1 | /** @file
|
---|
2 | The UEFI Inline Cryptographic Interface protocol provides services to abstract
|
---|
3 | access to inline cryptographic capabilities.
|
---|
4 |
|
---|
5 | Copyright (c) 2015, Intel Corporation. All rights reserved.<BR>
|
---|
6 | This program and the accompanying materials
|
---|
7 | are licensed and made available under the terms and conditions of the BSD License
|
---|
8 | which accompanies this distribution. The full text of the license may be found at
|
---|
9 | http://opensource.org/licenses/bsd-license.php
|
---|
10 |
|
---|
11 | THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
|
---|
12 | WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
|
---|
13 |
|
---|
14 | **/
|
---|
15 |
|
---|
16 | #ifndef __BLOCK_IO_CRYPTO_H__
|
---|
17 | #define __BLOCK_IO_CRYPTO_H__
|
---|
18 |
|
---|
19 | #include <Protocol/BlockIo.h>
|
---|
20 |
|
---|
21 | #define EFI_BLOCK_IO_CRYPTO_PROTOCOL_GUID \
|
---|
22 | { \
|
---|
23 | 0xa00490ba, 0x3f1a, 0x4b4c, {0xab, 0x90, 0x4f, 0xa9, 0x97, 0x26, 0xa1, 0xe8} \
|
---|
24 | }
|
---|
25 |
|
---|
26 | typedef struct _EFI_BLOCK_IO_CRYPTO_PROTOCOL EFI_BLOCK_IO_CRYPTO_PROTOCOL;
|
---|
27 |
|
---|
28 | ///
|
---|
29 | /// The struct of Block I/O Crypto Token.
|
---|
30 | ///
|
---|
31 | typedef struct {
|
---|
32 | //
|
---|
33 | // If Event is NULL, then blocking I/O is performed. If Event is not NULL and
|
---|
34 | // non-blocking I/O is supported, then non-blocking I/O is performed, and
|
---|
35 | // Event will be signaled when the read request is completed and data was
|
---|
36 | // decrypted (when Index was specified).
|
---|
37 | //
|
---|
38 | EFI_EVENT Event;
|
---|
39 | //
|
---|
40 | // Defines whether or not the signaled event encountered an error.
|
---|
41 | //
|
---|
42 | EFI_STATUS TransactionStatus;
|
---|
43 | } EFI_BLOCK_IO_CRYPTO_TOKEN;
|
---|
44 |
|
---|
45 | typedef struct {
|
---|
46 | //
|
---|
47 | // GUID of the algorithm.
|
---|
48 | //
|
---|
49 | EFI_GUID Algorithm;
|
---|
50 | //
|
---|
51 | // Specifies KeySizein bits used with this Algorithm.
|
---|
52 | //
|
---|
53 | UINT64 KeySize;
|
---|
54 | //
|
---|
55 | // Specifies bitmask of block sizes supported by this algorithm.
|
---|
56 | // Bit j being set means that 2^j bytes crypto block size is supported.
|
---|
57 | //
|
---|
58 | UINT64 CryptoBlockSizeBitMask;
|
---|
59 | } EFI_BLOCK_IO_CRYPTO_CAPABILITY;
|
---|
60 |
|
---|
61 | ///
|
---|
62 | /// EFI_BLOCK_IO_CRYPTO_IV_INPUT structure is used as a common header in CryptoIvInput
|
---|
63 | /// parameters passed to the ReadExtended and WriteExtended methods for Inline
|
---|
64 | /// Cryptographic Interface.
|
---|
65 | /// Its purpose is to pass size of the entire CryptoIvInputparameter memory buffer to
|
---|
66 | /// the Inline Cryptographic Interface.
|
---|
67 | ///
|
---|
68 | typedef struct {
|
---|
69 | UINT64 InputSize;
|
---|
70 | } EFI_BLOCK_IO_CRYPTO_IV_INPUT;
|
---|
71 |
|
---|
72 | #define EFI_BLOCK_IO_CRYPTO_ALGO_GUID_AES_XTS \
|
---|
73 | { \
|
---|
74 | 0x2f87ba6a, 0x5c04, 0x4385, {0xa7, 0x80, 0xf3, 0xbf, 0x78, 0xa9, 0x7b, 0xec} \
|
---|
75 | }
|
---|
76 |
|
---|
77 | extern EFI_GUID gEfiBlockIoCryptoAlgoAesXtsGuid;
|
---|
78 |
|
---|
79 | typedef struct {
|
---|
80 | EFI_BLOCK_IO_CRYPTO_IV_INPUT Header;
|
---|
81 | UINT64 CryptoBlockNumber;
|
---|
82 | UINT64 CryptoBlockByteSize;
|
---|
83 | } EFI_BLOCK_IO_CRYPTO_IV_INPUT_AES_XTS;
|
---|
84 |
|
---|
85 | #define EFI_BLOCK_IO_CRYPTO_ALGO_GUID_AES_CBC_MICROSOFT_BITLOCKER \
|
---|
86 | { \
|
---|
87 | 0x689e4c62, 0x70bf, 0x4cf3, {0x88, 0xbb, 0x33, 0xb3, 0x18, 0x26, 0x86, 0x70} \
|
---|
88 | }
|
---|
89 |
|
---|
90 | extern EFI_GUID gEfiBlockIoCryptoAlgoAesCbcMsBitlockerGuid;
|
---|
91 |
|
---|
92 | typedef struct {
|
---|
93 | EFI_BLOCK_IO_CRYPTO_IV_INPUT Header;
|
---|
94 | UINT64 CryptoBlockByteOffset;
|
---|
95 | UINT64 CryptoBlockByteSize;
|
---|
96 | } EFI_BLOCK_IO_CRYPTO_IV_INPUT_AES_CBC_MICROSOFT_BITLOCKER;
|
---|
97 |
|
---|
98 | #define EFI_BLOCK_IO_CRYPTO_INDEX_ANY 0xFFFFFFFFFFFFFFFF
|
---|
99 |
|
---|
100 | typedef struct {
|
---|
101 | //
|
---|
102 | // Is inline cryptographic capability supported on this device.
|
---|
103 | //
|
---|
104 | BOOLEAN Supported;
|
---|
105 | //
|
---|
106 | // Maximum number of keys that can be configured at the same time.
|
---|
107 | //
|
---|
108 | UINT64 KeyCount;
|
---|
109 | //
|
---|
110 | // Number of supported capabilities.
|
---|
111 | //
|
---|
112 | UINT64 CapabilityCount;
|
---|
113 | //
|
---|
114 | // Array of supported capabilities.
|
---|
115 | //
|
---|
116 | EFI_BLOCK_IO_CRYPTO_CAPABILITY Capabilities[1];
|
---|
117 | } EFI_BLOCK_IO_CRYPTO_CAPABILITIES;
|
---|
118 |
|
---|
119 | typedef struct {
|
---|
120 | //
|
---|
121 | // Configuration table index. A special Index EFI_BLOCK_IO_CRYPTO_INDEX_ANY can be
|
---|
122 | // used to set any available entry in the configuration table.
|
---|
123 | //
|
---|
124 | UINT64 Index;
|
---|
125 | //
|
---|
126 | // Identifies the owner of the configuration table entry. Entry can also be used
|
---|
127 | // with the Nil value to clear key from the configuration table index.
|
---|
128 | //
|
---|
129 | EFI_GUID KeyOwnerGuid;
|
---|
130 | //
|
---|
131 | // A supported capability to be used. The CryptoBlockSizeBitMask field of the
|
---|
132 | // structure should have only one bit set from the supported mask.
|
---|
133 | //
|
---|
134 | EFI_BLOCK_IO_CRYPTO_CAPABILITY Capability;
|
---|
135 | //
|
---|
136 | // Pointer to the key. The size of the key is defined by the KeySize field of
|
---|
137 | // the capability specified by the Capability parameter.
|
---|
138 | //
|
---|
139 | VOID *CryptoKey;
|
---|
140 | } EFI_BLOCK_IO_CRYPTO_CONFIGURATION_TABLE_ENTRY;
|
---|
141 |
|
---|
142 | typedef struct {
|
---|
143 | //
|
---|
144 | // Configuration table index.
|
---|
145 | //
|
---|
146 | UINT64 Index;
|
---|
147 | //
|
---|
148 | // Identifies the current owner of the entry.
|
---|
149 | //
|
---|
150 | EFI_GUID KeyOwnerGuid;
|
---|
151 | //
|
---|
152 | // The capability to be used. The CryptoBlockSizeBitMask field of the structure
|
---|
153 | // has only one bit set from the supported mask.
|
---|
154 | //
|
---|
155 | EFI_BLOCK_IO_CRYPTO_CAPABILITY Capability;
|
---|
156 | } EFI_BLOCK_IO_CRYPTO_RESPONSE_CONFIGURATION_ENTRY;
|
---|
157 |
|
---|
158 | /**
|
---|
159 | Reset the block device hardware.
|
---|
160 |
|
---|
161 | The Reset() function resets the block device hardware.
|
---|
162 |
|
---|
163 | As part of the initialization process, the firmware/device will make a quick but
|
---|
164 | reasonable attempt to verify that the device is functioning.
|
---|
165 |
|
---|
166 | If the ExtendedVerificationflag is TRUE the firmware may take an extended amount
|
---|
167 | of time to verify the device is operating on reset. Otherwise the reset operation
|
---|
168 | is to occur as quickly as possible.
|
---|
169 |
|
---|
170 | The hardware verification process is not defined by this specification and is left
|
---|
171 | up to the platform firmware or driver to implement.
|
---|
172 |
|
---|
173 | @param[in] This Pointer to the EFI_BLOCK_IO_CRYPTO_PROTOCOL instance.
|
---|
174 | @param[in] ExtendedVerification Indicates that the driver may perform a more exhausive
|
---|
175 | verification operation of the device during reset.
|
---|
176 |
|
---|
177 | @retval EFI_SUCCESS The block device was reset.
|
---|
178 | @retval EFI_DEVICE_ERROR The block device is not functioning correctly and could
|
---|
179 | not be reset.
|
---|
180 | @retval EFI_INVALID_PARAMETER This is NULL.
|
---|
181 |
|
---|
182 | **/
|
---|
183 | typedef
|
---|
184 | EFI_STATUS
|
---|
185 | (EFIAPI *EFI_BLOCK_IO_CRYPTO_RESET) (
|
---|
186 | IN EFI_BLOCK_IO_CRYPTO_PROTOCOL *This,
|
---|
187 | IN BOOLEAN ExtendedVerification
|
---|
188 | );
|
---|
189 |
|
---|
190 | /**
|
---|
191 | Get the capabilities of the underlying inline cryptographic interface.
|
---|
192 |
|
---|
193 | The GetCapabilities() function determines whether pre-OS controllable inline crypto
|
---|
194 | is supported by the system for the current disk and, if so, returns the capabilities
|
---|
195 | of the crypto engine.
|
---|
196 |
|
---|
197 | The caller is responsible for providing the Capabilities structure with a sufficient
|
---|
198 | number of entries.
|
---|
199 |
|
---|
200 | If the structure is too small, the EFI_BUFFER_TOO_SMALL error code is returned and the
|
---|
201 | CapabilityCount field contains the number of entries needed to contain the capabilities.
|
---|
202 |
|
---|
203 | @param[in] This Pointer to the EFI_BLOCK_IO_CRYPTO_PROTOCOL instance.
|
---|
204 | @param[out] Capabilities Pointer to the EFI_BLOCK_IO_CRYPTO_CAPABILITIES structure.
|
---|
205 |
|
---|
206 | @retval EFI_SUCCESS The ICI is ready for use.
|
---|
207 | @retval EFI_BUFFER_TOO_SMALL The Capabilities structure was too small. The number of
|
---|
208 | entries needed is returned in the CapabilityCount field
|
---|
209 | of the structure.
|
---|
210 | @retval EFI_NO_RESPONSE No response was received from the ICI.
|
---|
211 | @retval EFI_DEVICE_ERROR An error occurred when attempting to access the ICI.
|
---|
212 | @retval EFI_INVALID_PARAMETER This is NULL.
|
---|
213 | @retval EFI_INVALID_PARAMETER Capabilities is NULL.
|
---|
214 |
|
---|
215 | **/
|
---|
216 | typedef
|
---|
217 | EFI_STATUS
|
---|
218 | (EFIAPI *EFI_BLOCK_IO_CRYPTO_GET_CAPABILITIES) (
|
---|
219 | IN EFI_BLOCK_IO_CRYPTO_PROTOCOL *This,
|
---|
220 | OUT EFI_BLOCK_IO_CRYPTO_CAPABILITIES *Capabilities
|
---|
221 | );
|
---|
222 |
|
---|
223 | /**
|
---|
224 | Set the configuration of the underlying inline cryptographic interface.
|
---|
225 |
|
---|
226 | The SetConfiguration() function allows the user to set the current configuration of the
|
---|
227 | inline cryptographic interface and should be called before attempting any crypto operations.
|
---|
228 |
|
---|
229 | This configures the configuration table entries with algorithms, key sizes and keys. Each
|
---|
230 | configured entry can later be referred to by index at the time of storage transaction.
|
---|
231 |
|
---|
232 | The configuration table index will refer to the combination ofKeyOwnerGuid, Algorithm, and
|
---|
233 | CryptoKey.
|
---|
234 |
|
---|
235 | KeyOwnerGuid identifies the component taking ownership of the entry. It helps components to
|
---|
236 | identify their own entries, cooperate with other owner components, and avoid conflicts. This
|
---|
237 | Guid identifier is there to help coordination between cooperating components and not a security
|
---|
238 | or synchronization feature. The Nil GUID can be used by a component to release use of entry
|
---|
239 | owned. It is also used to identify potentially available entries (see GetConfiguration).
|
---|
240 |
|
---|
241 | CryptoKey specifies algorithm-specific key material to use within parameters of selected crypto
|
---|
242 | capability.
|
---|
243 |
|
---|
244 | This function is called infrequently typically once, on device start, before IO starts. It
|
---|
245 | can be called at later times in cases the number of keysused on the drive is higher than what
|
---|
246 | can be configured at a time or a new key has to be added.
|
---|
247 |
|
---|
248 | Components setting or changing an entry or entries for a given index or indices must ensure
|
---|
249 | that IO referencing affected indices is temporarily blocked (run-down) at the time of change.
|
---|
250 |
|
---|
251 | Indices parameters in each parameter table entry allow to set only a portion of the available
|
---|
252 | table entries in the crypto module anywhere from single entry to entire table supported.
|
---|
253 |
|
---|
254 | If corresponding table entry or entries being set are already in use by another owner the call
|
---|
255 | should be failed and none of the entries should be modified. The interface implementation must
|
---|
256 | enforce atomicity of this operation (should either succeed fully or fail completely without
|
---|
257 | modifying state).
|
---|
258 |
|
---|
259 | Note that components using GetConfiguration command to discover available entries should be
|
---|
260 | prepared that by the time of calling SetConfiguration the previously available entry may have
|
---|
261 | become occupied. Such components should be prepared to re-try the sequence of operations.
|
---|
262 |
|
---|
263 | Alternatively EFI_BLOCK_IO_CRYPTO_INDEX_ANY can be used to have the implementation discover
|
---|
264 | and allocate available,if any, indices atomically.
|
---|
265 |
|
---|
266 | An optional ResultingTable pointer can be provided by the caller to receive the newly configured
|
---|
267 | entries. The array provided by the caller must have at least ConfigurationCount of entries.
|
---|
268 |
|
---|
269 | @param[in] This Pointer to the EFI_BLOCK_IO_CRYPTO_PROTOCOL instance.
|
---|
270 | @param[in] ConfigurationCount Number of entries being configured with this call.
|
---|
271 | @param[in] ConfigurationTable Pointer to a table used to populate the configuration table.
|
---|
272 | @param[out] ResultingTable Optional pointer to a table that receives the newly configured
|
---|
273 | entries.
|
---|
274 |
|
---|
275 | @retval EFI_SUCCESS The ICI is ready for use.
|
---|
276 | @retval EFI_NO_RESPONSE No response was received from the ICI.
|
---|
277 | @retval EFI_DEVICE_ERROR An error occurred when attempting to access the ICI.
|
---|
278 | @retval EFI_INVALID_PARAMETER This is NULL.
|
---|
279 | @retval EFI_INVALID_PARAMETER ConfigurationTable is NULL.
|
---|
280 | @retval EFI_INVALID_PARAMETER ConfigurationCount is 0.
|
---|
281 | @retval EFI_OUT_OF_RESOURCES Could not find the requested number of available entries in the
|
---|
282 | configuration table.
|
---|
283 |
|
---|
284 | **/
|
---|
285 | typedef
|
---|
286 | EFI_STATUS
|
---|
287 | (EFIAPI *EFI_BLOCK_IO_CRYPTO_SET_CONFIGURATION) (
|
---|
288 | IN EFI_BLOCK_IO_CRYPTO_PROTOCOL *This,
|
---|
289 | IN UINT64 ConfigurationCount,
|
---|
290 | IN EFI_BLOCK_IO_CRYPTO_CONFIGURATION_TABLE_ENTRY *ConfigurationTable,
|
---|
291 | OUT EFI_BLOCK_IO_CRYPTO_RESPONSE_CONFIGURATION_ENTRY *ResultingTable OPTIONAL
|
---|
292 | );
|
---|
293 |
|
---|
294 | /**
|
---|
295 | Get the configuration of the underlying inline cryptographic interface.
|
---|
296 |
|
---|
297 | The GetConfiguration() function allows the user to get the configuration of the inline
|
---|
298 | cryptographic interface.
|
---|
299 |
|
---|
300 | Retrieves, entirely or partially, the currently configured key table. Note that the keys
|
---|
301 | themselves are not retrieved, but rather just indices, owner GUIDs and capabilities.
|
---|
302 |
|
---|
303 | If fewer entries than specified by ConfigurationCount are returned, the Index field of the
|
---|
304 | unused entries is set to EFI_BLOCK_IO_CRYPTO_INDEX_ANY.
|
---|
305 |
|
---|
306 | @param[in] This Pointer to the EFI_BLOCK_IO_CRYPTO_PROTOCOL instance.
|
---|
307 | @param[in] StartIndex Configuration table index at which to start the configuration
|
---|
308 | query.
|
---|
309 | @param[in] ConfigurationCount Number of entries to return in the response table.
|
---|
310 | @param[in] KeyOwnerGuid Optional parameter to filter response down to entries with a
|
---|
311 | given owner. A pointer to the Nil value can be used to return
|
---|
312 | available entries. Set to NULL when no owner filtering is required.
|
---|
313 | @param[out] ConfigurationTable Table of configured configuration table entries (with no CryptoKey
|
---|
314 | returned): configuration table index, KeyOwnerGuid, Capability.
|
---|
315 | Should have sufficient space to store up to ConfigurationCount
|
---|
316 | entries.
|
---|
317 |
|
---|
318 | @retval EFI_SUCCESS The ICI is ready for use.
|
---|
319 | @retval EFI_NO_RESPONSE No response was received from the ICI.
|
---|
320 | @retval EFI_DEVICE_ERROR An error occurred when attempting to access the ICI.
|
---|
321 | @retval EFI_INVALID_PARAMETER This is NULL.
|
---|
322 | @retval EFI_INVALID_PARAMETER Configuration table is NULL.
|
---|
323 | @retval EFI_INVALID_PARAMETER StartIndex is out of bounds.
|
---|
324 |
|
---|
325 | **/
|
---|
326 | typedef
|
---|
327 | EFI_STATUS
|
---|
328 | (EFIAPI *EFI_BLOCK_IO_CRYPTO_GET_CONFIGURATION) (
|
---|
329 | IN EFI_BLOCK_IO_CRYPTO_PROTOCOL *This,
|
---|
330 | IN UINT64 StartIndex,
|
---|
331 | IN UINT64 ConfigurationCount,
|
---|
332 | IN EFI_GUID *KeyOwnerGuid OPTIONAL,
|
---|
333 | OUT EFI_BLOCK_IO_CRYPTO_RESPONSE_CONFIGURATION_ENTRY *ConfigurationTable
|
---|
334 | );
|
---|
335 |
|
---|
336 | /**
|
---|
337 | Reads the requested number of blocks from the device and optionally decrypts
|
---|
338 | them inline.
|
---|
339 |
|
---|
340 | TheReadExtended() function allows the caller to perform a storage device read
|
---|
341 | operation. The function reads the requested number of blocks from the device
|
---|
342 | and then if Index is specified decrypts them inline. All the blocks are read
|
---|
343 | and decrypted (if decryption requested), or an error is returned.
|
---|
344 |
|
---|
345 | If there is no media in the device, the function returns EFI_NO_MEDIA. If the
|
---|
346 | MediaId is not the ID for the current media in the device, the function returns
|
---|
347 | EFI_MEDIA_CHANGED.
|
---|
348 |
|
---|
349 | If EFI_DEVICE_ERROR, EFI_NO_MEDIA, or EFI_MEDIA_CHANGED is returned and nonblocking
|
---|
350 | I/O is being used, the Event associated with this request will not be signaled.
|
---|
351 |
|
---|
352 | In addition to standard storage transaction parameters (LBA, IO size, and buffer),
|
---|
353 | this command will also specify a configuration table Index and CryptoIvInput
|
---|
354 | when data has to be decrypted inline by the controller after being read from
|
---|
355 | the storage device. If an Index parameter is not specified, no decryption is
|
---|
356 | performed.
|
---|
357 |
|
---|
358 | @param[in] This Pointer to the EFI_BLOCK_IO_CRYPTO_PROTOCOL instance.
|
---|
359 | @param[in] MediaId The media ID that the read request is for.
|
---|
360 | @param[in] LBA The starting logical block address to read from on
|
---|
361 | the device.
|
---|
362 | @param[in, out] Token A pointer to the token associated with the transaction.
|
---|
363 | @param[in] BufferSize The size of the Buffer in bytes. This must be a multiple
|
---|
364 | of the intrinsic block size of the device.
|
---|
365 | @param[out] Buffer A pointer to the destination buffer for the data. The
|
---|
366 | caller is responsible for either having implicit or
|
---|
367 | explicit ownership of the buffer.
|
---|
368 | @param[in] Index A pointer to the configuration table index. This is
|
---|
369 | optional.
|
---|
370 | @param[in] CryptoIvInput A pointer to a buffer that contains additional
|
---|
371 | cryptographic parameters as required by the capability
|
---|
372 | referenced by the configuration table index, such as
|
---|
373 | cryptographic initialization vector.
|
---|
374 |
|
---|
375 | @retval EFI_SUCCESS The read request was queued if Token-> Event is not NULL.
|
---|
376 | The data was read correctly from the device if the
|
---|
377 | Token->Event is NULL.
|
---|
378 | @retval EFI_DEVICE_ERROR The device reported an error while attempting to perform
|
---|
379 | the read operation and/or decryption operation.
|
---|
380 | @retval EFI_NO_MEDIA There is no media in the device.
|
---|
381 | @retval EFI_MEDIA_CHANGED The MediaId is not for the current media.
|
---|
382 | @retval EFI_BAD_BUFFER_SIZE The BufferSize parameter is not a multiple of the intrinsic
|
---|
383 | block size of the device.
|
---|
384 | @retval EFI_INVALID_PARAMETER This is NULL, or the read request contains LBAs that are
|
---|
385 | not valid, or the buffer is not on proper alignment.
|
---|
386 | @retval EFI_INVALID_PARAMETER CryptoIvInput is incorrect.
|
---|
387 | @retval EFI_OUT_OF_RESOURCES The request could not be completed due to a lack of
|
---|
388 | resources.
|
---|
389 |
|
---|
390 | **/
|
---|
391 | typedef
|
---|
392 | EFI_STATUS
|
---|
393 | (EFIAPI *EFI_BLOCK_IO_CRYPTO_READ_EXTENDED) (
|
---|
394 | IN EFI_BLOCK_IO_CRYPTO_PROTOCOL *This,
|
---|
395 | IN UINT32 MediaId,
|
---|
396 | IN EFI_LBA LBA,
|
---|
397 | IN OUT EFI_BLOCK_IO_CRYPTO_TOKEN *Token,
|
---|
398 | IN UINT64 BufferSize,
|
---|
399 | OUT VOID *Buffer,
|
---|
400 | IN UINT64 *Index OPTIONAL,
|
---|
401 | IN VOID *CryptoIvInput OPTIONAL
|
---|
402 | );
|
---|
403 |
|
---|
404 | /**
|
---|
405 | Optionally encrypts a specified number of blocks inline and then writes to the
|
---|
406 | device.
|
---|
407 |
|
---|
408 | The WriteExtended() function allows the caller to perform a storage device write
|
---|
409 | operation. The function encrypts the requested number of blocks inline if Index
|
---|
410 | is specified and then writes them to the device. All the blocks are encrypted
|
---|
411 | (if encryption requested) and written, or an error is returned.
|
---|
412 |
|
---|
413 | If there is no media in the device, the function returns EFI_NO_MEDIA. If the
|
---|
414 | MediaId is not the ID for the current media in the device, the function returns
|
---|
415 | EFI_MEDIA_CHANGED.
|
---|
416 |
|
---|
417 | If EFI_DEVICE_ERROR, EFI_NO_MEDIA, or EFI_MEDIA_CHANGED is returned and nonblocking
|
---|
418 | I/O is being used, the Event associated with this request will not be signaled.
|
---|
419 |
|
---|
420 | In addition to standard storage transaction parameters (LBA, IO size, and buffer),
|
---|
421 | this command will also specify a configuration table Index and a CryptoIvInput
|
---|
422 | when data has to be decrypted inline by the controller before being written to
|
---|
423 | the storage device. If no Index parameter is specified, no encryption is performed.
|
---|
424 |
|
---|
425 | @param[in] This Pointer to the EFI_BLOCK_IO_CRYPTO_PROTOCOL instance.
|
---|
426 | @param[in] MediaId The media ID that the read request is for.
|
---|
427 | @param[in] LBA The starting logical block address to read from on
|
---|
428 | the device.
|
---|
429 | @param[in, out] Token A pointer to the token associated with the transaction.
|
---|
430 | @param[in] BufferSize The size of the Buffer in bytes. This must be a multiple
|
---|
431 | of the intrinsic block size of the device.
|
---|
432 | @param[in] Buffer A pointer to the source buffer for the data.
|
---|
433 | @param[in] Index A pointer to the configuration table index. This is
|
---|
434 | optional.
|
---|
435 | @param[in] CryptoIvInput A pointer to a buffer that contains additional
|
---|
436 | cryptographic parameters as required by the capability
|
---|
437 | referenced by the configuration table index, such as
|
---|
438 | cryptographic initialization vector.
|
---|
439 |
|
---|
440 | @retval EFI_SUCCESS The request to encrypt (optionally) and write was queued
|
---|
441 | if Event is not NULL. The data was encrypted (optionally)
|
---|
442 | and written correctly to the device if the Event is NULL.
|
---|
443 | @retval EFI_WRITE_PROTECTED The device cannot be written to.
|
---|
444 | @retval EFI_NO_MEDIA There is no media in the device.
|
---|
445 | @retval EFI_MEDIA_CHANGED The MediaId is not for the current media.
|
---|
446 | @retval EFI_DEVICE_ERROR The device reported an error while attempting to encrypt
|
---|
447 | blocks or to perform the write operation.
|
---|
448 | @retval EFI_BAD_BUFFER_SIZE The BufferSize parameter is not a multiple of the intrinsic
|
---|
449 | block size of the device.
|
---|
450 | @retval EFI_INVALID_PARAMETER This is NULL, or the write request contains LBAs that are
|
---|
451 | not valid, or the buffer is not on proper alignment.
|
---|
452 | @retval EFI_INVALID_PARAMETER CryptoIvInput is incorrect.
|
---|
453 | @retval EFI_OUT_OF_RESOURCES The request could not be completed due to a lack of
|
---|
454 | resources.
|
---|
455 |
|
---|
456 | **/
|
---|
457 | typedef
|
---|
458 | EFI_STATUS
|
---|
459 | (EFIAPI *EFI_BLOCK_IO_CRYPTO_WRITE_EXTENDED) (
|
---|
460 | IN EFI_BLOCK_IO_CRYPTO_PROTOCOL *This,
|
---|
461 | IN UINT32 MediaId,
|
---|
462 | IN EFI_LBA LBA,
|
---|
463 | IN OUT EFI_BLOCK_IO_CRYPTO_TOKEN *Token,
|
---|
464 | IN UINT64 BufferSize,
|
---|
465 | IN VOID *Buffer,
|
---|
466 | IN UINT64 *Index OPTIONAL,
|
---|
467 | IN VOID *CryptoIvInput OPTIONAL
|
---|
468 | );
|
---|
469 |
|
---|
470 | /**
|
---|
471 | Flushes all modified data toa physical block device.
|
---|
472 |
|
---|
473 | The FlushBlocks() function flushes all modified data to the physical block device.
|
---|
474 | Any modified data that has to be encrypted must have been already encrypted as a
|
---|
475 | part of WriteExtended() operation - inline crypto operation cannot be a part of
|
---|
476 | flush operation.
|
---|
477 |
|
---|
478 | All data written to the device prior to the flush must be physically written before
|
---|
479 | returning EFI_SUCCESS from this function. This would include any cached data the
|
---|
480 | driver may have cached, and cached data the device may have cached. A flush may
|
---|
481 | cause a read request following the flush to force a device access.
|
---|
482 |
|
---|
483 | If EFI_DEVICE_ERROR, EFI_NO_MEDIA, EFI_WRITE_PROTECTED or EFI_MEDIA_CHANGED is
|
---|
484 | returned and non-blocking I/O is being used, the Event associated with this request
|
---|
485 | will not be signaled.
|
---|
486 |
|
---|
487 | @param[in] This Pointer to the EFI_BLOCK_IO_CRYPTO_PROTOCOL instance.
|
---|
488 | @param[in, out] Token A pointer to the token associated with the transaction.
|
---|
489 |
|
---|
490 | @retval EFI_SUCCESS The flush request was queued if Event is not NULL. All
|
---|
491 | outstanding data was written correctly to the device if
|
---|
492 | the Event is NULL.
|
---|
493 | @retval EFI_DEVICE_ERROR The device reported an error while attempting to write data.
|
---|
494 | @retval EFI_WRITE_PROTECTED The device cannot be written to.
|
---|
495 | @retval EFI_NO_MEDIA There is no media in the device.
|
---|
496 | @retval EFI_MEDIA_CHANGED The MediaId is not for the current media.
|
---|
497 | @retval EFI_INVALID_PARAMETER This is NULL.
|
---|
498 | @retval EFI_OUT_OF_RESOURCES The request could not be completed due to a lack of
|
---|
499 | resources.
|
---|
500 |
|
---|
501 | **/
|
---|
502 | typedef
|
---|
503 | EFI_STATUS
|
---|
504 | (EFIAPI *EFI_BLOCK_IO_CRYPTO_FLUSH) (
|
---|
505 | IN EFI_BLOCK_IO_CRYPTO_PROTOCOL *This,
|
---|
506 | IN OUT EFI_BLOCK_IO_CRYPTO_TOKEN *Token
|
---|
507 | );
|
---|
508 |
|
---|
509 | ///
|
---|
510 | /// The EFI_BLOCK_IO_CRYPTO_PROTOCOL defines a UEFI protocol that can be used by UEFI
|
---|
511 | /// drivers and applications to perform block encryption on a storage device, such as UFS.
|
---|
512 | ///
|
---|
513 | struct _EFI_BLOCK_IO_CRYPTO_PROTOCOL {
|
---|
514 | EFI_BLOCK_IO_MEDIA *Media;
|
---|
515 | EFI_BLOCK_IO_CRYPTO_RESET Reset;
|
---|
516 | EFI_BLOCK_IO_CRYPTO_GET_CAPABILITIES GetCapabilities;
|
---|
517 | EFI_BLOCK_IO_CRYPTO_SET_CONFIGURATION SetConfiguration;
|
---|
518 | EFI_BLOCK_IO_CRYPTO_GET_CONFIGURATION GetConfiguration;
|
---|
519 | EFI_BLOCK_IO_CRYPTO_READ_EXTENDED ReadExtended;
|
---|
520 | EFI_BLOCK_IO_CRYPTO_WRITE_EXTENDED WriteExtended;
|
---|
521 | EFI_BLOCK_IO_CRYPTO_FLUSH FlushBlocks;
|
---|
522 | };
|
---|
523 |
|
---|
524 | extern EFI_GUID gEfiBlockIoCryptoProtocolGuid;
|
---|
525 |
|
---|
526 | #endif
|
---|
527 |
|
---|