| /* Copyright (c) 2014 The Chromium OS Authors. All rights reserved. |
| * Use of this source code is governed by a BSD-style license that can be |
| * found in the LICENSE file. |
| * |
| * Secure non-volatile storage routines |
| */ |
| |
| #ifndef VBOOT_REFERENCE_2SECDATA_H_ |
| #define VBOOT_REFERENCE_2SECDATA_H_ |
| |
| #include "2api.h" |
| |
| /*****************************************************************************/ |
| /* Firmware secure storage space */ |
| |
| /* Which param to get/set for vb2_secdata_firmware_get/set() */ |
| enum vb2_secdata_firmware_param { |
| /* Flags; see vb2_secdata_firmware_flags */ |
| VB2_SECDATA_FIRMWARE_FLAGS = 0, |
| |
| /* Firmware versions */ |
| VB2_SECDATA_FIRMWARE_VERSIONS, |
| }; |
| |
| /* Flags for firmware space */ |
| enum vb2_secdata_firmware_flags { |
| /* |
| * Last boot was developer mode. TPM ownership is cleared when |
| * transitioning to/from developer mode. Set/cleared by |
| * vb2_check_dev_switch(). |
| */ |
| VB2_SECDATA_FIRMWARE_FLAG_LAST_BOOT_DEVELOPER = (1 << 0), |
| |
| /* |
| * Virtual developer mode switch is on. Set/cleared by the |
| * keyboard-controlled dev screens in recovery mode. Cleared by |
| * vb2_check_dev_switch(). |
| */ |
| VB2_SECDATA_FIRMWARE_FLAG_DEV_MODE = (1 << 1), |
| }; |
| |
| /** |
| * Initialize firmware secure storage context and verify its CRC. |
| * |
| * This must be called before vb2_secdata_firmware_get/set(). |
| * |
| * @param ctx Context pointer |
| * @return VB2_SUCCESS, or non-zero error code if error. |
| */ |
| vb2_error_t vb2_secdata_firmware_init(struct vb2_context *ctx); |
| |
| /** |
| * Read a firmware secure storage value. |
| * |
| * @param ctx Context pointer |
| * @param param Parameter to read |
| * @return Requested parameter value |
| */ |
| uint32_t vb2_secdata_firmware_get(struct vb2_context *ctx, |
| enum vb2_secdata_firmware_param param); |
| |
| /** |
| * Write a firmware secure storage value. |
| * |
| * @param ctx Context pointer |
| * @param param Parameter to write |
| * @param value New value |
| */ |
| void vb2_secdata_firmware_set(struct vb2_context *ctx, |
| enum vb2_secdata_firmware_param param, |
| uint32_t value); |
| |
| /*****************************************************************************/ |
| /* Kernel secure storage space |
| * |
| * These are separate functions so that they don't bloat the size of the early |
| * boot code which uses the firmware version space functions. |
| */ |
| |
| /* Which param to get/set for vb2_secdata_kernel_get/set() */ |
| enum vb2_secdata_kernel_param { |
| /* Kernel versions */ |
| VB2_SECDATA_KERNEL_VERSIONS = 0, |
| |
| /* Flags; see vb2_secdata_kernel_flags */ |
| VB2_SECDATA_KERNEL_FLAGS, |
| }; |
| |
| /* Flags for kernel space */ |
| enum vb2_secdata_kernel_flags { |
| /* |
| * Phone recovery functionality is disabled. |
| * |
| * RW firmware currently clears this flag to enable phone recovery on |
| * first boot (see function vb2api_kernel_phase1()). In the case that |
| * there are TPM communication issues, phone recovery is enabled by the |
| * default value of 0. See b/147744345 for details. |
| */ |
| VB2_SECDATA_KERNEL_FLAG_PHONE_RECOVERY_DISABLED = (1 << 0), |
| |
| /* Phone recovery instructions in recovery UI are disabled. */ |
| VB2_SECDATA_KERNEL_FLAG_PHONE_RECOVERY_UI_DISABLED = (1 << 1), |
| |
| /* |
| * Diagnostic UI is disabled. This includes both hiding the entry |
| * point on the recovery UI menu ("Launch diagnostics"), and |
| * disallowing the user from booting into the diagnostic UI. |
| */ |
| VB2_SECDATA_KERNEL_FLAG_DIAGNOSTIC_UI_DISABLED = (1 << 2), |
| |
| /* |
| * Allow HW acceleration for crypto |
| * |
| * RW firmware currently set this flag to enable HW acceleration |
| * for crypto. Verstage will use HW implementation for RSA/SHA |
| * only when this flag is set. |
| * |
| * Note: We used a flag in the FW preamble for this before. |
| * FW preamble was checked by verstage so the effect was immediate. |
| * However with TPM flag we have to modify this in RW stage which is |
| * after verstage, so even if we clear this flag the first boot |
| * WILL use hwcrypto, RW stage will run and clear this flag and then |
| * hwcrypto will be disabled from next boot. |
| */ |
| VB2_SECDATA_KERNEL_FLAG_HWCRYPTO_ALLOWED = (1 << 3), |
| }; |
| |
| /** |
| * Initialize kernel secure storage context and verify its CRC. |
| * |
| * This must be called before vb2_secdata_kernel_get/set(). |
| * |
| * @param ctx Context pointer |
| * @return VB2_SUCCESS, or non-zero error code if error. |
| */ |
| vb2_error_t vb2_secdata_kernel_init(struct vb2_context *ctx); |
| |
| /** |
| * Read a kernel secure storage value. |
| * |
| * @param ctx Context pointer |
| * @param param Parameter to read |
| * @return Requested parameter value |
| */ |
| uint32_t vb2_secdata_kernel_get(struct vb2_context *ctx, |
| enum vb2_secdata_kernel_param param); |
| |
| /** |
| * Write a kernel secure storage value. |
| * |
| * @param ctx Context pointer |
| * @param param Parameter to write |
| * @param value New value |
| */ |
| void vb2_secdata_kernel_set(struct vb2_context *ctx, |
| enum vb2_secdata_kernel_param param, |
| uint32_t value); |
| |
| /** |
| * Get ec_hash from kernel secure storage. |
| * |
| * @param ctx Context pointer |
| * @return Buffer where hash is stored or NULL on error. |
| */ |
| const uint8_t *vb2_secdata_kernel_get_ec_hash(struct vb2_context *ctx); |
| |
| /** |
| * Set ec_hash in kernel secure storage. |
| * |
| * @param ctx Context pointer |
| * @param sha256 Hash to be set. 32 bytes. |
| */ |
| void vb2_secdata_kernel_set_ec_hash(struct vb2_context *ctx, |
| const uint8_t *sha256); |
| |
| /*****************************************************************************/ |
| /* Firmware management parameters (FWMP) space */ |
| |
| /* Flags for FWMP space */ |
| enum vb2_secdata_fwmp_flags { |
| VB2_SECDATA_FWMP_DEV_DISABLE_BOOT = (1 << 0), |
| VB2_SECDATA_FWMP_DEV_DISABLE_RECOVERY = (1 << 1), |
| VB2_SECDATA_FWMP_DEV_ENABLE_EXTERNAL = (1 << 2), |
| VB2_SECDATA_FWMP_DEV_ENABLE_LEGACY = (1 << 3), |
| VB2_SECDATA_FWMP_DEV_ENABLE_OFFICIAL_ONLY = (1 << 4), |
| VB2_SECDATA_FWMP_DEV_USE_KEY_HASH = (1 << 5), |
| /* CCD = case-closed debugging on cr50; flag implemented on cr50 */ |
| VB2_SECDATA_FWMP_DEV_DISABLE_CCD_UNLOCK = (1 << 6), |
| VB2_SECDATA_FWMP_DEV_FIPS_MODE = (1 << 7), |
| }; |
| |
| /** |
| * Initialize FWMP secure storage context and verify its CRC. |
| * |
| * This must be called before vb2_secdata_fwmp_get_flag/get_dev_key_hash(). |
| * |
| * @param ctx Context pointer |
| * @return VB2_SUCCESS, or non-zero error code if error. |
| */ |
| vb2_error_t vb2_secdata_fwmp_init(struct vb2_context *ctx); |
| |
| /** |
| * Read a FWMP secure storage flag value. |
| * |
| * It is unsupported to call before successfully running vb2_secdata_fwmp_init. |
| * In this case, vboot will fail and exit. |
| * |
| * @param ctx Context pointer |
| * @param flag Flag to read |
| * @return current flag value (0 or 1) |
| */ |
| int vb2_secdata_fwmp_get_flag(struct vb2_context *ctx, |
| enum vb2_secdata_fwmp_flags flag); |
| |
| /** |
| * Return a pointer to FWMP dev key hash. |
| * |
| * @param ctx Context pointer |
| * @return uint8_t pointer to dev_key_hash field |
| */ |
| uint8_t *vb2_secdata_fwmp_get_dev_key_hash(struct vb2_context *ctx); |
| |
| /* |
| * Helper function to check if hwcrypto is allowed. |
| */ |
| static inline int vb2_hwcrypto_allowed(struct vb2_context *ctx) |
| { |
| |
| /* disable hwcrypto in recovery mode */ |
| if (ctx->flags & VB2_CONTEXT_RECOVERY_MODE) |
| return 0; |
| |
| /* enable hwcrypto only if RW firmware set the flag */ |
| if (vb2_secdata_kernel_get(ctx, VB2_SECDATA_KERNEL_FLAGS) |
| & VB2_SECDATA_KERNEL_FLAG_HWCRYPTO_ALLOWED) |
| return 1; |
| |
| return 0; |
| |
| } |
| |
| |
| #endif /* VBOOT_REFERENCE_2SECDATA_H_ */ |