the vboot2 initialization
sequence when the device is turned on in the factory for the first
time, namely two secure NVRAM spaces are created, with different
access privileges.

The higher privilege space can be modified only be the RO firmware,
and the lower privilege space can be modified by both RO and RW
firmware.

The API is being modified to hide the TPM implementation details from
the caller.

Some functions previously exported as global are in fact not used
anywhere else, they are being defined static.

BRANCH=none
BUG=chrome-os-partner:50645
TEST=when this code is enabled the two secure spaces are successfully
     created during factory initialization.

Change-Id: I917b2f74dfdbd214d7f651ce3d4b80f4a18def20
Signed-off-by: Vadim Bendebury <vbendeb@chromium.org>
Reviewed-on: https://chromium-review.googlesource.com/353916
Reviewed-by: Bill Richardson <wfrichar@chromium.org>
Reviewed-by: Darren Krahn <dkrahn@chromium.org>
2016-06-25 02:28:55 -07:00
..
amd UPSTREAM: AGESA boards: Split dispatcher to romstage and ramstage 2016-06-06 23:35:01 -07:00
google vboot2: tpm2 factory initialization. 2016-06-25 02:28:55 -07:00
intel UPSTREAM: util/checklist: Add bootblock support 2016-06-10 00:17:58 -07:00
siemens drivers/intel/i210: Use uint8_t and friends instead of u8 2016-04-28 08:25:23 +02:00
Makefile.inc vendorcode/siemens: Add hwilib for Siemens specific info struct 2016-04-28 08:15:47 +02:00