Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(830)

Side by Side Diff: src/platform/vboot_reference/vboot_firmware/include/kernel_image_fw.h

Issue 2327001: VerifyKernelHeader() fills a KernelImage* (Closed) Base URL: ssh://gitrw.chromium.org/chromiumos
Patch Set: Created 10 years, 7 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « no previous file | src/platform/vboot_reference/vboot_firmware/lib/include/stateful_util.h » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 /* Copyright (c) 2010 The Chromium OS Authors. All rights reserved. 1 /* Copyright (c) 2010 The Chromium OS Authors. All rights reserved.
2 * Use of this source code is governed by a BSD-style license that can be 2 * Use of this source code is governed by a BSD-style license that can be
3 * found in the LICENSE file. 3 * found in the LICENSE file.
4 * 4 *
5 * Data structure and API definitions for a verified boot kernel image. 5 * Data structure and API definitions for a verified boot kernel image.
6 * (Firmware Portion) 6 * (Firmware Portion)
7 */ 7 */
8 8
9 #ifndef VBOOT_REFERENCE_KERNEL_IMAGE_FW_H_ 9 #ifndef VBOOT_REFERENCE_KERNEL_IMAGE_FW_H_
10 #define VBOOT_REFERENCE_KERNEL_IMAGE_FW_H_ 10 #define VBOOT_REFERENCE_KERNEL_IMAGE_FW_H_
(...skipping 119 matching lines...) Expand 10 before | Expand all | Expand 10 after
130 * 130 *
131 * The signing key to use for kernel data verification is returned in 131 * The signing key to use for kernel data verification is returned in
132 * [kernel_sign_key], This must be free-d explicitly by the caller after use. 132 * [kernel_sign_key], This must be free-d explicitly by the caller after use.
133 * The kernel signing algorithm is returned in [kernel_sign_algorithm] and its 133 * The kernel signing algorithm is returned in [kernel_sign_algorithm] and its
134 * length in [kernel_len]. 134 * length in [kernel_len].
135 * 135 *
136 * Returns 0 on success, error code on failure. 136 * Returns 0 on success, error code on failure.
137 */ 137 */
138 int VerifyKernelHeader(const uint8_t* firmware_key_blob, 138 int VerifyKernelHeader(const uint8_t* firmware_key_blob,
139 const uint8_t* kernel_header_blob, 139 const uint8_t* kernel_header_blob,
140 uint64_t kernel_header_blob_len,
140 const int dev_mode, 141 const int dev_mode,
141 const uint8_t** expected_kernel_signature, 142 KernelImage *image,
142 RSAPublicKey** kernel_sign_key, 143 RSAPublicKey** kernel_sign_key);
143 int* kernel_sign_algorithm,
144 uint64_t* kernel_len);
145 144
146 /* Performs a chained verify of the kernel blob [kernel_blob]. If 145 /* Performs a chained verify of the kernel blob [kernel_blob]. If
147 * [dev_mode] is 0 [inactive], then the pre-processed public signing key 146 * [dev_mode] is 0 [inactive], then the pre-processed public signing key
148 * [root_key_blob] is used to verify the signature of the signing key, 147 * [root_key_blob] is used to verify the signature of the signing key,
149 * else the check is skipped. 148 * else the check is skipped.
150 * 149 *
150 * On success, fills in image with the kernel header and preamble fields.
151 * Note that pointers in the image directly point into the input
152 * kernel_header_blob. image->kernel_data is set to NULL, since it's not
153 * part of the header and preamble data itself.
151 * 154 *
152 * Returns 0 on success, error code on failure. 155 * Returns 0 on success, error code on failure.
153 * 156 *
154 * NOTE: The length of the kernel blob is derived from reading the fields 157 * NOTE: The length of the kernel blob is derived from reading the fields
155 * in the first few bytes of the buffer. This might look risky but in firmware 158 * in the first few bytes of the buffer. This might look risky but in firmware
156 * land, the start address of the kernel_blob will always be fixed depending 159 * land, the start address of the kernel_blob will always be fixed depending
157 * on the memory map on the particular platform. In addition, the signature on 160 * on the memory map on the particular platform. In addition, the signature on
158 * length itself is checked early in the verification process for extra safety. 161 * length itself is checked early in the verification process for extra safety.
159 */ 162 */
160 int VerifyKernel(const uint8_t* signing_key_blob, 163 int VerifyKernel(const uint8_t* signing_key_blob,
(...skipping 32 matching lines...) Expand 10 before | Expand all | Expand 10 after
193 * BOOT_KERNEL_A_CONTINUE Boot from Kenrel A 196 * BOOT_KERNEL_A_CONTINUE Boot from Kenrel A
194 * BOOT_KERNEL_B_CONTINUE Boot from Kernel B 197 * BOOT_KERNEL_B_CONTINUE Boot from Kernel B
195 * BOOT_KERNEL_RECOVERY_CONTINUE Jump to recovery mode 198 * BOOT_KERNEL_RECOVERY_CONTINUE Jump to recovery mode
196 */ 199 */
197 int VerifyKernelDriver_f(uint8_t* firmware_key_blob, 200 int VerifyKernelDriver_f(uint8_t* firmware_key_blob,
198 kernel_entry* kernelA, 201 kernel_entry* kernelA,
199 kernel_entry* kernelB, 202 kernel_entry* kernelB,
200 int dev_mode); 203 int dev_mode);
201 204
202 #endif /* VBOOT_REFERENCE_KERNEL_IMAGE_FW_H_ */ 205 #endif /* VBOOT_REFERENCE_KERNEL_IMAGE_FW_H_ */
OLDNEW
« no previous file with comments | « no previous file | src/platform/vboot_reference/vboot_firmware/lib/include/stateful_util.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698