VBOOT_VERIFY_FIRMWARE should be independent of CHROMEOS. This allows use of verified boot library without having to stick to CHROMEOS. BUG=chrome-os-partner:55639 Change-Id: Ia2c328712caedd230ab295b8a613e3c1ed1532d9 Signed-off-by: Furquan Shaikh <furquan@google.com> Reviewed-on: https://review.coreboot.org/15867 Tested-by: build bot (Jenkins) Reviewed-by: Duncan Laurie <dlaurie@chromium.org>
39 lines
815 B
C
39 lines
815 B
C
/* Copyright (c) 2015 The Chromium OS Authors. All rights reserved.
|
|
* Use of this source code is governed by a BSD-style license that can be
|
|
* found in the LICENSE file.
|
|
*
|
|
* Functions for querying, manipulating and locking rollback indices
|
|
* stored in the TPM NVRAM.
|
|
*/
|
|
|
|
#include <antirollback.h>
|
|
#include <stdlib.h>
|
|
#include <vb2_api.h>
|
|
|
|
uint32_t tpm_extend_pcr(struct vb2_context *ctx, int pcr,
|
|
enum vb2_pcr_digest which_digest)
|
|
{
|
|
return TPM_SUCCESS;
|
|
}
|
|
|
|
uint32_t tpm_clear_and_reenable(void)
|
|
{
|
|
return TPM_SUCCESS;
|
|
}
|
|
|
|
uint32_t antirollback_read_space_firmware(struct vb2_context *ctx)
|
|
{
|
|
vb2api_secdata_create(ctx);
|
|
return TPM_SUCCESS;
|
|
}
|
|
|
|
uint32_t antirollback_write_space_firmware(struct vb2_context *ctx)
|
|
{
|
|
return TPM_SUCCESS;
|
|
}
|
|
|
|
uint32_t antirollback_lock_space_firmware()
|
|
{
|
|
return TPM_SUCCESS;
|
|
}
|