2014-07-02 17:37:23 +02:00
|
|
|
/* Copyright (c) 2013 The Chromium OS Authors. All rights reserved.
|
|
|
|
* Use of this source code is governed by a BSD-style license that can be
|
|
|
|
* found in the LICENSE file.
|
|
|
|
*
|
|
|
|
* Functions for querying, manipulating and locking rollback indices
|
|
|
|
* stored in the TPM NVRAM.
|
|
|
|
*/
|
|
|
|
|
2014-07-16 04:47:32 +02:00
|
|
|
#ifndef ANTIROLLBACK_H_
|
|
|
|
#define ANTIROLLBACK_H_
|
2014-07-02 17:37:23 +02:00
|
|
|
|
2018-02-27 19:40:52 +01:00
|
|
|
#include <types.h>
|
|
|
|
#include <security/tpm/tspi.h>
|
2014-07-02 17:37:23 +02:00
|
|
|
|
2014-12-04 02:35:53 +01:00
|
|
|
struct vb2_context;
|
2015-01-31 03:45:27 +01:00
|
|
|
enum vb2_pcr_digest;
|
2014-12-04 02:35:53 +01:00
|
|
|
|
2014-07-02 17:37:23 +02:00
|
|
|
/* TPM NVRAM location indices. */
|
|
|
|
#define FIRMWARE_NV_INDEX 0x1007
|
2014-09-29 22:02:29 +02:00
|
|
|
#define KERNEL_NV_INDEX 0x1008
|
2016-10-07 22:59:36 +02:00
|
|
|
/* 0x1009 used to be used as a backup space. Think of conflicts if you
|
|
|
|
* want to use 0x1009 for something else. */
|
2016-11-08 08:50:12 +01:00
|
|
|
#define BACKUP_NV_INDEX 0x1009
|
|
|
|
#define FWMP_NV_INDEX 0x100a
|
2016-11-08 08:47:11 +01:00
|
|
|
#define REC_HASH_NV_INDEX 0x100b
|
|
|
|
#define REC_HASH_NV_SIZE VB2_SHA256_DIGEST_SIZE
|
2014-07-02 17:37:23 +02:00
|
|
|
|
|
|
|
/* Structure definitions for TPM spaces */
|
|
|
|
|
|
|
|
/* Flags for firmware space */
|
2014-07-16 04:47:32 +02:00
|
|
|
|
2014-07-02 17:37:23 +02:00
|
|
|
/*
|
|
|
|
* Last boot was developer mode. TPM ownership is cleared when transitioning
|
|
|
|
* to/from developer mode.
|
|
|
|
*/
|
|
|
|
#define FLAG_LAST_BOOT_DEVELOPER 0x01
|
|
|
|
|
|
|
|
/* All functions return TPM_SUCCESS (zero) if successful, non-zero if error */
|
|
|
|
|
2014-07-16 04:47:32 +02:00
|
|
|
uint32_t antirollback_read_space_firmware(struct vb2_context *ctx);
|
2014-07-02 17:37:23 +02:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Write may be called if the versions change.
|
|
|
|
*/
|
2014-07-16 04:47:32 +02:00
|
|
|
uint32_t antirollback_write_space_firmware(struct vb2_context *ctx);
|
2014-07-02 17:37:23 +02:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Lock must be called.
|
|
|
|
*/
|
2014-07-16 04:47:32 +02:00
|
|
|
uint32_t antirollback_lock_space_firmware(void);
|
2014-07-02 17:37:23 +02:00
|
|
|
|
2016-11-08 08:47:11 +01:00
|
|
|
/* Read recovery hash data from TPM. */
|
|
|
|
uint32_t antirollback_read_space_rec_hash(uint8_t *data, uint32_t size);
|
|
|
|
/* Write new hash data to recovery space in TPM. */
|
|
|
|
uint32_t antirollback_write_space_rec_hash(const uint8_t *data, uint32_t size);
|
|
|
|
/* Lock down recovery hash space in TPM. */
|
|
|
|
uint32_t antirollback_lock_space_rec_hash(void);
|
|
|
|
|
2018-02-27 19:40:52 +01:00
|
|
|
/* Start of the root of trust */
|
|
|
|
uint32_t vboot_setup_tpm(struct vb2_context *ctx);
|
2014-07-02 17:37:23 +02:00
|
|
|
|
2018-02-27 19:40:52 +01:00
|
|
|
/* vboot_extend_pcr function for vb2 context */
|
|
|
|
uint32_t vboot_extend_pcr(struct vb2_context *ctx, int pcr,
|
2015-01-31 03:45:27 +01:00
|
|
|
enum vb2_pcr_digest which_digest);
|
|
|
|
|
2014-07-16 04:47:32 +02:00
|
|
|
#endif /* ANTIROLLBACK_H_ */
|