Furquan Shaikh (furquan@google.com) just uploaded a new patch set to gerrit, which you can find at https://review.coreboot.org/18248
-gerrit
commit 7751d587ce5f28bb986a12c3eff4cc9594ccb6bd Author: Furquan Shaikh furquan@chromium.org Date: Thu Jan 26 15:33:01 2017 -0800
vboot: Add mock functions for recovery space read/write
For the boards that intend to use mock tpm and have recovery mrc cache support enabled, provide mock functions to read and write mrc hash space.
Reading MRC hash space returns TPM_SUCCESS as later checks take care of comparing the hash value and retraining if hash comparison fails. Thus, in case of mock tpm, device would always end up doing the memory retraining in recovery mode.
BUG=chrome-os-partner:62413 BRANCH=None TEST=Verified that eve builds with mock tpm selected.
Change-Id: I7817cda7821fadeea0e887cb9860804256dabfd9 Signed-off-by: Furquan Shaikh furquan@chromium.org --- src/vboot/secdata_mock.c | 10 ++++++++++ 1 file changed, 10 insertions(+)
diff --git a/src/vboot/secdata_mock.c b/src/vboot/secdata_mock.c index 9c966d9..31fa598 100644 --- a/src/vboot/secdata_mock.c +++ b/src/vboot/secdata_mock.c @@ -41,3 +41,13 @@ uint32_t antirollback_lock_space_rec_hash(void) { return TPM_SUCCESS; } + +uint32_t antirollback_read_space_rec_hash(uint8_t *data, uint32_t size) +{ + return TPM_SUCCESS; +} + +uint32_t antirollback_write_space_rec_hash(const uint8_t *data, uint32_t size) +{ + return TPM_SUCCESS; +}