| /* |
| * Copyright (c) 2015-2017, ARM Limited and Contributors. All rights reserved. |
| * |
| * SPDX-License-Identifier: BSD-3-Clause |
| */ |
| |
| #include <stdio.h> |
| #include <string.h> |
| #include <openssl/err.h> |
| #include <openssl/x509v3.h> |
| |
| #if USE_TBBR_DEFS |
| #include <tbbr_oid.h> |
| #else |
| #include <platform_oid.h> |
| #endif |
| |
| #include "ext.h" |
| #include "tbbr/tbb_ext.h" |
| #include "tbbr/tbb_key.h" |
| |
| /* TODO: get these values from the command line */ |
| #define TRUSTED_WORLD_NVCTR_VALUE 0 |
| #define NORMAL_WORLD_NVCTR_VALUE 0 |
| |
| static ext_t tbb_ext[] = { |
| [TRUSTED_FW_NVCOUNTER_EXT] = { |
| .oid = TRUSTED_FW_NVCOUNTER_OID, |
| .opt = "tfw-nvctr", |
| .help_msg = "Trusted Firmware Non-Volatile counter value", |
| .sn = "TrustedWorldNVCounter", |
| .ln = "Trusted World Non-Volatile counter", |
| .asn1_type = V_ASN1_INTEGER, |
| .type = EXT_TYPE_NVCOUNTER, |
| .attr.nvctr_type = NVCTR_TYPE_TFW |
| }, |
| [NON_TRUSTED_FW_NVCOUNTER_EXT] = { |
| .oid = NON_TRUSTED_FW_NVCOUNTER_OID, |
| .opt = "ntfw-nvctr", |
| .help_msg = "Non-Trusted Firmware Non-Volatile counter value", |
| .sn = "NormalWorldNVCounter", |
| .ln = "Non-Trusted Firmware Non-Volatile counter", |
| .asn1_type = V_ASN1_INTEGER, |
| .type = EXT_TYPE_NVCOUNTER, |
| .attr.nvctr_type = NVCTR_TYPE_NTFW |
| }, |
| [TRUSTED_BOOT_FW_HASH_EXT] = { |
| .oid = TRUSTED_BOOT_FW_HASH_OID, |
| .opt = "tb-fw", |
| .help_msg = "Trusted Boot Firmware image file", |
| .sn = "TrustedBootFirmwareHash", |
| .ln = "Trusted Boot Firmware hash (SHA256)", |
| .asn1_type = V_ASN1_OCTET_STRING, |
| .type = EXT_TYPE_HASH |
| }, |
| [TRUSTED_WORLD_PK_EXT] = { |
| .oid = TRUSTED_WORLD_PK_OID, |
| .sn = "TrustedWorldPublicKey", |
| .ln = "Trusted World Public Key", |
| .asn1_type = V_ASN1_OCTET_STRING, |
| .type = EXT_TYPE_PKEY, |
| .attr.key = TRUSTED_WORLD_KEY |
| }, |
| [NON_TRUSTED_WORLD_PK_EXT] = { |
| .oid = NON_TRUSTED_WORLD_PK_OID, |
| .sn = "NonTrustedWorldPublicKey", |
| .ln = "Non-Trusted World Public Key", |
| .asn1_type = V_ASN1_OCTET_STRING, |
| .type = EXT_TYPE_PKEY, |
| .attr.key = NON_TRUSTED_WORLD_KEY |
| }, |
| [SCP_FW_CONTENT_CERT_PK_EXT] = { |
| .oid = SCP_FW_CONTENT_CERT_PK_OID, |
| .sn = "SCPFirmwareContentCertPK", |
| .ln = "SCP Firmware content certificate public key", |
| .asn1_type = V_ASN1_OCTET_STRING, |
| .type = EXT_TYPE_PKEY, |
| .attr.key = SCP_FW_CONTENT_CERT_KEY |
| }, |
| [SCP_FW_HASH_EXT] = { |
| .oid = SCP_FW_HASH_OID, |
| .opt = "scp-fw", |
| .help_msg = "SCP Firmware image file", |
| .sn = "SCPFirmwareHash", |
| .ln = "SCP Firmware hash (SHA256)", |
| .asn1_type = V_ASN1_OCTET_STRING, |
| .type = EXT_TYPE_HASH |
| }, |
| [SOC_FW_CONTENT_CERT_PK_EXT] = { |
| .oid = SOC_FW_CONTENT_CERT_PK_OID, |
| .sn = "SoCFirmwareContentCertPK", |
| .ln = "SoC Firmware content certificate public key", |
| .asn1_type = V_ASN1_OCTET_STRING, |
| .type = EXT_TYPE_PKEY, |
| .attr.key = SOC_FW_CONTENT_CERT_KEY |
| }, |
| [SOC_AP_FW_HASH_EXT] = { |
| .oid = SOC_AP_FW_HASH_OID, |
| .opt = "soc-fw", |
| .help_msg = "SoC AP Firmware image file", |
| .sn = "SoCAPFirmwareHash", |
| .ln = "SoC AP Firmware hash (SHA256)", |
| .asn1_type = V_ASN1_OCTET_STRING, |
| .type = EXT_TYPE_HASH |
| }, |
| [TRUSTED_OS_FW_CONTENT_CERT_PK_EXT] = { |
| .oid = TRUSTED_OS_FW_CONTENT_CERT_PK_OID, |
| .sn = "TrustedOSFirmwareContentCertPK", |
| .ln = "Trusted OS Firmware content certificate public key", |
| .asn1_type = V_ASN1_OCTET_STRING, |
| .type = EXT_TYPE_PKEY, |
| .attr.key = TRUSTED_OS_FW_CONTENT_CERT_KEY |
| }, |
| [TRUSTED_OS_FW_HASH_EXT] = { |
| .oid = TRUSTED_OS_FW_HASH_OID, |
| .opt = "tos-fw", |
| .help_msg = "Trusted OS image file", |
| .sn = "TrustedOSHash", |
| .ln = "Trusted OS hash (SHA256)", |
| .asn1_type = V_ASN1_OCTET_STRING, |
| .type = EXT_TYPE_HASH |
| }, |
| [TRUSTED_OS_FW_EXTRA1_HASH_EXT] = { |
| .oid = TRUSTED_OS_FW_EXTRA1_HASH_OID, |
| .opt = "tos-fw-extra1", |
| .help_msg = "Trusted OS Extra1 image file", |
| .sn = "TrustedOSExtra1Hash", |
| .ln = "Trusted OS Extra1 hash (SHA256)", |
| .asn1_type = V_ASN1_OCTET_STRING, |
| .type = EXT_TYPE_HASH, |
| .optional = 1 |
| }, |
| [TRUSTED_OS_FW_EXTRA2_HASH_EXT] = { |
| .oid = TRUSTED_OS_FW_EXTRA2_HASH_OID, |
| .opt = "tos-fw-extra2", |
| .help_msg = "Trusted OS Extra2 image file", |
| .sn = "TrustedOSExtra2Hash", |
| .ln = "Trusted OS Extra2 hash (SHA256)", |
| .asn1_type = V_ASN1_OCTET_STRING, |
| .type = EXT_TYPE_HASH, |
| .optional = 1 |
| }, |
| [NON_TRUSTED_FW_CONTENT_CERT_PK_EXT] = { |
| .oid = NON_TRUSTED_FW_CONTENT_CERT_PK_OID, |
| .sn = "NonTrustedFirmwareContentCertPK", |
| .ln = "Non-Trusted Firmware content certificate public key", |
| .asn1_type = V_ASN1_OCTET_STRING, |
| .type = EXT_TYPE_PKEY, |
| .attr.key = NON_TRUSTED_FW_CONTENT_CERT_KEY |
| }, |
| [NON_TRUSTED_WORLD_BOOTLOADER_HASH_EXT] = { |
| .oid = NON_TRUSTED_WORLD_BOOTLOADER_HASH_OID, |
| .opt = "nt-fw", |
| .help_msg = "Non-Trusted World Bootloader image file", |
| .sn = "NonTrustedWorldBootloaderHash", |
| .ln = "Non-Trusted World hash (SHA256)", |
| .asn1_type = V_ASN1_OCTET_STRING, |
| .type = EXT_TYPE_HASH |
| }, |
| [SCP_FWU_CFG_HASH_EXT] = { |
| .oid = SCP_FWU_CFG_HASH_OID, |
| .opt = "scp-fwu-cfg", |
| .help_msg = "SCP Firmware Update Config image file", |
| .sn = "SCPFWUpdateConfig", |
| .ln = "SCP Firmware Update Config hash (SHA256)", |
| .asn1_type = V_ASN1_OCTET_STRING, |
| .type = EXT_TYPE_HASH, |
| .optional = 1 |
| }, |
| [AP_FWU_CFG_HASH_EXT] = { |
| .oid = AP_FWU_CFG_HASH_OID, |
| .opt = "ap-fwu-cfg", |
| .help_msg = "AP Firmware Update Config image file", |
| .sn = "APFWUpdateConfig", |
| .ln = "AP Firmware Update Config hash (SHA256)", |
| .asn1_type = V_ASN1_OCTET_STRING, |
| .type = EXT_TYPE_HASH, |
| .optional = 1 |
| }, |
| [FWU_HASH_EXT] = { |
| .oid = FWU_HASH_OID, |
| .opt = "fwu", |
| .help_msg = "Firmware Updater image file", |
| .sn = "FWUpdaterHash", |
| .ln = "Firmware Updater hash (SHA256)", |
| .asn1_type = V_ASN1_OCTET_STRING, |
| .type = EXT_TYPE_HASH, |
| .optional = 1 |
| } |
| }; |
| |
| REGISTER_EXTENSIONS(tbb_ext); |