Blame view

kernel/linux-imx6_3.14.28/security/keys/trusted.h 3.42 KB
6b13f685e   김민수   BSP 최초 추가
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
  #ifndef __TRUSTED_KEY_H
  #define __TRUSTED_KEY_H
  
  /* implementation specific TPM constants */
  #define MAX_PCRINFO_SIZE		64
  #define MAX_BUF_SIZE			512
  #define TPM_GETRANDOM_SIZE		14
  #define TPM_OSAP_SIZE			36
  #define TPM_OIAP_SIZE			10
  #define TPM_SEAL_SIZE			87
  #define TPM_UNSEAL_SIZE			104
  #define TPM_SIZE_OFFSET			2
  #define TPM_RETURN_OFFSET		6
  #define TPM_DATA_OFFSET			10
  
  #define LOAD32(buffer, offset)	(ntohl(*(uint32_t *)&buffer[offset]))
  #define LOAD32N(buffer, offset)	(*(uint32_t *)&buffer[offset])
  #define LOAD16(buffer, offset)	(ntohs(*(uint16_t *)&buffer[offset]))
  
  struct tpm_buf {
  	int len;
  	unsigned char data[MAX_BUF_SIZE];
  };
  
  #define INIT_BUF(tb) (tb->len = 0)
  
  struct osapsess {
  	uint32_t handle;
  	unsigned char secret[SHA1_DIGEST_SIZE];
  	unsigned char enonce[TPM_NONCE_SIZE];
  };
  
  /* discrete values, but have to store in uint16_t for TPM use */
  enum {
  	SEAL_keytype = 1,
  	SRK_keytype = 4
  };
  
  struct trusted_key_options {
  	uint16_t keytype;
  	uint32_t keyhandle;
  	unsigned char keyauth[SHA1_DIGEST_SIZE];
  	unsigned char blobauth[SHA1_DIGEST_SIZE];
  	uint32_t pcrinfo_len;
  	unsigned char pcrinfo[MAX_PCRINFO_SIZE];
  	int pcrlock;
  };
  
  #define TPM_DEBUG 0
  
  #if TPM_DEBUG
  static inline void dump_options(struct trusted_key_options *o)
  {
  	pr_info("trusted_key: sealing key type %d
  ", o->keytype);
  	pr_info("trusted_key: sealing key handle %0X
  ", o->keyhandle);
  	pr_info("trusted_key: pcrlock %d
  ", o->pcrlock);
  	pr_info("trusted_key: pcrinfo %d
  ", o->pcrinfo_len);
  	print_hex_dump(KERN_INFO, "pcrinfo ", DUMP_PREFIX_NONE,
  		       16, 1, o->pcrinfo, o->pcrinfo_len, 0);
  }
  
  static inline void dump_payload(struct trusted_key_payload *p)
  {
  	pr_info("trusted_key: key_len %d
  ", p->key_len);
  	print_hex_dump(KERN_INFO, "key ", DUMP_PREFIX_NONE,
  		       16, 1, p->key, p->key_len, 0);
  	pr_info("trusted_key: bloblen %d
  ", p->blob_len);
  	print_hex_dump(KERN_INFO, "blob ", DUMP_PREFIX_NONE,
  		       16, 1, p->blob, p->blob_len, 0);
  	pr_info("trusted_key: migratable %d
  ", p->migratable);
  }
  
  static inline void dump_sess(struct osapsess *s)
  {
  	print_hex_dump(KERN_INFO, "trusted-key: handle ", DUMP_PREFIX_NONE,
  		       16, 1, &s->handle, 4, 0);
  	pr_info("trusted-key: secret:
  ");
  	print_hex_dump(KERN_INFO, "", DUMP_PREFIX_NONE,
  		       16, 1, &s->secret, SHA1_DIGEST_SIZE, 0);
  	pr_info("trusted-key: enonce:
  ");
  	print_hex_dump(KERN_INFO, "", DUMP_PREFIX_NONE,
  		       16, 1, &s->enonce, SHA1_DIGEST_SIZE, 0);
  }
  
  static inline void dump_tpm_buf(unsigned char *buf)
  {
  	int len;
  
  	pr_info("
  trusted-key: tpm buffer
  ");
  	len = LOAD32(buf, TPM_SIZE_OFFSET);
  	print_hex_dump(KERN_INFO, "", DUMP_PREFIX_NONE, 16, 1, buf, len, 0);
  }
  #else
  static inline void dump_options(struct trusted_key_options *o)
  {
  }
  
  static inline void dump_payload(struct trusted_key_payload *p)
  {
  }
  
  static inline void dump_sess(struct osapsess *s)
  {
  }
  
  static inline void dump_tpm_buf(unsigned char *buf)
  {
  }
  #endif
  
  static inline void store8(struct tpm_buf *buf, const unsigned char value)
  {
  	buf->data[buf->len++] = value;
  }
  
  static inline void store16(struct tpm_buf *buf, const uint16_t value)
  {
  	*(uint16_t *) & buf->data[buf->len] = htons(value);
  	buf->len += sizeof value;
  }
  
  static inline void store32(struct tpm_buf *buf, const uint32_t value)
  {
  	*(uint32_t *) & buf->data[buf->len] = htonl(value);
  	buf->len += sizeof value;
  }
  
  static inline void storebytes(struct tpm_buf *buf, const unsigned char *in,
  			      const int len)
  {
  	memcpy(buf->data + buf->len, in, len);
  	buf->len += len;
  }
  #endif