summaryrefslogtreecommitdiffstats
path: root/src/usr/secureboot/common/errlud_secure.C
diff options
context:
space:
mode:
authorMike Baiocchi <mbaiocch@us.ibm.com>2017-03-13 08:46:46 -0500
committerDaniel M. Crowell <dcrowell@us.ibm.com>2017-03-21 09:45:24 -0400
commitafd8387b9c5f1583046820aba9a632bb4acaf767 (patch)
tree032093e231cca8dd99bcc75df2cf2109c447c2f0 /src/usr/secureboot/common/errlud_secure.C
parent5c40d7f2798087751e0f3c6a507107e540126b69 (diff)
downloadblackbird-hostboot-afd8387b9c5f1583046820aba9a632bb4acaf767.tar.gz
blackbird-hostboot-afd8387b9c5f1583046820aba9a632bb4acaf767.zip
Trace HwKeyHash and Add Errorlog Parser Infrastructure to Secureboot
This commit traces the HwKeyHash to Secureboot-specific error logs. It also adds the infrastucture necessary to parse secureboot-specific errorlog user data sections. It includes 2 new custom sections: one which is used in this commit, and another which will be used in a future commit. Change-Id: Id5fb115ad1214f956e5256d3641236021e4642ab RTC:165205 Reviewed-on: http://ralgit01.raleigh.ibm.com/gerrit1/37901 Tested-by: Jenkins Server <pfd-jenkins+hostboot@us.ibm.com> Tested-by: FSP CI Jenkins <fsp-CI-jenkins+hostboot@us.ibm.com> Tested-by: Jenkins OP Build CI <op-jenkins+hostboot@us.ibm.com> Reviewed-by: Stephen M. Cprek <smcprek@us.ibm.com> Reviewed-by: Nicholas E. Bofferding <bofferdn@us.ibm.com> Reviewed-by: Marshall J. Wilks <mjwilks@us.ibm.com> Reviewed-by: Daniel M. Crowell <dcrowell@us.ibm.com>
Diffstat (limited to 'src/usr/secureboot/common/errlud_secure.C')
-rw-r--r--src/usr/secureboot/common/errlud_secure.C125
1 files changed, 125 insertions, 0 deletions
diff --git a/src/usr/secureboot/common/errlud_secure.C b/src/usr/secureboot/common/errlud_secure.C
new file mode 100644
index 000000000..660038b8e
--- /dev/null
+++ b/src/usr/secureboot/common/errlud_secure.C
@@ -0,0 +1,125 @@
+/* IBM_PROLOG_BEGIN_TAG */
+/* This is an automatically generated prolog. */
+/* */
+/* $Source: src/usr/secureboot/common/errlud_secure.C $ */
+/* */
+/* OpenPOWER HostBoot Project */
+/* */
+/* Contributors Listed Below - COPYRIGHT 2014,2017 */
+/* [+] International Business Machines Corp. */
+/* */
+/* */
+/* Licensed under the Apache License, Version 2.0 (the "License"); */
+/* you may not use this file except in compliance with the License. */
+/* You may obtain a copy of the License at */
+/* */
+/* http://www.apache.org/licenses/LICENSE-2.0 */
+/* */
+/* Unless required by applicable law or agreed to in writing, software */
+/* distributed under the License is distributed on an "AS IS" BASIS, */
+/* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or */
+/* implied. See the License for the specific language governing */
+/* permissions and limitations under the License. */
+/* */
+/* IBM_PROLOG_END_TAG */
+/**
+ * @file errlud_secure.C
+ *
+ * @brief Implementation of classes to log SECUREBOOT FFDC
+ */
+#include <secureboot/service.H>
+#include <secureboot/secure_reasoncodes.H>
+#include "errlud_secure.H"
+
+namespace SECUREBOOT
+{
+
+//------------------------------------------------------------------------------
+// Enum defining MAGIC NUMBERS used for checks below
+//------------------------------------------------------------------------------
+enum {
+ PARSER_SIZEOF_SHA512_t = 64,
+ PARSER_SIZEOF_UINT32_t = 4,
+ PARSER_SIZEOF_UINT8_t = 1,
+ PARSER_SIZEOF_TARGET_HKH_SECTION = 69,
+};
+
+//------------------------------------------------------------------------------
+// SECURE System HW Keys Hash User Details
+//------------------------------------------------------------------------------
+UdSystemHwKeyHash::UdSystemHwKeyHash(const SHA512_t i_hash)
+{
+ // Set up Ud instance variables
+ iv_CompId = SECURE_COMP_ID;
+ iv_Version = SECURE_UDT_VERSION_1;
+ iv_SubSection = SECURE_UDT_SYSTEM_HW_KEY_HASH;
+
+ //***** Memory Layout *****
+ // 64 bytes : SHA512_t of Target HW Key Hash
+
+ static_assert(sizeof(SHA512_t) == PARSER_SIZEOF_SHA512_t, "Expected SHA512_t size is 64 bytes");
+
+ char * l_pBuf = reinterpret_cast<char *>(
+ reallocUsrBuf(sizeof(SHA512_t)) );
+
+ memcpy(l_pBuf, i_hash, sizeof(SHA512_t));
+ l_pBuf += sizeof(SHA512_t);
+}
+
+//------------------------------------------------------------------------------
+UdSystemHwKeyHash::~UdSystemHwKeyHash()
+{
+
+}
+
+//------------------------------------------------------------------------------
+// SECURE Target HW Keys Hash User Details
+//------------------------------------------------------------------------------
+UdTargetHwKeyHash::UdTargetHwKeyHash(const TARGETING::Target * i_target,
+ const uint8_t i_side,
+ const SHA512_t i_hash)
+{
+ // Set up Ud instance variables
+ iv_CompId = SECURE_COMP_ID;
+ iv_Version = SECURE_UDT_VERSION_1;
+ iv_SubSection = SECURE_UDT_TARGET_HW_KEY_HASH;
+
+ //***** Memory Layout *****
+ // 4 bytes : Target HUID
+ // 1 byte : SBE EEPROM (Primary or Backup)
+ // 64 bytes : SHA512_t of Target HW Key Hash
+
+ static_assert(sizeof(uint32_t)==PARSER_SIZEOF_UINT32_t, "Expected sizeof(uint32_t) is 4");
+ static_assert(sizeof(uint8_t)==PARSER_SIZEOF_UINT8_t, "Expected sizeof(uint8_t) is 1");
+ static_assert(sizeof(SHA512_t) == PARSER_SIZEOF_SHA512_t, "Expected SHA512_t size is 64 bytes");
+ static_assert((sizeof(uint32_t) + sizeof(uint8_t) + sizeof(SHA512_t)) == PARSER_SIZEOF_TARGET_HKH_SECTION,
+ "Expected Buffer length is 69 bytes");
+
+ char * l_pBuf = reinterpret_cast<char *>(
+ reallocUsrBuf(sizeof(uint32_t)
+ +sizeof(uint8_t)
+ +sizeof(SHA512_t)));
+
+ uint32_t tmp32 = 0;
+ uint8_t tmp8 = 0;
+
+ tmp32 = TARGETING::get_huid(i_target);
+ memcpy(l_pBuf, &tmp32, sizeof(tmp32));
+ l_pBuf += sizeof(tmp32);
+
+ tmp8 = static_cast<uint8_t>(i_side);
+ memcpy(l_pBuf, &tmp8, sizeof(tmp8));
+ l_pBuf += sizeof(tmp8);
+
+ memcpy(l_pBuf, i_hash, sizeof(SHA512_t));
+ l_pBuf += sizeof(SHA512_t);
+}
+
+//------------------------------------------------------------------------------
+UdTargetHwKeyHash::~UdTargetHwKeyHash()
+{
+
+}
+
+} // end SECUREBOOT namespace
+
OpenPOWER on IntegriCloud