blob: c60f8bd905ce2a28936989d6bbf014be2cf43337 [file] [log] [blame]
Tamas Ban48a0eb52018-08-17 12:48:05 +01001/*
Raef Coles793574c2019-10-09 10:59:42 +01002 * Copyright (c) 2018-2020, Arm Limited. All rights reserved.
Tamas Ban48a0eb52018-08-17 12:48:05 +01003 *
4 * SPDX-License-Identifier: BSD-3-Clause
5 *
6 */
7
Jamie Foxcc31d402019-01-28 17:13:52 +00008#include "psa/initial_attestation.h"
Tamas Banb6b80562019-01-04 22:49:24 +00009#include "tfm_veneers.h"
Antonio de Angelis05b24192019-07-04 15:28:46 +010010#include "tfm_ns_interface.h"
Jamie Foxcc31d402019-01-28 17:13:52 +000011#include "psa/client.h"
David Vinczeff6da532019-11-21 00:19:50 +010012#include "psa/crypto_types.h"
Edison Ai870abb42019-06-21 11:14:08 +080013#include "psa_manifest/sid.h"
Kevin Peng2ed30222019-04-30 09:26:11 +080014
15#define IOVEC_LEN(x) (sizeof(x)/sizeof(x[0]))
Tamas Ban48a0eb52018-08-17 12:48:05 +010016
Raef Coles793574c2019-10-09 10:59:42 +010017psa_status_t
Tamas Ban48a0eb52018-08-17 12:48:05 +010018psa_initial_attest_get_token(const uint8_t *challenge_obj,
19 uint32_t challenge_size,
20 uint8_t *token,
21 uint32_t *token_size)
22{
Kevin Peng2ed30222019-04-30 09:26:11 +080023 psa_handle_t handle = PSA_NULL_HANDLE;
24 psa_status_t status;
Kevin Peng9449a362019-07-29 16:05:42 +080025
Kevin Peng2ed30222019-04-30 09:26:11 +080026 psa_invec in_vec[] = {
27 {challenge_obj, challenge_size}
28 };
29 psa_outvec out_vec[] = {
30 {token, *token_size}
31 };
Tamas Ban48a0eb52018-08-17 12:48:05 +010032
Kevin Peng2ed30222019-04-30 09:26:11 +080033 handle = psa_connect(TFM_ATTEST_GET_TOKEN_SID,
Edison Ai870abb42019-06-21 11:14:08 +080034 TFM_ATTEST_GET_TOKEN_VERSION);
Raef Coles793574c2019-10-09 10:59:42 +010035 if (!PSA_HANDLE_IS_VALID(handle)) {
36 return PSA_HANDLE_TO_ERROR(handle);
Kevin Peng2ed30222019-04-30 09:26:11 +080037 }
Tamas Ban48a0eb52018-08-17 12:48:05 +010038
Summer Qin4b1d03b2019-07-02 14:56:08 +080039 status = psa_call(handle, PSA_IPC_CALL,
Kevin Peng2ed30222019-04-30 09:26:11 +080040 in_vec, IOVEC_LEN(in_vec),
41 out_vec, IOVEC_LEN(out_vec));
42 psa_close(handle);
Tamas Ban48a0eb52018-08-17 12:48:05 +010043
Kevin Peng2ed30222019-04-30 09:26:11 +080044 if (status == PSA_SUCCESS) {
45 *token_size = out_vec[0].len;
46 }
47
Raef Coles793574c2019-10-09 10:59:42 +010048 return status;
Tamas Banb6b80562019-01-04 22:49:24 +000049}
50
Raef Coles793574c2019-10-09 10:59:42 +010051psa_status_t
Tamas Banb6b80562019-01-04 22:49:24 +000052psa_initial_attest_get_token_size(uint32_t challenge_size,
53 uint32_t *token_size)
54{
Kevin Peng2ed30222019-04-30 09:26:11 +080055 psa_handle_t handle = PSA_NULL_HANDLE;
56 psa_status_t status;
Kevin Peng2ed30222019-04-30 09:26:11 +080057 psa_invec in_vec[] = {
58 {&challenge_size, sizeof(challenge_size)}
59 };
60 psa_outvec out_vec[] = {
61 {token_size, sizeof(uint32_t)}
62 };
Tamas Banb6b80562019-01-04 22:49:24 +000063
Kevin Peng2ed30222019-04-30 09:26:11 +080064 handle = psa_connect(TFM_ATTEST_GET_TOKEN_SIZE_SID,
Edison Ai870abb42019-06-21 11:14:08 +080065 TFM_ATTEST_GET_TOKEN_SIZE_VERSION);
Raef Coles793574c2019-10-09 10:59:42 +010066 if (!PSA_HANDLE_IS_VALID(handle)) {
67 return PSA_HANDLE_TO_ERROR(handle);
Kevin Peng2ed30222019-04-30 09:26:11 +080068 }
Tamas Banb6b80562019-01-04 22:49:24 +000069
Summer Qin4b1d03b2019-07-02 14:56:08 +080070 status = psa_call(handle, PSA_IPC_CALL,
Kevin Peng2ed30222019-04-30 09:26:11 +080071 in_vec, IOVEC_LEN(in_vec),
72 out_vec, IOVEC_LEN(out_vec));
73 psa_close(handle);
Tamas Banb6b80562019-01-04 22:49:24 +000074
Raef Coles793574c2019-10-09 10:59:42 +010075 return status;
Tamas Ban48a0eb52018-08-17 12:48:05 +010076}
David Vinczeff6da532019-11-21 00:19:50 +010077
Raef Coles793574c2019-10-09 10:59:42 +010078psa_status_t
David Vinczeff6da532019-11-21 00:19:50 +010079tfm_initial_attest_get_public_key(uint8_t *public_key,
80 size_t public_key_buf_size,
81 size_t *public_key_len,
82 psa_ecc_curve_t *elliptic_curve_type)
83{
84 psa_handle_t handle = PSA_NULL_HANDLE;
85 psa_status_t status;
86
87 psa_outvec out_vec[] = {
88 {.base = public_key, .len = public_key_buf_size},
89 {.base = elliptic_curve_type, .len = sizeof(*elliptic_curve_type)},
90 {.base = public_key_len, .len = sizeof(*public_key_len)}
91 };
92
93 handle = psa_connect(TFM_ATTEST_GET_PUBLIC_KEY_SID,
94 TFM_ATTEST_GET_PUBLIC_KEY_VERSION);
95 if (!PSA_HANDLE_IS_VALID(handle)) {
Raef Coles793574c2019-10-09 10:59:42 +010096 return PSA_HANDLE_TO_ERROR(handle);
David Vinczeff6da532019-11-21 00:19:50 +010097 }
98
99 status = psa_call(handle, PSA_IPC_CALL,
100 NULL, 0,
101 out_vec, IOVEC_LEN(out_vec));
102 psa_close(handle);
103
Raef Coles793574c2019-10-09 10:59:42 +0100104 return status;
David Vinczeff6da532019-11-21 00:19:50 +0100105}