1ad43c49eSManish V Badarkhe /* 2*7962c1c2SManish V Badarkhe * Copyright (c) 2015-2024, Arm Limited and Contributors. All rights reserved. 3ad43c49eSManish V Badarkhe * 4ad43c49eSManish V Badarkhe * SPDX-License-Identifier: BSD-3-Clause 5ad43c49eSManish V Badarkhe */ 6ad43c49eSManish V Badarkhe 7ad43c49eSManish V Badarkhe #include <stddef.h> 8ad43c49eSManish V Badarkhe 9a8eadc51SGovindraj Raja #include <mbedtls/version.h> 10ad43c49eSManish V Badarkhe 11ad43c49eSManish V Badarkhe #include <drivers/auth/auth_mod.h> 12ad43c49eSManish V Badarkhe #include <drivers/auth/tbbr_cot_common.h> 13a8eadc51SGovindraj Raja 14ad43c49eSManish V Badarkhe #if USE_TBBR_DEFS 15ad43c49eSManish V Badarkhe #include <tools_share/tbbr_oid.h> 16ad43c49eSManish V Badarkhe #else 17ad43c49eSManish V Badarkhe #include <platform_oid.h> 18ad43c49eSManish V Badarkhe #endif 19ad43c49eSManish V Badarkhe 20a8eadc51SGovindraj Raja #include <platform_def.h> 21a8eadc51SGovindraj Raja 22ad43c49eSManish V Badarkhe static auth_param_type_desc_t scp_bl2u_hash = AUTH_PARAM_TYPE_DESC( 23ad43c49eSManish V Badarkhe AUTH_PARAM_HASH, SCP_FWU_CFG_HASH_OID); 24ad43c49eSManish V Badarkhe static auth_param_type_desc_t bl2u_hash = AUTH_PARAM_TYPE_DESC( 25ad43c49eSManish V Badarkhe AUTH_PARAM_HASH, AP_FWU_CFG_HASH_OID); 26ad43c49eSManish V Badarkhe static auth_param_type_desc_t ns_bl2u_hash = AUTH_PARAM_TYPE_DESC( 27ad43c49eSManish V Badarkhe AUTH_PARAM_HASH, FWU_HASH_OID); 28ad43c49eSManish V Badarkhe 29ad43c49eSManish V Badarkhe static const auth_img_desc_t bl2_image = { 30ad43c49eSManish V Badarkhe .img_id = BL2_IMAGE_ID, 31ad43c49eSManish V Badarkhe .img_type = IMG_RAW, 32ad43c49eSManish V Badarkhe .parent = &trusted_boot_fw_cert, 33ad43c49eSManish V Badarkhe .img_auth_methods = (const auth_method_desc_t[AUTH_METHOD_NUM]) { 34ad43c49eSManish V Badarkhe [0] = { 35ad43c49eSManish V Badarkhe .type = AUTH_METHOD_HASH, 36ad43c49eSManish V Badarkhe .param.hash = { 37ad43c49eSManish V Badarkhe .data = &raw_data, 38ad43c49eSManish V Badarkhe .hash = &tb_fw_hash 39ad43c49eSManish V Badarkhe } 40ad43c49eSManish V Badarkhe } 41ad43c49eSManish V Badarkhe } 42ad43c49eSManish V Badarkhe }; 43ad43c49eSManish V Badarkhe 44ad43c49eSManish V Badarkhe /* 45ad43c49eSManish V Badarkhe * FWU auth descriptor. 46ad43c49eSManish V Badarkhe */ 47ad43c49eSManish V Badarkhe static const auth_img_desc_t fwu_cert = { 48ad43c49eSManish V Badarkhe .img_id = FWU_CERT_ID, 49ad43c49eSManish V Badarkhe .img_type = IMG_CERT, 50ad43c49eSManish V Badarkhe .parent = NULL, 51ad43c49eSManish V Badarkhe .img_auth_methods = (const auth_method_desc_t[AUTH_METHOD_NUM]) { 52ad43c49eSManish V Badarkhe [0] = { 53ad43c49eSManish V Badarkhe .type = AUTH_METHOD_SIG, 54ad43c49eSManish V Badarkhe .param.sig = { 55ad43c49eSManish V Badarkhe .pk = &subject_pk, 56ad43c49eSManish V Badarkhe .sig = &sig, 57ad43c49eSManish V Badarkhe .alg = &sig_alg, 58ad43c49eSManish V Badarkhe .data = &raw_data 59ad43c49eSManish V Badarkhe } 60ad43c49eSManish V Badarkhe } 61ad43c49eSManish V Badarkhe }, 62ad43c49eSManish V Badarkhe .authenticated_data = (const auth_param_desc_t[COT_MAX_VERIFIED_PARAMS]) { 63ad43c49eSManish V Badarkhe [0] = { 64ad43c49eSManish V Badarkhe .type_desc = &scp_bl2u_hash, 65ad43c49eSManish V Badarkhe .data = { 66ad43c49eSManish V Badarkhe .ptr = (void *)scp_fw_hash_buf, 67ad43c49eSManish V Badarkhe .len = (unsigned int)HASH_DER_LEN 68ad43c49eSManish V Badarkhe } 69ad43c49eSManish V Badarkhe }, 70ad43c49eSManish V Badarkhe [1] = { 71ad43c49eSManish V Badarkhe .type_desc = &bl2u_hash, 72ad43c49eSManish V Badarkhe .data = { 73ad43c49eSManish V Badarkhe .ptr = (void *)tb_fw_hash_buf, 74ad43c49eSManish V Badarkhe .len = (unsigned int)HASH_DER_LEN 75ad43c49eSManish V Badarkhe } 76ad43c49eSManish V Badarkhe }, 77ad43c49eSManish V Badarkhe [2] = { 78ad43c49eSManish V Badarkhe .type_desc = &ns_bl2u_hash, 79ad43c49eSManish V Badarkhe .data = { 80ad43c49eSManish V Badarkhe .ptr = (void *)nt_world_bl_hash_buf, 81ad43c49eSManish V Badarkhe .len = (unsigned int)HASH_DER_LEN 82ad43c49eSManish V Badarkhe } 83ad43c49eSManish V Badarkhe } 84ad43c49eSManish V Badarkhe } 85ad43c49eSManish V Badarkhe }; 86ad43c49eSManish V Badarkhe /* 87ad43c49eSManish V Badarkhe * SCP_BL2U 88ad43c49eSManish V Badarkhe */ 89ad43c49eSManish V Badarkhe static const auth_img_desc_t scp_bl2u_image = { 90ad43c49eSManish V Badarkhe .img_id = SCP_BL2U_IMAGE_ID, 91ad43c49eSManish V Badarkhe .img_type = IMG_RAW, 92ad43c49eSManish V Badarkhe .parent = &fwu_cert, 93ad43c49eSManish V Badarkhe .img_auth_methods = (const auth_method_desc_t[AUTH_METHOD_NUM]) { 94ad43c49eSManish V Badarkhe [0] = { 95ad43c49eSManish V Badarkhe .type = AUTH_METHOD_HASH, 96ad43c49eSManish V Badarkhe .param.hash = { 97ad43c49eSManish V Badarkhe .data = &raw_data, 98ad43c49eSManish V Badarkhe .hash = &scp_bl2u_hash 99ad43c49eSManish V Badarkhe } 100ad43c49eSManish V Badarkhe } 101ad43c49eSManish V Badarkhe } 102ad43c49eSManish V Badarkhe }; 103ad43c49eSManish V Badarkhe /* 104ad43c49eSManish V Badarkhe * BL2U 105ad43c49eSManish V Badarkhe */ 106ad43c49eSManish V Badarkhe static const auth_img_desc_t bl2u_image = { 107ad43c49eSManish V Badarkhe .img_id = BL2U_IMAGE_ID, 108ad43c49eSManish V Badarkhe .img_type = IMG_RAW, 109ad43c49eSManish V Badarkhe .parent = &fwu_cert, 110ad43c49eSManish V Badarkhe .img_auth_methods = (const auth_method_desc_t[AUTH_METHOD_NUM]) { 111ad43c49eSManish V Badarkhe [0] = { 112ad43c49eSManish V Badarkhe .type = AUTH_METHOD_HASH, 113ad43c49eSManish V Badarkhe .param.hash = { 114ad43c49eSManish V Badarkhe .data = &raw_data, 115ad43c49eSManish V Badarkhe .hash = &bl2u_hash 116ad43c49eSManish V Badarkhe } 117ad43c49eSManish V Badarkhe } 118ad43c49eSManish V Badarkhe } 119ad43c49eSManish V Badarkhe }; 120ad43c49eSManish V Badarkhe /* 121ad43c49eSManish V Badarkhe * NS_BL2U 122ad43c49eSManish V Badarkhe */ 123ad43c49eSManish V Badarkhe static const auth_img_desc_t ns_bl2u_image = { 124ad43c49eSManish V Badarkhe .img_id = NS_BL2U_IMAGE_ID, 125ad43c49eSManish V Badarkhe .img_type = IMG_RAW, 126ad43c49eSManish V Badarkhe .parent = &fwu_cert, 127ad43c49eSManish V Badarkhe .img_auth_methods = (const auth_method_desc_t[AUTH_METHOD_NUM]) { 128ad43c49eSManish V Badarkhe [0] = { 129ad43c49eSManish V Badarkhe .type = AUTH_METHOD_HASH, 130ad43c49eSManish V Badarkhe .param.hash = { 131ad43c49eSManish V Badarkhe .data = &raw_data, 132ad43c49eSManish V Badarkhe .hash = &ns_bl2u_hash 133ad43c49eSManish V Badarkhe } 134ad43c49eSManish V Badarkhe } 135ad43c49eSManish V Badarkhe } 136ad43c49eSManish V Badarkhe }; 137ad43c49eSManish V Badarkhe /* 138ad43c49eSManish V Badarkhe * TB_FW_CONFIG 139ad43c49eSManish V Badarkhe */ 140ad43c49eSManish V Badarkhe static const auth_img_desc_t tb_fw_config = { 141ad43c49eSManish V Badarkhe .img_id = TB_FW_CONFIG_ID, 142ad43c49eSManish V Badarkhe .img_type = IMG_RAW, 143ad43c49eSManish V Badarkhe .parent = &trusted_boot_fw_cert, 144ad43c49eSManish V Badarkhe .img_auth_methods = (const auth_method_desc_t[AUTH_METHOD_NUM]) { 145ad43c49eSManish V Badarkhe [0] = { 146ad43c49eSManish V Badarkhe .type = AUTH_METHOD_HASH, 147ad43c49eSManish V Badarkhe .param.hash = { 148ad43c49eSManish V Badarkhe .data = &raw_data, 149ad43c49eSManish V Badarkhe .hash = &tb_fw_config_hash 150ad43c49eSManish V Badarkhe } 151ad43c49eSManish V Badarkhe } 152ad43c49eSManish V Badarkhe } 153ad43c49eSManish V Badarkhe }; 154ad43c49eSManish V Badarkhe 155243875eaSLouis Mayencourt static const auth_img_desc_t fw_config = { 156243875eaSLouis Mayencourt .img_id = FW_CONFIG_ID, 157243875eaSLouis Mayencourt .img_type = IMG_RAW, 158243875eaSLouis Mayencourt .parent = &trusted_boot_fw_cert, 159243875eaSLouis Mayencourt .img_auth_methods = (const auth_method_desc_t[AUTH_METHOD_NUM]) { 160243875eaSLouis Mayencourt [0] = { 161243875eaSLouis Mayencourt .type = AUTH_METHOD_HASH, 162243875eaSLouis Mayencourt .param.hash = { 163243875eaSLouis Mayencourt .data = &raw_data, 164243875eaSLouis Mayencourt .hash = &fw_config_hash 165243875eaSLouis Mayencourt } 166243875eaSLouis Mayencourt } 167243875eaSLouis Mayencourt } 168243875eaSLouis Mayencourt }; 169243875eaSLouis Mayencourt 170ad43c49eSManish V Badarkhe /* 171ad43c49eSManish V Badarkhe * TBBR Chain of trust definition 172ad43c49eSManish V Badarkhe */ 173ad43c49eSManish V Badarkhe static const auth_img_desc_t * const cot_desc[] = { 174ad43c49eSManish V Badarkhe [TRUSTED_BOOT_FW_CERT_ID] = &trusted_boot_fw_cert, 175ad43c49eSManish V Badarkhe [BL2_IMAGE_ID] = &bl2_image, 176ad43c49eSManish V Badarkhe [TB_FW_CONFIG_ID] = &tb_fw_config, 177243875eaSLouis Mayencourt [FW_CONFIG_ID] = &fw_config, 178ad43c49eSManish V Badarkhe [FWU_CERT_ID] = &fwu_cert, 179ad43c49eSManish V Badarkhe [SCP_BL2U_IMAGE_ID] = &scp_bl2u_image, 180ad43c49eSManish V Badarkhe [BL2U_IMAGE_ID] = &bl2u_image, 181ad43c49eSManish V Badarkhe [NS_BL2U_IMAGE_ID] = &ns_bl2u_image 182ad43c49eSManish V Badarkhe }; 183ad43c49eSManish V Badarkhe 184ad43c49eSManish V Badarkhe /* Register the CoT in the authentication module */ 185ad43c49eSManish V Badarkhe REGISTER_COT(cot_desc); 186