History log of /external/tpm2/ExecCommand.c
Revision Date Author Comments (<<< Hide modified files) (Show modified files >>>)
7878aefcd59699a343a5699b68a40187e8f878f2 12-Aug-2015 Vadim Bendebury <vbendeb@chromium.org> Introduce embedded mode conditional compilation

When running on embedded targets software cryptography is often not
available due to inadequate toolchain capabilities and limited
hardware resources.

Invoking make with EMBEDDED_MODE=1 ROOTDIR=1 will stub out
cryptographic functions and will provide another -I preprocessor
option to allow to pull in alternative .h files not available from the
toolchain.

NV Ram buffer size provisionally is being reduced to 8K. In final
embedded implementation NVRam might be held in flash, in which case
the required memory buffer could limited to one flash block size.

Some big data objects not used in the code are also being compiled out
when building for embedded mode of operation.

BUG=chrome-os-partner:43025
TEST=with the rest of the changes in place the code compiles with the
EC, and TPM startup sequence gets invoked.

Change-Id: I71487570d2032c66b30c0bdf0b152dec6d0ece8a
Signed-off-by: Vadim Bendebury <vbendeb@chromium.org>
Reviewed-on: https://chromium-review.googlesource.com/292945
Reviewed-by: Utkarsh Sanghi <usanghi@chromium.org>
Commit-Queue: Vadim Bendebury <vbendeb@gmail.com>
/external/tpm2/ExecCommand.c
764a7d67fcb388409711199e014f60a0e960944d 30-Jul-2015 Jocelyn Bohr <bohr@chromium.org> Add ExecCommand_fp.h.

Add file ExecCommand_fp.h. Needed for inclusion in TPM2.0 simulator.
TPMCmdp.c includes ExecCommand_fp.h implying that it should exist.

Added package name HandleProcess_fp.h header guard.

TEST=$ sudo emerge tpm2
builds libtpm2.a
BUG=None

Change-Id: Ia0aac137f8b32f4f24a1ade4436a23c8a73434d7
Signed-off-by: Jocelyn Bohr <bohr@chromium.org>
Reviewed-on: https://chromium-review.googlesource.com/289862
Reviewed-by: Vadim Bendebury <vbendeb@chromium.org>
/external/tpm2/ExecCommand.c
32be40450906cd2c80dee4a83204931f7f3a2daa 30-Jul-2015 Jocelyn Bohr <bohr@chromium.org> Remove instances of calling marshal functions with NULL pointer.

In the code scraped from the TCG TPM2.0 Library specification, there
are several instances where the intent is to marshal data into a buffer,
but NULL pointer is passed in as size.

Part 4 section 4.2.3.1 states: "If size is a NULL pointer, then no
data is marshaled and the routine will compute the size of the memory
required to marshal the indicated type."

Implying these usages are bugs. This CL removes all instances of passing
in NULL as size to a Marshal function when the intent is to marshal data.

TEST=$ sudo emerge tpm2
builds libtpm2.a. Currently this is the only test we have for the
scraped code.
BUG=none

Change-Id: If7b2a60f6a8e875b4a6eceab513dc22325bf4999
Reviewed-on: https://chromium-review.googlesource.com/289647
Reviewed-by: Utkarsh Sanghi <usanghi@chromium.org>
Commit-Queue: Jocelyn Bohr <bohr@chromium.org>
Tested-by: Jocelyn Bohr <bohr@chromium.org>
/external/tpm2/ExecCommand.c
f5cc58b2d9df7d5391c1d42b86c6d747fdced06e 31-May-2015 Vadim Bendebury <vbendeb@chromium.org> Add files modified after part4.txt was edited

Two new files were generated and two previously generated files were
modified when parsep4 was run on modified part4.txt.

BUG=none
TEST=none

Change-Id: I4becad7ebff7250493f02839534791b006729d67
Signed-off-by: Vadim Bendebury <vbendeb@chromium.org>
/external/tpm2/ExecCommand.c
5679752bf24c21135884e987c4077e2f71848971 20-May-2015 Vadim Bendebury <vbendeb@chromium.org> Initial commit to seed TPM2.0 source code directory

LICENSE file text copied from TCG library specification. README
describes the procedure used to extract source code from parts 3 and 4
of the specification.

The python scripts and part{34}.txt files will be removed in the
following commits.

Change-Id: Ie281e6e988481831f33483053455e8aff8f3f75f
Signed-off-by: Vadim Bendebury <vbendeb@chromium.org>
/external/tpm2/ExecCommand.c