Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(747)

Side by Side Diff: firmware/lib/tpm_bootmode.c

Issue 6719005: Cherry-pick vboot_reference files from TOT to support crossystem (Closed) Base URL: ssh://git@gitrw.chromium.org:9222/vboot_reference.git@0.11.257.B
Patch Set: Created 9 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « firmware/lib/rollback_index.c ('k') | firmware/lib/tpm_lite/include/tlcl_structures.h » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
(Empty)
1 /* Copyright (c) 2011 The Chromium OS Authors. All rights reserved.
2 * Use of this source code is governed by a BSD-style license that can be
3 * found in the LICENSE file.
4 *
5 * Functions for updating the TPM state with the status of boot path.
6 */
7
8 #include "tpm_bootmode.h"
9
10 #include "tlcl.h"
11 #include "utility.h"
12
13 /* TPM PCR to use for storing boot mode measurements. */
14 #define BOOT_MODE_PCR 0
15
16 /* Input digests for PCR extend.
17 * These are calculated as:
18 * SHA1("|Developer_Mode||Recovery_Mode||Keyblock_Mode|").
19 * Developer_Mode can be 0 or 1.
20 * Recovery_Mode can be 0 or 1.
21 * Keyblock flags are defined in vboot_struct.h
22 *
23 * We map them to Keyblock_Mode as follows:
24 * -----------------------------------------
25 * Keyblock Flags | Keyblock Mode
26 * -----------------------------------------
27 * 6 (Dev-signed firmware) | 2
28 * 7 Normal-signed firmware | 1
29 * (anything else) | 0
30 */
31
32 const char* kBootStateSHA1Digests[] = {
33 /* SHA1("\x00\x00\x00") */
34 "\x29\xe2\xdc\xfb\xb1\x6f\x63\xbb\x02\x54\xdf\x75\x85\xa1\x5b\xb6"
35 "\xfb\x5e\x92\x7d",
36
37 /* SHA1("\x00\x00\x01") */
38 "\x25\x47\xcc\x73\x6e\x95\x1f\xa4\x91\x98\x53\xc4\x3a\xe8\x90\x86"
39 "\x1a\x3b\x32\x64",
40
41 /* SHA1("\x00\x00\x02") */
42 "\x1e\xf6\x24\x48\x2d\x62\x0e\x43\xe6\xd3\x4d\xa1\xaf\xe4\x62\x67"
43 "\xfc\x69\x5d\x9b",
44
45 /* SHA1("\x00\x01\x00") */
46 "\x62\x57\x18\x91\x21\x5b\x4e\xfc\x1c\xea\xb7\x44\xce\x59\xdd\x0b"
47 "\x66\xea\x6f\x73",
48
49 /* SHA1("\x00\x01\x01") */
50 "\xee\xe4\x47\xed\xc7\x9f\xea\x1c\xa7\xc7\xd3\x4e\x46\x32\x61\xcd"
51 "\xa4\xba\x33\x9e",
52
53 /* SHA1("\x00\x01\x02") */
54 "\x0c\x7a\x62\x3f\xd2\xbb\xc0\x5b\x06\x42\x3b\xe3\x59\xe4\x02\x1d"
55 "\x36\xe7\x21\xad",
56
57 /* SHA1("\x01\x00\x00") */
58 "\x95\x08\xe9\x05\x48\xb0\x44\x0a\x4a\x61\xe5\x74\x3b\x76\xc1\xe3"
59 "\x09\xb2\x3b\x7f",
60
61 /* SHA1("\x01\x00\x01") */
62 "\xc4\x2a\xc1\xc4\x6f\x1d\x4e\x21\x1c\x73\x5c\xc7\xdf\xad\x4f\xf8"
63 "\x39\x11\x10\xe9",
64
65 /* SHA1("\x01\x00\x02") */
66 "\xfa\x01\x0d\x26\x64\xcc\x5b\x3b\x82\xee\x48\x8f\xe2\xb9\xf5\x0f"
67 "\x49\x32\xeb\x8f",
68
69 /* SHA1("\x01\x01\x00") */
70 "\x47\xec\x8d\x98\x36\x64\x33\xdc\x00\x2e\x77\x21\xc9\xe3\x7d\x50"
71 "\x67\x54\x79\x37",
72
73 /* SHA1("\x01\x01\x01") */
74 "\x28\xd8\x6c\x56\xb3\xbf\x26\xd2\x36\x56\x9b\x8d\xc8\xc3\xf9\x1f"
75 "\x32\xf4\x7b\xc7",
76
77 /* SHA1("\x01\x01\x02") */
78 "\x12\xa3\x40\xd7\x89\x7f\xe7\x13\xfc\x8f\x02\xac\x53\x65\xb8\x6e"
79 "\xbf\x35\x31\x78",
80 };
81
82 #define MAX_BOOT_STATE_INDEX (sizeof(kBootStateSHA1Digests)/sizeof(char*))
83
84 /* Used for PCR extend when the passed-in boot state is invalid or
85 * if there is an internal error. */
86 const uint8_t kBootInvalidSHA1Digest[] = {
87 "\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff"
88 "\xff\xff\xff\xff"
89 };
90
91 /* Given the boot state, return the correct SHA1 digest index for TPMExtend
92 * in kBootStateSHA1Digests[]. */
93 int GetBootStateIndex(int dev_mode, int rec_mode, int keyblock_flags) {
94 int index = 0;
95
96 /* Convert keyblock flags into keyblock mode which we use to index into
97 * kBootStateSHA1Digest[]. */
98 switch(keyblock_flags) {
99 case 6: /* KEY_BLOCK_FLAG_RECOVERY_0 | KEY_BLOCK_FLAG_DEVELOPER_1 */
100 /* Developer firmware. */
101 index = 2;
102 break;
103 case 7: /* KEY_BLOCK_FLAG_RECOVERY_0 | KEY_BLOCK_FLAG_DEVELOPER_0
104 * | KEY_BLOCK_FLAGS_DEVELOPER_1 */
105 index = 1;
106 break;
107 default:
108 index = 0; /* Any other keyblock flags. */
109 };
110
111 if (rec_mode)
112 index += 3;
113 if (dev_mode)
114 index += 6;
115 return index;
116 }
117
118 uint32_t SetTPMBootModeState(int developer_mode, int recovery_mode,
119 int fw_keyblock_flags) {
120 uint32_t result;
121 const uint8_t* in_digest = NULL;
122 uint8_t out_digest[20]; /* For PCR extend output. */
123 int digest_index = GetBootStateIndex(developer_mode, recovery_mode,
124 fw_keyblock_flags);
125
126 if (digest_index >= 0 && digest_index < MAX_BOOT_STATE_INDEX)
127 in_digest = (const uint8_t*)kBootStateSHA1Digests[digest_index];
128 else
129 in_digest = kBootInvalidSHA1Digest; /* Internal out of bounds error. */
130 result = TlclExtend(BOOT_MODE_PCR, in_digest, out_digest);
131 VBDEBUG(("TPM: SetTPMBootModeState boot mode PCR out_digest %02x %02x %02x "
132 "%02x\n", out_digest, out_digest+1, out_digest+2, out_digest+3));
133 return result;
134 }
OLDNEW
« no previous file with comments | « firmware/lib/rollback_index.c ('k') | firmware/lib/tpm_lite/include/tlcl_structures.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698