UPSTREAM: src/vboot: mark factory_initialze_tpm() as static
This function is not used anywhere else in the code.
BRANCH=none
BUG=none
TEST=reef and kevin boards (using tpm1.2 and tpm2.0 respectively)
build successfully.
Signed-off-by: Vadim Bendebury <vbendeb@chromium.org>
Reviewed-on: https://review.coreboot.org/17387
Reviewed-by: Furquan Shaikh <furquan@google.com>
Tested-by: build bot (Jenkins)
Change-Id: Ifcc345ae9c22b25fdcfc2e547e70766021d27e32
Reviewed-on: https://chromium-review.googlesource.com/411429
Commit-Ready: Furquan Shaikh <furquan@chromium.org>
Tested-by: Furquan Shaikh <furquan@chromium.org>
Reviewed-by: Aaron Durbin <adurbin@chromium.org>
This commit is contained in:
parent
07d062e809
commit
d7ec7d8f26
2 changed files with 8 additions and 10 deletions
|
|
@ -73,15 +73,6 @@ uint32_t tpm_extend_pcr(struct vb2_context *ctx, int pcr,
|
|||
*/
|
||||
uint32_t tpm_clear_and_reenable(void);
|
||||
|
||||
/**
|
||||
* Perform one-time initializations.
|
||||
*
|
||||
* Create the NVRAM spaces, and set their initial values as needed. Sets the
|
||||
* nvLocked bit and ensures the physical presence command is enabled and
|
||||
* locked.
|
||||
*/
|
||||
uint32_t factory_initialize_tpm(struct vb2_context *ctx);
|
||||
|
||||
/**
|
||||
* Start the TPM and establish the root of trust for the antirollback mechanism.
|
||||
*/
|
||||
|
|
|
|||
|
|
@ -329,7 +329,14 @@ uint32_t antirollback_lock_space_rec_hash(void)
|
|||
}
|
||||
#endif
|
||||
|
||||
uint32_t factory_initialize_tpm(struct vb2_context *ctx)
|
||||
/**
|
||||
* Perform one-time initializations.
|
||||
*
|
||||
* Create the NVRAM spaces, and set their initial values as needed. Sets the
|
||||
* nvLocked bit and ensures the physical presence command is enabled and
|
||||
* locked.
|
||||
*/
|
||||
static uint32_t factory_initialize_tpm(struct vb2_context *ctx)
|
||||
{
|
||||
uint32_t result;
|
||||
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue