blob: 934cea7a3980c5710fb1c6d1ae3b2679dbbbf2b1 [file] [log] [blame]
// SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
/* Copyright 2013-2017 IBM Corp. */
#ifndef __TRUSTEDBOOT_H
#define __TRUSTEDBOOT_H
#include <platform.h>
typedef enum {
PCR_0 = 0,
PCR_1 = 1,
PCR_2 = 2,
PCR_3 = 3,
PCR_4 = 4,
PCR_5 = 5,
PCR_6 = 6,
PCR_7 = 7,
PCR_DEBUG = 16,
PCR_DRTM_17 = 17,
PCR_DRTM_18 = 18,
PCR_DRTM_19 = 19,
PCR_DRTM_20 = 20,
PCR_DRTM_21 = 21,
PCR_DRTM_22 = 22,
PLATFORM_PCR = 24, ///< The number of PCR required by the platform spec
IMPLEMENTATION_PCR = 24, ///< The number of PCRs implemented by TPM
} TPM_Pcr;
void trustedboot_init(void);
/**
* As defined in the TCG Platform Firmware Profile specification, the
* digest of 0xFFFFFFFF or 0x00000000 must be extended in PCR[0-7] and
* an EV_SEPARATOR event must be recorded in the event log for PCR[0-7]
* prior to the first invocation of the first Ready to Boot call.
*
* This function must be called just before BOOTKERNEL is executed. Every call
* to trustedboot_measure() will fail afterwards.
*/
int trustedboot_exit_boot_services(void);
/**
* trustedboot_measure - measure a resource
* @id : resource id
* @buf : data to be measured
* @len : buf length
*
* This measures a resource downloaded from PNOR if trusted mode is on. That is,
* an EV_ACTION event is recorded in the event log for the mapped PCR, and the
* the sha1 and sha256 measurements are extended in the mapped PCR.
*
* For more information please refer to 'doc/stb.rst'
*
* returns: 0 or an error as defined in status_codes.h
*/
int trustedboot_measure(enum resource_id id, void *buf, size_t len);
#endif /* __TRUSTEDBOOT_H */