summaryrefslogtreecommitdiff
path: root/firmware/lib/mocked_secdata_tpm.c
diff options
context:
space:
mode:
authorJoel Kitching <kitching@google.com>2019-08-29 13:27:23 +0800
committerCommit Bot <commit-bot@chromium.org>2019-09-05 14:29:06 +0000
commit110df5cafaa55eb0e78f379be7731f8d7b3914b7 (patch)
treef572e9a14691070162529d9de3261be5258608ed /firmware/lib/mocked_secdata_tpm.c
parent0961b80b9d2e6d5564024ca89d1f4d081d0baf34 (diff)
downloadvboot-110df5cafaa55eb0e78f379be7731f8d7b3914b7.tar.gz
vboot/secdata: rename rollback_index to secdata_tpm
These secure spaces are now used for more than just rollback versions and should be renamed thus. Note: Originally this rename operation was batched into the CL which rewrites the functions in rollback_index/secdata_tpm, but it made reviewing in Gerrit a pain, since it couldn't pick up on the file renames, and instead showed them as deletes/adds. Doing the rename separately helps ensure all references to rollback_index are updated, and gives us a better review experience in Gerrit. BUG=b:124141368, chromium:972956 TEST=make clean && make runtests BRANCH=none Change-Id: I51e5c731e0d7a071d384c28da56e7adce64ba943 Signed-off-by: Joel Kitching <kitching@google.com> Reviewed-on: https://chromium-review.googlesource.com/c/chromiumos/platform/vboot_reference/+/1776279 Commit-Queue: Joel Kitching <kitching@chromium.org> Tested-by: Joel Kitching <kitching@chromium.org> Reviewed-by: Julius Werner <jwerner@chromium.org>
Diffstat (limited to 'firmware/lib/mocked_secdata_tpm.c')
-rw-r--r--firmware/lib/mocked_secdata_tpm.c38
1 files changed, 38 insertions, 0 deletions
diff --git a/firmware/lib/mocked_secdata_tpm.c b/firmware/lib/mocked_secdata_tpm.c
new file mode 100644
index 00000000..4271f768
--- /dev/null
+++ b/firmware/lib/mocked_secdata_tpm.c
@@ -0,0 +1,38 @@
+/* Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
+ * Use of this source code is governed by a BSD-style license that can be
+ * found in the LICENSE file.
+ *
+ * Functions for querying, manipulating and locking secure data spaces
+ * stored in the TPM NVRAM.
+ */
+
+#include "utility.h"
+#include "secdata_tpm.h"
+#include "tss_constants.h"
+
+vb2_error_t SetVirtualDevMode(int val)
+{
+ return VB2_SUCCESS;
+}
+
+uint32_t RollbackKernelRead(uint32_t *version)
+{
+ *version = 0;
+ return TPM_SUCCESS;
+}
+
+uint32_t RollbackKernelWrite(uint32_t version)
+{
+ return TPM_SUCCESS;
+}
+
+uint32_t RollbackKernelLock(int recovery_mode)
+{
+ return TPM_SUCCESS;
+}
+
+uint32_t RollbackFwmpRead(struct RollbackSpaceFwmp *fwmp)
+{
+ memset(fwmp, 0, sizeof(*fwmp));
+ return TPM_SUCCESS;
+}