1fb7ef469SJerome Forissier // SPDX-License-Identifier: BSD-2-Clause 25baee69aSJens Wiklander /* 35baee69aSJens Wiklander * Copyright (c) 2017, Linaro Limited 45baee69aSJens Wiklander */ 55baee69aSJens Wiklander 613eb4e3cSJens Wiklander #include <assert.h> 75baee69aSJens Wiklander #include <bitstring.h> 85baee69aSJens Wiklander #include <crypto/crypto.h> 95baee69aSJens Wiklander #include <kernel/mutex.h> 105baee69aSJens Wiklander #include <kernel/thread.h> 1113eb4e3cSJens Wiklander #include <mm/mobj.h> 126009538cSJens Wiklander #include <optee_rpc_cmd.h> 1313eb4e3cSJens Wiklander #include <stdio.h> 145baee69aSJens Wiklander #include <string.h> 155baee69aSJens Wiklander #include <tee_api_defines_extensions.h> 165baee69aSJens Wiklander #include <tee/tadb.h> 175baee69aSJens Wiklander #include <tee/tee_fs.h> 185baee69aSJens Wiklander #include <tee/tee_fs_rpc.h> 195baee69aSJens Wiklander #include <tee/tee_pobj.h> 205baee69aSJens Wiklander #include <tee/tee_svc_storage.h> 215baee69aSJens Wiklander #include <utee_defines.h> 225baee69aSJens Wiklander 235baee69aSJens Wiklander #define TADB_MAX_BUFFER_SIZE (64U * 1024) 245baee69aSJens Wiklander 255baee69aSJens Wiklander #define TADB_AUTH_ENC_ALG TEE_ALG_AES_GCM 265baee69aSJens Wiklander #define TADB_IV_SIZE TEE_AES_BLOCK_SIZE 275baee69aSJens Wiklander #define TADB_TAG_SIZE TEE_AES_BLOCK_SIZE 285baee69aSJens Wiklander #define TADB_KEY_SIZE TEE_AES_MAX_KEY_SIZE 295baee69aSJens Wiklander 305baee69aSJens Wiklander struct tee_tadb_dir { 315baee69aSJens Wiklander const struct tee_file_operations *ops; 325baee69aSJens Wiklander struct tee_file_handle *fh; 335baee69aSJens Wiklander int nbits; 345baee69aSJens Wiklander bitstr_t *files; 355baee69aSJens Wiklander }; 365baee69aSJens Wiklander 372e42d8e7SJens Wiklander /* 382e42d8e7SJens Wiklander * struct tadb_entry - TA database entry 392e42d8e7SJens Wiklander * @prop: properties of TA 402e42d8e7SJens Wiklander * @file_number: encrypted TA is stored in <file_number>.ta 412e42d8e7SJens Wiklander * @iv: Initialization vector of the authentication crypto 422e42d8e7SJens Wiklander * @tag: Tag used to validate the authentication encrypted TA 432e42d8e7SJens Wiklander * @key: Key used to decrypt the TA 442e42d8e7SJens Wiklander */ 455baee69aSJens Wiklander struct tadb_entry { 465baee69aSJens Wiklander struct tee_tadb_property prop; 475baee69aSJens Wiklander uint32_t file_number; 485baee69aSJens Wiklander uint8_t iv[TADB_IV_SIZE]; 495baee69aSJens Wiklander uint8_t tag[TADB_TAG_SIZE]; 505baee69aSJens Wiklander uint8_t key[TADB_KEY_SIZE]; 515baee69aSJens Wiklander }; 525baee69aSJens Wiklander 535baee69aSJens Wiklander struct tadb_header { 545baee69aSJens Wiklander uint32_t opaque_len; 555baee69aSJens Wiklander uint8_t opaque[]; 565baee69aSJens Wiklander }; 575baee69aSJens Wiklander 585baee69aSJens Wiklander struct tee_tadb_ta_write { 595baee69aSJens Wiklander struct tee_tadb_dir *db; 605baee69aSJens Wiklander int fd; 615baee69aSJens Wiklander struct tadb_entry entry; 625baee69aSJens Wiklander size_t pos; 635baee69aSJens Wiklander void *ctx; 645baee69aSJens Wiklander }; 655baee69aSJens Wiklander 665baee69aSJens Wiklander struct tee_tadb_ta_read { 675baee69aSJens Wiklander struct tee_tadb_dir *db; 685baee69aSJens Wiklander int fd; 695baee69aSJens Wiklander struct tadb_entry entry; 705baee69aSJens Wiklander size_t pos; 715baee69aSJens Wiklander void *ctx; 725baee69aSJens Wiklander struct mobj *ta_mobj; 735baee69aSJens Wiklander uint8_t *ta_buf; 745baee69aSJens Wiklander }; 755baee69aSJens Wiklander 765baee69aSJens Wiklander static const char tadb_obj_id[] = "ta.db"; 775baee69aSJens Wiklander static struct tee_tadb_dir *tadb_db; 7878155888SJerome Forissier static unsigned int tadb_db_refc; 795baee69aSJens Wiklander static struct mutex tadb_mutex = MUTEX_INITIALIZER; 805baee69aSJens Wiklander 815baee69aSJens Wiklander static void file_num_to_str(char *buf, size_t blen, uint32_t file_number) 825baee69aSJens Wiklander { 83913847f3SJens Wiklander int rc __maybe_unused = 0; 84913847f3SJens Wiklander 85913847f3SJens Wiklander rc = snprintf(buf, blen, "%" PRIu32 ".ta", file_number); 86913847f3SJens Wiklander assert(rc >= 0); 875baee69aSJens Wiklander } 885baee69aSJens Wiklander 895baee69aSJens Wiklander static bool is_null_uuid(const TEE_UUID *uuid) 905baee69aSJens Wiklander { 915baee69aSJens Wiklander const TEE_UUID null_uuid = { 0 }; 925baee69aSJens Wiklander 935baee69aSJens Wiklander return !memcmp(uuid, &null_uuid, sizeof(*uuid)); 945baee69aSJens Wiklander } 955baee69aSJens Wiklander 965baee69aSJens Wiklander static TEE_Result ta_operation_open(unsigned int cmd, uint32_t file_number, 975baee69aSJens Wiklander int *fd) 985baee69aSJens Wiklander { 995baee69aSJens Wiklander struct mobj *mobj; 1005baee69aSJens Wiklander TEE_Result res; 1015baee69aSJens Wiklander void *va; 1025baee69aSJens Wiklander 1031a7d8eaeSJens Wiklander va = thread_rpc_shm_cache_alloc(THREAD_SHM_CACHE_USER_FS, 1041a7d8eaeSJens Wiklander THREAD_SHM_TYPE_APPLICATION, 1059bee8f2aSJens Wiklander TEE_FS_NAME_MAX, &mobj); 1065baee69aSJens Wiklander if (!va) 1075baee69aSJens Wiklander return TEE_ERROR_OUT_OF_MEMORY; 1085baee69aSJens Wiklander 1095baee69aSJens Wiklander file_num_to_str(va, TEE_FS_NAME_MAX, file_number); 1105baee69aSJens Wiklander 1117c350378SJens Wiklander struct thread_param params[] = { 1127c350378SJens Wiklander [0] = THREAD_PARAM_VALUE(IN, cmd, 0, 0), 1137c350378SJens Wiklander [1] = THREAD_PARAM_MEMREF(IN, mobj, 0, TEE_FS_NAME_MAX), 1147c350378SJens Wiklander [2] = THREAD_PARAM_VALUE(OUT, 0, 0, 0), 1157c350378SJens Wiklander }; 1167c350378SJens Wiklander 1176009538cSJens Wiklander res = thread_rpc_cmd(OPTEE_RPC_CMD_FS, ARRAY_SIZE(params), params); 1185baee69aSJens Wiklander if (!res) 1195baee69aSJens Wiklander *fd = params[2].u.value.a; 1205baee69aSJens Wiklander 1215baee69aSJens Wiklander return res; 1225baee69aSJens Wiklander } 1235baee69aSJens Wiklander 1245baee69aSJens Wiklander static TEE_Result ta_operation_remove(uint32_t file_number) 1255baee69aSJens Wiklander { 1265baee69aSJens Wiklander struct mobj *mobj; 1275baee69aSJens Wiklander void *va; 1285baee69aSJens Wiklander 1291a7d8eaeSJens Wiklander va = thread_rpc_shm_cache_alloc(THREAD_SHM_CACHE_USER_FS, 1301a7d8eaeSJens Wiklander THREAD_SHM_TYPE_APPLICATION, 1319bee8f2aSJens Wiklander TEE_FS_NAME_MAX, &mobj); 1325baee69aSJens Wiklander if (!va) 1335baee69aSJens Wiklander return TEE_ERROR_OUT_OF_MEMORY; 1345baee69aSJens Wiklander 1355baee69aSJens Wiklander file_num_to_str(va, TEE_FS_NAME_MAX, file_number); 1365baee69aSJens Wiklander 1377c350378SJens Wiklander struct thread_param params[] = { 1386009538cSJens Wiklander [0] = THREAD_PARAM_VALUE(IN, OPTEE_RPC_FS_REMOVE, 0, 0), 1397c350378SJens Wiklander [1] = THREAD_PARAM_MEMREF(IN, mobj, 0, TEE_FS_NAME_MAX), 1407c350378SJens Wiklander }; 1417c350378SJens Wiklander 1426009538cSJens Wiklander return thread_rpc_cmd(OPTEE_RPC_CMD_FS, ARRAY_SIZE(params), params); 1435baee69aSJens Wiklander } 1445baee69aSJens Wiklander 1455baee69aSJens Wiklander static TEE_Result maybe_grow_files(struct tee_tadb_dir *db, int idx) 1465baee69aSJens Wiklander { 1475baee69aSJens Wiklander void *p; 1485baee69aSJens Wiklander 1495baee69aSJens Wiklander if (idx < db->nbits) 1505baee69aSJens Wiklander return TEE_SUCCESS; 1515baee69aSJens Wiklander 1525baee69aSJens Wiklander p = realloc(db->files, bitstr_size(idx + 1)); 1535baee69aSJens Wiklander if (!p) 1545baee69aSJens Wiklander return TEE_ERROR_OUT_OF_MEMORY; 1555baee69aSJens Wiklander db->files = p; 1565baee69aSJens Wiklander 1575baee69aSJens Wiklander bit_nclear(db->files, db->nbits, idx); 1585baee69aSJens Wiklander db->nbits = idx + 1; 1595baee69aSJens Wiklander 1605baee69aSJens Wiklander return TEE_SUCCESS; 1615baee69aSJens Wiklander } 1625baee69aSJens Wiklander 1635baee69aSJens Wiklander static TEE_Result set_file(struct tee_tadb_dir *db, int idx) 1645baee69aSJens Wiklander { 1655baee69aSJens Wiklander TEE_Result res = maybe_grow_files(db, idx); 1665baee69aSJens Wiklander 1675baee69aSJens Wiklander if (!res) 1685baee69aSJens Wiklander bit_set(db->files, idx); 1695baee69aSJens Wiklander 1705baee69aSJens Wiklander return res; 1715baee69aSJens Wiklander } 1725baee69aSJens Wiklander 1735baee69aSJens Wiklander static void clear_file(struct tee_tadb_dir *db, int idx) 1745baee69aSJens Wiklander { 175*8d9a4147SElvira Khabirova /* 176*8d9a4147SElvira Khabirova * This is safe because db->nbits > 0 implies that 177*8d9a4147SElvira Khabirova * db->files is non-NULL (see maybe_grow_files()). 178*8d9a4147SElvira Khabirova */ 1795baee69aSJens Wiklander if (idx < db->nbits) 1805baee69aSJens Wiklander bit_clear(db->files, idx); 1815baee69aSJens Wiklander } 1825baee69aSJens Wiklander 1835baee69aSJens Wiklander static bool test_file(struct tee_tadb_dir *db, int idx) 1845baee69aSJens Wiklander { 185*8d9a4147SElvira Khabirova /* 186*8d9a4147SElvira Khabirova * This is safe because db->nbits > 0 implies that 187*8d9a4147SElvira Khabirova * db->files is non-NULL (see maybe_grow_files()). 188*8d9a4147SElvira Khabirova */ 1895baee69aSJens Wiklander if (idx < db->nbits) 1905baee69aSJens Wiklander return bit_test(db->files, idx); 1915baee69aSJens Wiklander 1925baee69aSJens Wiklander return false; 1935baee69aSJens Wiklander } 1945baee69aSJens Wiklander 1955baee69aSJens Wiklander static TEE_Result read_ent(struct tee_tadb_dir *db, size_t idx, 1965baee69aSJens Wiklander struct tadb_entry *entry) 1975baee69aSJens Wiklander { 1985baee69aSJens Wiklander size_t l = sizeof(*entry); 1995baee69aSJens Wiklander TEE_Result res = db->ops->read(db->fh, idx * l, entry, &l); 2005baee69aSJens Wiklander 2015baee69aSJens Wiklander if (!res && l != sizeof(*entry)) 2025baee69aSJens Wiklander return TEE_ERROR_ITEM_NOT_FOUND; 2035baee69aSJens Wiklander 2045baee69aSJens Wiklander return res; 2055baee69aSJens Wiklander } 2065baee69aSJens Wiklander 2075baee69aSJens Wiklander static TEE_Result write_ent(struct tee_tadb_dir *db, size_t idx, 2085baee69aSJens Wiklander const struct tadb_entry *entry) 2095baee69aSJens Wiklander { 2105baee69aSJens Wiklander const size_t l = sizeof(*entry); 2115baee69aSJens Wiklander 2125baee69aSJens Wiklander return db->ops->write(db->fh, idx * l, entry, l); 2135baee69aSJens Wiklander } 2145baee69aSJens Wiklander 2155baee69aSJens Wiklander static TEE_Result tadb_open(struct tee_tadb_dir **db_ret) 2165baee69aSJens Wiklander { 2175baee69aSJens Wiklander TEE_Result res; 2185baee69aSJens Wiklander struct tee_tadb_dir *db = calloc(1, sizeof(*db)); 2195baee69aSJens Wiklander struct tee_pobj po = { 2205baee69aSJens Wiklander .obj_id = (void *)tadb_obj_id, 2215baee69aSJens Wiklander .obj_id_len = sizeof(tadb_obj_id) 2225baee69aSJens Wiklander }; 2235baee69aSJens Wiklander 2245baee69aSJens Wiklander if (!db) 2255baee69aSJens Wiklander return TEE_ERROR_OUT_OF_MEMORY; 2265baee69aSJens Wiklander 2275baee69aSJens Wiklander db->ops = tee_svc_storage_file_ops(TEE_STORAGE_PRIVATE); 2285baee69aSJens Wiklander 2295baee69aSJens Wiklander res = db->ops->open(&po, NULL, &db->fh); 2305baee69aSJens Wiklander if (res == TEE_ERROR_ITEM_NOT_FOUND) 2315baee69aSJens Wiklander res = db->ops->create(&po, false, NULL, 0, NULL, 0, NULL, 0, 2325baee69aSJens Wiklander &db->fh); 2335baee69aSJens Wiklander 2345baee69aSJens Wiklander if (res) 2355baee69aSJens Wiklander free(db); 2365baee69aSJens Wiklander else 2375baee69aSJens Wiklander *db_ret = db; 2385baee69aSJens Wiklander 2395baee69aSJens Wiklander return res; 2405baee69aSJens Wiklander } 2415baee69aSJens Wiklander 2425baee69aSJens Wiklander static TEE_Result tee_tadb_open(struct tee_tadb_dir **db) 2435baee69aSJens Wiklander { 24478155888SJerome Forissier TEE_Result res = TEE_SUCCESS; 2455baee69aSJens Wiklander 2465baee69aSJens Wiklander mutex_lock(&tadb_mutex); 24778155888SJerome Forissier if (!tadb_db_refc) { 24878155888SJerome Forissier assert(!tadb_db); 2495baee69aSJens Wiklander res = tadb_open(&tadb_db); 2505baee69aSJens Wiklander if (res) 25178155888SJerome Forissier goto err; 2525baee69aSJens Wiklander } 25378155888SJerome Forissier tadb_db_refc++; 2545baee69aSJens Wiklander *db = tadb_db; 25578155888SJerome Forissier err: 25678155888SJerome Forissier mutex_unlock(&tadb_mutex); 25778155888SJerome Forissier return res; 2585baee69aSJens Wiklander } 2595baee69aSJens Wiklander 2605baee69aSJens Wiklander static void tadb_put(struct tee_tadb_dir *db) 2615baee69aSJens Wiklander { 26278155888SJerome Forissier assert(db == tadb_db); 2635baee69aSJens Wiklander mutex_lock(&tadb_mutex); 26478155888SJerome Forissier assert(tadb_db_refc); 26578155888SJerome Forissier tadb_db_refc--; 26678155888SJerome Forissier if (!tadb_db_refc) { 2675baee69aSJens Wiklander db->ops->close(&db->fh); 2685baee69aSJens Wiklander free(db->files); 2695baee69aSJens Wiklander free(db); 2705baee69aSJens Wiklander tadb_db = NULL; 2715baee69aSJens Wiklander } 2725baee69aSJens Wiklander mutex_unlock(&tadb_mutex); 2735baee69aSJens Wiklander } 2745baee69aSJens Wiklander 2755baee69aSJens Wiklander static void tee_tadb_close(struct tee_tadb_dir *db) 2765baee69aSJens Wiklander { 2775baee69aSJens Wiklander tadb_put(db); 2785baee69aSJens Wiklander } 2795baee69aSJens Wiklander 2805baee69aSJens Wiklander static TEE_Result tadb_authenc_init(TEE_OperationMode mode, 2815baee69aSJens Wiklander const struct tadb_entry *entry, 2825baee69aSJens Wiklander void **ctx_ret) 2835baee69aSJens Wiklander { 2845baee69aSJens Wiklander TEE_Result res; 2855baee69aSJens Wiklander void *ctx; 2865baee69aSJens Wiklander const size_t enc_size = entry->prop.custom_size + entry->prop.bin_size; 2875baee69aSJens Wiklander 288d7ac7d0fSJens Wiklander res = crypto_authenc_alloc_ctx(&ctx, TADB_AUTH_ENC_ALG); 2895baee69aSJens Wiklander if (res) 2905baee69aSJens Wiklander return res; 2915baee69aSJens Wiklander 29252ee414bSJens Wiklander res = crypto_authenc_init(ctx, mode, entry->key, sizeof(entry->key), 2935baee69aSJens Wiklander entry->iv, sizeof(entry->iv), 2945baee69aSJens Wiklander sizeof(entry->tag), 0, enc_size); 2955baee69aSJens Wiklander if (res) 29652ee414bSJens Wiklander crypto_authenc_free_ctx(ctx); 2975baee69aSJens Wiklander else 2985baee69aSJens Wiklander *ctx_ret = ctx; 2995baee69aSJens Wiklander 3005baee69aSJens Wiklander return res; 3015baee69aSJens Wiklander } 3025baee69aSJens Wiklander 3035baee69aSJens Wiklander static TEE_Result tadb_update_payload(void *ctx, TEE_OperationMode mode, 3045baee69aSJens Wiklander const void *src, size_t len, void *dst) 3055baee69aSJens Wiklander { 3065baee69aSJens Wiklander TEE_Result res; 3075baee69aSJens Wiklander size_t sz = len; 3085baee69aSJens Wiklander 30952ee414bSJens Wiklander res = crypto_authenc_update_payload(ctx, mode, (const uint8_t *)src, 31052ee414bSJens Wiklander len, dst, &sz); 3115baee69aSJens Wiklander assert(res || sz == len); 3125baee69aSJens Wiklander return res; 3135baee69aSJens Wiklander } 3145baee69aSJens Wiklander 3155baee69aSJens Wiklander static TEE_Result populate_files(struct tee_tadb_dir *db) 3165baee69aSJens Wiklander { 3175baee69aSJens Wiklander TEE_Result res; 3185baee69aSJens Wiklander size_t idx; 3195baee69aSJens Wiklander 3205baee69aSJens Wiklander /* 3215baee69aSJens Wiklander * If db->files isn't NULL the bitfield is already populated and 3225baee69aSJens Wiklander * there's nothing left to do here for now. 3235baee69aSJens Wiklander */ 32459593713SJens Wiklander if (db->nbits) 3255baee69aSJens Wiklander return TEE_SUCCESS; 3265baee69aSJens Wiklander 3275baee69aSJens Wiklander /* 3285baee69aSJens Wiklander * Iterate over the TA database and set the bits in the bit field 3295baee69aSJens Wiklander * for used file numbers. Note that set_file() will allocate and 3305baee69aSJens Wiklander * grow the bitfield as needed. 3315baee69aSJens Wiklander * 3325baee69aSJens Wiklander * At the same time clean out duplicate file numbers, the first 3335baee69aSJens Wiklander * entry with the file number has precedence. Duplicate entries is 3345baee69aSJens Wiklander * not supposed to be able to happen, but if it still does better 3355baee69aSJens Wiklander * to clean it out here instead of letting the error spread with 3365baee69aSJens Wiklander * unexpected side effects. 3375baee69aSJens Wiklander */ 3385baee69aSJens Wiklander for (idx = 0;; idx++) { 3395baee69aSJens Wiklander struct tadb_entry entry; 3405baee69aSJens Wiklander 3415baee69aSJens Wiklander res = read_ent(db, idx, &entry); 3425baee69aSJens Wiklander if (res) { 3435baee69aSJens Wiklander if (res == TEE_ERROR_ITEM_NOT_FOUND) 3445baee69aSJens Wiklander return TEE_SUCCESS; 3455baee69aSJens Wiklander goto err; 3465baee69aSJens Wiklander } 3475baee69aSJens Wiklander 3485baee69aSJens Wiklander if (is_null_uuid(&entry.prop.uuid)) 3495baee69aSJens Wiklander continue; 3505baee69aSJens Wiklander 3515baee69aSJens Wiklander if (test_file(db, entry.file_number)) { 3525baee69aSJens Wiklander IMSG("Clearing duplicate file number %" PRIu32, 3535baee69aSJens Wiklander entry.file_number); 3545baee69aSJens Wiklander memset(&entry, 0, sizeof(entry)); 3555baee69aSJens Wiklander res = write_ent(db, idx, &entry); 3565baee69aSJens Wiklander if (res) 3575baee69aSJens Wiklander goto err; 3585baee69aSJens Wiklander continue; 3595baee69aSJens Wiklander } 3605baee69aSJens Wiklander 3615baee69aSJens Wiklander res = set_file(db, entry.file_number); 3625baee69aSJens Wiklander if (res) 3635baee69aSJens Wiklander goto err; 3645baee69aSJens Wiklander } 3655baee69aSJens Wiklander 3665baee69aSJens Wiklander err: 3675baee69aSJens Wiklander free(db->files); 3685baee69aSJens Wiklander db->files = NULL; 3695baee69aSJens Wiklander db->nbits = 0; 3705baee69aSJens Wiklander 3715baee69aSJens Wiklander return res; 3725baee69aSJens Wiklander } 3735baee69aSJens Wiklander 3745baee69aSJens Wiklander TEE_Result tee_tadb_ta_create(const struct tee_tadb_property *property, 3755baee69aSJens Wiklander struct tee_tadb_ta_write **ta_ret) 3765baee69aSJens Wiklander { 3775baee69aSJens Wiklander TEE_Result res; 3785baee69aSJens Wiklander struct tee_tadb_ta_write *ta; 3795baee69aSJens Wiklander int i = 0; 3805baee69aSJens Wiklander 3815baee69aSJens Wiklander if (is_null_uuid(&property->uuid)) 3825baee69aSJens Wiklander return TEE_ERROR_GENERIC; 3835baee69aSJens Wiklander 3845baee69aSJens Wiklander ta = calloc(1, sizeof(*ta)); 3855baee69aSJens Wiklander if (!ta) 3865baee69aSJens Wiklander return TEE_ERROR_OUT_OF_MEMORY; 3875baee69aSJens Wiklander 3885baee69aSJens Wiklander res = tee_tadb_open(&ta->db); 3895baee69aSJens Wiklander if (res) 390d7a893d3SJens Wiklander goto err_free; 3915baee69aSJens Wiklander 3925baee69aSJens Wiklander mutex_lock(&tadb_mutex); 3935baee69aSJens Wiklander 3945baee69aSJens Wiklander /* 3955baee69aSJens Wiklander * Since we're going to search for next free file number below we 3965baee69aSJens Wiklander * need to populate the bitfield holding used file numbers. 3975baee69aSJens Wiklander */ 3985baee69aSJens Wiklander res = populate_files(ta->db); 3995baee69aSJens Wiklander if (res) 4005baee69aSJens Wiklander goto err_mutex; 4015baee69aSJens Wiklander 4025baee69aSJens Wiklander if (ta->db->files) { 4035baee69aSJens Wiklander bit_ffc(ta->db->files, ta->db->nbits, &i); 4045baee69aSJens Wiklander if (i == -1) 4055baee69aSJens Wiklander i = ta->db->nbits; 4065baee69aSJens Wiklander } 4075baee69aSJens Wiklander 4085baee69aSJens Wiklander res = set_file(ta->db, i); 4095baee69aSJens Wiklander if (res) 4105baee69aSJens Wiklander goto err_mutex; 4115baee69aSJens Wiklander 4125baee69aSJens Wiklander mutex_unlock(&tadb_mutex); 4135baee69aSJens Wiklander 4145baee69aSJens Wiklander ta->entry.file_number = i; 4155baee69aSJens Wiklander ta->entry.prop = *property; 4165baee69aSJens Wiklander 4175baee69aSJens Wiklander res = crypto_rng_read(ta->entry.iv, sizeof(ta->entry.iv)); 4185baee69aSJens Wiklander if (res) 419d7a893d3SJens Wiklander goto err_put; 4205baee69aSJens Wiklander 4215baee69aSJens Wiklander res = crypto_rng_read(ta->entry.key, sizeof(ta->entry.key)); 4225baee69aSJens Wiklander if (res) 423d7a893d3SJens Wiklander goto err_put; 4245baee69aSJens Wiklander 4256009538cSJens Wiklander res = ta_operation_open(OPTEE_RPC_FS_CREATE, ta->entry.file_number, 4265baee69aSJens Wiklander &ta->fd); 4275baee69aSJens Wiklander if (res) 428d7a893d3SJens Wiklander goto err_put; 4295baee69aSJens Wiklander 4305baee69aSJens Wiklander res = tadb_authenc_init(TEE_MODE_ENCRYPT, &ta->entry, &ta->ctx); 4315baee69aSJens Wiklander if (res) 432d7a893d3SJens Wiklander goto err_put; 4335baee69aSJens Wiklander 4345baee69aSJens Wiklander *ta_ret = ta; 4355baee69aSJens Wiklander 4365baee69aSJens Wiklander return TEE_SUCCESS; 4375baee69aSJens Wiklander 4385baee69aSJens Wiklander err_mutex: 4395baee69aSJens Wiklander mutex_unlock(&tadb_mutex); 440d7a893d3SJens Wiklander err_put: 4415baee69aSJens Wiklander tadb_put(ta->db); 442d7a893d3SJens Wiklander err_free: 4435baee69aSJens Wiklander free(ta); 4445baee69aSJens Wiklander 4455baee69aSJens Wiklander return res; 4465baee69aSJens Wiklander } 4475baee69aSJens Wiklander 4485baee69aSJens Wiklander TEE_Result tee_tadb_ta_write(struct tee_tadb_ta_write *ta, const void *buf, 4495baee69aSJens Wiklander size_t len) 4505baee69aSJens Wiklander { 4515baee69aSJens Wiklander TEE_Result res; 4525baee69aSJens Wiklander const uint8_t *rb = buf; 4535baee69aSJens Wiklander size_t rl = len; 4545baee69aSJens Wiklander struct tee_fs_rpc_operation op; 4555baee69aSJens Wiklander 4565baee69aSJens Wiklander while (rl) { 4575baee69aSJens Wiklander size_t wl = MIN(rl, TADB_MAX_BUFFER_SIZE); 4585baee69aSJens Wiklander void *wb; 4595baee69aSJens Wiklander 4606009538cSJens Wiklander res = tee_fs_rpc_write_init(&op, OPTEE_RPC_CMD_FS, ta->fd, 4615baee69aSJens Wiklander ta->pos, wl, &wb); 4625baee69aSJens Wiklander if (res) 4635baee69aSJens Wiklander return res; 4645baee69aSJens Wiklander 4655baee69aSJens Wiklander res = tadb_update_payload(ta->ctx, TEE_MODE_ENCRYPT, 4665baee69aSJens Wiklander rb, wl, wb); 4675baee69aSJens Wiklander if (res) 4685baee69aSJens Wiklander return res; 4695baee69aSJens Wiklander 4705baee69aSJens Wiklander res = tee_fs_rpc_write_final(&op); 4715baee69aSJens Wiklander if (res) 4725baee69aSJens Wiklander return res; 4735baee69aSJens Wiklander 4745baee69aSJens Wiklander rl -= wl; 4755baee69aSJens Wiklander rb += wl; 4765baee69aSJens Wiklander ta->pos += wl; 4775baee69aSJens Wiklander } 4785baee69aSJens Wiklander 4795baee69aSJens Wiklander return TEE_SUCCESS; 4805baee69aSJens Wiklander } 4815baee69aSJens Wiklander 4825baee69aSJens Wiklander void tee_tadb_ta_close_and_delete(struct tee_tadb_ta_write *ta) 4835baee69aSJens Wiklander { 48452ee414bSJens Wiklander crypto_authenc_final(ta->ctx); 48552ee414bSJens Wiklander crypto_authenc_free_ctx(ta->ctx); 4866009538cSJens Wiklander tee_fs_rpc_close(OPTEE_RPC_CMD_FS, ta->fd); 4875baee69aSJens Wiklander ta_operation_remove(ta->entry.file_number); 4885baee69aSJens Wiklander 4895baee69aSJens Wiklander mutex_lock(&tadb_mutex); 4905baee69aSJens Wiklander clear_file(ta->db, ta->entry.file_number); 4915baee69aSJens Wiklander mutex_unlock(&tadb_mutex); 4925baee69aSJens Wiklander 4935baee69aSJens Wiklander tadb_put(ta->db); 4945baee69aSJens Wiklander free(ta); 4955baee69aSJens Wiklander } 4965baee69aSJens Wiklander 4975baee69aSJens Wiklander static TEE_Result find_ent(struct tee_tadb_dir *db, const TEE_UUID *uuid, 4985baee69aSJens Wiklander size_t *idx_ret, struct tadb_entry *entry_ret) 4995baee69aSJens Wiklander { 5005baee69aSJens Wiklander TEE_Result res; 5015baee69aSJens Wiklander size_t idx; 5025baee69aSJens Wiklander 5035baee69aSJens Wiklander /* 5045baee69aSJens Wiklander * Search for the provided uuid, if it's found return the index it 5055baee69aSJens Wiklander * has together with TEE_SUCCESS. 5065baee69aSJens Wiklander * 5075baee69aSJens Wiklander * If the uuid can't be found return the number indexes together 5085baee69aSJens Wiklander * with TEE_ERROR_ITEM_NOT_FOUND. 5095baee69aSJens Wiklander */ 5105baee69aSJens Wiklander for (idx = 0;; idx++) { 5115baee69aSJens Wiklander struct tadb_entry entry; 5125baee69aSJens Wiklander 5135baee69aSJens Wiklander res = read_ent(db, idx, &entry); 5145baee69aSJens Wiklander if (res) { 5155baee69aSJens Wiklander if (res == TEE_ERROR_ITEM_NOT_FOUND) 5165baee69aSJens Wiklander break; 5175baee69aSJens Wiklander return res; 5185baee69aSJens Wiklander } 5195baee69aSJens Wiklander 5205baee69aSJens Wiklander if (!memcmp(&entry.prop.uuid, uuid, sizeof(*uuid))) { 5215baee69aSJens Wiklander if (entry_ret) 5225baee69aSJens Wiklander *entry_ret = entry; 5235baee69aSJens Wiklander break; 5245baee69aSJens Wiklander } 5255baee69aSJens Wiklander } 5265baee69aSJens Wiklander 5275baee69aSJens Wiklander *idx_ret = idx; 5285baee69aSJens Wiklander return res; 5295baee69aSJens Wiklander } 5305baee69aSJens Wiklander 5315baee69aSJens Wiklander static TEE_Result find_free_ent_idx(struct tee_tadb_dir *db, size_t *idx) 5325baee69aSJens Wiklander { 5335baee69aSJens Wiklander const TEE_UUID null_uuid = { 0 }; 5345baee69aSJens Wiklander TEE_Result res = find_ent(db, &null_uuid, idx, NULL); 5355baee69aSJens Wiklander 5365baee69aSJens Wiklander /* 5375baee69aSJens Wiklander * Note that *idx is set to the number of entries on 5385baee69aSJens Wiklander * TEE_ERROR_ITEM_NOT_FOUND. 5395baee69aSJens Wiklander */ 5405baee69aSJens Wiklander if (res == TEE_ERROR_ITEM_NOT_FOUND) 5415baee69aSJens Wiklander return TEE_SUCCESS; 5425baee69aSJens Wiklander return res; 5435baee69aSJens Wiklander } 5445baee69aSJens Wiklander 5455baee69aSJens Wiklander TEE_Result tee_tadb_ta_close_and_commit(struct tee_tadb_ta_write *ta) 5465baee69aSJens Wiklander { 5475baee69aSJens Wiklander TEE_Result res; 5485baee69aSJens Wiklander size_t dsz = 0; 5495baee69aSJens Wiklander size_t sz = sizeof(ta->entry.tag); 5505baee69aSJens Wiklander size_t idx; 5515baee69aSJens Wiklander struct tadb_entry old_ent; 5525baee69aSJens Wiklander bool have_old_ent = false; 5535baee69aSJens Wiklander 55452ee414bSJens Wiklander res = crypto_authenc_enc_final(ta->ctx, NULL, 0, NULL, &dsz, 5555baee69aSJens Wiklander ta->entry.tag, &sz); 5565baee69aSJens Wiklander if (res) 5575baee69aSJens Wiklander goto err; 5585baee69aSJens Wiklander 5596009538cSJens Wiklander tee_fs_rpc_close(OPTEE_RPC_CMD_FS, ta->fd); 5605baee69aSJens Wiklander 5615baee69aSJens Wiklander mutex_lock(&tadb_mutex); 5625baee69aSJens Wiklander /* 5635baee69aSJens Wiklander * First try to find an existing TA to replace. If there's one 5645baee69aSJens Wiklander * we'll use the entry, but we should also remove the old encrypted 5655baee69aSJens Wiklander * file. 5665baee69aSJens Wiklander * 5675baee69aSJens Wiklander * If there isn't an existing TA to replace, grab a new entry. 5685baee69aSJens Wiklander */ 5695baee69aSJens Wiklander res = find_ent(ta->db, &ta->entry.prop.uuid, &idx, &old_ent); 5705baee69aSJens Wiklander if (!res) { 5715baee69aSJens Wiklander have_old_ent = true; 5725baee69aSJens Wiklander } else { 5735baee69aSJens Wiklander res = find_free_ent_idx(ta->db, &idx); 5745baee69aSJens Wiklander if (res) 5755baee69aSJens Wiklander goto err_mutex; 5765baee69aSJens Wiklander } 5775baee69aSJens Wiklander res = write_ent(ta->db, idx, &ta->entry); 5785baee69aSJens Wiklander if (res) 5795baee69aSJens Wiklander goto err_mutex; 5805baee69aSJens Wiklander if (have_old_ent) 5815baee69aSJens Wiklander clear_file(ta->db, old_ent.file_number); 5825baee69aSJens Wiklander mutex_unlock(&tadb_mutex); 5835baee69aSJens Wiklander 58452ee414bSJens Wiklander crypto_authenc_final(ta->ctx); 58552ee414bSJens Wiklander crypto_authenc_free_ctx(ta->ctx); 5865baee69aSJens Wiklander tadb_put(ta->db); 5875baee69aSJens Wiklander free(ta); 5885baee69aSJens Wiklander if (have_old_ent) 5895baee69aSJens Wiklander ta_operation_remove(old_ent.file_number); 5905baee69aSJens Wiklander return TEE_SUCCESS; 5915baee69aSJens Wiklander 5925baee69aSJens Wiklander err_mutex: 5935baee69aSJens Wiklander mutex_unlock(&tadb_mutex); 5945baee69aSJens Wiklander err: 5955baee69aSJens Wiklander tee_tadb_ta_close_and_delete(ta); 5965baee69aSJens Wiklander return res; 5975baee69aSJens Wiklander } 5985baee69aSJens Wiklander 5995baee69aSJens Wiklander TEE_Result tee_tadb_ta_delete(const TEE_UUID *uuid) 6005baee69aSJens Wiklander { 601380507ddSVictor Chong const struct tadb_entry null_entry = { { { 0 } } }; 6025baee69aSJens Wiklander struct tee_tadb_dir *db; 6035baee69aSJens Wiklander struct tadb_entry entry; 6045baee69aSJens Wiklander size_t idx; 6055baee69aSJens Wiklander TEE_Result res; 6065baee69aSJens Wiklander 6075baee69aSJens Wiklander if (is_null_uuid(uuid)) 6085baee69aSJens Wiklander return TEE_ERROR_GENERIC; 6095baee69aSJens Wiklander 6105baee69aSJens Wiklander res = tee_tadb_open(&db); 6115baee69aSJens Wiklander if (res) 6125baee69aSJens Wiklander return res; 6135baee69aSJens Wiklander 6145baee69aSJens Wiklander mutex_lock(&tadb_mutex); 6155baee69aSJens Wiklander res = find_ent(db, uuid, &idx, &entry); 6165baee69aSJens Wiklander if (res) { 6175baee69aSJens Wiklander mutex_unlock(&tadb_mutex); 6185baee69aSJens Wiklander tee_tadb_close(db); 6195baee69aSJens Wiklander return res; 6205baee69aSJens Wiklander } 6215baee69aSJens Wiklander 6225baee69aSJens Wiklander clear_file(db, entry.file_number); 6235baee69aSJens Wiklander res = write_ent(db, idx, &null_entry); 6245baee69aSJens Wiklander mutex_unlock(&tadb_mutex); 6255baee69aSJens Wiklander 6265baee69aSJens Wiklander tee_tadb_close(db); 6275baee69aSJens Wiklander if (res) 6285baee69aSJens Wiklander return res; 6295baee69aSJens Wiklander 6305baee69aSJens Wiklander ta_operation_remove(entry.file_number); 6315baee69aSJens Wiklander return TEE_SUCCESS; 6325baee69aSJens Wiklander } 6335baee69aSJens Wiklander 6345baee69aSJens Wiklander TEE_Result tee_tadb_ta_open(const TEE_UUID *uuid, 6355baee69aSJens Wiklander struct tee_tadb_ta_read **ta_ret) 6365baee69aSJens Wiklander { 637bc6f3bf2SJens Wiklander TEE_Result res = TEE_SUCCESS; 638bc6f3bf2SJens Wiklander size_t idx = 0; 639bc6f3bf2SJens Wiklander struct tee_tadb_ta_read *ta = NULL; 6405baee69aSJens Wiklander 6415baee69aSJens Wiklander if (is_null_uuid(uuid)) 6425baee69aSJens Wiklander return TEE_ERROR_GENERIC; 6435baee69aSJens Wiklander 6445baee69aSJens Wiklander ta = calloc(1, sizeof(*ta)); 6455baee69aSJens Wiklander if (!ta) 6465baee69aSJens Wiklander return TEE_ERROR_OUT_OF_MEMORY; 6475baee69aSJens Wiklander 6485baee69aSJens Wiklander res = tee_tadb_open(&ta->db); 6495baee69aSJens Wiklander if (res) 650bc6f3bf2SJens Wiklander goto err_free; /* Mustn't call tadb_put() */ 6515baee69aSJens Wiklander 6525baee69aSJens Wiklander mutex_read_lock(&tadb_mutex); 6535baee69aSJens Wiklander res = find_ent(ta->db, uuid, &idx, &ta->entry); 6545baee69aSJens Wiklander mutex_read_unlock(&tadb_mutex); 6555baee69aSJens Wiklander if (res) 6565baee69aSJens Wiklander goto err; 6575baee69aSJens Wiklander 6586009538cSJens Wiklander res = ta_operation_open(OPTEE_RPC_FS_OPEN, ta->entry.file_number, 6596009538cSJens Wiklander &ta->fd); 6605baee69aSJens Wiklander if (res) 6615baee69aSJens Wiklander goto err; 6625baee69aSJens Wiklander 6635baee69aSJens Wiklander res = tadb_authenc_init(TEE_MODE_DECRYPT, &ta->entry, &ta->ctx); 6645baee69aSJens Wiklander if (res) 6655baee69aSJens Wiklander goto err; 6665baee69aSJens Wiklander 6675baee69aSJens Wiklander *ta_ret = ta; 6685baee69aSJens Wiklander 6695baee69aSJens Wiklander return TEE_SUCCESS; 6705baee69aSJens Wiklander err: 6715baee69aSJens Wiklander tadb_put(ta->db); 6725baee69aSJens Wiklander err_free: 6735baee69aSJens Wiklander free(ta); 6745baee69aSJens Wiklander return res; 6755baee69aSJens Wiklander } 6765baee69aSJens Wiklander 6775baee69aSJens Wiklander const struct tee_tadb_property * 6785baee69aSJens Wiklander tee_tadb_ta_get_property(struct tee_tadb_ta_read *ta) 6795baee69aSJens Wiklander { 6805baee69aSJens Wiklander return &ta->entry.prop; 6815baee69aSJens Wiklander } 6825baee69aSJens Wiklander 6830b345c6cSJens Wiklander TEE_Result tee_tadb_get_tag(struct tee_tadb_ta_read *ta, uint8_t *tag, 6840b345c6cSJens Wiklander unsigned int *tag_len) 6850b345c6cSJens Wiklander { 686fead5511SJens Wiklander if (!tag || *tag_len < sizeof(ta->entry.tag)) { 6870b345c6cSJens Wiklander *tag_len = sizeof(ta->entry.tag); 6880b345c6cSJens Wiklander return TEE_ERROR_SHORT_BUFFER; 6890b345c6cSJens Wiklander } 690fead5511SJens Wiklander *tag_len = sizeof(ta->entry.tag); 6910b345c6cSJens Wiklander 6920b345c6cSJens Wiklander memcpy(tag, ta->entry.tag, sizeof(ta->entry.tag)); 6930b345c6cSJens Wiklander 6940b345c6cSJens Wiklander return TEE_SUCCESS; 6950b345c6cSJens Wiklander } 6960b345c6cSJens Wiklander 6975baee69aSJens Wiklander static TEE_Result ta_load(struct tee_tadb_ta_read *ta) 6985baee69aSJens Wiklander { 6995baee69aSJens Wiklander TEE_Result res; 7005baee69aSJens Wiklander const size_t sz = ta->entry.prop.custom_size + ta->entry.prop.bin_size; 7015baee69aSJens Wiklander 7025baee69aSJens Wiklander if (ta->ta_mobj) 7035baee69aSJens Wiklander return TEE_SUCCESS; 7045baee69aSJens Wiklander 705cd278f78SJens Wiklander ta->ta_mobj = thread_rpc_alloc_payload(sz); 7065baee69aSJens Wiklander if (!ta->ta_mobj) 7075baee69aSJens Wiklander return TEE_ERROR_OUT_OF_MEMORY; 7085baee69aSJens Wiklander 7095baee69aSJens Wiklander ta->ta_buf = mobj_get_va(ta->ta_mobj, 0); 7105baee69aSJens Wiklander assert(ta->ta_buf); 7115baee69aSJens Wiklander 7127c350378SJens Wiklander struct thread_param params[] = { 7136009538cSJens Wiklander [0] = THREAD_PARAM_VALUE(IN, OPTEE_RPC_FS_READ, ta->fd, 0), 7147c350378SJens Wiklander [1] = THREAD_PARAM_MEMREF(OUT, ta->ta_mobj, 0, sz), 7157c350378SJens Wiklander }; 7165baee69aSJens Wiklander 7176009538cSJens Wiklander res = thread_rpc_cmd(OPTEE_RPC_CMD_FS, ARRAY_SIZE(params), params); 7185baee69aSJens Wiklander if (res) { 719cd278f78SJens Wiklander thread_rpc_free_payload(ta->ta_mobj); 7205baee69aSJens Wiklander ta->ta_mobj = NULL; 7215baee69aSJens Wiklander } 7225baee69aSJens Wiklander return res; 7235baee69aSJens Wiklander } 7245baee69aSJens Wiklander 7255baee69aSJens Wiklander TEE_Result tee_tadb_ta_read(struct tee_tadb_ta_read *ta, void *buf, size_t *len) 7265baee69aSJens Wiklander { 7275baee69aSJens Wiklander TEE_Result res; 7285baee69aSJens Wiklander const size_t sz = ta->entry.prop.custom_size + ta->entry.prop.bin_size; 7295baee69aSJens Wiklander size_t l = MIN(*len, sz - ta->pos); 7305baee69aSJens Wiklander 7315baee69aSJens Wiklander res = ta_load(ta); 7325baee69aSJens Wiklander if (res) 7335baee69aSJens Wiklander return res; 7345baee69aSJens Wiklander 7355baee69aSJens Wiklander if (buf) { 7365baee69aSJens Wiklander res = tadb_update_payload(ta->ctx, TEE_MODE_DECRYPT, 7375baee69aSJens Wiklander ta->ta_buf + ta->pos, l, buf); 7385baee69aSJens Wiklander if (res) 7395baee69aSJens Wiklander return res; 7405baee69aSJens Wiklander } else { 7415baee69aSJens Wiklander size_t num_bytes = 0; 742820042a5SJens Wiklander size_t b_size = MIN(256U, l); 7435baee69aSJens Wiklander uint8_t *b = malloc(b_size); 7445baee69aSJens Wiklander 7455baee69aSJens Wiklander if (!b) 7465baee69aSJens Wiklander return TEE_ERROR_OUT_OF_MEMORY; 7475baee69aSJens Wiklander 7485baee69aSJens Wiklander while (num_bytes < l) { 7495baee69aSJens Wiklander size_t n = MIN(b_size, l - num_bytes); 7505baee69aSJens Wiklander 7515baee69aSJens Wiklander res = tadb_update_payload(ta->ctx, TEE_MODE_DECRYPT, 752dddb285cSJens Wiklander ta->ta_buf + ta->pos + 753dddb285cSJens Wiklander num_bytes, n, b); 7545baee69aSJens Wiklander if (res) 7555baee69aSJens Wiklander break; 7565baee69aSJens Wiklander num_bytes += n; 7575baee69aSJens Wiklander } 7585baee69aSJens Wiklander 7595baee69aSJens Wiklander free(b); 7605baee69aSJens Wiklander if (res) 7615baee69aSJens Wiklander return res; 7625baee69aSJens Wiklander } 7635baee69aSJens Wiklander 7645baee69aSJens Wiklander ta->pos += l; 765dddb285cSJens Wiklander if (ta->pos == sz) { 766dddb285cSJens Wiklander size_t dl = 0; 767dddb285cSJens Wiklander 76852ee414bSJens Wiklander res = crypto_authenc_dec_final(ta->ctx, NULL, 0, NULL, &dl, 769dddb285cSJens Wiklander ta->entry.tag, TADB_TAG_SIZE); 770dddb285cSJens Wiklander if (res) 771dddb285cSJens Wiklander return res; 772dddb285cSJens Wiklander } 7735baee69aSJens Wiklander *len = l; 7745baee69aSJens Wiklander return TEE_SUCCESS; 7755baee69aSJens Wiklander } 7765baee69aSJens Wiklander 7775baee69aSJens Wiklander void tee_tadb_ta_close(struct tee_tadb_ta_read *ta) 7785baee69aSJens Wiklander { 77952ee414bSJens Wiklander crypto_authenc_final(ta->ctx); 78052ee414bSJens Wiklander crypto_authenc_free_ctx(ta->ctx); 7815baee69aSJens Wiklander if (ta->ta_mobj) 782cd278f78SJens Wiklander thread_rpc_free_payload(ta->ta_mobj); 7836009538cSJens Wiklander tee_fs_rpc_close(OPTEE_RPC_CMD_FS, ta->fd); 7845baee69aSJens Wiklander tadb_put(ta->db); 7855baee69aSJens Wiklander free(ta); 7865baee69aSJens Wiklander } 787