diff options
author | Joel Kitching <kitching@google.com> | 2019-08-29 13:27:23 +0800 |
---|---|---|
committer | Commit Bot <commit-bot@chromium.org> | 2019-09-05 14:29:06 +0000 |
commit | 110df5cafaa55eb0e78f379be7731f8d7b3914b7 (patch) | |
tree | f572e9a14691070162529d9de3261be5258608ed /firmware/lib/mocked_secdata_tpm.c | |
parent | 0961b80b9d2e6d5564024ca89d1f4d081d0baf34 (diff) | |
download | vboot-110df5cafaa55eb0e78f379be7731f8d7b3914b7.tar.gz |
vboot/secdata: rename rollback_index to secdata_tpm
These secure spaces are now used for more than just rollback
versions and should be renamed thus.
Note: Originally this rename operation was batched into the CL
which rewrites the functions in rollback_index/secdata_tpm, but
it made reviewing in Gerrit a pain, since it couldn't pick up on
the file renames, and instead showed them as deletes/adds.
Doing the rename separately helps ensure all references to
rollback_index are updated, and gives us a better review
experience in Gerrit.
BUG=b:124141368, chromium:972956
TEST=make clean && make runtests
BRANCH=none
Change-Id: I51e5c731e0d7a071d384c28da56e7adce64ba943
Signed-off-by: Joel Kitching <kitching@google.com>
Reviewed-on: https://chromium-review.googlesource.com/c/chromiumos/platform/vboot_reference/+/1776279
Commit-Queue: Joel Kitching <kitching@chromium.org>
Tested-by: Joel Kitching <kitching@chromium.org>
Reviewed-by: Julius Werner <jwerner@chromium.org>
Diffstat (limited to 'firmware/lib/mocked_secdata_tpm.c')
-rw-r--r-- | firmware/lib/mocked_secdata_tpm.c | 38 |
1 files changed, 38 insertions, 0 deletions
diff --git a/firmware/lib/mocked_secdata_tpm.c b/firmware/lib/mocked_secdata_tpm.c new file mode 100644 index 00000000..4271f768 --- /dev/null +++ b/firmware/lib/mocked_secdata_tpm.c @@ -0,0 +1,38 @@ +/* Copyright (c) 2012 The Chromium OS Authors. All rights reserved. + * Use of this source code is governed by a BSD-style license that can be + * found in the LICENSE file. + * + * Functions for querying, manipulating and locking secure data spaces + * stored in the TPM NVRAM. + */ + +#include "utility.h" +#include "secdata_tpm.h" +#include "tss_constants.h" + +vb2_error_t SetVirtualDevMode(int val) +{ + return VB2_SUCCESS; +} + +uint32_t RollbackKernelRead(uint32_t *version) +{ + *version = 0; + return TPM_SUCCESS; +} + +uint32_t RollbackKernelWrite(uint32_t version) +{ + return TPM_SUCCESS; +} + +uint32_t RollbackKernelLock(int recovery_mode) +{ + return TPM_SUCCESS; +} + +uint32_t RollbackFwmpRead(struct RollbackSpaceFwmp *fwmp) +{ + memset(fwmp, 0, sizeof(*fwmp)); + return TPM_SUCCESS; +} |