xref: /rk3399_ARM-atf/drivers/auth/tbbr/tbbr_cot_common.c (revision 243875eaf9df591aec14c20075c70cb5af7dd9e9)
1ad43c49eSManish V Badarkhe /*
2ad43c49eSManish V Badarkhe  * Copyright (c) 2015-2020, ARM Limited and Contributors. All rights reserved.
3ad43c49eSManish V Badarkhe  *
4ad43c49eSManish V Badarkhe  * SPDX-License-Identifier: BSD-3-Clause
5ad43c49eSManish V Badarkhe  */
6ad43c49eSManish V Badarkhe 
7ad43c49eSManish V Badarkhe #include <stddef.h>
8ad43c49eSManish V Badarkhe 
9ad43c49eSManish V Badarkhe #include <platform_def.h>
10ad43c49eSManish V Badarkhe #include <drivers/auth/mbedtls/mbedtls_config.h>
11ad43c49eSManish V Badarkhe 
12ad43c49eSManish V Badarkhe #include <drivers/auth/auth_mod.h>
13ad43c49eSManish V Badarkhe #include <drivers/auth/tbbr_cot_common.h>
14ad43c49eSManish V Badarkhe #if USE_TBBR_DEFS
15ad43c49eSManish V Badarkhe #include <tools_share/tbbr_oid.h>
16ad43c49eSManish V Badarkhe #else
17ad43c49eSManish V Badarkhe #include <platform_oid.h>
18ad43c49eSManish V Badarkhe #endif
19ad43c49eSManish V Badarkhe 
20ad43c49eSManish V Badarkhe /*
21ad43c49eSManish V Badarkhe  * The platform must allocate buffers to store the authentication parameters
22ad43c49eSManish V Badarkhe  * extracted from the certificates. In this case, because of the way the CoT is
23ad43c49eSManish V Badarkhe  * established, we can reuse some of the buffers on different stages
24ad43c49eSManish V Badarkhe  */
25ad43c49eSManish V Badarkhe 
26*243875eaSLouis Mayencourt static unsigned char fw_config_hash_buf[HASH_DER_LEN];
27*243875eaSLouis Mayencourt static unsigned char tb_fw_config_hash_buf[HASH_DER_LEN];
28*243875eaSLouis Mayencourt static unsigned char hw_config_hash_buf[HASH_DER_LEN];
29ad43c49eSManish V Badarkhe unsigned char tb_fw_hash_buf[HASH_DER_LEN];
30ad43c49eSManish V Badarkhe unsigned char scp_fw_hash_buf[HASH_DER_LEN];
31ad43c49eSManish V Badarkhe unsigned char nt_world_bl_hash_buf[HASH_DER_LEN];
32ad43c49eSManish V Badarkhe 
33ad43c49eSManish V Badarkhe /*
34ad43c49eSManish V Badarkhe  * common Parameter type descriptors across BL1 and BL2
35ad43c49eSManish V Badarkhe  */
36ad43c49eSManish V Badarkhe auth_param_type_desc_t trusted_nv_ctr = AUTH_PARAM_TYPE_DESC(
37ad43c49eSManish V Badarkhe 	AUTH_PARAM_NV_CTR, TRUSTED_FW_NVCOUNTER_OID);
38ad43c49eSManish V Badarkhe auth_param_type_desc_t subject_pk = AUTH_PARAM_TYPE_DESC(
39ad43c49eSManish V Badarkhe 	AUTH_PARAM_PUB_KEY, 0);
40ad43c49eSManish V Badarkhe auth_param_type_desc_t sig = AUTH_PARAM_TYPE_DESC(
41ad43c49eSManish V Badarkhe 	AUTH_PARAM_SIG, 0);
42ad43c49eSManish V Badarkhe auth_param_type_desc_t sig_alg = AUTH_PARAM_TYPE_DESC(
43ad43c49eSManish V Badarkhe 	AUTH_PARAM_SIG_ALG, 0);
44ad43c49eSManish V Badarkhe auth_param_type_desc_t raw_data = AUTH_PARAM_TYPE_DESC(
45ad43c49eSManish V Badarkhe 	AUTH_PARAM_RAW_DATA, 0);
46ad43c49eSManish V Badarkhe 
47ad43c49eSManish V Badarkhe /* common hash used across BL1 and BL2 */
48ad43c49eSManish V Badarkhe auth_param_type_desc_t tb_fw_hash = AUTH_PARAM_TYPE_DESC(
49ad43c49eSManish V Badarkhe 	AUTH_PARAM_HASH, TRUSTED_BOOT_FW_HASH_OID);
50ad43c49eSManish V Badarkhe auth_param_type_desc_t tb_fw_config_hash = AUTH_PARAM_TYPE_DESC(
51ad43c49eSManish V Badarkhe 	AUTH_PARAM_HASH, TRUSTED_BOOT_FW_CONFIG_HASH_OID);
52*243875eaSLouis Mayencourt auth_param_type_desc_t fw_config_hash = AUTH_PARAM_TYPE_DESC(
53*243875eaSLouis Mayencourt 	AUTH_PARAM_HASH, FW_CONFIG_HASH_OID);
54*243875eaSLouis Mayencourt static auth_param_type_desc_t hw_config_hash = AUTH_PARAM_TYPE_DESC(
55ad43c49eSManish V Badarkhe 	AUTH_PARAM_HASH, HW_CONFIG_HASH_OID);
56ad43c49eSManish V Badarkhe 
57ad43c49eSManish V Badarkhe /* trusted_boot_fw_cert */
58ad43c49eSManish V Badarkhe const auth_img_desc_t trusted_boot_fw_cert = {
59ad43c49eSManish V Badarkhe 	.img_id = TRUSTED_BOOT_FW_CERT_ID,
60ad43c49eSManish V Badarkhe 	.img_type = IMG_CERT,
61ad43c49eSManish V Badarkhe 	.parent = NULL,
62ad43c49eSManish V Badarkhe 	.img_auth_methods = (const auth_method_desc_t[AUTH_METHOD_NUM]) {
63ad43c49eSManish V Badarkhe 		[0] = {
64ad43c49eSManish V Badarkhe 			.type = AUTH_METHOD_SIG,
65ad43c49eSManish V Badarkhe 			.param.sig = {
66ad43c49eSManish V Badarkhe 				.pk = &subject_pk,
67ad43c49eSManish V Badarkhe 				.sig = &sig,
68ad43c49eSManish V Badarkhe 				.alg = &sig_alg,
69ad43c49eSManish V Badarkhe 				.data = &raw_data
70ad43c49eSManish V Badarkhe 			}
71ad43c49eSManish V Badarkhe 		},
72ad43c49eSManish V Badarkhe 		[1] = {
73ad43c49eSManish V Badarkhe 			.type = AUTH_METHOD_NV_CTR,
74ad43c49eSManish V Badarkhe 			.param.nv_ctr = {
75ad43c49eSManish V Badarkhe 				.cert_nv_ctr = &trusted_nv_ctr,
76ad43c49eSManish V Badarkhe 				.plat_nv_ctr = &trusted_nv_ctr
77ad43c49eSManish V Badarkhe 			}
78ad43c49eSManish V Badarkhe 		}
79ad43c49eSManish V Badarkhe 	},
80ad43c49eSManish V Badarkhe 	.authenticated_data = (const auth_param_desc_t[COT_MAX_VERIFIED_PARAMS]) {
81ad43c49eSManish V Badarkhe 		[0] = {
82ad43c49eSManish V Badarkhe 			.type_desc = &tb_fw_hash,
83ad43c49eSManish V Badarkhe 			.data = {
84ad43c49eSManish V Badarkhe 				.ptr = (void *)tb_fw_hash_buf,
85ad43c49eSManish V Badarkhe 				.len = (unsigned int)HASH_DER_LEN
86ad43c49eSManish V Badarkhe 			}
87ad43c49eSManish V Badarkhe 		},
88ad43c49eSManish V Badarkhe 		[1] = {
89ad43c49eSManish V Badarkhe 			.type_desc = &tb_fw_config_hash,
90ad43c49eSManish V Badarkhe 			.data = {
91ad43c49eSManish V Badarkhe 				.ptr = (void *)tb_fw_config_hash_buf,
92ad43c49eSManish V Badarkhe 				.len = (unsigned int)HASH_DER_LEN
93ad43c49eSManish V Badarkhe 			}
94ad43c49eSManish V Badarkhe 		},
95ad43c49eSManish V Badarkhe 		[2] = {
96ad43c49eSManish V Badarkhe 			.type_desc = &hw_config_hash,
97ad43c49eSManish V Badarkhe 			.data = {
98ad43c49eSManish V Badarkhe 				.ptr = (void *)hw_config_hash_buf,
99ad43c49eSManish V Badarkhe 				.len = (unsigned int)HASH_DER_LEN
100ad43c49eSManish V Badarkhe 			}
101*243875eaSLouis Mayencourt 		},
102*243875eaSLouis Mayencourt 		[3] = {
103*243875eaSLouis Mayencourt 			.type_desc = &fw_config_hash,
104*243875eaSLouis Mayencourt 			.data = {
105*243875eaSLouis Mayencourt 				.ptr = (void *)fw_config_hash_buf,
106*243875eaSLouis Mayencourt 				.len = (unsigned int)HASH_DER_LEN
107*243875eaSLouis Mayencourt 			}
108ad43c49eSManish V Badarkhe 		}
109ad43c49eSManish V Badarkhe 	}
110ad43c49eSManish V Badarkhe };
111ad43c49eSManish V Badarkhe 
112ad43c49eSManish V Badarkhe /* HW Config */
113ad43c49eSManish V Badarkhe const auth_img_desc_t hw_config = {
114ad43c49eSManish V Badarkhe 	.img_id = HW_CONFIG_ID,
115ad43c49eSManish V Badarkhe 	.img_type = IMG_RAW,
116ad43c49eSManish V Badarkhe 	.parent = &trusted_boot_fw_cert,
117ad43c49eSManish V Badarkhe 	.img_auth_methods = (const auth_method_desc_t[AUTH_METHOD_NUM]) {
118ad43c49eSManish V Badarkhe 		[0] = {
119ad43c49eSManish V Badarkhe 			.type = AUTH_METHOD_HASH,
120ad43c49eSManish V Badarkhe 			.param.hash = {
121ad43c49eSManish V Badarkhe 				.data = &raw_data,
122ad43c49eSManish V Badarkhe 				.hash = &hw_config_hash
123ad43c49eSManish V Badarkhe 			}
124ad43c49eSManish V Badarkhe 		}
125ad43c49eSManish V Badarkhe 	}
126ad43c49eSManish V Badarkhe };
127