blob: 337acbe1bde175d344f88a51c13f0200661cf85b [file] [log] [blame]
Tamas Ban48a0eb52018-08-17 12:48:05 +01001/*
Raef Coles793574c2019-10-09 10:59:42 +01002 * Copyright (c) 2018-2020, Arm Limited. All rights reserved.
Tamas Ban48a0eb52018-08-17 12:48:05 +01003 *
4 * SPDX-License-Identifier: BSD-3-Clause
5 *
6 */
7
Jamie Foxcc31d402019-01-28 17:13:52 +00008#include "psa/initial_attestation.h"
Tamas Banb6b80562019-01-04 22:49:24 +00009#include "tfm_veneers.h"
Antonio de Angelis05b24192019-07-04 15:28:46 +010010#include "tfm_ns_interface.h"
Jamie Foxcc31d402019-01-28 17:13:52 +000011#include "psa/client.h"
David Vinczeff6da532019-11-21 00:19:50 +010012#include "psa/crypto_types.h"
Edison Ai870abb42019-06-21 11:14:08 +080013#include "psa_manifest/sid.h"
Kevin Peng2ed30222019-04-30 09:26:11 +080014
15#define IOVEC_LEN(x) (sizeof(x)/sizeof(x[0]))
Tamas Ban48a0eb52018-08-17 12:48:05 +010016
Raef Coles793574c2019-10-09 10:59:42 +010017psa_status_t
Raef Coles70a02da2019-10-09 11:32:04 +010018psa_initial_attest_get_token(const uint8_t *auth_challenge,
19 size_t challenge_size,
20 uint8_t *token_buf,
21 size_t token_buf_size,
22 size_t *token_size)
Tamas Ban48a0eb52018-08-17 12:48:05 +010023{
Kevin Peng2ed30222019-04-30 09:26:11 +080024 psa_handle_t handle = PSA_NULL_HANDLE;
25 psa_status_t status;
Kevin Peng9449a362019-07-29 16:05:42 +080026
Kevin Peng2ed30222019-04-30 09:26:11 +080027 psa_invec in_vec[] = {
Raef Coles70a02da2019-10-09 11:32:04 +010028 {auth_challenge, challenge_size}
Kevin Peng2ed30222019-04-30 09:26:11 +080029 };
30 psa_outvec out_vec[] = {
Raef Coles70a02da2019-10-09 11:32:04 +010031 {token_buf, token_buf_size}
Kevin Peng2ed30222019-04-30 09:26:11 +080032 };
Tamas Ban48a0eb52018-08-17 12:48:05 +010033
Kevin Peng2ed30222019-04-30 09:26:11 +080034 handle = psa_connect(TFM_ATTEST_GET_TOKEN_SID,
Edison Ai870abb42019-06-21 11:14:08 +080035 TFM_ATTEST_GET_TOKEN_VERSION);
Raef Coles793574c2019-10-09 10:59:42 +010036 if (!PSA_HANDLE_IS_VALID(handle)) {
37 return PSA_HANDLE_TO_ERROR(handle);
Kevin Peng2ed30222019-04-30 09:26:11 +080038 }
Tamas Ban48a0eb52018-08-17 12:48:05 +010039
Summer Qin4b1d03b2019-07-02 14:56:08 +080040 status = psa_call(handle, PSA_IPC_CALL,
Kevin Peng2ed30222019-04-30 09:26:11 +080041 in_vec, IOVEC_LEN(in_vec),
42 out_vec, IOVEC_LEN(out_vec));
43 psa_close(handle);
Tamas Ban48a0eb52018-08-17 12:48:05 +010044
Kevin Peng2ed30222019-04-30 09:26:11 +080045 if (status == PSA_SUCCESS) {
46 *token_size = out_vec[0].len;
47 }
48
Raef Coles793574c2019-10-09 10:59:42 +010049 return status;
Tamas Banb6b80562019-01-04 22:49:24 +000050}
51
Raef Coles793574c2019-10-09 10:59:42 +010052psa_status_t
Raef Coles70a02da2019-10-09 11:32:04 +010053psa_initial_attest_get_token_size(size_t challenge_size,
54 size_t *token_size)
Tamas Banb6b80562019-01-04 22:49:24 +000055{
Kevin Peng2ed30222019-04-30 09:26:11 +080056 psa_handle_t handle = PSA_NULL_HANDLE;
57 psa_status_t status;
Kevin Peng2ed30222019-04-30 09:26:11 +080058 psa_invec in_vec[] = {
59 {&challenge_size, sizeof(challenge_size)}
60 };
61 psa_outvec out_vec[] = {
Raef Coles70a02da2019-10-09 11:32:04 +010062 {token_size, sizeof(size_t)}
Kevin Peng2ed30222019-04-30 09:26:11 +080063 };
Tamas Banb6b80562019-01-04 22:49:24 +000064
Kevin Peng2ed30222019-04-30 09:26:11 +080065 handle = psa_connect(TFM_ATTEST_GET_TOKEN_SIZE_SID,
Edison Ai870abb42019-06-21 11:14:08 +080066 TFM_ATTEST_GET_TOKEN_SIZE_VERSION);
Raef Coles793574c2019-10-09 10:59:42 +010067 if (!PSA_HANDLE_IS_VALID(handle)) {
68 return PSA_HANDLE_TO_ERROR(handle);
Kevin Peng2ed30222019-04-30 09:26:11 +080069 }
Tamas Banb6b80562019-01-04 22:49:24 +000070
Summer Qin4b1d03b2019-07-02 14:56:08 +080071 status = psa_call(handle, PSA_IPC_CALL,
Kevin Peng2ed30222019-04-30 09:26:11 +080072 in_vec, IOVEC_LEN(in_vec),
73 out_vec, IOVEC_LEN(out_vec));
74 psa_close(handle);
Tamas Banb6b80562019-01-04 22:49:24 +000075
Raef Coles793574c2019-10-09 10:59:42 +010076 return status;
Tamas Ban48a0eb52018-08-17 12:48:05 +010077}
David Vinczeff6da532019-11-21 00:19:50 +010078
Raef Coles793574c2019-10-09 10:59:42 +010079psa_status_t
David Vinczeff6da532019-11-21 00:19:50 +010080tfm_initial_attest_get_public_key(uint8_t *public_key,
81 size_t public_key_buf_size,
82 size_t *public_key_len,
83 psa_ecc_curve_t *elliptic_curve_type)
84{
85 psa_handle_t handle = PSA_NULL_HANDLE;
86 psa_status_t status;
87
88 psa_outvec out_vec[] = {
89 {.base = public_key, .len = public_key_buf_size},
90 {.base = elliptic_curve_type, .len = sizeof(*elliptic_curve_type)},
91 {.base = public_key_len, .len = sizeof(*public_key_len)}
92 };
93
94 handle = psa_connect(TFM_ATTEST_GET_PUBLIC_KEY_SID,
95 TFM_ATTEST_GET_PUBLIC_KEY_VERSION);
96 if (!PSA_HANDLE_IS_VALID(handle)) {
Raef Coles793574c2019-10-09 10:59:42 +010097 return PSA_HANDLE_TO_ERROR(handle);
David Vinczeff6da532019-11-21 00:19:50 +010098 }
99
100 status = psa_call(handle, PSA_IPC_CALL,
101 NULL, 0,
102 out_vec, IOVEC_LEN(out_vec));
103 psa_close(handle);
104
Raef Coles793574c2019-10-09 10:59:42 +0100105 return status;
David Vinczeff6da532019-11-21 00:19:50 +0100106}