mirror of
https://github.com/Telecominfraproject/OpenCellular.git
synced 2025-11-24 18:25:10 +00:00
vboot: Remove vboot1 init and select-firmware APIs
And nuke all the underlying code that is unused once those APIs are gone. These APIs are not used by any project in ToT, having been superseded last year by the vboot2 APIs. No functional changes to live code, just lots of deletes. CQ-DEPEND=CL:347414 BUG=chromium:611535 BRANCH=none TEST=make runtests; build samus Change-Id: I05ac752d74d1343dd03600b1c5e6ed22822e2802 Signed-off-by: Randall Spangler <rspangler@chromium.org> Reviewed-on: https://chromium-review.googlesource.com/347257
This commit is contained in:
committed by
chrome-bot
parent
c61df529d0
commit
2afa87360d
@@ -1,29 +0,0 @@
|
||||
/* Copyright (c) 2013 The Chromium OS Authors. All rights reserved.
|
||||
* Use of this source code is governed by a BSD-style license that can be
|
||||
* found in the LICENSE file.
|
||||
*
|
||||
* High-level firmware API for loading and verifying rewritable firmware.
|
||||
* (Firmware Portion)
|
||||
*/
|
||||
|
||||
#ifndef VBOOT_REFERENCE_LOAD_FIRMWARE_FW_H_
|
||||
#define VBOOT_REFERENCE_LOAD_FIRMWARE_FW_H_
|
||||
|
||||
#include "vboot_api.h"
|
||||
#include "vboot_nvstorage.h"
|
||||
#include "vboot_struct.h"
|
||||
|
||||
/**
|
||||
* Load the rewritable firmware.
|
||||
*
|
||||
* Pass the common and firmware params from VbSelectFirmware(), and a
|
||||
* VbNvContext. Caller is responsible for calling VbNvSetup() and
|
||||
* VbNvTeardown() on the VbNvContext.
|
||||
*
|
||||
* Returns VBERROR_SUCCESS if successful. If unsuccessful, sets a recovery
|
||||
* reason via VbNvStorage and returns an error code.
|
||||
*/
|
||||
int LoadFirmware(VbCommonParams *cparams, VbSelectFirmwareParams *fparams,
|
||||
VbNvContext *vnc);
|
||||
|
||||
#endif /* VBOOT_REFERENCE_LOAD_FIRMWARE_FW_H_ */
|
||||
@@ -102,37 +102,6 @@ enum fwmp_flags {
|
||||
|
||||
/* All functions return TPM_SUCCESS (zero) if successful, non-zero if error */
|
||||
|
||||
/*
|
||||
* These functions are called from VbInit(). They cannot use global
|
||||
* variables.
|
||||
*/
|
||||
|
||||
uint32_t RollbackS3Resume(void);
|
||||
|
||||
/*
|
||||
* These functions are callable from VbSelectFirmware(). They cannot use
|
||||
* global variables.
|
||||
*/
|
||||
|
||||
/**
|
||||
* This must be called.
|
||||
*/
|
||||
uint32_t RollbackFirmwareSetup(int is_hw_dev,
|
||||
int disable_dev_request,
|
||||
int clear_tpm_owner_request,
|
||||
/* two outputs on success */
|
||||
int *is_virt_dev, uint32_t *tpm_version);
|
||||
|
||||
/**
|
||||
* Write may be called if the versions change.
|
||||
*/
|
||||
uint32_t RollbackFirmwareWrite(uint32_t version);
|
||||
|
||||
/**
|
||||
* Lock must be called.
|
||||
*/
|
||||
uint32_t RollbackFirmwareLock(void);
|
||||
|
||||
/*
|
||||
* These functions are callable from VbSelectAndLoadKernel(). They may use
|
||||
* global variables.
|
||||
@@ -148,16 +117,6 @@ uint32_t RollbackKernelRead(uint32_t *version);
|
||||
*/
|
||||
uint32_t RollbackKernelWrite(uint32_t version);
|
||||
|
||||
/**
|
||||
* Read backup data.
|
||||
*/
|
||||
uint32_t RollbackBackupRead(uint8_t *raw);
|
||||
|
||||
/**
|
||||
* Write backup data.
|
||||
*/
|
||||
uint32_t RollbackBackupWrite(uint8_t *raw);
|
||||
|
||||
/**
|
||||
* Lock must be called. Internally, it's ignored in recovery mode.
|
||||
*/
|
||||
@@ -192,31 +151,6 @@ uint32_t TPMClearAndReenable(void);
|
||||
*/
|
||||
uint32_t SafeWrite(uint32_t index, const void *data, uint32_t length);
|
||||
|
||||
/**
|
||||
* Similarly to SafeWrite(), this ensures we don't fail a DefineSpace because
|
||||
* we hit the TPM write limit. This is even less likely to happen than with
|
||||
* writes because we only define spaces once at initialization, but we'd rather
|
||||
* be paranoid about this.
|
||||
*/
|
||||
uint32_t SafeDefineSpace(uint32_t index, uint32_t perm, uint32_t size);
|
||||
|
||||
/**
|
||||
* Perform one-time initializations.
|
||||
*
|
||||
* Create the NVRAM spaces, and set their initial values as needed. Sets the
|
||||
* nvLocked bit and ensures the physical presence command is enabled and
|
||||
* locked.
|
||||
*/
|
||||
uint32_t OneTimeInitializeTPM(RollbackSpaceFirmware *rsf,
|
||||
RollbackSpaceKernel *rsk);
|
||||
|
||||
/**
|
||||
* Start the TPM and establish the root of trust for the anti-rollback
|
||||
* mechanism.
|
||||
*/
|
||||
uint32_t SetupTPM(int developer_mode, int disable_dev_request,
|
||||
int clear_tpm_owner_request, RollbackSpaceFirmware *rsf);
|
||||
|
||||
/**
|
||||
* Utility function to turn the virtual dev-mode flag on or off. 0=off, 1=on.
|
||||
*/
|
||||
|
||||
@@ -1,29 +0,0 @@
|
||||
/* Copyright (c) 2013 The Chromium OS Authors. All rights reserved.
|
||||
* Use of this source code is governed by a BSD-style license that can be
|
||||
* found in the LICENSE file.
|
||||
*
|
||||
* Functions for updating the TPM state with the status of boot path.
|
||||
*/
|
||||
|
||||
#ifndef VBOOT_REFERENCE_TPM_BOOTMODE_H_
|
||||
#define VBOOT_REFERENCE_TPM_BOOTMODE_H_
|
||||
|
||||
#include "gbb_header.h"
|
||||
#include "sysincludes.h"
|
||||
|
||||
/**
|
||||
* Update TPM PCR State with the boot path status.
|
||||
*
|
||||
* [developer_mode]: State of the developer switch.
|
||||
* [recovery_mode]: State of the recovery mode.
|
||||
* [fw_keyblock_flags]: Keyblock flags of the to-be-booted
|
||||
* RW firmware keyblock.
|
||||
* [gbb]: Pointer to GBB header from RO firmware.
|
||||
*
|
||||
* Returns: TPM_SUCCESS if the TPM extend operation succeeds.
|
||||
*/
|
||||
uint32_t SetTPMBootModeState(int developer_mode, int recovery_mode,
|
||||
uint64_t fw_keyblock_flags,
|
||||
GoogleBinaryBlockHeader *gbb);
|
||||
|
||||
#endif /* VBOOT_REFERENCE_TPM_BOOTMODE_H_ */
|
||||
@@ -11,7 +11,6 @@
|
||||
|
||||
#include "cgptlib.h"
|
||||
#include "gpt_misc.h"
|
||||
#include "load_firmware_fw.h"
|
||||
#include "load_kernel_fw.h"
|
||||
#include "vboot_api.h"
|
||||
|
||||
|
||||
Reference in New Issue
Block a user