1ad43c49eSManish V Badarkhe /* 2ad43c49eSManish V Badarkhe * Copyright (c) 2015-2020, ARM Limited and Contributors. All rights reserved. 3ad43c49eSManish V Badarkhe * 4ad43c49eSManish V Badarkhe * SPDX-License-Identifier: BSD-3-Clause 5ad43c49eSManish V Badarkhe */ 6ad43c49eSManish V Badarkhe 7ad43c49eSManish V Badarkhe #include <stddef.h> 8ad43c49eSManish V Badarkhe 9ad43c49eSManish V Badarkhe #include <platform_def.h> 10ad43c49eSManish V Badarkhe #include <drivers/auth/mbedtls/mbedtls_config.h> 11ad43c49eSManish V Badarkhe 12ad43c49eSManish V Badarkhe #include <drivers/auth/auth_mod.h> 13ad43c49eSManish V Badarkhe #include <drivers/auth/tbbr_cot_common.h> 14ad43c49eSManish V Badarkhe #if USE_TBBR_DEFS 15ad43c49eSManish V Badarkhe #include <tools_share/tbbr_oid.h> 16ad43c49eSManish V Badarkhe #else 17ad43c49eSManish V Badarkhe #include <platform_oid.h> 18ad43c49eSManish V Badarkhe #endif 19ad43c49eSManish V Badarkhe 20ad43c49eSManish V Badarkhe static auth_param_type_desc_t scp_bl2u_hash = AUTH_PARAM_TYPE_DESC( 21ad43c49eSManish V Badarkhe AUTH_PARAM_HASH, SCP_FWU_CFG_HASH_OID); 22ad43c49eSManish V Badarkhe static auth_param_type_desc_t bl2u_hash = AUTH_PARAM_TYPE_DESC( 23ad43c49eSManish V Badarkhe AUTH_PARAM_HASH, AP_FWU_CFG_HASH_OID); 24ad43c49eSManish V Badarkhe static auth_param_type_desc_t ns_bl2u_hash = AUTH_PARAM_TYPE_DESC( 25ad43c49eSManish V Badarkhe AUTH_PARAM_HASH, FWU_HASH_OID); 26ad43c49eSManish V Badarkhe 27ad43c49eSManish V Badarkhe static const auth_img_desc_t bl2_image = { 28ad43c49eSManish V Badarkhe .img_id = BL2_IMAGE_ID, 29ad43c49eSManish V Badarkhe .img_type = IMG_RAW, 30ad43c49eSManish V Badarkhe .parent = &trusted_boot_fw_cert, 31ad43c49eSManish V Badarkhe .img_auth_methods = (const auth_method_desc_t[AUTH_METHOD_NUM]) { 32ad43c49eSManish V Badarkhe [0] = { 33ad43c49eSManish V Badarkhe .type = AUTH_METHOD_HASH, 34ad43c49eSManish V Badarkhe .param.hash = { 35ad43c49eSManish V Badarkhe .data = &raw_data, 36ad43c49eSManish V Badarkhe .hash = &tb_fw_hash 37ad43c49eSManish V Badarkhe } 38ad43c49eSManish V Badarkhe } 39ad43c49eSManish V Badarkhe } 40ad43c49eSManish V Badarkhe }; 41ad43c49eSManish V Badarkhe 42ad43c49eSManish V Badarkhe /* 43ad43c49eSManish V Badarkhe * FWU auth descriptor. 44ad43c49eSManish V Badarkhe */ 45ad43c49eSManish V Badarkhe static const auth_img_desc_t fwu_cert = { 46ad43c49eSManish V Badarkhe .img_id = FWU_CERT_ID, 47ad43c49eSManish V Badarkhe .img_type = IMG_CERT, 48ad43c49eSManish V Badarkhe .parent = NULL, 49ad43c49eSManish V Badarkhe .img_auth_methods = (const auth_method_desc_t[AUTH_METHOD_NUM]) { 50ad43c49eSManish V Badarkhe [0] = { 51ad43c49eSManish V Badarkhe .type = AUTH_METHOD_SIG, 52ad43c49eSManish V Badarkhe .param.sig = { 53ad43c49eSManish V Badarkhe .pk = &subject_pk, 54ad43c49eSManish V Badarkhe .sig = &sig, 55ad43c49eSManish V Badarkhe .alg = &sig_alg, 56ad43c49eSManish V Badarkhe .data = &raw_data 57ad43c49eSManish V Badarkhe } 58ad43c49eSManish V Badarkhe } 59ad43c49eSManish V Badarkhe }, 60ad43c49eSManish V Badarkhe .authenticated_data = (const auth_param_desc_t[COT_MAX_VERIFIED_PARAMS]) { 61ad43c49eSManish V Badarkhe [0] = { 62ad43c49eSManish V Badarkhe .type_desc = &scp_bl2u_hash, 63ad43c49eSManish V Badarkhe .data = { 64ad43c49eSManish V Badarkhe .ptr = (void *)scp_fw_hash_buf, 65ad43c49eSManish V Badarkhe .len = (unsigned int)HASH_DER_LEN 66ad43c49eSManish V Badarkhe } 67ad43c49eSManish V Badarkhe }, 68ad43c49eSManish V Badarkhe [1] = { 69ad43c49eSManish V Badarkhe .type_desc = &bl2u_hash, 70ad43c49eSManish V Badarkhe .data = { 71ad43c49eSManish V Badarkhe .ptr = (void *)tb_fw_hash_buf, 72ad43c49eSManish V Badarkhe .len = (unsigned int)HASH_DER_LEN 73ad43c49eSManish V Badarkhe } 74ad43c49eSManish V Badarkhe }, 75ad43c49eSManish V Badarkhe [2] = { 76ad43c49eSManish V Badarkhe .type_desc = &ns_bl2u_hash, 77ad43c49eSManish V Badarkhe .data = { 78ad43c49eSManish V Badarkhe .ptr = (void *)nt_world_bl_hash_buf, 79ad43c49eSManish V Badarkhe .len = (unsigned int)HASH_DER_LEN 80ad43c49eSManish V Badarkhe } 81ad43c49eSManish V Badarkhe } 82ad43c49eSManish V Badarkhe } 83ad43c49eSManish V Badarkhe }; 84ad43c49eSManish V Badarkhe /* 85ad43c49eSManish V Badarkhe * SCP_BL2U 86ad43c49eSManish V Badarkhe */ 87ad43c49eSManish V Badarkhe static const auth_img_desc_t scp_bl2u_image = { 88ad43c49eSManish V Badarkhe .img_id = SCP_BL2U_IMAGE_ID, 89ad43c49eSManish V Badarkhe .img_type = IMG_RAW, 90ad43c49eSManish V Badarkhe .parent = &fwu_cert, 91ad43c49eSManish V Badarkhe .img_auth_methods = (const auth_method_desc_t[AUTH_METHOD_NUM]) { 92ad43c49eSManish V Badarkhe [0] = { 93ad43c49eSManish V Badarkhe .type = AUTH_METHOD_HASH, 94ad43c49eSManish V Badarkhe .param.hash = { 95ad43c49eSManish V Badarkhe .data = &raw_data, 96ad43c49eSManish V Badarkhe .hash = &scp_bl2u_hash 97ad43c49eSManish V Badarkhe } 98ad43c49eSManish V Badarkhe } 99ad43c49eSManish V Badarkhe } 100ad43c49eSManish V Badarkhe }; 101ad43c49eSManish V Badarkhe /* 102ad43c49eSManish V Badarkhe * BL2U 103ad43c49eSManish V Badarkhe */ 104ad43c49eSManish V Badarkhe static const auth_img_desc_t bl2u_image = { 105ad43c49eSManish V Badarkhe .img_id = BL2U_IMAGE_ID, 106ad43c49eSManish V Badarkhe .img_type = IMG_RAW, 107ad43c49eSManish V Badarkhe .parent = &fwu_cert, 108ad43c49eSManish V Badarkhe .img_auth_methods = (const auth_method_desc_t[AUTH_METHOD_NUM]) { 109ad43c49eSManish V Badarkhe [0] = { 110ad43c49eSManish V Badarkhe .type = AUTH_METHOD_HASH, 111ad43c49eSManish V Badarkhe .param.hash = { 112ad43c49eSManish V Badarkhe .data = &raw_data, 113ad43c49eSManish V Badarkhe .hash = &bl2u_hash 114ad43c49eSManish V Badarkhe } 115ad43c49eSManish V Badarkhe } 116ad43c49eSManish V Badarkhe } 117ad43c49eSManish V Badarkhe }; 118ad43c49eSManish V Badarkhe /* 119ad43c49eSManish V Badarkhe * NS_BL2U 120ad43c49eSManish V Badarkhe */ 121ad43c49eSManish V Badarkhe static const auth_img_desc_t ns_bl2u_image = { 122ad43c49eSManish V Badarkhe .img_id = NS_BL2U_IMAGE_ID, 123ad43c49eSManish V Badarkhe .img_type = IMG_RAW, 124ad43c49eSManish V Badarkhe .parent = &fwu_cert, 125ad43c49eSManish V Badarkhe .img_auth_methods = (const auth_method_desc_t[AUTH_METHOD_NUM]) { 126ad43c49eSManish V Badarkhe [0] = { 127ad43c49eSManish V Badarkhe .type = AUTH_METHOD_HASH, 128ad43c49eSManish V Badarkhe .param.hash = { 129ad43c49eSManish V Badarkhe .data = &raw_data, 130ad43c49eSManish V Badarkhe .hash = &ns_bl2u_hash 131ad43c49eSManish V Badarkhe } 132ad43c49eSManish V Badarkhe } 133ad43c49eSManish V Badarkhe } 134ad43c49eSManish V Badarkhe }; 135ad43c49eSManish V Badarkhe /* 136ad43c49eSManish V Badarkhe * TB_FW_CONFIG 137ad43c49eSManish V Badarkhe */ 138ad43c49eSManish V Badarkhe static const auth_img_desc_t tb_fw_config = { 139ad43c49eSManish V Badarkhe .img_id = TB_FW_CONFIG_ID, 140ad43c49eSManish V Badarkhe .img_type = IMG_RAW, 141ad43c49eSManish V Badarkhe .parent = &trusted_boot_fw_cert, 142ad43c49eSManish V Badarkhe .img_auth_methods = (const auth_method_desc_t[AUTH_METHOD_NUM]) { 143ad43c49eSManish V Badarkhe [0] = { 144ad43c49eSManish V Badarkhe .type = AUTH_METHOD_HASH, 145ad43c49eSManish V Badarkhe .param.hash = { 146ad43c49eSManish V Badarkhe .data = &raw_data, 147ad43c49eSManish V Badarkhe .hash = &tb_fw_config_hash 148ad43c49eSManish V Badarkhe } 149ad43c49eSManish V Badarkhe } 150ad43c49eSManish V Badarkhe } 151ad43c49eSManish V Badarkhe }; 152ad43c49eSManish V Badarkhe 153*243875eaSLouis Mayencourt static const auth_img_desc_t fw_config = { 154*243875eaSLouis Mayencourt .img_id = FW_CONFIG_ID, 155*243875eaSLouis Mayencourt .img_type = IMG_RAW, 156*243875eaSLouis Mayencourt .parent = &trusted_boot_fw_cert, 157*243875eaSLouis Mayencourt .img_auth_methods = (const auth_method_desc_t[AUTH_METHOD_NUM]) { 158*243875eaSLouis Mayencourt [0] = { 159*243875eaSLouis Mayencourt .type = AUTH_METHOD_HASH, 160*243875eaSLouis Mayencourt .param.hash = { 161*243875eaSLouis Mayencourt .data = &raw_data, 162*243875eaSLouis Mayencourt .hash = &fw_config_hash 163*243875eaSLouis Mayencourt } 164*243875eaSLouis Mayencourt } 165*243875eaSLouis Mayencourt } 166*243875eaSLouis Mayencourt }; 167*243875eaSLouis Mayencourt 168ad43c49eSManish V Badarkhe /* 169ad43c49eSManish V Badarkhe * TBBR Chain of trust definition 170ad43c49eSManish V Badarkhe */ 171ad43c49eSManish V Badarkhe static const auth_img_desc_t * const cot_desc[] = { 172ad43c49eSManish V Badarkhe [TRUSTED_BOOT_FW_CERT_ID] = &trusted_boot_fw_cert, 173ad43c49eSManish V Badarkhe [BL2_IMAGE_ID] = &bl2_image, 174ad43c49eSManish V Badarkhe [HW_CONFIG_ID] = &hw_config, 175ad43c49eSManish V Badarkhe [TB_FW_CONFIG_ID] = &tb_fw_config, 176*243875eaSLouis Mayencourt [FW_CONFIG_ID] = &fw_config, 177ad43c49eSManish V Badarkhe [FWU_CERT_ID] = &fwu_cert, 178ad43c49eSManish V Badarkhe [SCP_BL2U_IMAGE_ID] = &scp_bl2u_image, 179ad43c49eSManish V Badarkhe [BL2U_IMAGE_ID] = &bl2u_image, 180ad43c49eSManish V Badarkhe [NS_BL2U_IMAGE_ID] = &ns_bl2u_image 181ad43c49eSManish V Badarkhe }; 182ad43c49eSManish V Badarkhe 183ad43c49eSManish V Badarkhe /* Register the CoT in the authentication module */ 184ad43c49eSManish V Badarkhe REGISTER_COT(cot_desc); 185