blob: 17a17f3e64358aa81e8cfa40249c2cd7f0b6d960 [file] [log] [blame]
diff --git a/ports/demo/demo-discovery.c b/ports/demo/demo-discovery.c
index aab117a..a7a0f5d 100644
--- a/ports/demo/demo-discovery.c
+++ b/ports/demo/demo-discovery.c
@@ -88,24 +88,31 @@
ED25519_VAL ED448_VAL SM2SM3_VAL HMAC_VAL CMAC_VAL
uint8_t discovery_template[] = {
- // @+00 (6 bytes) psa_auth_version: 1.0
- 0x01, 0x00, 0x02, 0x00, 0x01, 0x00,
- // @+06 (6 bytes) vendor_id: {0x04, 0x3B} => 0x023B ("ARM Ltd.")
- 0x02, 0x00, 0x02, 0x00, 0x04, 0x3B,
- // @+12 (8 bytes) soc_class: [0x00, 0x00, 0x00, 0x00]
- 0x03, 0x00, 0x04, 0x00, 0x00, 0x00, 0x00, 0x00,
- // @+20 (20 bytes) soc_id: [0x00] * 16
- 0x04, 0x00, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00,
- 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ // @+00 (12 bytes) psa_auth_version: 1.0
+ 0x00, 0x00, 0x01, 0x00, 0x02, 0x00, 0x00, 0x00,
+ 0x01, 0x00, 0x00, 0x00,
+ // @+12 (12 bytes) vendor_id: {0x04, 0x3B} => 0x023B ("ARM Ltd.")
+ 0x00, 0x00, 0x02, 0x00, 0x02, 0x00, 0x00, 0x00,
+ 0x04, 0x3B, 0x00, 0x00,
+ // @+24 (12 bytes) soc_class: [0x00, 0x00, 0x00, 0x00]
+ 0x00, 0x00, 0x03, 0x00, 0x04, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00,
- // @+40 (6 bytes) psa_lifecycle: PSA_LIFECYCLE_SECURED
- 0x08, 0x00, 0x02, 0x00, 0x00, 0x30,
- // @+46 (6 bytes) token_formats: [{0x00, 0x02} (token_psa_debug)]
- 0x00, 0x01, 0x02, 0x00, 0x00, 0x02,
- // @+52 (6 bytes) cert_formats: [{0x01, 0x02} (cert_psa_debug)]
- 0x01, 0x01, 0x02, 0x00, 0x01, 0x02,
- // @+58 (4 + X bytes) cryptosystems: [...]
- 0x02, 0x01, CRYPTO_CNT, 0x00, CRYPTO_VALS
+ // @+36 (24 bytes) soc_id: [0x00] * 16
+ 0x00, 0x00, 0x04, 0x00, 0x10, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ // @+60 (12 bytes) psa_lifecycle: PSA_LIFECYCLE_SECURED
+ 0x00, 0x00, 0x08, 0x00, 0x02, 0x00, 0x00, 0x00,
+ 0x00, 0x30, 0x00, 0x00,
+ // @+72 (12 bytes) token_formats: [{0x00, 0x02} (token_psa_debug)]
+ 0x00, 0x00, 0x00, 0x01, 0x02, 0x00, 0x00, 0x00,
+ 0x00, 0x02, 0x00, 0x00,
+ // @+84 (12 bytes) cert_formats: [{0x01, 0x02} (cert_psa_debug)]
+ 0x00, 0x00, 0x01, 0x01, 0x02, 0x00, 0x00, 0x00,
+ 0x01, 0x02, 0x00, 0x00,
+ // @+96 (8 + X bytes) cryptosystems: [...]
+ 0x00, 0x00, 0x02, 0x01, CRYPTO_CNT, 0x00, 0x00, 0x00,
+ CRYPTO_VALS
};
size_t discovery_template_len = sizeof(discovery_template);
diff --git a/ports/platforms/transports/unix_socket.c b/ports/platforms/transports/unix_socket.c
index 359a8c4..7ad11ff 100644
--- a/ports/platforms/transports/unix_socket.c
+++ b/ports/platforms/transports/unix_socket.c
@@ -54,7 +54,7 @@ static int message_receive(int fd, uint8_t buffer[], size_t max, size_t *size) {
}
}
- PSA_ADAC_LOG_DUMP("msg", "receive", buffer, 4 + p->data_count * 4);
+ PSA_ADAC_LOG_DUMP("msg", "receive", buffer, sizeof(request_packet_t) + p->data_count * 4);
return 0;
}
diff --git a/ports/targets/native/autotest.c b/ports/targets/native/autotest.c
index 8817825..ad185d5 100644
--- a/ports/targets/native/autotest.c
+++ b/ports/targets/native/autotest.c
@@ -111,7 +111,7 @@ void run_test(char *chain_file, char *key_file, uint8_t type) {
return;
}
psa_adac_sign_token(challenge->challenge_vector, sizeof(challenge->challenge_vector),
- key_type, NULL, 0, &token, &token_size, handle, NULL, 0);
+ key_type, NULL, 0, &token, &token_size, NULL, handle, NULL, 0);
psa_destroy_key(handle);
} else if ((type == CMAC_AES) || (type == HMAC_SHA256)) {
if (0 != load_secret_key(key_file, key_type, &key, &key_size)) {
@@ -119,7 +119,7 @@ void run_test(char *chain_file, char *key_file, uint8_t type) {
return;
}
psa_adac_sign_token(challenge->challenge_vector, sizeof(challenge->challenge_vector),
- key_type, NULL, 0, &token, &token_size, 0, key, key_size);
+ key_type, NULL, 0, &token, &token_size, NULL, 0, key, key_size);
}
response_packet_release(response);
diff --git a/ports/targets/native/client.c b/ports/targets/native/client.c
index 2316a87..740be99 100755
--- a/ports/targets/native/client.c
+++ b/ports/targets/native/client.c
@@ -135,7 +135,7 @@ int main(int argc, char *argv[]) {
if (PSA_SUCCESS == psa_adac_sign_token(challenge->challenge_vector, sizeof(challenge->challenge_vector),
- key_type, NULL, 0, &token, &token_size, handle, key, key_size)) {
+ key_type, NULL, 0, &token, &token_size, NULL, handle, key, key_size)) {
response_packet_release(response);
PSA_ADAC_LOG_DUMP("client", "token", token, token_size);
} else {
diff --git a/ports/targets/native/psa_sdm.c b/ports/targets/native/psa_sdm.c
index 2d775c1..d5e47ea 100755
--- a/ports/targets/native/psa_sdm.c
+++ b/ports/targets/native/psa_sdm.c
@@ -178,7 +178,7 @@ SDM_EXTERN SDMReturnCode SDM_Authenticate(SDMHandle handle, const SDMAuthenticat
config->callbacks->updateProgress("signing token", 40, config->refcon);
if (PSA_SUCCESS == psa_adac_sign_token(challenge->challenge_vector, sizeof(challenge->challenge_vector),
- key_type, NULL, 0, &token, &token_size, key_handle, NULL, 0)) {
+ key_type, NULL, 0, &token, &token_size, NULL, key_handle, NULL, 0)) {
response_packet_release(response);
PSA_ADAC_LOG_DUMP("client", "token", token, token_size);
} else {
diff --git a/ports/targets/native/selftest.c b/ports/targets/native/selftest.c
index 14d09d1..a1084e9 100755
--- a/ports/targets/native/selftest.c
+++ b/ports/targets/native/selftest.c
@@ -133,7 +133,7 @@ int main(int argc, char *argv[]) {
}
if (PSA_SUCCESS == psa_adac_sign_token(challenge.challenge_vector, sizeof(challenge.challenge_vector),
- key_type, NULL, 0, &token, &token_size, handle, NULL, 0)) {
+ key_type, NULL, 0, &token, &token_size, NULL, handle, NULL, 0)) {
// PSA_ADAC_LOG_DUMP("client", "token", token, token_size);
if (PSA_SUCCESS != psa_adac_verify_token_signature(token + 4, token_size - 4,
diff --git a/psa-adac/core/include/psa_adac.h b/psa-adac/core/include/psa_adac.h
index c965f76..0bf80be 100644
--- a/psa-adac/core/include/psa_adac.h
+++ b/psa-adac/core/include/psa_adac.h
@@ -20,6 +20,17 @@
#define ROUND_TO_WORD(x) (((size_t)x + 3) & ~0x03UL)
+/** \brief Version
+ *
+ * Current version numbers for certificate and token format.
+ */
+enum _adac_versions {
+ SDP_CERT_MAJOR = 1,
+ SDP_CERT_MINOR = 0,
+ SDP_TOKEN_MAJOR = 1,
+ SDP_TOKEN_MINOR = 0,
+};
+
/** \brief Key options
*
*/
@@ -124,7 +135,7 @@ typedef struct {
uint8_t usage;
uint16_t _reserved; //!< Must be set to zero.
uint16_t lifecycle;
- uint16_t custom_constraint;
+ uint16_t oem_constraint;
uint32_t extensions_bytes;
uint32_t soc_class;
uint8_t soc_id[16];
@@ -144,6 +155,7 @@ typedef struct {
#define CHALLENGE_SIZE 32
#define MAX_EXTENSIONS 16
+#define PERMISSION_BITS 128
/** \brief Authentication challenge
*
diff --git a/psa-adac/sda/src/psa_adac_sda.c b/psa-adac/sda/src/psa_adac_sda.c
index f57f65c..d5e030c 100644
--- a/psa-adac/sda/src/psa_adac_sda.c
+++ b/psa-adac/sda/src/psa_adac_sda.c
@@ -365,7 +365,6 @@ int authentication_handle(authentication_context_t *auth_ctx) {
(void) authenticator_request_packet_release(auth_ctx, request);
response = authenticator_response_packet_build(auth_ctx, SDP_SUCCESS, NULL, 0);
ret = authenticator_send_response(auth_ctx, response);
- done = 1;
break;
default:
@@ -380,8 +379,12 @@ int authentication_handle(authentication_context_t *auth_ctx) {
PSA_ADAC_LOG_ERR("auth", "Error sending response: %04x\n", ret);
}
- if ((auth_ctx->state == AUTH_SUCCESS) || (auth_ctx->state == AUTH_FAILURE)) {
- done = 1;
+ if ((auth_ctx->state == AUTH_SUCCESS)) {
+ PSA_ADAC_LOG_INFO("auth", "Authentication is a success\n");
+ auth_ctx->state = AUTH_INIT;
+ } else if (auth_ctx->state == AUTH_FAILURE) {
+ PSA_ADAC_LOG_INFO("auth", "Authentication is a failure\n");
+ auth_ctx->state = AUTH_INIT;
}
}
diff --git a/psa-adac/sdm/include/psa_adac_sdm.h b/psa-adac/sdm/include/psa_adac_sdm.h
index b15c630..616ef62 100644
--- a/psa-adac/sdm/include/psa_adac_sdm.h
+++ b/psa-adac/sdm/include/psa_adac_sdm.h
@@ -31,9 +31,9 @@ int load_trust_chain(const char *chain_file, uint8_t **chain, size_t *chain_size
int load_trust_rotpk(const char *chain_file, psa_algorithm_t alg, uint8_t *rotpk,
size_t buffer_size, size_t *rotpk_size, uint8_t *rotpk_type);
-psa_status_t psa_adac_sign_token(uint8_t challenge[], size_t challenge_size, uint8_t signature_type, uint8_t exts[],
- size_t exts_size, uint8_t *fragment[], size_t *fragment_size, psa_key_handle_t handle,
- uint8_t *key, size_t key_size);
+psa_status_t psa_adac_sign_token(uint8_t challenge[], size_t challenge_size, uint8_t signature_type,
+ uint8_t exts[], size_t exts_size, uint8_t *fragment[], size_t *fragment_size,
+ uint8_t *req_perms, psa_key_handle_t handle, uint8_t *key, size_t key_size);
/**@}*/
diff --git a/psa-adac/sdm/src/sdm_token.c b/psa-adac/sdm/src/sdm_token.c
index 7d048d7..01df4f4 100644
--- a/psa-adac/sdm/src/sdm_token.c
+++ b/psa-adac/sdm/src/sdm_token.c
@@ -82,9 +82,9 @@ psa_status_t psa_adac_mac_sign(psa_algorithm_t algo, const uint8_t *inputs[], si
return r;
}
-psa_status_t psa_adac_sign_token(uint8_t challenge[], size_t challenge_size, uint8_t signature_type, uint8_t exts[],
- size_t exts_size, uint8_t *fragment[], size_t *fragment_size, psa_key_handle_t handle,
- uint8_t *key, size_t key_size) {
+psa_status_t psa_adac_sign_token(uint8_t challenge[], size_t challenge_size, uint8_t signature_type,
+ uint8_t exts[], size_t exts_size, uint8_t *fragment[], size_t *fragment_size,
+ uint8_t *req_perms, psa_key_handle_t handle, uint8_t *key, size_t key_size) {
uint8_t hash[PSA_HASH_MAX_SIZE], *sig, *ext_hash, *_fragment;
size_t token_size, hash_size, sig_size, body_size, tbs_size, ext_hash_size;
psa_algorithm_t hash_algo, sig_algo;
@@ -243,8 +243,13 @@ psa_status_t psa_adac_sign_token(uint8_t challenge[], size_t challenge_size, uin
token_header_t *token = (token_header_t *) (_fragment + sizeof(psa_tlv_t));
// memset(token, 0, token_size);
+ token->format_version.minor = SDP_TOKEN_MINOR;
+ token->format_version.major = SDP_TOKEN_MAJOR;
token->signature_type = signature_type;
token->extensions_bytes = exts_size;
+ if(req_perms != NULL)
+ memcpy((void*)(token->requested_permissions), req_perms, PERMISSION_BITS/8);
+
if (exts_size > 0) {
// FIXME: Support PSA_ALG_CMAC
psa_adac_hash(hash_algo, exts, exts_size, ext_hash, ext_hash_size, &hash_size);