summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorTaylor Hutt <thutt@chromium.org>2012-08-13 11:33:14 -0700
committerGerrit <chrome-bot@google.com>2012-08-14 10:17:32 -0700
commit3e894ba453fe76b46cf5d269a596ff190927b92e (patch)
tree349e330508461862e0f67d769255c35c3425d850
parent9a6e6e7785988dc9a0434d5b734d282460a9ce6b (diff)
downloadvboot-3e894ba453fe76b46cf5d269a596ff190927b92e.tar.gz
mocked_tpm: Provide definition of kBootStateSHA1Digests
Add a definition of kBootStateSHA1Digests[]. Without this, it is not possible to build the Sanbox version of U-Boot. BUG=chromium-os:32603 TEST=Allows vboot to link when using mocked TPM with U-Boot Sandbox Change-Id: Ie84f4ba3f1c266ed8063fbf6aea0093dd21f638b Signed-off-by: Taylor Hutt <thutt@chromium.org> Reviewed-on: https://gerrit.chromium.org/gerrit/30200 Reviewed-by: Randall Spangler <rspangler@chromium.org> Reviewed-by: Simon Glass <sjg@chromium.org> Reviewed-by: Kees Cook <keescook@chromium.org>
-rw-r--r--firmware/lib/mocked_tpm_bootmode.c50
1 files changed, 50 insertions, 0 deletions
diff --git a/firmware/lib/mocked_tpm_bootmode.c b/firmware/lib/mocked_tpm_bootmode.c
index 5b34d18d..b42c2c79 100644
--- a/firmware/lib/mocked_tpm_bootmode.c
+++ b/firmware/lib/mocked_tpm_bootmode.c
@@ -9,6 +9,56 @@
#include "tss_constants.h"
+const char* kBootStateSHA1Digests[] = {
+ /* SHA1("\x00\x00\x00") */
+ "\x29\xe2\xdc\xfb\xb1\x6f\x63\xbb\x02\x54\xdf\x75\x85\xa1\x5b\xb6"
+ "\xfb\x5e\x92\x7d",
+
+ /* SHA1("\x00\x00\x01") */
+ "\x25\x47\xcc\x73\x6e\x95\x1f\xa4\x91\x98\x53\xc4\x3a\xe8\x90\x86"
+ "\x1a\x3b\x32\x64",
+
+ /* SHA1("\x00\x00\x02") */
+ "\x1e\xf6\x24\x48\x2d\x62\x0e\x43\xe6\xd3\x4d\xa1\xaf\xe4\x62\x67"
+ "\xfc\x69\x5d\x9b",
+
+ /* SHA1("\x00\x01\x00") */
+ "\x62\x57\x18\x91\x21\x5b\x4e\xfc\x1c\xea\xb7\x44\xce\x59\xdd\x0b"
+ "\x66\xea\x6f\x73",
+
+ /* SHA1("\x00\x01\x01") */
+ "\xee\xe4\x47\xed\xc7\x9f\xea\x1c\xa7\xc7\xd3\x4e\x46\x32\x61\xcd"
+ "\xa4\xba\x33\x9e",
+
+ /* SHA1("\x00\x01\x02") */
+ "\x0c\x7a\x62\x3f\xd2\xbb\xc0\x5b\x06\x42\x3b\xe3\x59\xe4\x02\x1d"
+ "\x36\xe7\x21\xad",
+
+ /* SHA1("\x01\x00\x00") */
+ "\x95\x08\xe9\x05\x48\xb0\x44\x0a\x4a\x61\xe5\x74\x3b\x76\xc1\xe3"
+ "\x09\xb2\x3b\x7f",
+
+ /* SHA1("\x01\x00\x01") */
+ "\xc4\x2a\xc1\xc4\x6f\x1d\x4e\x21\x1c\x73\x5c\xc7\xdf\xad\x4f\xf8"
+ "\x39\x11\x10\xe9",
+
+ /* SHA1("\x01\x00\x02") */
+ "\xfa\x01\x0d\x26\x64\xcc\x5b\x3b\x82\xee\x48\x8f\xe2\xb9\xf5\x0f"
+ "\x49\x32\xeb\x8f",
+
+ /* SHA1("\x01\x01\x00") */
+ "\x47\xec\x8d\x98\x36\x64\x33\xdc\x00\x2e\x77\x21\xc9\xe3\x7d\x50"
+ "\x67\x54\x79\x37",
+
+ /* SHA1("\x01\x01\x01") */
+ "\x28\xd8\x6c\x56\xb3\xbf\x26\xd2\x36\x56\x9b\x8d\xc8\xc3\xf9\x1f"
+ "\x32\xf4\x7b\xc7",
+
+ /* SHA1("\x01\x01\x02") */
+ "\x12\xa3\x40\xd7\x89\x7f\xe7\x13\xfc\x8f\x02\xac\x53\x65\xb8\x6e"
+ "\xbf\x35\x31\x78",
+};
+
uint32_t SetTPMBootModeState(int developer_mode, int recovery_mode,
uint64_t fw_keyblock_flags) {