1 /* 2 * Copyright (C) 2016 The Android Open Source Project 3 * 4 * Permission is hereby granted, free of charge, to any person 5 * obtaining a copy of this software and associated documentation 6 * files (the "Software"), to deal in the Software without 7 * restriction, including without limitation the rights to use, copy, 8 * modify, merge, publish, distribute, sublicense, and/or sell copies 9 * of the Software, and to permit persons to whom the Software is 10 * furnished to do so, subject to the following conditions: 11 * 12 * The above copyright notice and this permission notice shall be 13 * included in all copies or substantial portions of the Software. 14 * 15 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, 16 * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF 17 * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND 18 * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS 19 * BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN 20 * ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN 21 * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE 22 * SOFTWARE. 23 */ 24 25 #if !defined(AVB_INSIDE_LIBAVB_H) && !defined(AVB_COMPILATION) 26 #error "Never include this file directly, include libavb.h instead." 27 #endif 28 29 #ifndef AVB_SLOT_VERIFY_H_ 30 #define AVB_SLOT_VERIFY_H_ 31 32 #include "avb_ops.h" 33 #include "avb_vbmeta_image.h" 34 35 #ifdef __cplusplus 36 extern "C" { 37 #endif 38 39 /* Return codes used in avb_slot_verify(), see that function for 40 * documentation for each field. 41 * 42 * Use avb_slot_verify_result_to_string() to get a textual 43 * representation usable for error/debug output. 44 */ 45 typedef enum { 46 AVB_SLOT_VERIFY_RESULT_OK, 47 AVB_SLOT_VERIFY_RESULT_ERROR_OOM, 48 AVB_SLOT_VERIFY_RESULT_ERROR_IO, 49 AVB_SLOT_VERIFY_RESULT_ERROR_VERIFICATION, 50 AVB_SLOT_VERIFY_RESULT_ERROR_ROLLBACK_INDEX, 51 AVB_SLOT_VERIFY_RESULT_ERROR_PUBLIC_KEY_REJECTED, 52 AVB_SLOT_VERIFY_RESULT_ERROR_INVALID_METADATA, 53 AVB_SLOT_VERIFY_RESULT_ERROR_UNSUPPORTED_VERSION 54 } AvbSlotVerifyResult; 55 56 /* Get a textual representation of |result|. */ 57 const char* avb_slot_verify_result_to_string(AvbSlotVerifyResult result); 58 59 /* Maximum number of rollback index locations supported. */ 60 #define AVB_MAX_NUMBER_OF_ROLLBACK_INDEX_LOCATIONS 32 61 62 /* AvbPartitionData contains data loaded from partitions when using 63 * avb_slot_verify(). The |partition_name| field contains the name of 64 * the partition (without A/B suffix), |data| points to the loaded 65 * data which is |data_size| bytes long. 66 * 67 * Note that this is strictly less than the partition size - it's only 68 * the image stored there, not the entire partition nor any of the 69 * metadata. 70 */ 71 typedef struct { 72 char* partition_name; 73 uint8_t* data; 74 size_t data_size; 75 } AvbPartitionData; 76 77 /* AvbVBMetaData contains a vbmeta struct loaded from a partition when 78 * using avb_slot_verify(). The |partition_name| field contains the 79 * name of the partition (without A/B suffix), |vbmeta_data| points to 80 * the loaded data which is |vbmeta_size| bytes long. 81 * 82 * The |verify_result| field contains the result of 83 * avb_vbmeta_image_verify() on the data. This is guaranteed to be 84 * AVB_VBMETA_VERIFY_RESULT_OK for all vbmeta images if 85 * avb_slot_verify() returns AVB_SLOT_VERIFY_RESULT_OK. 86 * 87 * You can use avb_descriptor_get_all(), avb_descriptor_foreach(), and 88 * avb_vbmeta_image_header_to_host_byte_order() with this data. 89 */ 90 typedef struct { 91 char* partition_name; 92 uint8_t* vbmeta_data; 93 size_t vbmeta_size; 94 AvbVBMetaVerifyResult verify_result; 95 } AvbVBMetaData; 96 97 /* AvbSlotVerifyData contains data needed to boot a particular slot 98 * and is returned by avb_slot_verify() if partitions in a slot are 99 * successfully verified. 100 * 101 * All data pointed to by this struct - including data in each item in 102 * the |partitions| array - will be freed when the 103 * avb_slot_verify_data_free() function is called. 104 * 105 * The |ab_suffix| field is the copy of the of |ab_suffix| field 106 * passed to avb_slot_verify(). It is the A/B suffix of the slot. 107 * 108 * The VBMeta images that were checked are available in the 109 * |vbmeta_images| field. The field |num_vbmeta_images| contains the 110 * number of elements in this array. The first element - 111 * vbmeta_images[0] - is guaranteed to be from the partition with the 112 * top-level vbmeta struct. This is usually the "vbmeta" partition in 113 * the requested slot but if there is no "vbmeta" partition it can 114 * also be the "boot" partition. 115 * 116 * The partitions loaded and verified from from the slot are 117 * accessible in the |loaded_partitions| array. The field 118 * |num_loaded_partitions| contains the number of elements in this 119 * array. The order of partitions in this array may not necessarily be 120 * the same order as in the passed-in |requested_partitions| array. 121 * 122 * Rollback indexes for the verified slot are stored in the 123 * |rollback_indexes| field. Note that avb_slot_verify() will NEVER 124 * modify stored_rollback_index[n] locations e.g. it will never use 125 * the write_rollback_index() AvbOps operation. Instead it is the job 126 * of the caller of avb_slot_verify() to do this based on e.g. A/B 127 * policy and other factors. See libavb_ab/avb_ab_flow.c for an 128 * example of how to do this. 129 * 130 * The |cmdline| field is a NUL-terminated string in UTF-8 resulting 131 * from concatenating all |AvbKernelCmdlineDescriptor| and then 132 * performing proper substitution of the variables 133 * $(ANDROID_SYSTEM_PARTUUID), $(ANDROID_BOOT_PARTUUID), and 134 * $(ANDROID_VBMETA_PARTUUID) using the 135 * get_unique_guid_for_partition() operation in |AvbOps|. 136 * 137 * Additionally, the |cmdline| field will have the following kernel 138 * command-line options set: 139 * 140 * androidboot.vbmeta.device_state: set to "locked" or "unlocked" 141 * depending on the result of the result of AvbOps's 142 * read_is_unlocked() function. 143 * 144 * androidboot.vbmeta.{hash_alg, size, digest}: Will be set to 145 * the digest of all images in |vbmeta_images|. 146 * 147 * androidboot.vbmeta.device: This is set to the value 148 * PARTUUID=$(ANDROID_VBMETA_PARTUUID) before substitution so it 149 * will end up pointing to the vbmeta partition for the verified 150 * slot. If there is no vbmeta partition it will point to the boot 151 * partition of the verified slot. 152 * 153 * androidboot.vbmeta.avb_version: This is set to the decimal value 154 * of AVB_VERSION_MAJOR followed by a dot followed by the decimal 155 * value of AVB_VERSION_MINOR, for example "1.0" or "1.4". This 156 * version number represents the vbmeta file format version 157 * supported by libavb copy used in the boot loader. This is not 158 * necessarily the same version number of the on-disk metadata for 159 * the slot that was verified. 160 * 161 * Note that androidboot.slot_suffix is not set in |cmdline| - you 162 * will have to pass this command-line option yourself. 163 * 164 * This struct may grow in the future without it being considered an 165 * ABI break. 166 */ 167 typedef struct { 168 char* ab_suffix; 169 AvbVBMetaData* vbmeta_images; 170 size_t num_vbmeta_images; 171 AvbPartitionData* loaded_partitions; 172 size_t num_loaded_partitions; 173 char* cmdline; 174 uint64_t rollback_indexes[AVB_MAX_NUMBER_OF_ROLLBACK_INDEX_LOCATIONS]; 175 } AvbSlotVerifyData; 176 177 /* Frees a |AvbSlotVerifyData| including all data it points to. */ 178 void avb_slot_verify_data_free(AvbSlotVerifyData* data); 179 180 /* Performs a full verification of the slot identified by |ab_suffix| 181 * and load the contents of the partitions whose name is in the 182 * NULL-terminated string array |requested_partitions| (each partition 183 * must use hash verification). If not using A/B, pass an empty string 184 * (e.g. "", not NULL) for |ab_suffix|. 185 * 186 * Typically the |requested_partitions| array only contains a single 187 * item for the boot partition, 'boot'. 188 * 189 * Verification includes loading data from the 'vbmeta', all hash 190 * partitions, and possibly other partitions (with |ab_suffix| 191 * appended), inspecting rollback indexes, and checking if the public 192 * key used to sign the data is acceptable. The functions in |ops| 193 * will be used to do this. 194 * 195 * If |out_data| is not NULL, it will be set to a newly allocated 196 * |AvbSlotVerifyData| struct containing all the data needed to 197 * actually boot the slot. This data structure should be freed with 198 * avb_slot_verify_data_free() when you are done with it. See below 199 * for when this is returned. 200 * 201 * If |allow_verification_error| is false this function will bail out 202 * as soon as an error is encountered and |out_data| is set only if 203 * AVB_SLOT_VERIFY_RESULT_OK is returned. 204 * 205 * Otherwise if |allow_verification_error| is true the function will 206 * continue verification efforts and |out_data| is also set if 207 * AVB_SLOT_VERIFY_RESULT_ERROR_PUBLIC_KEY_REJECTED, 208 * AVB_SLOT_VERIFY_RESULT_ERROR_VERIFICATION, or 209 * AVB_SLOT_VERIFY_RESULT_ERROR_ROLLBACK_INDEX is returned. It is 210 * undefined which error is returned if more than one distinct error 211 * is encountered. It is guaranteed that AVB_SLOT_VERIFY_RESULT_OK is 212 * returned if, and only if, there are no errors. This mode is needed 213 * to boot valid but unverified slots when the device is unlocked. 214 * 215 * Also note that |out_data| is never set if 216 * AVB_SLOT_VERIFY_RESULT_ERROR_OOM, AVB_SLOT_VERIFY_RESULT_ERROR_IO, 217 * or AVB_SLOT_VERIFY_RESULT_ERROR_INVALID_METADATA is returned. 218 * 219 * AVB_SLOT_VERIFY_RESULT_OK is returned if everything is verified 220 * correctly and all public keys are accepted. 221 * 222 * AVB_SLOT_VERIFY_RESULT_ERROR_PUBLIC_KEY_REJECTED is returned if 223 * everything is verified correctly out but one or more public keys 224 * are not accepted. This includes the case where integrity data is 225 * not signed. 226 * 227 * AVB_SLOT_VERIFY_RESULT_ERROR_OOM is returned if unable to 228 * allocate memory. 229 * 230 * AVB_SLOT_VERIFY_RESULT_ERROR_IO is returned if an I/O error 231 * occurred while trying to load data or get a rollback index. 232 * 233 * AVB_SLOT_VERIFY_RESULT_ERROR_VERIFICATION is returned if the data 234 * did not verify, e.g. the digest didn't match or signature checks 235 * failed. 236 * 237 * AVB_SLOT_VERIFY_RESULT_ERROR_ROLLBACK_INDEX is returned if a 238 * rollback index was less than its stored value. 239 * 240 * AVB_SLOT_VERIFY_RESULT_ERROR_INVALID_METADATA is returned if some 241 * of the metadata is invalid or inconsistent. 242 * 243 * AVB_SLOT_VERIFY_RESULT_ERROR_UNSUPPORTED_VERSION is returned if 244 * some of the metadata requires a newer version of libavb than what 245 * is in use. 246 */ 247 AvbSlotVerifyResult avb_slot_verify(AvbOps* ops, 248 const char* const* requested_partitions, 249 const char* ab_suffix, 250 bool allow_verification_error, 251 AvbSlotVerifyData** out_data); 252 253 #ifdef __cplusplus 254 } 255 #endif 256 257 #endif /* AVB_SLOT_VERIFY_H_ */ 258