1ad43c49eSManish V Badarkhe /* 2ad43c49eSManish V Badarkhe * Copyright (c) 2015-2020, ARM Limited and Contributors. All rights reserved. 3ad43c49eSManish V Badarkhe * 4ad43c49eSManish V Badarkhe * SPDX-License-Identifier: BSD-3-Clause 5ad43c49eSManish V Badarkhe */ 6ad43c49eSManish V Badarkhe 7ad43c49eSManish V Badarkhe #include <stddef.h> 8ad43c49eSManish V Badarkhe 9ad43c49eSManish V Badarkhe #include <platform_def.h> 10ad43c49eSManish V Badarkhe #include <drivers/auth/mbedtls/mbedtls_config.h> 11ad43c49eSManish V Badarkhe 12ad43c49eSManish V Badarkhe #include <drivers/auth/auth_mod.h> 13ad43c49eSManish V Badarkhe #include <drivers/auth/tbbr_cot_common.h> 14ad43c49eSManish V Badarkhe #if USE_TBBR_DEFS 15ad43c49eSManish V Badarkhe #include <tools_share/tbbr_oid.h> 16ad43c49eSManish V Badarkhe #else 17ad43c49eSManish V Badarkhe #include <platform_oid.h> 18ad43c49eSManish V Badarkhe #endif 19ad43c49eSManish V Badarkhe 20ad43c49eSManish V Badarkhe /* 21ad43c49eSManish V Badarkhe * The platform must allocate buffers to store the authentication parameters 22ad43c49eSManish V Badarkhe * extracted from the certificates. In this case, because of the way the CoT is 23ad43c49eSManish V Badarkhe * established, we can reuse some of the buffers on different stages 24ad43c49eSManish V Badarkhe */ 25ad43c49eSManish V Badarkhe 26*243875eaSLouis Mayencourt static unsigned char fw_config_hash_buf[HASH_DER_LEN]; 27*243875eaSLouis Mayencourt static unsigned char tb_fw_config_hash_buf[HASH_DER_LEN]; 28*243875eaSLouis Mayencourt static unsigned char hw_config_hash_buf[HASH_DER_LEN]; 29ad43c49eSManish V Badarkhe unsigned char tb_fw_hash_buf[HASH_DER_LEN]; 30ad43c49eSManish V Badarkhe unsigned char scp_fw_hash_buf[HASH_DER_LEN]; 31ad43c49eSManish V Badarkhe unsigned char nt_world_bl_hash_buf[HASH_DER_LEN]; 32ad43c49eSManish V Badarkhe 33ad43c49eSManish V Badarkhe /* 34ad43c49eSManish V Badarkhe * common Parameter type descriptors across BL1 and BL2 35ad43c49eSManish V Badarkhe */ 36ad43c49eSManish V Badarkhe auth_param_type_desc_t trusted_nv_ctr = AUTH_PARAM_TYPE_DESC( 37ad43c49eSManish V Badarkhe AUTH_PARAM_NV_CTR, TRUSTED_FW_NVCOUNTER_OID); 38ad43c49eSManish V Badarkhe auth_param_type_desc_t subject_pk = AUTH_PARAM_TYPE_DESC( 39ad43c49eSManish V Badarkhe AUTH_PARAM_PUB_KEY, 0); 40ad43c49eSManish V Badarkhe auth_param_type_desc_t sig = AUTH_PARAM_TYPE_DESC( 41ad43c49eSManish V Badarkhe AUTH_PARAM_SIG, 0); 42ad43c49eSManish V Badarkhe auth_param_type_desc_t sig_alg = AUTH_PARAM_TYPE_DESC( 43ad43c49eSManish V Badarkhe AUTH_PARAM_SIG_ALG, 0); 44ad43c49eSManish V Badarkhe auth_param_type_desc_t raw_data = AUTH_PARAM_TYPE_DESC( 45ad43c49eSManish V Badarkhe AUTH_PARAM_RAW_DATA, 0); 46ad43c49eSManish V Badarkhe 47ad43c49eSManish V Badarkhe /* common hash used across BL1 and BL2 */ 48ad43c49eSManish V Badarkhe auth_param_type_desc_t tb_fw_hash = AUTH_PARAM_TYPE_DESC( 49ad43c49eSManish V Badarkhe AUTH_PARAM_HASH, TRUSTED_BOOT_FW_HASH_OID); 50ad43c49eSManish V Badarkhe auth_param_type_desc_t tb_fw_config_hash = AUTH_PARAM_TYPE_DESC( 51ad43c49eSManish V Badarkhe AUTH_PARAM_HASH, TRUSTED_BOOT_FW_CONFIG_HASH_OID); 52*243875eaSLouis Mayencourt auth_param_type_desc_t fw_config_hash = AUTH_PARAM_TYPE_DESC( 53*243875eaSLouis Mayencourt AUTH_PARAM_HASH, FW_CONFIG_HASH_OID); 54*243875eaSLouis Mayencourt static auth_param_type_desc_t hw_config_hash = AUTH_PARAM_TYPE_DESC( 55ad43c49eSManish V Badarkhe AUTH_PARAM_HASH, HW_CONFIG_HASH_OID); 56ad43c49eSManish V Badarkhe 57ad43c49eSManish V Badarkhe /* trusted_boot_fw_cert */ 58ad43c49eSManish V Badarkhe const auth_img_desc_t trusted_boot_fw_cert = { 59ad43c49eSManish V Badarkhe .img_id = TRUSTED_BOOT_FW_CERT_ID, 60ad43c49eSManish V Badarkhe .img_type = IMG_CERT, 61ad43c49eSManish V Badarkhe .parent = NULL, 62ad43c49eSManish V Badarkhe .img_auth_methods = (const auth_method_desc_t[AUTH_METHOD_NUM]) { 63ad43c49eSManish V Badarkhe [0] = { 64ad43c49eSManish V Badarkhe .type = AUTH_METHOD_SIG, 65ad43c49eSManish V Badarkhe .param.sig = { 66ad43c49eSManish V Badarkhe .pk = &subject_pk, 67ad43c49eSManish V Badarkhe .sig = &sig, 68ad43c49eSManish V Badarkhe .alg = &sig_alg, 69ad43c49eSManish V Badarkhe .data = &raw_data 70ad43c49eSManish V Badarkhe } 71ad43c49eSManish V Badarkhe }, 72ad43c49eSManish V Badarkhe [1] = { 73ad43c49eSManish V Badarkhe .type = AUTH_METHOD_NV_CTR, 74ad43c49eSManish V Badarkhe .param.nv_ctr = { 75ad43c49eSManish V Badarkhe .cert_nv_ctr = &trusted_nv_ctr, 76ad43c49eSManish V Badarkhe .plat_nv_ctr = &trusted_nv_ctr 77ad43c49eSManish V Badarkhe } 78ad43c49eSManish V Badarkhe } 79ad43c49eSManish V Badarkhe }, 80ad43c49eSManish V Badarkhe .authenticated_data = (const auth_param_desc_t[COT_MAX_VERIFIED_PARAMS]) { 81ad43c49eSManish V Badarkhe [0] = { 82ad43c49eSManish V Badarkhe .type_desc = &tb_fw_hash, 83ad43c49eSManish V Badarkhe .data = { 84ad43c49eSManish V Badarkhe .ptr = (void *)tb_fw_hash_buf, 85ad43c49eSManish V Badarkhe .len = (unsigned int)HASH_DER_LEN 86ad43c49eSManish V Badarkhe } 87ad43c49eSManish V Badarkhe }, 88ad43c49eSManish V Badarkhe [1] = { 89ad43c49eSManish V Badarkhe .type_desc = &tb_fw_config_hash, 90ad43c49eSManish V Badarkhe .data = { 91ad43c49eSManish V Badarkhe .ptr = (void *)tb_fw_config_hash_buf, 92ad43c49eSManish V Badarkhe .len = (unsigned int)HASH_DER_LEN 93ad43c49eSManish V Badarkhe } 94ad43c49eSManish V Badarkhe }, 95ad43c49eSManish V Badarkhe [2] = { 96ad43c49eSManish V Badarkhe .type_desc = &hw_config_hash, 97ad43c49eSManish V Badarkhe .data = { 98ad43c49eSManish V Badarkhe .ptr = (void *)hw_config_hash_buf, 99ad43c49eSManish V Badarkhe .len = (unsigned int)HASH_DER_LEN 100ad43c49eSManish V Badarkhe } 101*243875eaSLouis Mayencourt }, 102*243875eaSLouis Mayencourt [3] = { 103*243875eaSLouis Mayencourt .type_desc = &fw_config_hash, 104*243875eaSLouis Mayencourt .data = { 105*243875eaSLouis Mayencourt .ptr = (void *)fw_config_hash_buf, 106*243875eaSLouis Mayencourt .len = (unsigned int)HASH_DER_LEN 107*243875eaSLouis Mayencourt } 108ad43c49eSManish V Badarkhe } 109ad43c49eSManish V Badarkhe } 110ad43c49eSManish V Badarkhe }; 111ad43c49eSManish V Badarkhe 112ad43c49eSManish V Badarkhe /* HW Config */ 113ad43c49eSManish V Badarkhe const auth_img_desc_t hw_config = { 114ad43c49eSManish V Badarkhe .img_id = HW_CONFIG_ID, 115ad43c49eSManish V Badarkhe .img_type = IMG_RAW, 116ad43c49eSManish V Badarkhe .parent = &trusted_boot_fw_cert, 117ad43c49eSManish V Badarkhe .img_auth_methods = (const auth_method_desc_t[AUTH_METHOD_NUM]) { 118ad43c49eSManish V Badarkhe [0] = { 119ad43c49eSManish V Badarkhe .type = AUTH_METHOD_HASH, 120ad43c49eSManish V Badarkhe .param.hash = { 121ad43c49eSManish V Badarkhe .data = &raw_data, 122ad43c49eSManish V Badarkhe .hash = &hw_config_hash 123ad43c49eSManish V Badarkhe } 124ad43c49eSManish V Badarkhe } 125ad43c49eSManish V Badarkhe } 126ad43c49eSManish V Badarkhe }; 127