diff options
author | Sergii Dmytruk <sergii.dmytruk@3mdeb.com> | 2022-10-29 16:57:07 +0300 |
---|---|---|
committer | Felix Held <felix-coreboot@felixheld.de> | 2022-12-05 14:46:43 +0000 |
commit | 0a89d5237edcec3015363e9a7a3bd8b014fec500 (patch) | |
tree | 71186da3863f0fc295ac60b60344f3c6e801eb0a /src/security/tpm | |
parent | 2393ad0bfb1cd23a0524e7b02a0fd75aff3bf274 (diff) |
security/tpm: remove tis_close()
This function was never called from outside of drivers and
src/drivers/pc80/tpm/tis.c was the only one doing it in a questionable
way.
tpm_vendor_cleanup() also isn't needed as one of tis_close() functions
was its only caller.
Change-Id: I9df76adfc21fca9fa1d1af7c40635ec0684ceb0f
Ticket: https://ticket.coreboot.org/issues/433
Signed-off-by: Sergii Dmytruk <sergii.dmytruk@3mdeb.com>
Reviewed-on: https://review.coreboot.org/c/coreboot/+/68989
Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
Reviewed-by: Julius Werner <jwerner@chromium.org>
Diffstat (limited to 'src/security/tpm')
-rw-r--r-- | src/security/tpm/tis.h | 12 |
1 files changed, 1 insertions, 11 deletions
diff --git a/src/security/tpm/tis.h b/src/security/tpm/tis.h index 8868e1a0fe..04a137f12e 100644 --- a/src/security/tpm/tis.h +++ b/src/security/tpm/tis.h @@ -44,23 +44,13 @@ int tis_init(void); /* * tis_open() * - * Requests access to locality 0 for the caller. After all commands have been - * completed the caller is supposed to call tis_close(). + * Requests access to locality 0 for the caller. * * Returns 0 on success, -1 on failure. */ int tis_open(void); /* - * tis_close() - * - * terminate the current session with the TPM by releasing the locked - * locality. Returns 0 on success of -1 on failure (in case lock - * removal did not succeed). - */ -int tis_close(void); - -/* * tis_sendrecv() * * Send the requested data to the TPM and then try to get its response |