mirror of
https://github.com/AsahiLinux/u-boot
synced 2024-12-15 15:53:02 +00:00
fc1fe01b08
AVB 2.0 spec. revision 1.1 introduces support for named persistent values that must be tamper evident and allows AVB to store arbitrary key-value pairs [1]. Introduce implementation of two additional AVB operations read_persistent_value()/write_persistent_value() for retrieving/storing named persistent values. Correspondent pull request in the OP-TEE OS project repo [2]. [1]: https://android.googlesource.com/platform/external/avb/+/android-9.0.0_r22 [2]: https://github.com/OP-TEE/optee_os/pull/2699 Reviewed-by: Simon Glass <sjg@chromium.org> Reviewed-by: Sam Protsenko <semen.protsenko@linaro.org> Signed-off-by: Igor Opaniuk <igor.opaniuk@gmail.com>
30 lines
778 B
C
30 lines
778 B
C
/* SPDX-License-Identifier: GPL-2.0+ */
|
|
/*
|
|
* Copyright (C) 2018 Linaro Limited
|
|
*/
|
|
|
|
#ifndef __SANDBOXTEE_H
|
|
#define __SANDBOXTEE_H
|
|
|
|
#include <search.h>
|
|
#include <tee/optee_ta_avb.h>
|
|
|
|
/**
|
|
* struct sandbox_tee_state - internal state of the sandbox TEE
|
|
* @session: current open session
|
|
* @num_shms: number of registered shared memory objects
|
|
* @ta: Trusted Application of current session
|
|
* @ta_avb_rollback_indexes TA avb rollback indexes storage
|
|
* @ta_avb_lock_state TA avb lock state storage
|
|
* @pstorage_htab named persistent values storage
|
|
*/
|
|
struct sandbox_tee_state {
|
|
u32 session;
|
|
int num_shms;
|
|
void *ta;
|
|
u64 ta_avb_rollback_indexes[TA_AVB_MAX_ROLLBACK_LOCATIONS];
|
|
u32 ta_avb_lock_state;
|
|
struct hsearch_data pstorage_htab;
|
|
};
|
|
|
|
#endif /*__SANDBOXTEE_H*/
|