blob: b4a8f379e3e9c865a7ea9cbfc4ccf83d1140fd30 [file] [log] [blame]
Tamas Ban48a0eb52018-08-17 12:48:05 +01001/*
Raef Coles793574c2019-10-09 10:59:42 +01002 * Copyright (c) 2018-2020, Arm Limited. All rights reserved.
Tamas Ban48a0eb52018-08-17 12:48:05 +01003 *
4 * SPDX-License-Identifier: BSD-3-Clause
5 *
6 */
7
Jamie Foxcc31d402019-01-28 17:13:52 +00008#include "psa/initial_attestation.h"
Antonio de Angelis05b24192019-07-04 15:28:46 +01009#include "tfm_ns_interface.h"
Jamie Foxcc31d402019-01-28 17:13:52 +000010#include "psa/client.h"
David Vinczeff6da532019-11-21 00:19:50 +010011#include "psa/crypto_types.h"
Edison Ai870abb42019-06-21 11:14:08 +080012#include "psa_manifest/sid.h"
Kevin Peng2ed30222019-04-30 09:26:11 +080013
14#define IOVEC_LEN(x) (sizeof(x)/sizeof(x[0]))
Tamas Ban48a0eb52018-08-17 12:48:05 +010015
Raef Coles793574c2019-10-09 10:59:42 +010016psa_status_t
Raef Coles70a02da2019-10-09 11:32:04 +010017psa_initial_attest_get_token(const uint8_t *auth_challenge,
18 size_t challenge_size,
19 uint8_t *token_buf,
20 size_t token_buf_size,
21 size_t *token_size)
Tamas Ban48a0eb52018-08-17 12:48:05 +010022{
Kevin Peng2ed30222019-04-30 09:26:11 +080023 psa_handle_t handle = PSA_NULL_HANDLE;
24 psa_status_t status;
Kevin Peng9449a362019-07-29 16:05:42 +080025
Kevin Peng2ed30222019-04-30 09:26:11 +080026 psa_invec in_vec[] = {
Raef Coles70a02da2019-10-09 11:32:04 +010027 {auth_challenge, challenge_size}
Kevin Peng2ed30222019-04-30 09:26:11 +080028 };
29 psa_outvec out_vec[] = {
Raef Coles70a02da2019-10-09 11:32:04 +010030 {token_buf, token_buf_size}
Kevin Peng2ed30222019-04-30 09:26:11 +080031 };
Tamas Ban48a0eb52018-08-17 12:48:05 +010032
Kevin Peng2ed30222019-04-30 09:26:11 +080033 handle = psa_connect(TFM_ATTEST_GET_TOKEN_SID,
Edison Ai870abb42019-06-21 11:14:08 +080034 TFM_ATTEST_GET_TOKEN_VERSION);
Raef Coles793574c2019-10-09 10:59:42 +010035 if (!PSA_HANDLE_IS_VALID(handle)) {
36 return PSA_HANDLE_TO_ERROR(handle);
Kevin Peng2ed30222019-04-30 09:26:11 +080037 }
Tamas Ban48a0eb52018-08-17 12:48:05 +010038
Summer Qin4b1d03b2019-07-02 14:56:08 +080039 status = psa_call(handle, PSA_IPC_CALL,
Kevin Peng2ed30222019-04-30 09:26:11 +080040 in_vec, IOVEC_LEN(in_vec),
41 out_vec, IOVEC_LEN(out_vec));
42 psa_close(handle);
Tamas Ban48a0eb52018-08-17 12:48:05 +010043
Kevin Peng2ed30222019-04-30 09:26:11 +080044 if (status == PSA_SUCCESS) {
45 *token_size = out_vec[0].len;
46 }
47
Raef Coles793574c2019-10-09 10:59:42 +010048 return status;
Tamas Banb6b80562019-01-04 22:49:24 +000049}
50
Raef Coles793574c2019-10-09 10:59:42 +010051psa_status_t
Raef Coles70a02da2019-10-09 11:32:04 +010052psa_initial_attest_get_token_size(size_t challenge_size,
53 size_t *token_size)
Tamas Banb6b80562019-01-04 22:49:24 +000054{
Kevin Peng2ed30222019-04-30 09:26:11 +080055 psa_handle_t handle = PSA_NULL_HANDLE;
56 psa_status_t status;
Kevin Peng2ed30222019-04-30 09:26:11 +080057 psa_invec in_vec[] = {
58 {&challenge_size, sizeof(challenge_size)}
59 };
60 psa_outvec out_vec[] = {
Raef Coles70a02da2019-10-09 11:32:04 +010061 {token_size, sizeof(size_t)}
Kevin Peng2ed30222019-04-30 09:26:11 +080062 };
Tamas Banb6b80562019-01-04 22:49:24 +000063
Kevin Peng2ed30222019-04-30 09:26:11 +080064 handle = psa_connect(TFM_ATTEST_GET_TOKEN_SIZE_SID,
Edison Ai870abb42019-06-21 11:14:08 +080065 TFM_ATTEST_GET_TOKEN_SIZE_VERSION);
Raef Coles793574c2019-10-09 10:59:42 +010066 if (!PSA_HANDLE_IS_VALID(handle)) {
67 return PSA_HANDLE_TO_ERROR(handle);
Kevin Peng2ed30222019-04-30 09:26:11 +080068 }
Tamas Banb6b80562019-01-04 22:49:24 +000069
Summer Qin4b1d03b2019-07-02 14:56:08 +080070 status = psa_call(handle, PSA_IPC_CALL,
Kevin Peng2ed30222019-04-30 09:26:11 +080071 in_vec, IOVEC_LEN(in_vec),
72 out_vec, IOVEC_LEN(out_vec));
73 psa_close(handle);
Tamas Banb6b80562019-01-04 22:49:24 +000074
Raef Coles793574c2019-10-09 10:59:42 +010075 return status;
Tamas Ban48a0eb52018-08-17 12:48:05 +010076}
David Vinczeff6da532019-11-21 00:19:50 +010077
Raef Coles793574c2019-10-09 10:59:42 +010078psa_status_t
Summer Qin0e5b2e02020-10-22 11:23:39 +080079tfm_initial_attest_get_public_key(uint8_t *public_key,
80 size_t public_key_buf_size,
81 size_t *public_key_len,
82 psa_ecc_family_t *elliptic_curve_type)
David Vinczeff6da532019-11-21 00:19:50 +010083{
84 psa_handle_t handle = PSA_NULL_HANDLE;
85 psa_status_t status;
86
87 psa_outvec out_vec[] = {
88 {.base = public_key, .len = public_key_buf_size},
89 {.base = elliptic_curve_type, .len = sizeof(*elliptic_curve_type)},
90 {.base = public_key_len, .len = sizeof(*public_key_len)}
91 };
92
93 handle = psa_connect(TFM_ATTEST_GET_PUBLIC_KEY_SID,
94 TFM_ATTEST_GET_PUBLIC_KEY_VERSION);
95 if (!PSA_HANDLE_IS_VALID(handle)) {
Raef Coles793574c2019-10-09 10:59:42 +010096 return PSA_HANDLE_TO_ERROR(handle);
David Vinczeff6da532019-11-21 00:19:50 +010097 }
98
99 status = psa_call(handle, PSA_IPC_CALL,
100 NULL, 0,
101 out_vec, IOVEC_LEN(out_vec));
102 psa_close(handle);
103
Raef Coles793574c2019-10-09 10:59:42 +0100104 return status;
David Vinczeff6da532019-11-21 00:19:50 +0100105}