blob: 3656e6f96060e71fa71e9db37d804c1a4de72404 [file] [log] [blame]
/* Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
* Use of this source code is governed by a BSD-style license that can be
* found in the LICENSE file.
*
* Functions for querying, manipulating and locking secure data spaces
* stored in the TPM NVRAM (mock versions).
*/
#include <tss_constants.h>
#include <vb2_api.h>
#include "secdata_tpm.h"
int secdata_kernel_locked = 0;
uint32_t secdata_firmware_write(struct vb2_context *ctx)
{
ctx->flags &= ~VB2_CONTEXT_SECDATA_FIRMWARE_CHANGED;
return TPM_SUCCESS;
}
uint32_t secdata_kernel_write(struct vb2_context *ctx)
{
ctx->flags &= ~VB2_CONTEXT_SECDATA_KERNEL_CHANGED;
return TPM_SUCCESS;
}
uint32_t secdata_kernel_lock(struct vb2_context *ctx)
{
secdata_kernel_locked = 1;
return TPM_SUCCESS;
}
uint32_t secdata_fwmp_read(struct vb2_context *ctx)
{
ctx->flags |= VB2_CONTEXT_NO_SECDATA_FWMP;
return TPM_SUCCESS;
}