summaryrefslogtreecommitdiff
path: root/arch/powerpc/platforms/pseries/plpks_sed_ops.c
blob: 7c873c9589effdea891d81a5902af2f16e89b900 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
// SPDX-License-Identifier: GPL-2.0-only
/*
 * POWER Platform specific code for non-volatile SED key access
 * Copyright (C) 2022 IBM Corporation
 *
 * Define operations for SED Opal to read/write keys
 * from POWER LPAR Platform KeyStore(PLPKS).
 *
 * Self Encrypting Drives(SED) key storage using PLPKS
 */

#include <linux/kernel.h>
#include <linux/slab.h>
#include <linux/string.h>
#include <linux/ioctl.h>
#include <linux/sed-opal-key.h>
#include <asm/plpks.h>

static bool plpks_sed_initialized = false;
static bool plpks_sed_available = false;

/*
 * structure that contains all SED data
 */
struct plpks_sed_object_data {
	u_char version;
	u_char pad1[7];
	u_long authority;
	u_long range;
	u_int  key_len;
	u_char key[32];
};

#define PLPKS_SED_OBJECT_DATA_V0        0
#define PLPKS_SED_MANGLED_LABEL         "/default/pri"
#define PLPKS_SED_COMPONENT             "sed-opal"
#define PLPKS_SED_KEY                   "opal-boot-pin"

/*
 * authority is admin1 and range is global
 */
#define PLPKS_SED_AUTHORITY  0x0000000900010001
#define PLPKS_SED_RANGE      0x0000080200000001

static void plpks_init_var(struct plpks_var *var, char *keyname)
{
	if (!plpks_sed_initialized) {
		plpks_sed_initialized = true;
		plpks_sed_available = plpks_is_available();
		if (!plpks_sed_available)
			pr_err("SED: plpks not available\n");
	}

	var->name = keyname;
	var->namelen = strlen(keyname);
	if (strcmp(PLPKS_SED_KEY, keyname) == 0) {
		var->name = PLPKS_SED_MANGLED_LABEL;
		var->namelen = strlen(keyname);
	}
	var->policy = PLPKS_WORLDREADABLE;
	var->os = PLPKS_VAR_COMMON;
	var->data = NULL;
	var->datalen = 0;
	var->component = PLPKS_SED_COMPONENT;
}

/*
 * Read the SED Opal key from PLPKS given the label
 */
int sed_read_key(char *keyname, char *key, u_int *keylen)
{
	struct plpks_var var;
	struct plpks_sed_object_data data;
	int ret;
	u_int len;

	plpks_init_var(&var, keyname);

	if (!plpks_sed_available)
		return -EOPNOTSUPP;

	var.data = (u8 *)&data;
	var.datalen = sizeof(data);

	ret = plpks_read_os_var(&var);
	if (ret != 0)
		return ret;

	len = min_t(u16, be32_to_cpu(data.key_len), var.datalen);
	memcpy(key, data.key, len);
	key[len] = '\0';
	*keylen = len;

	return 0;
}

/*
 * Write the SED Opal key to PLPKS given the label
 */
int sed_write_key(char *keyname, char *key, u_int keylen)
{
	struct plpks_var var;
	struct plpks_sed_object_data data;
	struct plpks_var_name vname;

	plpks_init_var(&var, keyname);

	if (!plpks_sed_available)
		return -EOPNOTSUPP;

	var.datalen = sizeof(struct plpks_sed_object_data);
	var.data = (u8 *)&data;

	/* initialize SED object */
	data.version = PLPKS_SED_OBJECT_DATA_V0;
	data.authority = cpu_to_be64(PLPKS_SED_AUTHORITY);
	data.range = cpu_to_be64(PLPKS_SED_RANGE);
	memset(&data.pad1, '\0', sizeof(data.pad1));
	data.key_len = cpu_to_be32(keylen);
	memcpy(data.key, (char *)key, keylen);

	/*
	 * Key update requires remove first. The return value
	 * is ignored since it's okay if the key doesn't exist.
	 */
	vname.namelen = var.namelen;
	vname.name = var.name;
	plpks_remove_var(var.component, var.os, vname);

	return plpks_write_var(var);
}