src/security: Drop unneeded empty lines

Change-Id: Icb6057ac73fcc038981ef95a648420ac00b3c106
Signed-off-by: Elyes HAOUAS <ehaouas@noos.fr>
Reviewed-on: https://review.coreboot.org/c/coreboot/+/44808
Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
Reviewed-by: Michael Niewöhner <foss@mniewoehner.de>
This commit is contained in:
Elyes HAOUAS 2020-08-26 09:22:45 +02:00 committed by Michael Niewöhner
parent 4b7f3151a8
commit f91bcb310b
11 changed files with 0 additions and 14 deletions

View File

@ -73,7 +73,6 @@ struct descriptor {
uintptr_t base;
} __attribute__((packed));
static void read_gdtr(struct descriptor *gdtr)
{
__asm__ __volatile__("sgdt %0" : "=m"(*gdtr));
@ -118,7 +117,6 @@ void setup_smm_descriptor(void *smbase, void *base_smbase, int32_t apic_id,
psd->smm_other_segment = ROM_DATA_SEG;
psd->smm_tr = SMM_TASK_STATE_SEG;
// At this point the coreboot smm_stub is relative to the default
// smbase and not the one for the smi handler in tseg. So we have
// to adjust the gdtr.base

View File

@ -267,7 +267,6 @@ struct __packed txt_biosdataregion {
u8 extended_data_elements[0];
};
void txt_dump_regions(void);
void txt_dump_chipset_info(void);
void txt_dump_acm_info(const struct acm_header_v0 *acm_header);

View File

@ -1,4 +1,3 @@
/* SPDX-License-Identifier: GPL-2.0-only */
bool security_clear_dram_request(void);

View File

@ -41,7 +41,6 @@ void tcpa_log_add_table_entry(const char *name, const uint32_t pcr,
*/
void tcpa_log_dump(void *unused);
/**
* Ask vboot for a digest and extend a TPM PCR with it.
* @param pcr sets the pcr index

View File

@ -165,7 +165,6 @@ int tspi_measure_cache_to_pcr(void)
hash_alg = VB2_HASH_SHA256;
}
printk(BIOS_DEBUG, "TPM: Write digests cached in TCPA log to PCR\n");
for (i = 0; i < tclt->num_entries; i++) {
struct tcpa_entry *tce = &tclt->entries[i];

View File

@ -99,7 +99,6 @@ static uint32_t tlcl_send_receive_no_retry(const uint8_t *request,
return result;
}
/* Sends a TPM command and gets a response. Returns 0 if success or the TPM
* error code if error. Waits for the self test to complete if needed. */
uint32_t tlcl_send_receive(const uint8_t *request, uint8_t *response,
@ -246,7 +245,6 @@ uint32_t tlcl_read(uint32_t index, void *data, uint32_t length)
return result;
}
uint32_t tlcl_assert_physical_presence(void)
{
VBDEBUG("TPM: Asserting physical presence\n");

View File

@ -15,7 +15,6 @@
#define kEncAuthLength 20
#define kPcrDigestLength 20
/*
* Conversion functions. to_tpm_TYPE puts a value of type TYPE into a TPM
* command buffer. from_tpm_TYPE gets a value of type TYPE from a TPM command

View File

@ -40,7 +40,6 @@ enum cr50_tpm_mode {
TPM_MODE_INVALID,
};
/**
* CR50 specific tpm command to enable nvmem commits before internal timeout
* expires.
@ -96,5 +95,4 @@ uint32_t tlcl_cr50_get_boot_mode(uint8_t *boot_mode);
*/
uint32_t tlcl_cr50_immediate_reset(uint16_t timeout_ms);
#endif /* CR50_TSS_STRUCTURES_H_ */

View File

@ -87,5 +87,4 @@ static inline int vboot_logic_executed(void)
}
}
#endif /* __VBOOT_MISC_H__ */

View File

@ -1,6 +1,5 @@
/* SPDX-License-Identifier: GPL-2.0-only */
#include <security/tpm/tspi.h>
#include <vb2_api.h>
#include <security/vboot/tpm_common.h>

View File

@ -207,7 +207,6 @@ static vb2_error_t hash_body(struct vb2_context *ctx,
return VB2_SUCCESS;
}
static uint32_t extend_pcrs(struct vb2_context *ctx)
{
return vboot_extend_pcr(ctx, 0, BOOT_MODE_PCR) ||