| 19b1ce2b | 10-Nov-2022 |
Jens Wiklander <jens.wiklander@linaro.org> |
core: ree_fs: check ta size before use
Check that the total loaded size of a TA matches what is in the sign header. This prevents an eventual attacker from providing arbitrary values in the img_size
core: ree_fs: check ta size before use
Check that the total loaded size of a TA matches what is in the sign header. This prevents an eventual attacker from providing arbitrary values in the img_size field of the signed header.
Reviewed-by: Etienne Carriere <etienne.carriere@linaro.org> Suggested-by: Asaf Modelevsky <amodele@amazon.com> Reported-by: Asaf Modelevsky <amodele@amazon.com> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| e41e74a8 | 10-Nov-2022 |
Jorge Ramirez-Ortiz <jorge@foundries.io> |
crypto: se050: provision SCP03 keys on SCP03 enablement.
Rotate the SCP03 keys as soon as the SCP03 communication channel is established.
This can happen during boot or at a later time via normal w
crypto: se050: provision SCP03 keys on SCP03 enablement.
Rotate the SCP03 keys as soon as the SCP03 communication channel is established.
This can happen during boot or at a later time via normal world request [1].
The rotation configuration that can be built-in in the driver allows the algorithm to rotate to a HUK based secret key or back to the factory based keys.
[1] https://u-boot.readthedocs.io/en/latest/usage/cmd/scp03.html
Signed-off-by: Jorge Ramirez-Ortiz <jorge@foundries.io> Acked-by: Jerome Forissier <jerome.forissier@linaro.org> Acked-by: Etienne Carriere <etienne.carriere@linaro.org>
show more ...
|
| d5050d09 | 10-Nov-2022 |
Jorge Ramirez-Ortiz <jorge@foundries.io> |
crypto: se050: reword configuration options
Reword and add caution clauses to some of the critical configuration options in the driver.
Signed-off-by: Jorge Ramirez-Ortiz <jorge@foundries.io> Acked
crypto: se050: reword configuration options
Reword and add caution clauses to some of the critical configuration options in the driver.
Signed-off-by: Jorge Ramirez-Ortiz <jorge@foundries.io> Acked-by: Jerome Forissier <jerome.forissier@linaro.org> Acked-by: Etienne Carriere <etienne.carriere@linaro.org>
show more ...
|
| c89e397c | 10-Nov-2022 |
Nasreddine Ouldei Tebina <tebina1@live.fr> |
plat-zynqmp: add ZCU104 and ZCU106 flavour support
Adding support for the ZCU104 and ZCU106 boards since they possess the same core as the ZCU102. This is to avoid having the "flavour not supported
plat-zynqmp: add ZCU104 and ZCU106 flavour support
Adding support for the ZCU104 and ZCU106 boards since they possess the same core as the ZCU102. This is to avoid having the "flavour not supported error" when compiling for the ZCU104 and ZCU106.
Tested successfully on the ZCU106
Tested-by: Nasreddine Ouldei Tebina <tebina1@live.fr> Signed-off-by: Nasreddine Ouldei Tebina <tebina1@live.fr> Acked-by: Jerome Forissier <jerome.forissier@linaro.org> Acked-by: Ricardo Salveti <ricardo@foundries.io>
show more ...
|
| 3241779b | 09-Nov-2022 |
Jens Wiklander <jens.wiklander@linaro.org> |
core: fix potential integer overflow in syscall_log()
Fixes a potential integer overflow in syscall_log(). Note that an eventual overflow would still be caught by copy_from_user(), but it's preferab
core: fix potential integer overflow in syscall_log()
Fixes a potential integer overflow in syscall_log(). Note that an eventual overflow would still be caught by copy_from_user(), but it's preferable to catch this earlier.
Reviewed-by: Etienne Carriere <etienne.carriere@linaro.org> Suggested-by: Asaf Modelevsky <amodele@amazon.com> Reported-by: Asaf Modelevsky <amodele@amazon.com> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 8236cf30 | 26-Oct-2022 |
Etienne Carriere <etienne.carriere@linaro.org> |
MAINTAINERS: add stm32 drivers entries
Adds stm32 platforms drivers maintainer.
Acked-by: Jens Wiklander <jens.wiklander@linaro.org> Signed-off-by: Etienne Carriere <etienne.carriere@linaro.org> |
| f82e8501 | 21-Oct-2022 |
Etienne Carriere <etienne.carriere@linaro.org> |
plat-stm32mp1: helper config CFG_STM32MP15_HUK_OTP_BASE
Adds helper configuration switch CFG_STM32MP15_HUK_OTP_BASE to define the OTP base index where HUK storage that occupies the 4 32bit contiguou
plat-stm32mp1: helper config CFG_STM32MP15_HUK_OTP_BASE
Adds helper configuration switch CFG_STM32MP15_HUK_OTP_BASE to define the OTP base index where HUK storage that occupies the 4 32bit contiguous BSEC words.
Acked-by: Jens Wiklander <jens.wiklander@linaro.org> Signed-off-by: Etienne Carriere <etienne.carriere@linaro.org>
show more ...
|
| a833cb74 | 21-Oct-2022 |
Etienne Carriere <etienne.carriere@linaro.org> |
drivers: stm32mp15_huk: default to fuse key without derivation
Introduces 2 configuration switches for defining how stm32mp15 HUK is generated from fuses. Both are exclusive. One of them must be set
drivers: stm32mp15_huk: default to fuse key without derivation
Introduces 2 configuration switches for defining how stm32mp15 HUK is generated from fuses. Both are exclusive. One of them must be set when CFG_STM32MP15_HUK is enable.
When CFG_STM32MP15_HUK_BSEC_KEY is enabled, HUK is HUK fuses raw content. When CFG_STM32MP15_HUK_BSEC_DERIVE_UID is enabled, HUK is the derivation of HUK fuses content derived with device UID fuses content.
The platform default enables CFG_STM32MP15_HUK_BSEC_KEY when CFG_STM32MP15_HUK is enable.
Acked-by: Jens Wiklander <jens.wiklander@linaro.org> Signed-off-by: Etienne Carriere <etienne.carriere@linaro.org>
show more ...
|
| 5ddb11a1 | 04-Nov-2022 |
Jorge Ramirez-Ortiz <jorge@foundries.io> |
crypto: se050: provision SCP03 keys back factory keys
This commit allows a user who might have rotated the device's SCP03 keys to reset them back to their factory settings (public).
Signed-off-by:
crypto: se050: provision SCP03 keys back factory keys
This commit allows a user who might have rotated the device's SCP03 keys to reset them back to their factory settings (public).
Signed-off-by: Jorge Ramirez-Ortiz <jorge@foundries.io> Acked-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| b54b17ab | 04-Nov-2022 |
Jorge Ramirez-Ortiz <jorge@foundries.io> |
crypto: se050: output the SCP03 security level to the console
The SCP03 keys used in the secure channel have different levels of security that can change at runtime.
Output the name of the one bein
crypto: se050: output the SCP03 security level to the console
The SCP03 keys used in the secure channel have different levels of security that can change at runtime.
Output the name of the one being used to the console for informational purposes.
Signed-off-by: Jorge Ramirez-Ortiz <jorge@foundries.io> Acked-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 884f2f1a | 21-Mar-2022 |
Olivier Moysan <olivier.moysan@foss.st.com> |
core: dt: allow null value in reg property
This change allows reg property to have value 0. The reg property can be used to describe an element that is not a physical address and for which 0 is a va
core: dt: allow null value in reg property
This change allows reg property to have value 0. The reg property can be used to describe an element that is not a physical address and for which 0 is a valid value.
Signed-off-by: Olivier Moysan <olivier.moysan@foss.st.com> Signed-off-by: Gatien Chevallier <gatien.chevallier@foss.st.com> Reviewed-by: Jerome Forissier <jerome.forissier@linaro.org>
show more ...
|
| 1ca4e47b | 03-Nov-2022 |
Xiaoxu Zeng <zengxiaoxu@huawei.com> |
MAINTAINERS: support HiSilicon D06
Add maintainer for HiSilicon D06.
Signed-off-by: Xiaoxu Zeng <zengxiaoxu@huawei.com> Acked-by: Jerome Forissier <jerome.forissier@linaro.org> |
| d7205770 | 31-Oct-2022 |
Xiaoxu Zeng <zengxiaoxu@huawei.com> |
core: Add support for Hisilicon D06 (PLATFORM=d06)
D06 is a server-class development board equipped with a Hisilicon Phosphor processor.
Signed-off-by: Xiaoxu Zeng <zengxiaoxu@huawei.com> Acked-by:
core: Add support for Hisilicon D06 (PLATFORM=d06)
D06 is a server-class development board equipped with a Hisilicon Phosphor processor.
Signed-off-by: Xiaoxu Zeng <zengxiaoxu@huawei.com> Acked-by: Jerome Forissier <jerome.forissier@linaro.org> Acked-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| c34d0d91 | 05-Sep-2022 |
Jens Wiklander <jens.wiklander@linaro.org> |
core: support loading TAs signed with a subkey
Adds support to load TAs signed with subkey or a chain of subkeys. This allows delegation of TA signing without distributing the root key. TAs signed w
core: support loading TAs signed with a subkey
Adds support to load TAs signed with subkey or a chain of subkeys. This allows delegation of TA signing without distributing the root key. TAs signed with a subkey are confined to the UUID-V5 namespace of the subkey to avoid TA UUID clashes with different subkeys.
SHDR_SUBKEY is a type of header which enables chains of public keys. The public root key is used to verify the first public subkey, which then is used to verify the next public subkey and so on.
The TA is finally verified using the last subkey. All these headers are added in front of the TA binary so everything needed to verify the TA is available when it's loaded into memory.
For example: Subkey struct shdr magic: 0x4f545348 img_type: 3 (SHDR_SUBKEY) img_size: 320 bytes algo: 0x70414930 (TEE_ALG_RSASSA_PKCS1_PSS_MGF1_SHA256) hash_size: 32 bytes sig_size: 256 bytes hash: f573f329fe77be686ce71647909c4ea35b5e1cd7de86369bd7d9fca31f6a4d65 struct shdr_subkey uuid: f04fa996-148a-453c-b037-1dcfbad120a6 name_size: 64 subkey_version: 1 max_depth: 4 algo: 0x70414930 (TEE_ALG_RSASSA_PKCS1_PSS_MGF1_SHA256) attr_count: 2 next name: "mid_level_subkey" Next header at offset: 692 (0x2b4) Subkey struct shdr magic: 0x4f545348 img_type: 3 (SHDR_SUBKEY) img_size: 320 bytes algo: 0x70414930 (TEE_ALG_RSASSA_PKCS1_PSS_MGF1_SHA256) hash_size: 32 bytes sig_size: 256 bytes hash: 233a6dcf1a2cf69e50cde8e20c4129157da707c76fa86ce12ee31037edef02d7 struct shdr_subkey uuid: 1a5948c5-1aa0-518c-86f4-be6f6a057b16 name_size: 64 subkey_version: 1 max_depth: 3 algo: 0x70414930 (TEE_ALG_RSASSA_PKCS1_PSS_MGF1_SHA256) attr_count: 2 next name: "subkey1_ta" Next header at offset: 1384 (0x568) Bootstrap TA struct shdr magic: 0x4f545348 img_type: 1 (SHDR_BOOTSTRAP_TA) img_size: 84576 bytes algo: 0x70414930 (TEE_ALG_RSASSA_PKCS1_PSS_MGF1_SHA256) hash_size: 32 bytes sig_size: 256 bytes hash: ea31ac7dc2cc06a9dc2853cd791dd00f784b5edc062ecfa274deeb66589b4ca5 struct shdr_bootstrap_ta uuid: 5c206987-16a3-59cc-ab0f-64b9cfc9e758 ta_version: 0 TA offset: 1712 (0x6b0) bytes TA size: 84576 (0x14a60) bytes
Acked-by: Jerome Forissier <jerome.forissier@linaro.org> Tested-by: Jerome Forissier <jerome.forissier@linaro.org> (vexpress-qemu_virt) Acked-by: Etienne Carriere <etienne.carriere@linaro.org> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| ce20b8ec | 05-Sep-2022 |
Jens Wiklander <jens.wiklander@linaro.org> |
core: ree_fs: refactor check_update_version()
Refactors check_update_version() to support more than one version database.
Reviewed-by: Jerome Forissier <jerome.forissier@linaro.org> Acked-by: Etien
core: ree_fs: refactor check_update_version()
Refactors check_update_version() to support more than one version database.
Reviewed-by: Jerome Forissier <jerome.forissier@linaro.org> Acked-by: Etienne Carriere <etienne.carriere@linaro.org> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| ec1aa4fa | 05-Sep-2022 |
Jens Wiklander <jens.wiklander@linaro.org> |
core: add offset argument to shdr_alloc_and_copy()
Adds an offset argument to shdr_alloc_and_copy() to make it easier to copy a signed header located further into a non-secure buffer.
Reviewed-by:
core: add offset argument to shdr_alloc_and_copy()
Adds an offset argument to shdr_alloc_and_copy() to make it easier to copy a signed header located further into a non-secure buffer.
Reviewed-by: Jerome Forissier <jerome.forissier@linaro.org> Acked-by: Etienne Carriere <etienne.carriere@linaro.org> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 7512a644 | 26-Oct-2022 |
Jens Wiklander <jens.wiklander@linaro.org> |
sign_encrypt.py: rename to hash_size and sig_size
Renames digest_len to hash_size and sig_len to sig_size in order to match the names used in the corresponding C code.
Reviewed-by: Jerome Forissier
sign_encrypt.py: rename to hash_size and sig_size
Renames digest_len to hash_size and sig_len to sig_size in order to match the names used in the corresponding C code.
Reviewed-by: Jerome Forissier <jerome.forissier@linaro.org> Acked-by: Etienne Carriere <etienne.carriere@linaro.org> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| f04ff66a | 26-Oct-2022 |
Jens Wiklander <jens.wiklander@linaro.org> |
sign_encrypt.py: add subkey support
Adds support to sign TAs using a subkey. Two new commands are added to help with this: - sign-subkey: signs a new subkey using either the root key or the keys fro
sign_encrypt.py: add subkey support
Adds support to sign TAs using a subkey. Two new commands are added to help with this: - sign-subkey: signs a new subkey using either the root key or the keys from another subkey - subkey-uuid: calculate the UUID of next TA or subkey
Acked-by: Jerome Forissier <jerome.forissier@linaro.org> Acked-by: Etienne Carriere <etienne.carriere@linaro.org> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| f454988e | 06-Oct-2022 |
Jens Wiklander <jens.wiklander@linaro.org> |
sign_encrypt.py: add display command
Adds a display command to sign_encrypt.py doing what dump_ta_header.py used to do. Removes the now redundant script dump_ta_header.py.
Reviewed-by: Jerome Foris
sign_encrypt.py: add display command
Adds a display command to sign_encrypt.py doing what dump_ta_header.py used to do. Removes the now redundant script dump_ta_header.py.
Reviewed-by: Jerome Forissier <jerome.forissier@linaro.org> Acked-by: Etienne Carriere <etienne.carriere@linaro.org> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 3cf28238 | 06-Oct-2022 |
Jens Wiklander <jens.wiklander@linaro.org> |
sign_encrypt.py: add command func in argument parsing
While parsing the argument assign the function to handle the command for easier dispatching of the command.
Reviewed-by: Jerome Forissier <jero
sign_encrypt.py: add command func in argument parsing
While parsing the argument assign the function to handle the command for easier dispatching of the command.
Reviewed-by: Jerome Forissier <jerome.forissier@linaro.org> Acked-by: Etienne Carriere <etienne.carriere@linaro.org> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 49e93635 | 04-Oct-2022 |
Jens Wiklander <jens.wiklander@linaro.org> |
sign_encrypt.py: refactor with BinaryImage class
Moves manipulations of the TA binary into a BinaryImage class for some abstraction and better structure of the code for the different sub-commands.
sign_encrypt.py: refactor with BinaryImage class
Moves manipulations of the TA binary into a BinaryImage class for some abstraction and better structure of the code for the different sub-commands.
Acked-by: Jerome Forissier <jerome.forissier@linaro.org> Acked-by: Etienne Carriere <etienne.carriere@linaro.org> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| f182afc4 | 04-Oct-2022 |
Jens Wiklander <jens.wiklander@linaro.org> |
sign_encrypt.py: refactor argument parsing
Uses the add_subparsers() method from argparse.ArgumentParser to add the command instead of adding command and options at the same level. With this we have
sign_encrypt.py: refactor argument parsing
Uses the add_subparsers() method from argparse.ArgumentParser to add the command instead of adding command and options at the same level. With this we have one parser for each command to allow the argparse module to handle checks for optional and mandatory options. This makes the argument parsing a bit more modular and easier to extend.
Behavior of the script is supposed to be unchanged with the exception of printed help and errors since that now relies more on the argparse module.
Reviewed-by: Jerome Forissier <jerome.forissier@linaro.org> Acked-by: Etienne Carriere <etienne.carriere@linaro.org> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 5e153009 | 06-Oct-2022 |
Jens Wiklander <jens.wiklander@linaro.org> |
sign_encrypt.py: make logger global
Makes the logger variable global to avoid passing it to all functions that needs to log something.
Reviewed-by: Jerome Forissier <jerome.forissier@linaro.org> Ac
sign_encrypt.py: make logger global
Makes the logger variable global to avoid passing it to all functions that needs to log something.
Reviewed-by: Jerome Forissier <jerome.forissier@linaro.org> Acked-by: Etienne Carriere <etienne.carriere@linaro.org> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 25a36f4c | 08-Feb-2022 |
Vesa Jääskeläinen <vesa.jaaskelainen@vaisala.com> |
drivers: clk_dt: Switch to use get_secure_dt()
This adds support for both embedded and external secure device trees so that clock driver and system configuration information can be fetched from ther
drivers: clk_dt: Switch to use get_secure_dt()
This adds support for both embedded and external secure device trees so that clock driver and system configuration information can be fetched from there.
Signed-off-by: Vesa Jääskeläinen <vesa.jaaskelainen@vaisala.com> Reviewed-by: Etienne Carriere <etienne.carriere@linaro.org>
show more ...
|
| d2289450 | 24-Mar-2022 |
Vesa Jääskeläinen <vesa.jaaskelainen@vaisala.com> |
core: dt_driver: Add driver probing to use secure device tree
When secure external device tree is configured for use OP-TEE's drivers should be loaded based on its definitions. Add support to probe
core: dt_driver: Add driver probing to use secure device tree
When secure external device tree is configured for use OP-TEE's drivers should be loaded based on its definitions. Add support to probe drivers also with secure external device tree.
This allows common system device tree to be used to define devices for bootloaders and OP-TEE.
In any case if embedded device tree is defined this will take precedense.
Signed-off-by: Vesa Jääskeläinen <vesa.jaaskelainen@vaisala.com> Reviewed-by: Etienne Carriere <etienne.carriere@linaro.org>
show more ...
|