mirror of
https://github.com/trezor/trezor-firmware.git
synced 2024-12-19 21:08:07 +00:00
chore(core): add comments to secret.h functions
[no changelog]
This commit is contained in:
parent
8a18cfe0d4
commit
a873a7064e
@ -13,38 +13,72 @@
|
||||
#define SECRET_BHK_OFFSET (1024 * 8)
|
||||
#define SECRET_BHK_LEN 32
|
||||
|
||||
// Checks if bootloader is locked, that is the secret storage contains optiga
|
||||
// pairing secret on platforms where access to the secret storage cannot be
|
||||
// restricted for unofficial firmware
|
||||
secbool secret_bootloader_locked(void);
|
||||
|
||||
// Writes data to the secret storage
|
||||
void secret_write(const uint8_t* data, uint32_t offset, uint32_t len);
|
||||
|
||||
// Reads data from the secret storage
|
||||
secbool secret_read(uint8_t* data, uint32_t offset, uint32_t len);
|
||||
|
||||
// Checks if the secret storage has been wiped
|
||||
secbool secret_wiped(void);
|
||||
|
||||
// Verifies that the secret storage has correct header
|
||||
secbool secret_verify_header(void);
|
||||
|
||||
// Checks that the secret storage is initialized and initializes it if not
|
||||
secbool secret_ensure_initialized(void);
|
||||
|
||||
// Erases the entire secret storage
|
||||
void secret_erase(void);
|
||||
|
||||
// Disables access to the secret storage until next reset
|
||||
void secret_hide(void);
|
||||
|
||||
// Writes the secret header to the secret storage
|
||||
void secret_write_header(void);
|
||||
|
||||
// Writes optiga pairing secret to the secret storage
|
||||
// Encrypts the secret if encryption is available on the platform
|
||||
// Returns true if the secret was written successfully
|
||||
secbool secret_optiga_set(const uint8_t secret[SECRET_OPTIGA_KEY_LEN]);
|
||||
|
||||
// Reads optiga pairing secret
|
||||
// Decrypts the secret if encryption is available on the platform
|
||||
// Returns true if the secret was read successfully
|
||||
// Reading can fail if optiga is not paired, the pairing secret was not
|
||||
// provisioned to the firmware (by calling secret_optiga_backup), or the secret
|
||||
// was made unavailable by calling secret_optiga_hide
|
||||
secbool secret_optiga_get(uint8_t dest[SECRET_OPTIGA_KEY_LEN]);
|
||||
|
||||
// Backs up the optiga pairing secret from the secret storage to the backup
|
||||
// register
|
||||
void secret_optiga_backup(void);
|
||||
|
||||
// Deletes the optiga pairing secret from the register
|
||||
void secret_optiga_hide(void);
|
||||
|
||||
// Locks the BHK register. Once locked, the BHK register can't be accessed by
|
||||
// the software. BHK is made available to the SAES peripheral
|
||||
void secret_bhk_lock(void);
|
||||
|
||||
// Verifies that access to the register has been disabled
|
||||
secbool secret_bhk_locked(void);
|
||||
|
||||
// Regenerates the BHK and writes it to the secret storage
|
||||
void secret_bhk_regenerate(void);
|
||||
|
||||
// Provision the secret BHK from the secret storage to the BHK register
|
||||
// which makes the BHK usable for encryption by the firmware, without having
|
||||
// read access to it.
|
||||
void secret_bhk_provision(void);
|
||||
|
||||
// Checks that the optiga pairing secret is present in the secret storage.
|
||||
// This functions only works when software has access to the secret storage,
|
||||
// i.e. in bootloader. Access to secret storage is restricted by calling
|
||||
// secret_hide.
|
||||
secbool secret_optiga_present(void);
|
||||
|
Loading…
Reference in New Issue
Block a user