OLD | NEW |
---|---|
(Empty) | |
1 /* Copyright (c) 2011 The Chromium OS Authors. All rights reserved. | |
2 * Use of this source code is governed by a BSD-style license that can be | |
3 * found in the LICENSE file. | |
4 * | |
5 * Functions for updating the TPM state with the status of boot path. | |
6 */ | |
7 | |
8 #include "tpm_bootmode.h" | |
9 | |
10 #include "tlcl.h" | |
11 #include "utility.h" | |
12 | |
13 /* TPM PCR to use for storing boot mode measurements. */ | |
14 #define BOOT_MODE_PCR 0 | |
15 | |
16 /* Input digests for PCR extend. | |
17 * These are calculated as: | |
18 * SHA1("|Developer_Mode||Recovery_Mode||Keyblock_Mode|"). | |
19 * Developer_Mode can be 0 or 1 | |
20 * Recovery_Mode can be 0 or 1 | |
21 * Keyblock_Mode could be 0 (invalid or don't care), 1 (developer switch | |
Randall Spangler
2011/03/15 05:18:18
Key block flags are defined in vboot_struct.h:
#d
gauravsh
2011/03/15 06:29:10
Ahh ok, I misread this to mean that in the normal
| |
22 * off), or 2 (developer switch on). | |
23 */ | |
24 const uint8_t kBootStateSHA1Digests[][20] = { | |
25 /* SHA1("\x00\x00\x00") */ | |
26 "\x29\xe2\xdc\xfb\xb1\x6f\x63\xbb\x02\x54\xdf\x75\x85\xa1\x5b\xb6" | |
27 "\xfb\x5e\x92\x7d", | |
28 | |
29 /* SHA1("\x00\x00\x01") */ | |
30 "\x25\x47\xcc\x73\x6e\x95\x1f\xa4\x91\x98\x53\xc4\x3a\xe8\x90\x86" | |
31 "\x1a\x3b\x32\x64", | |
32 | |
33 /* SHA1("\x00\x00\x02") */ | |
34 "\x1e\xf6\x24\x48\x2d\x62\x0e\x43\xe6\xd3\x4d\xa1\xaf\xe4\x62\x67" | |
35 "\xfc\x69\x5d\x9b", | |
36 | |
37 /* SHA1("\x00\x01\x00") */ | |
38 "\x62\x57\x18\x91\x21\x5b\x4e\xfc\x1c\xea\xb7\x44\xce\x59\xdd\x0b" | |
39 "\x66\xea\x6f\x73", | |
40 | |
41 /* SHA1("\x00\x01\x01") */ | |
42 "\xee\xe4\x47\xed\xc7\x9f\xea\x1c\xa7\xc7\xd3\x4e\x46\x32\x61\xcd" | |
43 "\xa4\xba\x33\x9e", | |
44 | |
45 /* SHA1("\x00\x01\x02") */ | |
46 "\x0c\x7a\x62\x3f\xd2\xbb\xc0\x5b\x06\x42\x3b\xe3\x59\xe4\x02\x1d" | |
47 "\x36\xe7\x21\xad", | |
48 | |
49 /* SHA1("\x01\x00\x00") */ | |
50 "\x95\x08\xe9\x05\x48\xb0\x44\x0a\x4a\x61\xe5\x74\x3b\x76\xc1\xe3" | |
51 "\x09\xb2\x3b\x7f", | |
52 | |
53 /* SHA1("\x01\x00\x01") */ | |
54 "\xc4\x2a\xc1\xc4\x6f\x1d\x4e\x21\x1c\x73\x5c\xc7\xdf\xad\x4f\xf8" | |
55 "\x39\x11\x10\xe9", | |
56 | |
57 /* SHA1("\x01\x00\x02") */ | |
58 "\xfa\x01\x0d\x26\x64\xcc\x5b\x3b\x82\xee\x48\x8f\xe2\xb9\xf5\x0f" | |
59 "\x49\x32\xeb\x8f", | |
60 | |
61 /* SHA1("\x01\x01\x00") */ | |
62 "\x47\xec\x8d\x98\x36\x64\x33\xdc\x00\x2e\x77\x21\xc9\xe3\x7d\x50" | |
63 "\x67\x54\x79\x37", | |
64 | |
65 /* SHA1("\x01\x01\x01") */ | |
66 "\x28\xd8\x6c\x56\xb3\xbf\x26\xd2\x36\x56\x9b\x8d\xc8\xc3\xf9\x1f" | |
67 "\x32\xf4\x7b\xc7", | |
68 | |
69 /* SHA1("\x01\x01\x02") */ | |
70 "\x12\xa3\x40\xd7\x89\x7f\xe7\x13\xfc\x8f\x02\xac\x53\x65\xb8\x6e" | |
71 "\xbf\x35\x31\x78" | |
72 }; | |
73 | |
74 /* Given the boot state, return the correct SHA1 digest index for TPMExtend | |
75 * in kBootStateSHA1Digests[]. */ | |
76 #define GET_BOOTSTATE_INDEX(dev_mode, rec_mode, keyblock_mode) \ | |
77 ( ((dev_mode) * 6) + ((rec_mode) * 3) + (keyblock_mode) ) | |
Randall Spangler
2011/03/15 05:18:18
This runs off the end of your array for keyblock_m
gauravsh
2011/03/15 06:29:10
Yeah, no point optimizing - I was relying on the (
| |
78 | |
79 uint32_t SetTPMBootModeState(int developer_mode, int recovery_mode, | |
80 int fw_keyblock_mode) { | |
81 uint32_t result; | |
82 uint8_t out_digest[20]; /* For PCR extend output. */ | |
83 int digest_index = GET_BOOTSTATE_INDEX(developer_mode, recovery_mode, | |
Randall Spangler
2011/03/15 05:18:18
Should range-check digest_index to make sure it's
gauravsh
2011/03/15 23:22:49
I wasn't sure what to return in case the range che
| |
84 fw_keyblock_mode); | |
85 result = TlclExtend(BOOT_MODE_PCR, kBootStateSHA1Digests[digest_index], | |
86 out_digest); | |
87 VBDEBUG(("TPM: SetTPMBootModeState boot mode PCR out_digest %02x %02x %02x " | |
88 "%02x\n", out_digest, out_digest+1, out_digest+2, out_digest+3)); | |
89 return result; | |
90 } | |
OLD | NEW |