blob: 5e4193408ff384b60c4cc3878ead3adbfb4dfa6a [file] [log] [blame] [edit]
/* Copyright (c) 2014 The Chromium OS Authors. All rights reserved.
* Use of this source code is governed by a BSD-style license that can be
* found in the LICENSE file.
*
* Secure non-volatile storage routines
*/
#ifndef VBOOT_REFERENCE_2SECDATA_H_
#define VBOOT_REFERENCE_2SECDATA_H_
#include "2api.h"
/*****************************************************************************/
/* Firmware secure storage space */
/* Which param to get/set for vb2_secdata_firmware_get/set() */
enum vb2_secdata_firmware_param {
/* Flags; see vb2_secdata_firmware_flags */
VB2_SECDATA_FIRMWARE_FLAGS = 0,
/* Firmware versions */
VB2_SECDATA_FIRMWARE_VERSIONS,
};
/* Flags for firmware space */
enum vb2_secdata_firmware_flags {
/*
* Last boot was developer mode. TPM ownership is cleared when
* transitioning to/from developer mode. Set/cleared by
* vb2_check_dev_switch().
*/
VB2_SECDATA_FIRMWARE_FLAG_LAST_BOOT_DEVELOPER = (1 << 0),
/*
* Virtual developer mode switch is on. Set/cleared by the
* keyboard-controlled dev screens in recovery mode. Cleared by
* vb2_check_dev_switch().
*/
VB2_SECDATA_FIRMWARE_FLAG_DEV_MODE = (1 << 1),
};
/**
* Initialize firmware secure storage context and verify its CRC.
*
* This must be called before vb2_secdata_firmware_get/set().
*
* @param ctx Context pointer
* @return VB2_SUCCESS, or non-zero error code if error.
*/
vb2_error_t vb2_secdata_firmware_init(struct vb2_context *ctx);
/**
* Read a firmware secure storage value.
*
* @param ctx Context pointer
* @param param Parameter to read
* @return Requested parameter value
*/
uint32_t vb2_secdata_firmware_get(struct vb2_context *ctx,
enum vb2_secdata_firmware_param param);
/**
* Write a firmware secure storage value.
*
* @param ctx Context pointer
* @param param Parameter to write
* @param value New value
*/
void vb2_secdata_firmware_set(struct vb2_context *ctx,
enum vb2_secdata_firmware_param param,
uint32_t value);
/*****************************************************************************/
/* Kernel secure storage space
*
* These are separate functions so that they don't bloat the size of the early
* boot code which uses the firmware version space functions.
*/
/* Which param to get/set for vb2_secdata_kernel_get/set() */
enum vb2_secdata_kernel_param {
/* Kernel versions */
VB2_SECDATA_KERNEL_VERSIONS = 0,
/* Flags; see vb2_secdata_kernel_flags */
VB2_SECDATA_KERNEL_FLAGS,
};
/* Flags for kernel space */
enum vb2_secdata_kernel_flags {
/*
* Phone recovery functionality is disabled.
*
* RW firmware currently clears this flag to enable phone recovery on
* first boot (see function vb2api_kernel_phase1()). In the case that
* there are TPM communication issues, phone recovery is enabled by the
* default value of 0. See b/147744345 for details.
*/
VB2_SECDATA_KERNEL_FLAG_PHONE_RECOVERY_DISABLED = (1 << 0),
/* Phone recovery instructions in recovery UI are disabled. */
VB2_SECDATA_KERNEL_FLAG_PHONE_RECOVERY_UI_DISABLED = (1 << 1),
/*
* Diagnostic UI is disabled. This includes both hiding the entry
* point on the recovery UI menu ("Launch diagnostics"), and
* disallowing the user from booting into the diagnostic UI.
*/
VB2_SECDATA_KERNEL_FLAG_DIAGNOSTIC_UI_DISABLED = (1 << 2),
/*
* Allow HW acceleration for crypto
*
* RW firmware currently set this flag to enable HW acceleration
* for crypto. Verstage will use HW implementation for RSA/SHA
* only when this flag is set.
*
* Note: We used a flag in the FW preamble for this before.
* FW preamble was checked by verstage so the effect was immediate.
* However with TPM flag we have to modify this in RW stage which is
* after verstage, so even if we clear this flag the first boot
* WILL use hwcrypto, RW stage will run and clear this flag and then
* hwcrypto will be disabled from next boot.
*/
VB2_SECDATA_KERNEL_FLAG_HWCRYPTO_ALLOWED = (1 << 3),
};
/**
* Initialize kernel secure storage context and verify its CRC.
*
* This must be called before vb2_secdata_kernel_get/set().
*
* @param ctx Context pointer
* @return VB2_SUCCESS, or non-zero error code if error.
*/
vb2_error_t vb2_secdata_kernel_init(struct vb2_context *ctx);
/**
* Read a kernel secure storage value.
*
* @param ctx Context pointer
* @param param Parameter to read
* @return Requested parameter value
*/
uint32_t vb2_secdata_kernel_get(struct vb2_context *ctx,
enum vb2_secdata_kernel_param param);
/**
* Write a kernel secure storage value.
*
* @param ctx Context pointer
* @param param Parameter to write
* @param value New value
*/
void vb2_secdata_kernel_set(struct vb2_context *ctx,
enum vb2_secdata_kernel_param param,
uint32_t value);
/**
* Get ec_hash from kernel secure storage.
*
* @param ctx Context pointer
* @return Buffer where hash is stored or NULL on error.
*/
const uint8_t *vb2_secdata_kernel_get_ec_hash(struct vb2_context *ctx);
/**
* Set ec_hash in kernel secure storage.
*
* @param ctx Context pointer
* @param sha256 Hash to be set. 32 bytes.
*/
void vb2_secdata_kernel_set_ec_hash(struct vb2_context *ctx,
const uint8_t *sha256);
/*****************************************************************************/
/* Firmware management parameters (FWMP) space */
/* Flags for FWMP space */
enum vb2_secdata_fwmp_flags {
VB2_SECDATA_FWMP_DEV_DISABLE_BOOT = (1 << 0),
VB2_SECDATA_FWMP_DEV_DISABLE_RECOVERY = (1 << 1),
VB2_SECDATA_FWMP_DEV_ENABLE_EXTERNAL = (1 << 2),
VB2_SECDATA_FWMP_DEV_ENABLE_LEGACY = (1 << 3),
VB2_SECDATA_FWMP_DEV_ENABLE_OFFICIAL_ONLY = (1 << 4),
VB2_SECDATA_FWMP_DEV_USE_KEY_HASH = (1 << 5),
/* CCD = case-closed debugging on cr50; flag implemented on cr50 */
VB2_SECDATA_FWMP_DEV_DISABLE_CCD_UNLOCK = (1 << 6),
VB2_SECDATA_FWMP_DEV_FIPS_MODE = (1 << 7),
};
/**
* Initialize FWMP secure storage context and verify its CRC.
*
* This must be called before vb2_secdata_fwmp_get_flag/get_dev_key_hash().
*
* @param ctx Context pointer
* @return VB2_SUCCESS, or non-zero error code if error.
*/
vb2_error_t vb2_secdata_fwmp_init(struct vb2_context *ctx);
/**
* Read a FWMP secure storage flag value.
*
* It is unsupported to call before successfully running vb2_secdata_fwmp_init.
* In this case, vboot will fail and exit.
*
* @param ctx Context pointer
* @param flag Flag to read
* @return current flag value (0 or 1)
*/
int vb2_secdata_fwmp_get_flag(struct vb2_context *ctx,
enum vb2_secdata_fwmp_flags flag);
/**
* Return a pointer to FWMP dev key hash.
*
* @param ctx Context pointer
* @return uint8_t pointer to dev_key_hash field
*/
uint8_t *vb2_secdata_fwmp_get_dev_key_hash(struct vb2_context *ctx);
/*
* Helper function to check if hwcrypto is allowed.
*/
static inline int vb2_hwcrypto_allowed(struct vb2_context *ctx)
{
/* disable hwcrypto in recovery mode */
if (ctx->flags & VB2_CONTEXT_RECOVERY_MODE)
return 0;
/* enable hwcrypto only if RW firmware set the flag */
if (vb2_secdata_kernel_get(ctx, VB2_SECDATA_KERNEL_FLAGS)
& VB2_SECDATA_KERNEL_FLAG_HWCRYPTO_ALLOWED)
return 1;
return 0;
}
#endif /* VBOOT_REFERENCE_2SECDATA_H_ */