2c38933a0e
Create an NVRAM space in TPM 2.0 that survives owner clear and can be read and written without authorization. This space allows to seal data with the TPM that can only be unsealed before the space was cleared. It will be used during ChromeOS enterprise rollback to securely carry data across a TPM clear. Public documentation on the rollback feature: https://source.chromium.org/chromium/chromiumos/platform2/+/main:oobe_config/README.md BUG=b/233746744 Signed-off-by: Miriam Polzer <mpolzer@google.com> Change-Id: I59ca0783b41a6f9ecd5b72f07de6fb403baf2820 Reviewed-on: https://review.coreboot.org/c/coreboot/+/66623 Tested-by: build bot (Jenkins) <no-reply@coreboot.org> Reviewed-by: Julius Werner <jwerner@chromium.org> |
||
---|---|---|
.. | ||
antirollback.h | ||
bootmode.c | ||
common.c | ||
ec_sync.c | ||
Kconfig | ||
Makefile.inc | ||
misc.h | ||
mrc_cache_hash_tpm.c | ||
mrc_cache_hash_tpm.h | ||
secdata_mock.c | ||
secdata_tpm.c | ||
symbols.h | ||
tpm_common.c | ||
tpm_common.h | ||
vbnv.c | ||
vbnv.h | ||
vbnv_cmos.c | ||
vbnv_flash.c | ||
vbnv_layout.h | ||
vboot_common.c | ||
vboot_common.h | ||
vboot_lib.c | ||
vboot_loader.c | ||
vboot_logic.c | ||
verstage.c |