tbb_ext.c 6.24 KB
Newer Older
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
/*
 * Copyright (c) 2015, ARM Limited and Contributors. All rights reserved.
 *
 * Redistribution and use in source and binary forms, with or without
 * modification, are permitted provided that the following conditions are met:
 *
 * Redistributions of source code must retain the above copyright notice, this
 * list of conditions and the following disclaimer.
 *
 * Redistributions in binary form must reproduce the above copyright notice,
 * this list of conditions and the following disclaimer in the documentation
 * and/or other materials provided with the distribution.
 *
 * Neither the name of ARM nor the names of its contributors may be used
 * to endorse or promote products derived from this software without specific
 * prior written permission.
 *
 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
 * POSSIBILITY OF SUCH DAMAGE.
 */

#include <stdio.h>
#include <string.h>
#include <openssl/err.h>
#include <openssl/x509v3.h>
#include "ext.h"
#include "platform_oid.h"
37
38
#include "tbbr/tbb_ext.h"
#include "tbbr/tbb_key.h"
39

40
41
42
43
44
/* TODO: get these values from the command line */
#define TRUSTED_WORLD_NVCTR_VALUE	0
#define NORMAL_WORLD_NVCTR_VALUE	0

static ext_t tbb_ext[] = {
45
46
	[TRUSTED_FW_NVCOUNTER_EXT] = {
		.oid = TRUSTED_FW_NVCOUNTER_OID,
47
48
		.opt = "tfw-nvctr",
		.help_msg = "Trusted Firmware Non-Volatile counter value",
49
50
51
52
		.sn = "TrustedWorldNVCounter",
		.ln = "Trusted World Non-Volatile counter",
		.asn1_type = V_ASN1_INTEGER,
		.type = EXT_TYPE_NVCOUNTER,
53
		.attr.nvctr_type = NVCTR_TYPE_TFW
54
	},
55
56
	[NON_TRUSTED_FW_NVCOUNTER_EXT] = {
		.oid = NON_TRUSTED_FW_NVCOUNTER_OID,
57
58
		.opt = "ntfw-nvctr",
		.help_msg = "Non-Trusted Firmware Non-Volatile counter value",
59
		.sn = "NormalWorldNVCounter",
60
		.ln = "Non-Trusted Firmware Non-Volatile counter",
61
62
		.asn1_type = V_ASN1_INTEGER,
		.type = EXT_TYPE_NVCOUNTER,
63
		.attr.nvctr_type = NVCTR_TYPE_NTFW
64
	},
65
66
67
	[TRUSTED_BOOT_FW_HASH_EXT] = {
		.oid = TRUSTED_BOOT_FW_HASH_OID,
		.opt = "tb-fw",
68
		.help_msg = "Trusted Boot Firmware image file",
69
		.sn = "TrustedBootFirmwareHash",
70
		.ln = "Trusted Boot Firmware hash (SHA256)",
71
72
		.asn1_type = V_ASN1_OCTET_STRING,
		.type = EXT_TYPE_HASH
73
	},
74
75
	[TRUSTED_WORLD_PK_EXT] = {
		.oid = TRUSTED_WORLD_PK_OID,
76
77
		.sn = "TrustedWorldPublicKey",
		.ln = "Trusted World Public Key",
78
79
		.asn1_type = V_ASN1_OCTET_STRING,
		.type = EXT_TYPE_PKEY,
80
		.attr.key = TRUSTED_WORLD_KEY
81
	},
82
83
	[NON_TRUSTED_WORLD_PK_EXT] = {
		.oid = NON_TRUSTED_WORLD_PK_OID,
84
85
		.sn = "NonTrustedWorldPublicKey",
		.ln = "Non-Trusted World Public Key",
86
87
		.asn1_type = V_ASN1_OCTET_STRING,
		.type = EXT_TYPE_PKEY,
88
		.attr.key = NON_TRUSTED_WORLD_KEY
89
	},
90
91
	[SCP_FW_CONTENT_CERT_PK_EXT] = {
		.oid = SCP_FW_CONTENT_CERT_PK_OID,
92
93
		.sn = "SCPFirmwareContentCertPK",
		.ln = "SCP Firmware content certificate public key",
94
95
		.asn1_type = V_ASN1_OCTET_STRING,
		.type = EXT_TYPE_PKEY,
96
		.attr.key = SCP_FW_CONTENT_CERT_KEY
97
	},
98
99
100
	[SCP_FW_HASH_EXT] = {
		.oid = SCP_FW_HASH_OID,
		.opt = "scp-fw",
101
		.help_msg = "SCP Firmware image file",
102
		.sn = "SCPFirmwareHash",
103
		.ln = "SCP Firmware hash (SHA256)",
104
105
		.asn1_type = V_ASN1_OCTET_STRING,
		.type = EXT_TYPE_HASH
106
	},
107
108
	[SOC_FW_CONTENT_CERT_PK_EXT] = {
		.oid = SOC_FW_CONTENT_CERT_PK_OID,
109
110
111
112
		.sn = "SoCFirmwareContentCertPK",
		.ln = "SoC Firmware content certificate public key",
		.asn1_type = V_ASN1_OCTET_STRING,
		.type = EXT_TYPE_PKEY,
113
		.attr.key = SOC_FW_CONTENT_CERT_KEY
114
	},
115
116
117
	[SOC_AP_FW_HASH_EXT] = {
		.oid = SOC_AP_FW_HASH_OID,
		.opt = "soc-fw",
118
		.help_msg = "SoC AP Firmware image file",
119
		.sn = "SoCAPFirmwareHash",
120
		.ln = "SoC AP Firmware hash (SHA256)",
121
122
123
		.asn1_type = V_ASN1_OCTET_STRING,
		.type = EXT_TYPE_HASH
	},
124
125
	[TRUSTED_OS_FW_CONTENT_CERT_PK_EXT] = {
		.oid = TRUSTED_OS_FW_CONTENT_CERT_PK_OID,
126
127
		.sn = "TrustedOSFirmwareContentCertPK",
		.ln = "Trusted OS Firmware content certificate public key",
128
129
		.asn1_type = V_ASN1_OCTET_STRING,
		.type = EXT_TYPE_PKEY,
130
		.attr.key = TRUSTED_OS_FW_CONTENT_CERT_KEY
131
	},
132
133
134
	[TRUSTED_OS_FW_HASH_EXT] = {
		.oid = TRUSTED_OS_FW_HASH_OID,
		.opt = "tos-fw",
135
		.help_msg = "Trusted OS image file",
136
		.sn = "TrustedOSHash",
137
		.ln = "Trusted OS hash (SHA256)",
138
139
		.asn1_type = V_ASN1_OCTET_STRING,
		.type = EXT_TYPE_HASH
140
	},
141
142
	[NON_TRUSTED_FW_CONTENT_CERT_PK_EXT] = {
		.oid = NON_TRUSTED_FW_CONTENT_CERT_PK_OID,
143
144
		.sn = "NonTrustedFirmwareContentCertPK",
		.ln = "Non-Trusted Firmware content certificate public key",
145
146
		.asn1_type = V_ASN1_OCTET_STRING,
		.type = EXT_TYPE_PKEY,
147
		.attr.key = NON_TRUSTED_FW_CONTENT_CERT_KEY
148
	},
149
150
151
	[NON_TRUSTED_WORLD_BOOTLOADER_HASH_EXT] = {
		.oid = NON_TRUSTED_WORLD_BOOTLOADER_HASH_OID,
		.opt = "nt-fw",
152
		.help_msg = "Non-Trusted World Bootloader image file",
153
		.sn = "NonTrustedWorldBootloaderHash",
154
		.ln = "Non-Trusted World hash (SHA256)",
155
156
		.asn1_type = V_ASN1_OCTET_STRING,
		.type = EXT_TYPE_HASH
157
	},
158
159
160
	[SCP_FWU_CFG_HASH_EXT] = {
		.oid = SCP_FWU_CFG_HASH_OID,
		.opt = "scp-fwu-cfg",
161
		.help_msg = "SCP Firmware Update Config image file",
162
		.sn = "SCPFWUpdateConfig",
163
		.ln = "SCP Firmware Update Config hash (SHA256)",
164
165
166
167
		.asn1_type = V_ASN1_OCTET_STRING,
		.type = EXT_TYPE_HASH,
		.optional = 1
	},
168
169
170
	[AP_FWU_CFG_HASH_EXT] = {
		.oid = AP_FWU_CFG_HASH_OID,
		.opt = "ap-fwu-cfg",
171
		.help_msg = "AP Firmware Update Config image file",
172
		.sn = "APFWUpdateConfig",
173
		.ln = "AP Firmware Update Config hash (SHA256)",
174
175
176
177
		.asn1_type = V_ASN1_OCTET_STRING,
		.type = EXT_TYPE_HASH,
		.optional = 1
	},
178
179
180
	[FWU_HASH_EXT] = {
		.oid = FWU_HASH_OID,
		.opt = "fwu",
181
		.help_msg = "Firmware Updater image file",
182
		.sn = "FWUpdaterHash",
183
		.ln = "Firmware Updater hash (SHA256)",
184
185
186
		.asn1_type = V_ASN1_OCTET_STRING,
		.type = EXT_TYPE_HASH,
		.optional = 1
187
	}
188
};
189
190

REGISTER_EXTENSIONS(tbb_ext);