coreboot/src/security/tpm
Joel Kitching c5d0a2ea1f tpm2/tlcl_send_startup: should pass on TPM_E_INVALID_POSTINIT
Change TSS layer tlcl_send_startup() to expose TPM_RC_INITIALIZE,
which gets mapped to TPM_E_INVALID_POSTINIT.  The return value
is exposed to TSPI layer tpm_setup(), and dealt with as follows:

- Regular startup: TPM_E_INVALID_POSTINIT should count as failure.
- S3 resume: TPM_E_INVALID_POSTINIT can be assumed to mean that
  TPM maintains power during S3, and is already initialized.

Also, correct an error where |response| could be erroneously accessed
when it is set to NULL.

BUG=b:114018226
TEST=compile coreboot

Change-Id: Ib0c3750386ae04279401c1dc318c5019d39f5ecf
Signed-off-by: Joel Kitching <kitching@google.com>
Reviewed-on: https://review.coreboot.org/29063
Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
Reviewed-by: Paul Menzel <paulepanter@users.sourceforge.net>
Reviewed-by: Julius Werner <jwerner@chromium.org>
Reviewed-by: Philipp Deppenwiese <zaolin.daisuki@gmail.com>
2018-10-24 09:05:23 +00:00
..
tspi tpm/tspi: clean up tpm_setup function flow 2018-10-18 16:22:40 +00:00
tss tpm2/tlcl_send_startup: should pass on TPM_E_INVALID_POSTINIT 2018-10-24 09:05:23 +00:00
Kconfig security/tpm: Unify the coreboot TPM software stack 2018-06-04 20:33:07 +00:00
Makefile.inc security/tpm: Add TCPA logging functionality 2018-07-28 16:58:05 +00:00
tis.h security/tpm: Unify the coreboot TPM software stack 2018-06-04 20:33:07 +00:00
tspi.h security/tpm: Improve TCPA log generation 2018-08-03 23:46:21 +00:00
tss.h security/tpm: Unify the coreboot TPM software stack 2018-06-04 20:33:07 +00:00
tss_errors.h security/tpm: Unify the coreboot TPM software stack 2018-06-04 20:33:07 +00:00