blob: 7c101c9b746091262c7669643d7305171ecbeff2 [file] [log] [blame]
Pascal Brandc639ac82015-07-02 08:53:34 +02001/*
2 * Copyright (c) 2014, STMicroelectronics International N.V.
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions are met:
7 *
8 * 1. Redistributions of source code must retain the above copyright notice,
9 * this list of conditions and the following disclaimer.
10 *
11 * 2. Redistributions in binary form must reproduce the above copyright notice,
12 * this list of conditions and the following disclaimer in the documentation
13 * and/or other materials provided with the distribution.
14 *
15 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
16 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
17 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
18 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
19 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
20 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
21 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
22 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
23 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
24 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
25 * POSSIBILITY OF SUCH DAMAGE.
26 */
27
Pascal Brandc639ac82015-07-02 08:53:34 +020028#include <aes_taf.h>
Pascal Brandc639ac82015-07-02 08:53:34 +020029#include <cryp_taf.h>
Jens Wiklandere9babd92018-04-20 11:20:59 +020030#include <mbedtls_taf.h>
31#include <sha2_taf.h>
32#include <ta_crypt.h>
33#include <tee_ta_api.h>
Jens Wiklander065ccfa2015-08-21 14:39:20 +020034#include <trace.h>
Pascal Brandc639ac82015-07-02 08:53:34 +020035
36static TEE_Result set_global(uint32_t param_types, TEE_Param params[4]);
37static TEE_Result get_global(uint32_t param_types, TEE_Param params[4]);
38static int _globalvalue;
39
40/*
41 * Trusted Application Entry Points
42 */
43
44/* Called each time a new instance is created */
45TEE_Result TA_CreateEntryPoint(void)
46{
47 return TEE_SUCCESS;
48}
49
50/* Called each time an instance is destroyed */
51void TA_DestroyEntryPoint(void)
52{
53}
54
55/* Called each time a session is opened */
56TEE_Result TA_OpenSessionEntryPoint(uint32_t nParamTypes,
57 TEE_Param pParams[4],
58 void **ppSessionContext)
59{
60 (void)nParamTypes;
61 (void)pParams;
62 (void)ppSessionContext;
63 return TEE_SUCCESS;
64}
65
66/* Called each time a session is closed */
67void TA_CloseSessionEntryPoint(void *pSessionContext)
68{
69 (void)pSessionContext;
70}
71
Jens Wiklander065ccfa2015-08-21 14:39:20 +020072/*
73 * To provoke the linker to produce R_ARM_ABS32 relocations we need to
74 * pre-initilize a pointer to the function and then also call the function
75 * directly.
76 */
77static TEE_Result (*ta_cmd_entries[])(uint32_t, TEE_Param *) = {
78 [TA_CRYPT_CMD_SHA224] = ta_entry_sha224,
79 [TA_CRYPT_CMD_SHA256] = ta_entry_sha256,
80};
81
Pascal Brandc639ac82015-07-02 08:53:34 +020082/* Called when a command is invoked */
83TEE_Result TA_InvokeCommandEntryPoint(void *pSessionContext,
84 uint32_t nCommandID, uint32_t nParamTypes,
85 TEE_Param pParams[4])
86{
Jens Wiklander065ccfa2015-08-21 14:39:20 +020087 static bool use_fptr = false;
88
Pascal Brandc639ac82015-07-02 08:53:34 +020089 (void)pSessionContext;
90
Jens Wiklander065ccfa2015-08-21 14:39:20 +020091
Pascal Brandc639ac82015-07-02 08:53:34 +020092 switch (nCommandID) {
93 case TA_CRYPT_CMD_SHA224:
Jens Wiklander065ccfa2015-08-21 14:39:20 +020094 use_fptr = !use_fptr;
95 if (use_fptr)
96 return ta_cmd_entries[nCommandID](nParamTypes, pParams);
97 else
98 return ta_entry_sha224(nParamTypes, pParams);
Pascal Brandc639ac82015-07-02 08:53:34 +020099
100 case TA_CRYPT_CMD_SHA256:
Jens Wiklander065ccfa2015-08-21 14:39:20 +0200101 use_fptr = !use_fptr;
102 if (use_fptr)
103 return ta_cmd_entries[nCommandID](nParamTypes, pParams);
104 else
105 return ta_entry_sha256(nParamTypes, pParams);
Pascal Brandc639ac82015-07-02 08:53:34 +0200106
107 case TA_CRYPT_CMD_AES256ECB_ENC:
108 return ta_entry_aes256ecb_encrypt(nParamTypes, pParams);
109
110 case TA_CRYPT_CMD_AES256ECB_DEC:
111 return ta_entry_aes256ecb_decrypt(nParamTypes, pParams);
112
113 case TA_CRYPT_CMD_ALLOCATE_OPERATION:
114 return ta_entry_allocate_operation(nParamTypes, pParams);
115
116 case TA_CRYPT_CMD_FREE_OPERATION:
117 return ta_entry_free_operation(nParamTypes, pParams);
118
119 case TA_CRYPT_CMD_GET_OPERATION_INFO:
120 return ta_entry_get_operation_info(nParamTypes, pParams);
121
122 case TA_CRYPT_CMD_RESET_OPERATION:
123 return ta_entry_reset_operation(nParamTypes, pParams);
124
125 case TA_CRYPT_CMD_SET_OPERATION_KEY:
126 return ta_entry_set_operation_key(nParamTypes, pParams);
127
128 case TA_CRYPT_CMD_SET_OPERATION_KEY2:
129 return ta_entry_set_operation_key2(nParamTypes, pParams);
130
131 case TA_CRYPT_CMD_COPY_OPERATION:
132 return ta_entry_copy_operation(nParamTypes, pParams);
133
134 case TA_CRYPT_CMD_DIGEST_UPDATE:
135 return ta_entry_digest_update(nParamTypes, pParams);
136
137 case TA_CRYPT_CMD_DIGEST_DO_FINAL:
138 return ta_entry_digest_do_final(nParamTypes, pParams);
139
140 case TA_CRYPT_CMD_CIPHER_INIT:
141 return ta_entry_cipher_init(nParamTypes, pParams);
142
143 case TA_CRYPT_CMD_CIPHER_UPDATE:
144 return ta_entry_cipher_update(nParamTypes, pParams);
145
146 case TA_CRYPT_CMD_CIPHER_DO_FINAL:
147 return ta_entry_cipher_do_final(nParamTypes, pParams);
148
149 case TA_CRYPT_CMD_MAC_INIT:
150 return ta_entry_mac_init(nParamTypes, pParams);
151
152 case TA_CRYPT_CMD_MAC_UPDATE:
153 return ta_entry_mac_update(nParamTypes, pParams);
154
155 case TA_CRYPT_CMD_MAC_FINAL_COMPUTE:
156 return ta_entry_mac_final_compute(nParamTypes, pParams);
157
158 case TA_CRYPT_CMD_MAC_FINAL_COMPARE:
159 return ta_entry_mac_final_compare(nParamTypes, pParams);
160
161 case TA_CRYPT_CMD_ALLOCATE_TRANSIENT_OBJECT:
162 return ta_entry_allocate_transient_object(nParamTypes, pParams);
163
164 case TA_CRYPT_CMD_FREE_TRANSIENT_OBJECT:
165 return ta_entry_free_transient_object(nParamTypes, pParams);
166
167 case TA_CRYPT_CMD_RESET_TRANSIENT_OBJECT:
168 return ta_entry_reset_transient_object(nParamTypes, pParams);
169
170 case TA_CRYPT_CMD_POPULATE_TRANSIENT_OBJECT:
171 return ta_entry_populate_transient_object(nParamTypes, pParams);
172
173 case TA_CRYPT_CMD_COPY_OBJECT_ATTRIBUTES:
174 return ta_entry_copy_object_attributes(nParamTypes, pParams);
175
176 case TA_CRYPT_CMD_GENERATE_KEY:
177 return ta_entry_generate_key(nParamTypes, pParams);
178
179 case TA_CRYPT_CMD_ASYMMETRIC_ENCRYPT:
180 return ta_entry_asymmetric_encrypt(nParamTypes, pParams);
181
182 case TA_CRYPT_CMD_ASYMMETRIC_DECRYPT:
183 return ta_entry_asymmetric_decrypt(nParamTypes, pParams);
184
185 case TA_CRYPT_CMD_ASYMMETRIC_SIGN_DIGEST:
186 return ta_entry_asymmetric_sign_digest(nParamTypes, pParams);
187
188 case TA_CRYPT_CMD_ASYMMETRIC_VERIFY_DIGEST:
189 return ta_entry_asymmetric_verify_digest(nParamTypes, pParams);
190
191 case TA_CRYPT_CMD_DERIVE_KEY:
192 return ta_entry_derive_key(nParamTypes, pParams);
193
194 case TA_CRYPT_CMD_RANDOM_NUMBER_GENEREATE:
195 return ta_entry_random_number_generate(nParamTypes, pParams);
196
197 case TA_CRYPT_CMD_AE_INIT:
198 return ta_entry_ae_init(nParamTypes, pParams);
199
200 case TA_CRYPT_CMD_AE_UPDATE_AAD:
201 return ta_entry_ae_update_aad(nParamTypes, pParams);
202
203 case TA_CRYPT_CMD_AE_UPDATE:
204 return ta_entry_ae_update(nParamTypes, pParams);
205
206 case TA_CRYPT_CMD_AE_ENCRYPT_FINAL:
207 return ta_entry_ae_encrypt_final(nParamTypes, pParams);
208
209 case TA_CRYPT_CMD_AE_DECRYPT_FINAL:
210 return ta_entry_ae_decrypt_final(nParamTypes, pParams);
211
212 case TA_CRYPT_CMD_GET_OBJECT_BUFFER_ATTRIBUTE:
213 return ta_entry_get_object_buffer_attribute(nParamTypes,
214 pParams);
215 case TA_CRYPT_CMD_GET_OBJECT_VALUE_ATTRIBUTE:
216 return ta_entry_get_object_value_attribute(nParamTypes,
217 pParams);
218 case TA_CRYPT_CMD_SETGLOBAL:
219 return set_global(nParamTypes, pParams);
220
221 case TA_CRYPT_CMD_GETGLOBAL:
222 return get_global(nParamTypes, pParams);
223
Jens Wiklandere9babd92018-04-20 11:20:59 +0200224#ifdef CFG_TA_MBEDTLS
225 case TA_CRYPT_CMD_MBEDTLS_SELF_TESTS:
226 return ta_entry_mbedtls_self_tests(nParamTypes, pParams);
227#endif
228
Pascal Brandc639ac82015-07-02 08:53:34 +0200229 default:
230 return TEE_ERROR_BAD_PARAMETERS;
231 }
232}
233
234static TEE_Result set_global(uint32_t param_types, TEE_Param params[4])
235{
236 int i;
237
238 /* Param 0 is a memref, input/output */
239 if (TEE_PARAM_TYPE_VALUE_INPUT != TEE_PARAM_TYPE_GET(param_types, 0))
240 return TEE_ERROR_BAD_PARAMETERS;
241
242 /* Other parameters must be of type TEE_PARAM_TYPE_NONE */
243 for (i = 1; i < 4; i++) {
244 if (TEE_PARAM_TYPE_NONE != TEE_PARAM_TYPE_GET(param_types, i))
245 return TEE_ERROR_BAD_PARAMETERS;
246 }
247
248 _globalvalue = params[0].value.a;
249 return TEE_SUCCESS;
250}
251
252static TEE_Result get_global(uint32_t param_types, TEE_Param params[4])
253{
254 int i;
255
256 /* Param 0 is a memref, input/output */
257 if (TEE_PARAM_TYPE_VALUE_OUTPUT != TEE_PARAM_TYPE_GET(param_types, 0))
258 return TEE_ERROR_BAD_PARAMETERS;
259
260 /* Other parameters must be of type TEE_PARAM_TYPE_NONE */
261 for (i = 1; i < 4; i++) {
262 if (TEE_PARAM_TYPE_NONE != TEE_PARAM_TYPE_GET(param_types, i))
263 return TEE_ERROR_BAD_PARAMETERS;
264 }
265
266 params[0].value.a = _globalvalue;
267 return TEE_SUCCESS;
268}