diff options
author | Taylor Hutt <thutt@chromium.org> | 2012-08-13 11:33:14 -0700 |
---|---|---|
committer | Gerrit <chrome-bot@google.com> | 2012-08-14 10:17:32 -0700 |
commit | 3e894ba453fe76b46cf5d269a596ff190927b92e (patch) | |
tree | 349e330508461862e0f67d769255c35c3425d850 /firmware | |
parent | 9a6e6e7785988dc9a0434d5b734d282460a9ce6b (diff) | |
download | vboot-3e894ba453fe76b46cf5d269a596ff190927b92e.tar.gz |
mocked_tpm: Provide definition of kBootStateSHA1Digests
Add a definition of kBootStateSHA1Digests[]. Without this, it is not
possible to build the Sanbox version of U-Boot.
BUG=chromium-os:32603
TEST=Allows vboot to link when using mocked TPM with U-Boot Sandbox
Change-Id: Ie84f4ba3f1c266ed8063fbf6aea0093dd21f638b
Signed-off-by: Taylor Hutt <thutt@chromium.org>
Reviewed-on: https://gerrit.chromium.org/gerrit/30200
Reviewed-by: Randall Spangler <rspangler@chromium.org>
Reviewed-by: Simon Glass <sjg@chromium.org>
Reviewed-by: Kees Cook <keescook@chromium.org>
Diffstat (limited to 'firmware')
-rw-r--r-- | firmware/lib/mocked_tpm_bootmode.c | 50 |
1 files changed, 50 insertions, 0 deletions
diff --git a/firmware/lib/mocked_tpm_bootmode.c b/firmware/lib/mocked_tpm_bootmode.c index 5b34d18d..b42c2c79 100644 --- a/firmware/lib/mocked_tpm_bootmode.c +++ b/firmware/lib/mocked_tpm_bootmode.c @@ -9,6 +9,56 @@ #include "tss_constants.h" +const char* kBootStateSHA1Digests[] = { + /* SHA1("\x00\x00\x00") */ + "\x29\xe2\xdc\xfb\xb1\x6f\x63\xbb\x02\x54\xdf\x75\x85\xa1\x5b\xb6" + "\xfb\x5e\x92\x7d", + + /* SHA1("\x00\x00\x01") */ + "\x25\x47\xcc\x73\x6e\x95\x1f\xa4\x91\x98\x53\xc4\x3a\xe8\x90\x86" + "\x1a\x3b\x32\x64", + + /* SHA1("\x00\x00\x02") */ + "\x1e\xf6\x24\x48\x2d\x62\x0e\x43\xe6\xd3\x4d\xa1\xaf\xe4\x62\x67" + "\xfc\x69\x5d\x9b", + + /* SHA1("\x00\x01\x00") */ + "\x62\x57\x18\x91\x21\x5b\x4e\xfc\x1c\xea\xb7\x44\xce\x59\xdd\x0b" + "\x66\xea\x6f\x73", + + /* SHA1("\x00\x01\x01") */ + "\xee\xe4\x47\xed\xc7\x9f\xea\x1c\xa7\xc7\xd3\x4e\x46\x32\x61\xcd" + "\xa4\xba\x33\x9e", + + /* SHA1("\x00\x01\x02") */ + "\x0c\x7a\x62\x3f\xd2\xbb\xc0\x5b\x06\x42\x3b\xe3\x59\xe4\x02\x1d" + "\x36\xe7\x21\xad", + + /* SHA1("\x01\x00\x00") */ + "\x95\x08\xe9\x05\x48\xb0\x44\x0a\x4a\x61\xe5\x74\x3b\x76\xc1\xe3" + "\x09\xb2\x3b\x7f", + + /* SHA1("\x01\x00\x01") */ + "\xc4\x2a\xc1\xc4\x6f\x1d\x4e\x21\x1c\x73\x5c\xc7\xdf\xad\x4f\xf8" + "\x39\x11\x10\xe9", + + /* SHA1("\x01\x00\x02") */ + "\xfa\x01\x0d\x26\x64\xcc\x5b\x3b\x82\xee\x48\x8f\xe2\xb9\xf5\x0f" + "\x49\x32\xeb\x8f", + + /* SHA1("\x01\x01\x00") */ + "\x47\xec\x8d\x98\x36\x64\x33\xdc\x00\x2e\x77\x21\xc9\xe3\x7d\x50" + "\x67\x54\x79\x37", + + /* SHA1("\x01\x01\x01") */ + "\x28\xd8\x6c\x56\xb3\xbf\x26\xd2\x36\x56\x9b\x8d\xc8\xc3\xf9\x1f" + "\x32\xf4\x7b\xc7", + + /* SHA1("\x01\x01\x02") */ + "\x12\xa3\x40\xd7\x89\x7f\xe7\x13\xfc\x8f\x02\xac\x53\x65\xb8\x6e" + "\xbf\x35\x31\x78", +}; + uint32_t SetTPMBootModeState(int developer_mode, int recovery_mode, uint64_t fw_keyblock_flags) { |