| OLD | NEW |
| 1 /* Copyright (c) 2010 The Chromium OS Authors. All rights reserved. | 1 /* Copyright (c) 2010 The Chromium OS Authors. All rights reserved. |
| 2 * Use of this source code is governed by a BSD-style license that can be | 2 * Use of this source code is governed by a BSD-style license that can be |
| 3 * found in the LICENSE file. | 3 * found in the LICENSE file. |
| 4 * | 4 * |
| 5 * High-level firmware API for loading and verifying rewritable firmware. | 5 * High-level firmware API for loading and verifying rewritable firmware. |
| 6 * (Firmware portion) | 6 * (Firmware portion) |
| 7 */ | 7 */ |
| 8 | 8 |
| 9 #include "load_firmware_fw.h" | 9 #include "load_firmware_fw.h" |
| 10 #include "rollback_index.h" | 10 #include "rollback_index.h" |
| (...skipping 43 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 54 return LOAD_FIRMWARE_RECOVERY; | 54 return LOAD_FIRMWARE_RECOVERY; |
| 55 } | 55 } |
| 56 | 56 |
| 57 /* Must have a root key */ | 57 /* Must have a root key */ |
| 58 if (!root_key) { | 58 if (!root_key) { |
| 59 VBDEBUG(("No root key\n")); | 59 VBDEBUG(("No root key\n")); |
| 60 return LOAD_FIRMWARE_RECOVERY; | 60 return LOAD_FIRMWARE_RECOVERY; |
| 61 } | 61 } |
| 62 | 62 |
| 63 /* Initialize the TPM and read rollback indices. */ | 63 /* Initialize the TPM and read rollback indices. */ |
| 64 status = RollbackFirmwareSetup(params->boot_flags & BOOT_FLAG_DEVELOPER); | 64 status = RollbackFirmwareSetup(params->boot_flags & BOOT_FLAG_DEVELOPER, |
| 65 &tpm_key_version, &tpm_fw_version); |
| 65 if (0 != status) { | 66 if (0 != status) { |
| 66 VBDEBUG(("Unable to setup TPM.\n")); | 67 VBDEBUG(("Unable to setup TPM and read stored versions.\n")); |
| 67 return (status == TPM_E_MUST_REBOOT ? | 68 return (status == TPM_E_MUST_REBOOT ? |
| 68 LOAD_FIRMWARE_REBOOT : LOAD_FIRMWARE_RECOVERY); | 69 LOAD_FIRMWARE_REBOOT : LOAD_FIRMWARE_RECOVERY); |
| 69 } | 70 } |
| 70 status = RollbackFirmwareRead(&tpm_key_version, &tpm_fw_version); | |
| 71 if (0 != status) { | |
| 72 VBDEBUG(("Unable to read stored versions.\n")); | |
| 73 return (status == TPM_E_MUST_REBOOT ? | |
| 74 LOAD_FIRMWARE_REBOOT : LOAD_FIRMWARE_RECOVERY); | |
| 75 } | |
| 76 | 71 |
| 77 /* Allocate our internal data */ | 72 /* Allocate our internal data */ |
| 78 lfi = (VbLoadFirmwareInternal*)Malloc(sizeof(VbLoadFirmwareInternal)); | 73 lfi = (VbLoadFirmwareInternal*)Malloc(sizeof(VbLoadFirmwareInternal)); |
| 79 if (!lfi) | 74 if (!lfi) |
| 80 return LOAD_FIRMWARE_RECOVERY; | 75 return LOAD_FIRMWARE_RECOVERY; |
| 81 params->load_firmware_internal = (uint8_t*)lfi; | 76 params->load_firmware_internal = (uint8_t*)lfi; |
| 82 | 77 |
| 83 /* Loop over indices */ | 78 /* Loop over indices */ |
| 84 for (index = 0; index < 2; index++) { | 79 for (index = 0; index < 2; index++) { |
| 85 VbKeyBlockHeader* key_block; | 80 VbKeyBlockHeader* key_block; |
| (...skipping 158 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 244 | 239 |
| 245 /* Success */ | 240 /* Success */ |
| 246 VBDEBUG(("Will boot firmware index %d\n", (int)params->firmware_index)); | 241 VBDEBUG(("Will boot firmware index %d\n", (int)params->firmware_index)); |
| 247 return LOAD_FIRMWARE_SUCCESS; | 242 return LOAD_FIRMWARE_SUCCESS; |
| 248 } | 243 } |
| 249 | 244 |
| 250 /* If we're still here, no good firmware, so go to recovery mode. */ | 245 /* If we're still here, no good firmware, so go to recovery mode. */ |
| 251 VBDEBUG(("Alas, no good firmware.\n")); | 246 VBDEBUG(("Alas, no good firmware.\n")); |
| 252 return LOAD_FIRMWARE_RECOVERY; | 247 return LOAD_FIRMWARE_RECOVERY; |
| 253 } | 248 } |
| OLD | NEW |