History log of /external/vboot_reference/firmware/lib/tpm_lite/tlcl.c
Revision Date Author Comments (<<< Hide modified files) (Show modified files >>>)
4c3b4ea3d810a2ed907078a6b9a379442aaf6def 30-May-2014 Bill Richardson <wfrichar@chromium.org> Workaround for failing tests when DEBUG=1

Two changes here.

First are some failing assertions in tlcl.c. These have always failed, but
only when DEBUG=1, so no one noticed. I've opened a bug to find out why, but
it's blocking something else. We're refactoring anyway, so for now we'll
just comment around it.

Second is a null-pointer dereference in VbSharedDataSetKernelKey(). Again,
only when DEBUG=1.

BUG=chromium:379255
BRANCH=ToT
TEST=manual

cd src/platform/ec
\rm -rf build
DEBUG=1 make runtests

Change-Id: Ia5e0a742f75057b449f3c19b778c5d2f0408d7cd
Signed-off-by: Bill Richardson <wfrichar@chromium.org>
Reviewed-on: https://chromium-review.googlesource.com/202303
Reviewed-by: Randall Spangler <rspangler@chromium.org>
Reviewed-by: Luigi Semenzato <semenzato@chromium.org>
/external/vboot_reference/firmware/lib/tpm_lite/tlcl.c
0c3ba249abb1dc60f5ebabccf84ff13206440b83 29-Mar-2013 Bill Richardson <wfrichar@chromium.org> Massive refactoring of external header files.

This reduces the number of exported header files to the minimum needed by
the existing userspace utilities and firmware implementations.

BUG=chromium:221544
BRANCH=none
TEST=manual, trybots
CQ-DEPEND=CL:47019,CL:47022,CL:47023

sudo FEATURES=test emerge vboot_reference
FEATURES=test emerge-$BOARD \
vboot_reference \
chromeos-cryptohome \
chromeos-installer \
chromeos-u-boot \
peach-u-boot \
depthcharge

Change-Id: I2946cc2dbaf5459a6c5eca92ca57d546498e6d85
Signed-off-by: Bill Richardson <wfrichar@chromium.org>
Reviewed-on: https://gerrit.chromium.org/gerrit/47021
Reviewed-by: Randall Spangler <rspangler@chromium.org>
/external/vboot_reference/firmware/lib/tpm_lite/tlcl.c
ac8805e7e9bd40c03baf44e37b26f28d9b763ab5 16-Mar-2013 Gabe Black <gabeblack@chromium.org> Get rid of some crufty macros.

These were macros that were never used, or that were only set to one thing and
could be substituted up front.

I left in code guarded by the HAVE_ENDIAN_H and HAVE_LITTLE_ENDIAN macros even
though those are never defined because they guard a reportedly significantly
faster implementation of some functionality, at least according to a comment
in the source. It would be a good idea to enable that code path and see if it
really does make a big difference before removing it entirely.

BUG=None
TEST=Built for Link, Daisy, and the host with FEATURES=test. Built depthcharge
for Link and booted in normal mode.
BRANCH=None

Change-Id: I934a4dd0da169ac018ba07350d56924ab88b1acc
Signed-off-by: Gabe Black <gabeblack@google.com>
Reviewed-on: https://gerrit.chromium.org/gerrit/45687
Reviewed-by: Randall Spangler <rspangler@chromium.org>
Commit-Queue: Gabe Black <gabeblack@chromium.org>
Tested-by: Gabe Black <gabeblack@chromium.org>
/external/vboot_reference/firmware/lib/tpm_lite/tlcl.c
c3d488d155961d2849dfdaa4f0461df1aa95c2ca 29-Jan-2013 Randall Spangler <rspangler@chromium.org> Add tlcl tests

Verifies the right TPM commands are called, but doesn't check at a
detailed level that they're packed properly.

BUG=chromium-os:38139
BRANCH=none
TEST=make runtests

Change-Id: I6c14db083ac0a40d4738582d200d9687cddb99de
Signed-off-by: Randall Spangler <rspangler@chromium.org>
Reviewed-on: https://gerrit.chromium.org/gerrit/42261
Reviewed-by: Bill Richardson <wfrichar@chromium.org>
/external/vboot_reference/firmware/lib/tpm_lite/tlcl.c
25d1c25efb6b3ad5b34905d4f8452b4a58613af1 17-Jan-2013 Kees Cook <keescook@chromium.org> fix s_tpm_pcr_read_cmd structure name typo

Che-Liang Chiou noticed this structure was misnamed. Luckily, they have
the same offsets to the useful fields.

BUG=None
TEST=link build, manual verification
BRANCH=None

Change-Id: I40abd21f053f19758e47c7775333208ad1c3c33d
Signed-off-by: Kees Cook <keescook@chromium.org>
Reviewed-on: https://gerrit.chromium.org/gerrit/41482
Reviewed-by: Che-Liang Chiou <clchiou@chromium.org>
/external/vboot_reference/firmware/lib/tpm_lite/tlcl.c
3428b4bcd99a6d2e9f8b3e1bdf800d943fbe78c3 12-Jan-2013 Luigi Semenzato <semenzato@chromium.org> Make tpmc able to send and receive raw datagrams.

This is immediately needed to debug a Parrot TPM problems, but
we've had similar situation in the past and probably will again
in the future.

BUG=chromium-os:37819
TEST=manually tested with a couple of different packets, and error inputs
BRANCH=none

Change-Id: Id7f66bdbdfe5887fa49cd62af4a9b807fa3d9a89
Reviewed-on: https://gerrit.chromium.org/gerrit/41166
Reviewed-by: Randall Spangler <rspangler@chromium.org>
Commit-Queue: Luigi Semenzato <semenzato@chromium.org>
Tested-by: Luigi Semenzato <semenzato@chromium.org>
/external/vboot_reference/firmware/lib/tpm_lite/tlcl.c
00cc72894f3ce5c3b0d337e424f19da089140237 28-Nov-2012 Kees Cook <keescook@chromium.org> Tlcl: allow OS failures to bubble up to caller

If there were any errors communicating with the TPM at the OS layer
(open, read, write failures), the library would immediately exit, not
allowing the caller to make any decisions about how to handle it. This
introduces a way to initialize the library so that errors will get passed
back up to the caller instead of unceremoniously exiting.

Setting the environment variable "TPM_NO_EXIT=1" enables the feature. To
avoid needing to implement supporting functions in all backends, the
feature is currently limited to just the Tlcl stub implementation.

In the case of mount-encrypted, it can now survive the kernel returning
read/write failures. In the past it had only worked around having open
fail, but that has now been replaced with more sensible logic instead of
the environment variable trickiness.

BUG=chrome-os-partner:15960
TEST=daisy built with an always-failing kernel driver, u-boot builds too
BRANCH=None

Change-Id: Ic7b217017537980f9c239d678067398613045676
Signed-off-by: Kees Cook <keescook@chromium.org>
Reviewed-on: https://gerrit.chromium.org/gerrit/38791
Reviewed-by: Luigi Semenzato <semenzato@chromium.org>
/external/vboot_reference/firmware/lib/tpm_lite/tlcl.c
8b6da26a6e5978a43233f7a43c7bab5889d3817a 07-Jun-2012 Kees Cook <keescook@chromium.org> tlcl: add GetOwner command

Since the "ownership" permament flag does not indicate if the TPM is
currently owned, the state of TPM Ownership must be read via a Capability
read of TPM_CAP_PROP_OWNER. This adds the "getownership" function.

BUG=chromium-os:22172
TEST=x86-alex build & manual test

Change-Id: I2fc9e933e891ba40190d008436b22496dced1c93
Signed-off-by: Kees Cook <keescook@chromium.org>
Reviewed-on: https://gerrit.chromium.org/gerrit/24784
Reviewed-by: Will Drewry <wad@chromium.org>
/external/vboot_reference/firmware/lib/tpm_lite/tlcl.c
f9e82e9695d3f208b549cc0208baf24985bbb488 03-Apr-2012 Kees Cook <keescook@chromium.org> mount-encrypted: close TPM when spawning resizer

When the filesystem resizing process starts, it has the TPM open,
which means it can collide with tcsd after the main process exits.
Additionally, improve the debugging around TPM usage for better timing
analysis.

BUG=None
TEST=lumpy build & manual testing

Change-Id: I7028131015fb972c99e8b3d035f58346f08fbd06
Signed-off-by: Kees Cook <keescook@chromium.org>
Reviewed-on: https://gerrit.chromium.org/gerrit/19535
Reviewed-by: Elly Jones <ellyjones@chromium.org>
/external/vboot_reference/firmware/lib/tpm_lite/tlcl.c
f0605cbdc36f58829a908a3333e438c565c8c7af 01-Mar-2012 Kees Cook <keescook@chromium.org> tpm_lite: implement TPM_GetRandom

Provide TPM_GetRandom function to library callers.

BUG=chromium-os:22172
TEST=lumpy build & manual testing

Change-Id: Id604fd92490ba697033158a580b0b4df1d975932
Signed-off-by: Kees Cook <keescook@chromium.org>
Reviewed-on: https://gerrit.chromium.org/gerrit/17120
Reviewed-by: Luigi Semenzato <semenzato@chromium.org>
/external/vboot_reference/firmware/lib/tpm_lite/tlcl.c
68bd6130407ec0c8f070b49d69057a9f8cf3680d 10-Jan-2012 Sonny Rao <sonnyrao@chromium.org> Fix compile by eliminating unused variable

bug was introduced in
https://gerrit.chromium.org/gerrit/#change,13891
946370d012a809bba833ff9d37fe0ce86af09860

BUG=none
TEST=package compiles again

Change-Id: Iaa1d4479b713b379955073eff02599c26b4b5bc4
Reviewed-on: https://gerrit.chromium.org/gerrit/13922
Tested-by: Sonny Rao <sonnyrao@chromium.org>
Reviewed-by: Gabe Black (Do Not Use) <gabeblack@google.com>
/external/vboot_reference/firmware/lib/tpm_lite/tlcl.c
946370d012a809bba833ff9d37fe0ce86af09860 09-Jan-2012 Kees Cook <keescook@chromium.org> tpmc: add PCR reading function

Add ability to report a single PCR value via the tpmc utility. Using
/sys/devices/platform/tpm_tis/pcrs is too slow, since it reads all
PCRs before returning. Anything wanting to read PCR0 on a time-critical
path needs maximum speed.

BUG=chromium-os:22172
TEST=install and test x86-alex.

Change-Id: I2d450961d33fa314d54b909135a74aa756279ec6
Signed-off-by: Kees Cook <keescook@chromium.org>
Reviewed-on: https://gerrit.chromium.org/gerrit/13891
Reviewed-by: Luigi Semenzato <semenzato@chromium.org>
/external/vboot_reference/firmware/lib/tpm_lite/tlcl.c
1b1998dff0002f20b3f27a21e6e79d8951e64684 02-Jul-2011 Randall Spangler <rspangler@chromium.org> Vboot wrapper initial implementation

Patch 1: Initial change
Patch 2: Fix comment in vboot_struct.h
Patch 3: Revert files unintentionally reverted
Patch 4: (rebase)
Patch 5: (rebase)
Patch 6: Revert files unintentionally reverted (again)
Patch 7: Fix mocked tlcl for ARM build

BUG=chromium-os:17010
TEST=make && make runtests; works on H2C; emerge-tegra2_seaboard chromeos-bootimage compiles

Change-Id: I6e5ce72d41b9297c07a3f330a881eba68cfabee2
Reviewed-on: http://gerrit.chromium.org/gerrit/3593
Reviewed-by: Randall Spangler <rspangler@chromium.org>
Tested-by: Randall Spangler <rspangler@chromium.org>
/external/vboot_reference/firmware/lib/tpm_lite/tlcl.c
e49e8af65fce38da7a308305566f8a14f102254a 08-Jul-2011 Randall Spangler <rspangler@chromium.org> Port vboot_reference to use new wrapper API utility functions

Third time's the charm. Now that we've moved to u-boot-next, this
won't break the ARM build.

BUG=chromium-os:17006
TEST=make && make runtests; emerge vboot_reference; emerge-tegra2_seaboard chromeos-bootimage

Change-Id: Ib4fa26c7a23868dd2ffd2b321ee8dc08c66ea322
Original-Change-Id: I771085dcdf79d9592de64f35e3b758111a80dd9f
Original-Reviewed-on: http://gerrit.chromium.org/gerrit/3263
Original-Reviewed-by: Simon Glass <sjg@chromium.org>
Reviewed-on: http://gerrit.chromium.org/gerrit/3803
Tested-by: Randall Spangler <rspangler@chromium.org>
Reviewed-by: Simon Glass <sjg@chromium.org>
/external/vboot_reference/firmware/lib/tpm_lite/tlcl.c
cfd841d3c2c8bb91e7024c62d0acc8668c5041b3 02-Jul-2011 Randall Spangler <rspangler@chromium.org> Revert "Verified boot wrapper - replace utility functions"

This reverts commit 0184886c8cb35e8e01d610622df448a7cb063e06

(This works with uboot-next, but not uboot, which doesn't implement its half of the new wrapper API. So rolling back to leave uboot working.

Change-Id: I1f9e3c63e5bbdb20b9195cd68787bef89f24afee
Reviewed-on: http://gerrit.chromium.org/gerrit/3588
Reviewed-by: Randall Spangler <rspangler@chromium.org>
Tested-by: Randall Spangler <rspangler@chromium.org>
/external/vboot_reference/firmware/lib/tpm_lite/tlcl.c
f8c65491595a8e849cf61b600b2371357ec75ff4 27-Jun-2011 Randall Spangler <rspangler@chromium.org> Verified boot wrapper - replace utility functions

This is part 3 of the vboot wrapper API refactoring. It replaces the
function calls to utility.c functions with new API calls. (It also
fixes up some integer type mismatches in cryptolib that were causing
warnings on the H2C build; those had been fixed a while ago in H2C but
hadn't been propagated across.)

This is a re-commit of the original; I've verified it compiles on both
x86-alex and tegra2, for both vboot_reference and
vboot_reference-firmware, now that the patch from
1c1a883bc746a6216bb634825d33d80562853020 is checked in.

BUG=chromium-os:17006
TEST=make && make runtests, and emerged on both x86-alex and tegra2

Original-Change-Id: I771085dcdf79d9592de64f35e3b758111a80dd9f
Original-Reviewed-on: http://gerrit.chromium.org/gerrit/3263
Original-Reviewed-by: Simon Glass <sjg@chromium.org>
Tested-by: Randall Spangler <rspangler@chromium.org>
(cherry picked from commit bd81b3a7d3b7fe4ca6179ade665e565800ab17fc)

Change-Id: Iefdbfb3d10eb9aa385fb6dfc3bf0896f637cb64b
Reviewed-on: http://gerrit.chromium.org/gerrit/3582
Reviewed-by: Bill Richardson <wfrichar@chromium.org>
Tested-by: Randall Spangler <rspangler@chromium.org>
/external/vboot_reference/firmware/lib/tpm_lite/tlcl.c
a7b9481f343fb4a19b5a5ed44c2fda2c59547e84 28-Jun-2011 mukesh agrawal <quiche@chromium.org> Revert "Verified boot wrapper - replace utility functions"

This reverts commit bd81b3a7d3b7fe4ca6179ade665e565800ab17fc.

Change-Id: I2be2c076a37bf0e49569248691fceac417254f0b
Reviewed-on: http://gerrit.chromium.org/gerrit/3295
Reviewed-by: mukesh agrawal <quiche@chromium.org>
Tested-by: mukesh agrawal <quiche@chromium.org>
/external/vboot_reference/firmware/lib/tpm_lite/tlcl.c
bd81b3a7d3b7fe4ca6179ade665e565800ab17fc 27-Jun-2011 Randall Spangler <rspangler@chromium.org> Verified boot wrapper - replace utility functions

This is part 3 of the vboot wrapper API refactoring. It replaces the
function calls to utility.c functions with new API calls. (It also
fixes up some integer type mismatches in cryptolib that were causing
warnings on the H2C build; those had been fixed a while ago in H2C but
hadn't been propagated across.)

BUG=chromium-os:17006
TEST=make && make runtests

Change-Id: I771085dcdf79d9592de64f35e3b758111a80dd9f
Reviewed-on: http://gerrit.chromium.org/gerrit/3263
Reviewed-by: Simon Glass <sjg@chromium.org>
Tested-by: Randall Spangler <rspangler@chromium.org>
/external/vboot_reference/firmware/lib/tpm_lite/tlcl.c
32a6526d25d4bf9a1c137fc3d275d1c68935d184 27-Jun-2011 Randall Spangler <rspangler@chromium.org> Verified boot wrapper - add stub implementations for host

This is part 2 of the wrapper API refactor. It adds stub
implementations for the host, and changes the host-side utilities to
use them. Firmware implementation is unchanged in this CL (other than
a few updates to macros).

BUG=chromium_os:16997
TEST=make && make runtests

Change-Id: I63989bd11de1f2239ddae256beaccd31bfb5acef
Reviewed-on: http://gerrit.chromium.org/gerrit/3256
Reviewed-by: Stefan Reinauer <reinauer@chromium.org>
Tested-by: Randall Spangler <rspangler@chromium.org>
/external/vboot_reference/firmware/lib/tpm_lite/tlcl.c
06fbb168ac49dd63f427beb3907f3c129d81bf84 17-Mar-2011 Luigi Semenzato <semenzato@google.com> Move ContinueSelfTest to a later point to save time.

Change-Id: I96b413438359e11315101d408033066e6f0a0981

BUG=chrome-os-partner: 1826
TEST=none

Review URL: http://codereview.chromium.org/6667051
/external/vboot_reference/firmware/lib/tpm_lite/tlcl.c
54992f9d3379c4b048d8da6171f0e578b2db4fac 16-Mar-2011 Luigi Semenzato <semenzato@google.com> Added TPM_SaveState command.

Change-Id: If7b6ef3cba733b74ba13db0871e6ac554d0d84ef

BUG=chromium-os:433
TEST=none

Review URL: http://codereview.chromium.org/6696043
/external/vboot_reference/firmware/lib/tpm_lite/tlcl.c
b64faaa7f4167344765eb32baebb0aa01a03bc29 16-Mar-2011 Gaurav Shah <gauravsh@chromium.org> Update PCR state with the state of the firmware keyblock flags too.

I re-factored the extend call into its own module, since it doesn't necessarily
need to be couple with rollbackfirmwaresetup.

BUG=chrome-os-partner:2372
TEST=Tried emerge-x86-generic and emerge-arm-generic vboot_reference.

Change-Id: I0d3115b10b686133e63e304570325ebdbd50ae3a

Review URL: http://codereview.chromium.org/6696006
/external/vboot_reference/firmware/lib/tpm_lite/tlcl.c
c324fbfb6d37aa62b0e6e2f22dae7c949896ddef 04-Mar-2011 Randall Spangler <rspangler@chromium.org> Only advance kernel version when the booted partition has a valid key block

Change-Id: I879c18cc139f8a02bcaa6eb80437eaf836a5e851

BUG=chrome-os-partner:2597
TEST=manual

install pvt-signed image
flip dev switch on and boot
install dev-signed firmware
reboot
reboot
sudo bash
stop tcsd
tpmc read 0x1008 0x0d

bytes 6-10 should be 1 0 1 0, not FF FF FF FF

Review URL: http://codereview.chromium.org/6626020
/external/vboot_reference/firmware/lib/tpm_lite/tlcl.c
5d9509cbdee7b9c8dd91ed47d967569dbb9af83d 16-Dec-2010 Che-Liang Chiou <clchiou@chromium.org> vboot TPM stub functions return error codes

TlclStubInit, TlclCloseDevice, and TlclOpenDevice were void functions but
should return error codes.

BUG=chromium-os:6695
TEST=RUNTESTS=1 make && emerge successfully

Review URL: http://codereview.chromium.org/5796005

Change-Id: I8ddbf8b1f080d98ff6ed42c4a675fbda5b17eef1
/external/vboot_reference/firmware/lib/tpm_lite/tlcl.c
1fe1607679a17a37ab6be390e2f04155e5c37e8e 02-Sep-2010 Randall Spangler <rspangler@chromium.org> TBR: reviewed in person with semenzato
/external/vboot_reference/firmware/lib/tpm_lite/tlcl.c
89a02c194f1b6da0de7f98784d85e6827c3a1aec 01-Sep-2010 Luigi Semenzato <semenzato@google.com> Make TPM datagrams const, since they cannot be modified in the RO firmware.

Change-Id: I7f135584536c7437824ae65f74a8f7ef27c28665

BUG=
TEST=

Review URL: http://codereview.chromium.org/3271006
/external/vboot_reference/firmware/lib/tpm_lite/tlcl.c
3da063e3f7612464a41a4c9b2b31fb7eade57a13 31-Aug-2010 Luigi Semenzato <semenzato@google.com> Add resume command (TPM_Startup(ST_STATE))

Change-Id: Ia85c3cdbcb74c6cd8e7bd53c51eaccc98b13677e

BUG=
TEST=

Review URL: http://codereview.chromium.org/3232006
/external/vboot_reference/firmware/lib/tpm_lite/tlcl.c
377557fcb260c9b41abc36ebba5759336436e59c 31-Aug-2010 Luigi Semenzato <semenzato@google.com> Add physical presence initialization and locking to one-time initializations.

Change-Id: If2b6041fe93bc97885e45bbb0cf7e1b81cb06c18

BUG=none
TEST=none

Review URL: http://codereview.chromium.org/3229011
/external/vboot_reference/firmware/lib/tpm_lite/tlcl.c
1d83dd1ba5b825407a8e17972c54577d14ba173d 30-Aug-2010 Luigi Semenzato <semenzato@google.com> Add a command to enable the physical presence command.

Change-Id: Id8b6ac3c75d1ee34237cde8adde55cea33b25889

Review URL: http://codereview.chromium.org/3163045
/external/vboot_reference/firmware/lib/tpm_lite/tlcl.c
5896b9664d088699e246de964a7c374af663a34e 25-Aug-2010 Luigi Semenzato <semenzato@google.com> Added new commands and reactivated full rebuild after fixing for ARM ebuild.

Review URL: http://codereview.chromium.org/3116025

Change-Id: Ideb82562f6b1c3ce5cd9e0b79de250d0a7bd976e
/external/vboot_reference/firmware/lib/tpm_lite/tlcl.c
4abede35afc8b5ecc8165d5d79f77c203bce51fc 13-Aug-2010 Randall Spangler <rspangler@chromium.org> Add structs for TPM NV simplification. Now uses only 2 NV spaces, one for firmware and one for kernel.

Changed TlclRead / TlclWrite to take void* / const void* to reduce typecasts.

Much restructuring of rollback_index.c.

Fixed a version-packing bug in rollback_index.c (& --> |)

BUG:chrome-os-partner:304
TEST:manual testing of all code flows on CRB

Review URL: http://codereview.chromium.org/3084030
/external/vboot_reference/firmware/lib/tpm_lite/tlcl.c
205190d4ae8080298d9d1b580dd95c885f2af42c 06-Aug-2010 Randall Spangler <rspangler@chromium.org> Pay attention to TPM communication errors

BUG=none
TEST=make && make runtests

Review URL: http://codereview.chromium.org/3078028
/external/vboot_reference/firmware/lib/tpm_lite/tlcl.c
63dffcb52b56f27d5315de249d20958b94eed47f 06-Aug-2010 Randall Spangler <rspangler@chromium.org> Enable TPM in developer mode again.

Also fix a few comments, and make extra debugging work when compiled
in firmware.

BUG=none
TEST=make && make runtests; all pass

Review URL: http://codereview.chromium.org/3007036
/external/vboot_reference/firmware/lib/tpm_lite/tlcl.c
3fafad3bb663c548f025c37d3a7e88fca960746e 04-Aug-2010 Luigi Semenzato <semenzato@google.com> Fix GetPermissions bug.

Review URL: http://codereview.chromium.org/3046046
/external/vboot_reference/firmware/lib/tpm_lite/tlcl.c
50d48feb9e0df6a990cc5890ce14e1398798eeb1 04-Aug-2010 Luigi Semenzato <semenzato@google.com> Various bug fixes to tpm_lite. Some changes to the test suite.

Review URL: http://codereview.chromium.org/3091004
/external/vboot_reference/firmware/lib/tpm_lite/tlcl.c
ada3fa9ee606c07d7675e235506522fa332c1747 21-Jul-2010 Randall Spangler <rspangler@chromium.org> Misc TPM cleanup

Review URL: http://codereview.chromium.org/3010019
/external/vboot_reference/firmware/lib/tpm_lite/tlcl.c
553d00ec86fed95888dcaff1b911ce8c444d03fd 20-Jul-2010 Gaurav Shah <gauravsh@chromium.org> (In the right repository this time.)

Do not directly manipulate global structs. Work on the local copy instead.

In firmware-land, globals are a bad idea.

Review URL: http://codereview.chromium.org/3027011
/external/vboot_reference/firmware/lib/tpm_lite/tlcl.c
3e1081fb71385d72fd3a522599c35b516dda7a37 19-Jul-2010 Randall Spangler <rspangler@chromium.org> Add lots of debugging to TPM library.

Temporarily disable TPM in developer mode.

Review URL: http://codereview.chromium.org/3041005
/external/vboot_reference/firmware/lib/tpm_lite/tlcl.c
39f66114c03639715cb88774255f066a2d942557 14-Jul-2010 Randall Spangler <rspangler@chromium.org> Add tpm lite to vboot reference

Review URL: http://codereview.chromium.org/2919010
/external/vboot_reference/firmware/lib/tpm_lite/tlcl.c