lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Tue, 21 Feb 2017 11:20:58 +0530
From:   Nayna <nayna@...ux.vnet.ibm.com>
To:     Jarkko Sakkinen <jarkko.sakkinen@...ux.intel.com>,
        tpmdd-devel@...ts.sourceforge.net
Cc:     linux-security-module@...r.kernel.org,
        Peter Huewe <peterhuewe@....de>,
        Marcel Selhorst <tpmdd@...horst.net>,
        Jason Gunthorpe <jgunthorpe@...idianresearch.com>,
        open list <linux-kernel@...r.kernel.org>
Subject: Re: [PATCH] tpm: declare tpm2_get_pcr_allocation() as static



On 02/17/2017 03:54 PM, Jarkko Sakkinen wrote:
> On Wed, Feb 15, 2017 at 08:02:28PM +0200, Jarkko Sakkinen wrote:
>> There's no need to export tpm2_get_pcr_alloation() because it is only
>> a helper function for tpm2_auto_startup(). For the same reason it does
>> not make much sense to maintain documentation for it.
>>
>> Signed-off-by: Jarkko Sakkinen <jarkko.sakkinen@...ux.intel.com>
>
> Nayna, does this look good to you?

Oops !! I don't know how it is missed. Sorry for that..My internet 
connection wasn't working since my Friday evening and just started 
working yesterday. So, probably somewhere got this missed and saw it today

It is fine and I already see it in PULL request. So, Thanks !!

Thanks & Regards,
    - Nayna

>
> /Jarkko
>
>> ---
>>   drivers/char/tpm/tpm.h      |  1 -
>>   drivers/char/tpm/tpm2-cmd.c | 94 ++++++++++++++++++++++-----------------------
>>   2 files changed, 45 insertions(+), 50 deletions(-)
>>
>> diff --git a/drivers/char/tpm/tpm.h b/drivers/char/tpm/tpm.h
>> index 6b4e7aa..4937b56 100644
>> --- a/drivers/char/tpm/tpm.h
>> +++ b/drivers/char/tpm/tpm.h
>> @@ -554,5 +554,4 @@ int tpm2_auto_startup(struct tpm_chip *chip);
>>   void tpm2_shutdown(struct tpm_chip *chip, u16 shutdown_type);
>>   unsigned long tpm2_calc_ordinal_duration(struct tpm_chip *chip, u32 ordinal);
>>   int tpm2_probe(struct tpm_chip *chip);
>> -ssize_t tpm2_get_pcr_allocation(struct tpm_chip *chip);
>>   #endif
>> diff --git a/drivers/char/tpm/tpm2-cmd.c b/drivers/char/tpm/tpm2-cmd.c
>> index 10f97e6..881aea9 100644
>> --- a/drivers/char/tpm/tpm2-cmd.c
>> +++ b/drivers/char/tpm/tpm2-cmd.c
>> @@ -997,61 +997,13 @@ int tpm2_probe(struct tpm_chip *chip)
>>   }
>>   EXPORT_SYMBOL_GPL(tpm2_probe);
>>
>> -/**
>> - * tpm2_auto_startup - Perform the standard automatic TPM initialization
>> - *                     sequence
>> - * @chip: TPM chip to use
>> - *
>> - * Returns 0 on success, < 0 in case of fatal error.
>> - */
>> -int tpm2_auto_startup(struct tpm_chip *chip)
>> -{
>> -	int rc;
>> -
>> -	rc = tpm_get_timeouts(chip);
>> -	if (rc)
>> -		goto out;
>> -
>> -	rc = tpm2_do_selftest(chip);
>> -	if (rc != 0 && rc != TPM2_RC_INITIALIZE) {
>> -		dev_err(&chip->dev, "TPM self test failed\n");
>> -		goto out;
>> -	}
>> -
>> -	if (rc == TPM2_RC_INITIALIZE) {
>> -		rc = tpm2_startup(chip, TPM2_SU_CLEAR);
>> -		if (rc)
>> -			goto out;
>> -
>> -		rc = tpm2_do_selftest(chip);
>> -		if (rc) {
>> -			dev_err(&chip->dev, "TPM self test failed\n");
>> -			goto out;
>> -		}
>> -	}
>> -
>> -	rc = tpm2_get_pcr_allocation(chip);
>> -
>> -out:
>> -	if (rc > 0)
>> -		rc = -ENODEV;
>> -	return rc;
>> -}
>> -
>>   struct tpm2_pcr_selection {
>>   	__be16  hash_alg;
>>   	u8  size_of_select;
>>   	u8  pcr_select[3];
>>   } __packed;
>>
>> -/**
>> - * tpm2_get_pcr_allocation() - get TPM active PCR banks.
>> - *
>> - * @chip: TPM chip to use.
>> - *
>> - * Return: Same as with tpm_transmit_cmd.
>> - */
>> -ssize_t tpm2_get_pcr_allocation(struct tpm_chip *chip)
>> +static ssize_t tpm2_get_pcr_allocation(struct tpm_chip *chip)
>>   {
>>   	struct tpm2_pcr_selection pcr_selection;
>>   	struct tpm_buf buf;
>> @@ -1114,3 +1066,47 @@ ssize_t tpm2_get_pcr_allocation(struct tpm_chip *chip)
>>
>>   	return rc;
>>   }
>> +
>> +/**
>> + * tpm2_auto_startup - Perform the standard automatic TPM initialization
>> + *                     sequence
>> + * @chip: TPM chip to use
>> + *
>> + * Initializes timeout values for operation and command durations, conducts
>> + * a self-test and reads the list of active PCR banks.
>> + *
>> + * Return: 0 on success. Otherwise, a system error code is returned.
>> + */
>> +int tpm2_auto_startup(struct tpm_chip *chip)
>> +{
>> +	int rc;
>> +
>> +	rc = tpm_get_timeouts(chip);
>> +	if (rc)
>> +		goto out;
>> +
>> +	rc = tpm2_do_selftest(chip);
>> +	if (rc != 0 && rc != TPM2_RC_INITIALIZE) {
>> +		dev_err(&chip->dev, "TPM self test failed\n");
>> +		goto out;
>> +	}
>> +
>> +	if (rc == TPM2_RC_INITIALIZE) {
>> +		rc = tpm2_startup(chip, TPM2_SU_CLEAR);
>> +		if (rc)
>> +			goto out;
>> +
>> +		rc = tpm2_do_selftest(chip);
>> +		if (rc) {
>> +			dev_err(&chip->dev, "TPM self test failed\n");
>> +			goto out;
>> +		}
>> +	}
>> +
>> +	rc = tpm2_get_pcr_allocation(chip);
>> +
>> +out:
>> +	if (rc > 0)
>> +		rc = -ENODEV;
>> +	return rc;
>> +}
>> --
>> 2.9.3
>>
>> --
>> To unsubscribe from this list: send the line "unsubscribe linux-security-module" in
>> the body of a message to majordomo@...r.kernel.org
>> More majordomo info at  http://vger.kernel.org/majordomo-info.html
>

Powered by blists - more mailing lists