src/security: Drop unneeded empty lines
Change-Id: Icb6057ac73fcc038981ef95a648420ac00b3c106 Signed-off-by: Elyes HAOUAS <ehaouas@noos.fr> Reviewed-on: https://review.coreboot.org/c/coreboot/+/44808 Tested-by: build bot (Jenkins) <no-reply@coreboot.org> Reviewed-by: Michael Niewöhner <foss@mniewoehner.de>
This commit is contained in:
parent
4b7f3151a8
commit
f91bcb310b
|
@ -73,7 +73,6 @@ struct descriptor {
|
|||
uintptr_t base;
|
||||
} __attribute__((packed));
|
||||
|
||||
|
||||
static void read_gdtr(struct descriptor *gdtr)
|
||||
{
|
||||
__asm__ __volatile__("sgdt %0" : "=m"(*gdtr));
|
||||
|
@ -118,7 +117,6 @@ void setup_smm_descriptor(void *smbase, void *base_smbase, int32_t apic_id,
|
|||
psd->smm_other_segment = ROM_DATA_SEG;
|
||||
psd->smm_tr = SMM_TASK_STATE_SEG;
|
||||
|
||||
|
||||
// At this point the coreboot smm_stub is relative to the default
|
||||
// smbase and not the one for the smi handler in tseg. So we have
|
||||
// to adjust the gdtr.base
|
||||
|
|
|
@ -267,7 +267,6 @@ struct __packed txt_biosdataregion {
|
|||
u8 extended_data_elements[0];
|
||||
};
|
||||
|
||||
|
||||
void txt_dump_regions(void);
|
||||
void txt_dump_chipset_info(void);
|
||||
void txt_dump_acm_info(const struct acm_header_v0 *acm_header);
|
||||
|
|
|
@ -1,4 +1,3 @@
|
|||
/* SPDX-License-Identifier: GPL-2.0-only */
|
||||
|
||||
|
||||
bool security_clear_dram_request(void);
|
||||
|
|
|
@ -41,7 +41,6 @@ void tcpa_log_add_table_entry(const char *name, const uint32_t pcr,
|
|||
*/
|
||||
void tcpa_log_dump(void *unused);
|
||||
|
||||
|
||||
/**
|
||||
* Ask vboot for a digest and extend a TPM PCR with it.
|
||||
* @param pcr sets the pcr index
|
||||
|
|
|
@ -165,7 +165,6 @@ int tspi_measure_cache_to_pcr(void)
|
|||
hash_alg = VB2_HASH_SHA256;
|
||||
}
|
||||
|
||||
|
||||
printk(BIOS_DEBUG, "TPM: Write digests cached in TCPA log to PCR\n");
|
||||
for (i = 0; i < tclt->num_entries; i++) {
|
||||
struct tcpa_entry *tce = &tclt->entries[i];
|
||||
|
|
|
@ -99,7 +99,6 @@ static uint32_t tlcl_send_receive_no_retry(const uint8_t *request,
|
|||
return result;
|
||||
}
|
||||
|
||||
|
||||
/* Sends a TPM command and gets a response. Returns 0 if success or the TPM
|
||||
* error code if error. Waits for the self test to complete if needed. */
|
||||
uint32_t tlcl_send_receive(const uint8_t *request, uint8_t *response,
|
||||
|
@ -246,7 +245,6 @@ uint32_t tlcl_read(uint32_t index, void *data, uint32_t length)
|
|||
return result;
|
||||
}
|
||||
|
||||
|
||||
uint32_t tlcl_assert_physical_presence(void)
|
||||
{
|
||||
VBDEBUG("TPM: Asserting physical presence\n");
|
||||
|
|
|
@ -15,7 +15,6 @@
|
|||
#define kEncAuthLength 20
|
||||
#define kPcrDigestLength 20
|
||||
|
||||
|
||||
/*
|
||||
* Conversion functions. to_tpm_TYPE puts a value of type TYPE into a TPM
|
||||
* command buffer. from_tpm_TYPE gets a value of type TYPE from a TPM command
|
||||
|
|
|
@ -40,7 +40,6 @@ enum cr50_tpm_mode {
|
|||
TPM_MODE_INVALID,
|
||||
};
|
||||
|
||||
|
||||
/**
|
||||
* CR50 specific tpm command to enable nvmem commits before internal timeout
|
||||
* expires.
|
||||
|
@ -96,5 +95,4 @@ uint32_t tlcl_cr50_get_boot_mode(uint8_t *boot_mode);
|
|||
*/
|
||||
uint32_t tlcl_cr50_immediate_reset(uint16_t timeout_ms);
|
||||
|
||||
|
||||
#endif /* CR50_TSS_STRUCTURES_H_ */
|
||||
|
|
|
@ -87,5 +87,4 @@ static inline int vboot_logic_executed(void)
|
|||
}
|
||||
}
|
||||
|
||||
|
||||
#endif /* __VBOOT_MISC_H__ */
|
||||
|
|
|
@ -1,6 +1,5 @@
|
|||
/* SPDX-License-Identifier: GPL-2.0-only */
|
||||
|
||||
|
||||
#include <security/tpm/tspi.h>
|
||||
#include <vb2_api.h>
|
||||
#include <security/vboot/tpm_common.h>
|
||||
|
|
|
@ -207,7 +207,6 @@ static vb2_error_t hash_body(struct vb2_context *ctx,
|
|||
return VB2_SUCCESS;
|
||||
}
|
||||
|
||||
|
||||
static uint32_t extend_pcrs(struct vb2_context *ctx)
|
||||
{
|
||||
return vboot_extend_pcr(ctx, 0, BOOT_MODE_PCR) ||
|
||||
|
|
Loading…
Reference in New Issue