diff options
author | Joel Kitching <kitching@google.com> | 2019-12-09 18:51:00 +0800 |
---|---|---|
committer | Commit Bot <commit-bot@chromium.org> | 2020-01-22 09:02:03 +0000 |
commit | e22ceb974fc551e41ca588c2b524a0a91fbe5d5a (patch) | |
tree | 02206aebc187cf0fe5c21d2ed1ccf7a5b3c82418 /tests/vboot_api_kernel_tests.c | |
parent | 39e34fb71632d2a20363f53d2671c98bc972a093 (diff) | |
download | vboot-e22ceb974fc551e41ca588c2b524a0a91fbe5d5a.tar.gz |
vboot: remove secdata TPM backend code
In vboot 2 design, secdata spaces are read/written by the vboot
caller, and not by vboot itself. We still need to maintain a
vb2ex_commit_data callback for edge cases, such as when the vboot
UI prompts the user to reboot.
BUG=b:124141368, chromium:972956
TEST=Build locally, flash and boot eve,
check logs for secdata writes and locks
TEST=make clean && make runtests
BRANCH=none
Change-Id: Ib3b628549185749a290dd65e297f2e19adecbc66
Cq-Depend: chromium:1958012
Reviewed-on: https://chromium-review.googlesource.com/c/chromiumos/platform/vboot_reference/+/1958070
Reviewed-by: Joel Kitching <kitching@chromium.org>
Commit-Queue: Joel Kitching <kitching@chromium.org>
Tested-by: Joel Kitching <kitching@chromium.org>
Diffstat (limited to 'tests/vboot_api_kernel_tests.c')
-rw-r--r-- | tests/vboot_api_kernel_tests.c | 1 |
1 files changed, 0 insertions, 1 deletions
diff --git a/tests/vboot_api_kernel_tests.c b/tests/vboot_api_kernel_tests.c index 61077227..d7c32357 100644 --- a/tests/vboot_api_kernel_tests.c +++ b/tests/vboot_api_kernel_tests.c @@ -10,7 +10,6 @@ #include "2nvstorage.h" #include "2sysincludes.h" #include "load_kernel_fw.h" -#include "secdata_tpm.h" #include "test_common.h" #include "utility.h" #include "vboot_api.h" |