1 /* Copyright (c) 2013 The Chromium OS Authors. All rights reserved. 2 * Use of this source code is governed by a BSD-style license that can be 3 * found in the LICENSE file. 4 * 5 * Functions for updating the TPM state with the status of boot path. 6 */ 7 8 #include "sysincludes.h" 9 10 #include "tlcl.h" 11 #include "tpm_bootmode.h" 12 #include "utility.h" 13 #include "vboot_api.h" 14 15 /* TPM PCRs to use for storing boot mode measurements. */ 16 #define BOOT_MODE_PCR 0 17 #define HWID_DIGEST_PCR 1 18 19 /* 20 * Input digests for PCR extend. 21 * These are calculated as: 22 * SHA1("|Developer_Mode||Recovery_Mode||Keyblock_Mode|"). 23 * Developer_Mode can be 0 or 1. 24 * Recovery_Mode can be 0 or 1. 25 * Keyblock flags are defined in vboot_struct.h 26 * 27 * We map them to Keyblock_Mode as follows: 28 * ----------------------------------------- 29 * Keyblock Flags | Keyblock Mode 30 * ----------------------------------------- 31 * 6 (Dev-signed firmware) | 2 32 * 7 Normal-signed firmware | 1 33 * (anything else) | 0 34 */ 35 36 const char* kBootStateSHA1Digests[] = { 37 /* SHA1("\x00\x00\x00") */ 38 "\x29\xe2\xdc\xfb\xb1\x6f\x63\xbb\x02\x54\xdf\x75\x85\xa1\x5b\xb6" 39 "\xfb\x5e\x92\x7d", 40 41 /* SHA1("\x00\x00\x01") */ 42 "\x25\x47\xcc\x73\x6e\x95\x1f\xa4\x91\x98\x53\xc4\x3a\xe8\x90\x86" 43 "\x1a\x3b\x32\x64", 44 45 /* SHA1("\x00\x00\x02") */ 46 "\x1e\xf6\x24\x48\x2d\x62\x0e\x43\xe6\xd3\x4d\xa1\xaf\xe4\x62\x67" 47 "\xfc\x69\x5d\x9b", 48 49 /* SHA1("\x00\x01\x00") */ 50 "\x62\x57\x18\x91\x21\x5b\x4e\xfc\x1c\xea\xb7\x44\xce\x59\xdd\x0b" 51 "\x66\xea\x6f\x73", 52 53 /* SHA1("\x00\x01\x01") */ 54 "\xee\xe4\x47\xed\xc7\x9f\xea\x1c\xa7\xc7\xd3\x4e\x46\x32\x61\xcd" 55 "\xa4\xba\x33\x9e", 56 57 /* SHA1("\x00\x01\x02") */ 58 "\x0c\x7a\x62\x3f\xd2\xbb\xc0\x5b\x06\x42\x3b\xe3\x59\xe4\x02\x1d" 59 "\x36\xe7\x21\xad", 60 61 /* SHA1("\x01\x00\x00") */ 62 "\x95\x08\xe9\x05\x48\xb0\x44\x0a\x4a\x61\xe5\x74\x3b\x76\xc1\xe3" 63 "\x09\xb2\x3b\x7f", 64 65 /* SHA1("\x01\x00\x01") */ 66 "\xc4\x2a\xc1\xc4\x6f\x1d\x4e\x21\x1c\x73\x5c\xc7\xdf\xad\x4f\xf8" 67 "\x39\x11\x10\xe9", 68 69 /* SHA1("\x01\x00\x02") */ 70 "\xfa\x01\x0d\x26\x64\xcc\x5b\x3b\x82\xee\x48\x8f\xe2\xb9\xf5\x0f" 71 "\x49\x32\xeb\x8f", 72 73 /* SHA1("\x01\x01\x00") */ 74 "\x47\xec\x8d\x98\x36\x64\x33\xdc\x00\x2e\x77\x21\xc9\xe3\x7d\x50" 75 "\x67\x54\x79\x37", 76 77 /* SHA1("\x01\x01\x01") */ 78 "\x28\xd8\x6c\x56\xb3\xbf\x26\xd2\x36\x56\x9b\x8d\xc8\xc3\xf9\x1f" 79 "\x32\xf4\x7b\xc7", 80 81 /* SHA1("\x01\x01\x02") */ 82 "\x12\xa3\x40\xd7\x89\x7f\xe7\x13\xfc\x8f\x02\xac\x53\x65\xb8\x6e" 83 "\xbf\x35\x31\x78", 84 }; 85 86 #define MAX_BOOT_STATE_INDEX (sizeof(kBootStateSHA1Digests)/sizeof(char *)) 87 88 /* 89 * Used for PCR extend when the passed-in boot state is invalid or if there is 90 * an internal error. 91 */ 92 const uint8_t kBootInvalidSHA1Digest[] = { 93 "\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff" 94 "\xff\xff\xff\xff" 95 }; 96 97 /** 98 * Given the boot state, return the correct SHA1 digest index for TPMExtend 99 * in kBootStateSHA1Digests[]. 100 */ 101 static int GetBootStateIndex(int dev_mode, int rec_mode, 102 uint64_t keyblock_flags) 103 { 104 int index = 0; 105 106 /* 107 * Convert keyblock flags into keyblock mode which we use to index into 108 * kBootStateSHA1Digest[]. 109 */ 110 switch(keyblock_flags) { 111 case 6: 112 /* 113 * KEY_BLOCK_FLAG_RECOVERY_0 | KEY_BLOCK_FLAG_DEVELOPER_1 114 * 115 * Developer firmware. */ 116 index = 2; 117 break; 118 case 7: 119 /* 120 * KEY_BLOCK_FLAG_RECOVERY_0 | KEY_BLOCK_FLAG_DEVELOPER_0 121 * | KEY_BLOCK_FLAGS_DEVELOPER_1 122 */ 123 index = 1; 124 break; 125 default: 126 /* Any other keyblock flags. */ 127 index = 0; 128 }; 129 130 if (rec_mode) 131 index += 3; 132 if (dev_mode) 133 index += 6; 134 return index; 135 } 136 137 uint32_t SetTPMBootModeState(int developer_mode, int recovery_mode, 138 uint64_t fw_keyblock_flags, 139 GoogleBinaryBlockHeader *gbb) 140 { 141 uint32_t result0, result1 = 0; 142 const uint8_t *in_digest = NULL; 143 uint8_t out_digest[20]; /* For PCR extend output. */ 144 int digest_index = GetBootStateIndex(developer_mode, recovery_mode, 145 fw_keyblock_flags); 146 147 if (digest_index >= 0 && digest_index < MAX_BOOT_STATE_INDEX) { 148 in_digest = (const uint8_t*) 149 kBootStateSHA1Digests[digest_index]; 150 } else { 151 /* Internal out of bounds error. */ 152 in_digest = kBootInvalidSHA1Digest; 153 } 154 155 result0 = TlclExtend(BOOT_MODE_PCR, in_digest, out_digest); 156 VBDEBUG(("TPM: SetTPMBootModeState boot mode PCR%d result %d\n", 157 BOOT_MODE_PCR, result0)); 158 159 /* Extend the HWID Digest into PCR1 (GBB v1.2 and later only) */ 160 if (gbb && gbb->minor_version >= 2) { 161 result1 = TlclExtend(HWID_DIGEST_PCR, gbb->hwid_digest, 162 out_digest); 163 VBDEBUG(("TPM: SetTPMBootModeState HWID PCR%d result %d\n", 164 HWID_DIGEST_PCR, result1)); 165 } 166 167 /* The caller only looks for nonzero results, not error codes. */ 168 return result0 || result1; 169 } 170