blob: 8ccad7f5e4b3164d73f8cdee8ff3e60ba401e0ed (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
|
/* Copyright 2017 The Chromium OS Authors. All rights reserved.
* Use of this source code is governed by a BSD-style license that can be
* found in the LICENSE file.
*/
/* RMA challenge-response */
#ifndef __CROS_EC_RMA_AUTH_H
#define __CROS_EC_RMA_AUTH_H
#include <stdint.h>
#include "common.h" /* For __packed. */
/* Current challenge protocol version */
#define RMA_CHALLENGE_VERSION 0
/* Getters and setters for version_key_id byte */
#define RMA_CHALLENGE_VKID_BYTE(version, keyid) \
(((version) << 6) | ((keyid)&0x3f))
#define RMA_CHALLENGE_GET_VERSION(vkidbyte) ((vkidbyte) >> 6)
#define RMA_CHALLENGE_GET_KEY_ID(vkidbyte) ((vkidbyte)&0x3f)
#define RMA_DEVICE_ID_SIZE 8
struct __packed rma_challenge {
/* Top 2 bits are protocol version; bottom 6 are server KeyID */
uint8_t version_key_id;
/* Ephemeral public key from device */
uint8_t device_pub_key[32];
/* Board ID (.type) */
uint8_t board_id[4];
/* Device ID */
uint8_t device_id[RMA_DEVICE_ID_SIZE];
};
/* Size of encoded challenge and response, and buffer sizes to hold them */
#define RMA_CHALLENGE_CHARS 80
#define RMA_CHALLENGE_BUF_SIZE (RMA_CHALLENGE_CHARS + 1)
#define RMA_AUTHCODE_CHARS 8
#define RMA_AUTHCODE_BUF_SIZE (RMA_AUTHCODE_CHARS + 1)
/**
* Create a new RMA challenge/response
*
* @return EC_SUCCESS, EC_ERROR_TIMEOUT if too soon since the last challenge,
* or other non-zero error code.
*/
int rma_create_challenge(void);
/**
* Get the current challenge string
*
* @return a pointer to the challenge string. String will be empty if there
* is no active challenge.
*/
const char *rma_get_challenge(void);
/**
* Try a RMA authorization code
*
* @param code Authorization code to try (buffer needs to be at least
* RMA_AUTHCODE_CHARS bytes long, no matter the actual string length, as the
* function uses safe_memcmp to prevent timing attacks).
* @return EC_SUCCESS if the response was correct, or non-zero error code.
*/
int rma_try_authcode(const char *code);
/**
* Get the device ID returned in RMA response.
*
* @param rma_device_id Pointer to the buffer that will be filled with
* the ID. The buffer must be of size RMA_DEVICE_ID_SIZE.
*/
void get_rma_device_id(uint8_t rma_device_id[RMA_DEVICE_ID_SIZE]);
#endif
|