Attestation: Update iat claims data

Add more iat claims: profile definition and verification service
Update boot status data: add more SW components for SW_S_NS module
pull/9668/head
Moran Peker 2019-02-13 17:09:25 +02:00
parent 636753b404
commit 080f4f4e69
3 changed files with 27 additions and 14 deletions

View File

@ -22,7 +22,6 @@
#include "tfm_plat_boot_seed.h" #include "tfm_plat_boot_seed.h"
#include "attestation_bootloader_data.h" #include "attestation_bootloader_data.h"
#include "tfm_attest_hal.h" #include "tfm_attest_hal.h"
#include "psa_initial_attestation_api.h" #include "psa_initial_attestation_api.h"
#include "attestation.h" #include "attestation.h"
#include "crypto.h" #include "crypto.h"
@ -173,16 +172,19 @@ enum tfm_security_lifecycle_t tfm_attest_hal_get_security_lifecycle(void)
return PSA_ATTEST_ERR_CLAIM_UNAVAILABLE; return PSA_ATTEST_ERR_CLAIM_UNAVAILABLE;
} }
const char * const char *
tfm_attest_hal_get_verification_service(uint32_t *size) tfm_attest_hal_get_verification_service(uint32_t *size)
{ {
return NULL; *size = sizeof(verification_service_url) - 1;
return verification_service_url;
} }
const char * const char *
tfm_attest_hal_get_profile_definition(uint32_t *size) tfm_attest_hal_get_profile_definition(uint32_t *size)
{ {
return NULL; *size = sizeof(attestation_profile_definition) - 1;
return attestation_profile_definition;
} }

View File

@ -21,23 +21,29 @@
/* Temporary Boodloader data - conatians temp mandatory claims */ /* Temporary Boodloader data - conatians temp mandatory claims */
__attribute__((aligned(4))) __attribute__((aligned(4)))
const uint8_t temp_ram_page_data[] = { const uint8_t temp_ram_page_data[] = {
0x16, 0x20, 0x6D, 0x00, //shared_data_tlv_header 0x16, 0x20, 0x94, 0x00, //shared_data_tlv_header
0x88, 0x11, 0x24, 0x00, //TLV_MINOR_IAS_NSPE_MEASURE_VALUE 0x83, 0x11, 0x0C, 0x00, // SW_TYPE
0xA0, 0xA1, 0xA2, 0xA3, 0xA4, 0xA5, 0xA6, 0xA7, 0x4E, 0x53, 0x50, 0x45, 0x5F, 0x53, 0x50, 0x45,
0xA8, 0xA9, 0xAA, 0xAB, 0xAC, 0xAD, 0xAE, 0xAF, 0x80, 0x11, 0x0A, 0x00, //SW_VERSION
0xB0, 0xB1, 0xB2, 0xB3, 0xB4, 0xB5, 0xB6, 0xB7, 0x31, 0x2E, 0x31, 0x2E, 0x31, 0x31,
0xB8, 0xB9, 0xBA, 0xBB, 0xBC, 0xBD, 0xBE, 0xBF, 0x82, 0x11, 0x08, 0x00, //SW_EPOCH
0x82, 0x11, 0x06, 0x00, //TLV_MINOR_IAS_NSPE_EPOCH 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x88, 0x11, 0x24, 0x00, //SW_MEASURE_VALUE
0xD0, 0xD1, 0xD2, 0xD3, 0xD4, 0xD5, 0xD6, 0xD7,
0xD8, 0xD9, 0xDA, 0xDB, 0xDC, 0xDD, 0xDE, 0xDF,
0xD0, 0xD1, 0xD2, 0xD3, 0xD4, 0xD5, 0xD6, 0xD7,
0xD8, 0xD9, 0xDA, 0xDB, 0xDC, 0xDD, 0xDE, 0xDF,
0x89, 0x11, 0x0A, 0x00, //SW_MEASURE_TYPE
0x53, 0x48, 0x41, 0x32, 0x35, 0x36,
0x00, 0x10, 0x24, 0x00, //TLV_MINOR_IAS_BOOT_SEED 0x00, 0x10, 0x24, 0x00, //TLV_MINOR_IAS_BOOT_SEED
0xA0, 0xA1, 0xA2, 0xA3, 0xA4, 0xA5, 0xA6, 0xA7, 0xA0, 0xA1, 0xA2, 0xA3, 0xA4, 0xA5, 0xA6, 0xA7,
0xA8, 0xA9, 0xAA, 0xAB, 0xAC, 0xAD, 0xAE, 0xAF, 0xA8, 0xA9, 0xAA, 0xAB, 0xAC, 0xAD, 0xAE, 0xAF,
0xB0, 0xB1, 0xB2, 0xB3, 0xB4, 0xB5, 0xB6, 0xB7, 0xB0, 0xB1, 0xB2, 0xB3, 0xB4, 0xB5, 0xB6, 0xB7,
0xB8, 0xB9, 0xBA, 0xBB, 0xBC, 0xBD, 0xBE, 0xBF, 0xB8, 0xB9, 0xBA, 0xBB, 0xBC, 0xBD, 0xBE, 0xBF,
0x01, 0x10, 0x16, 0x00, //TLV_MINOR_IAS_HW_VERSION 0x01, 0x10, 0x16, 0x00, //TLV_MINOR_IAS_HW_VERSION
0xA0, 0xA1, 0xA2, 0xA3, 0xA4, 0xA5, 0xA6, 0xA7, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37, 0x38,
0xA8, 0xA9, 0xAA, 0xAB, 0xAC, 0xAD, 0xAE, 0xAF, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37, 0x38,
0xB0, 0xB1, 0x31, 0x32,
0x02, 0x10, 0x06, 0x00, //TLV_MINOR_IAS_SLC 0x02, 0x10, 0x06, 0x00, //TLV_MINOR_IAS_SLC
0x00, 0x20 0x00, 0x20
}; };

View File

@ -46,6 +46,11 @@ extern const uint8_t temp_ram_page_data[];
extern uint8_t impl_id_data[]; extern uint8_t impl_id_data[];
/* Example verification service URL for initial attestation token */
static const char verification_service_url[] = "www.mbed.com";
/* Example profile definition document for initial attestation token */
static const char attestation_profile_definition[] = "psa-attest.md";
#ifdef __cplusplus #ifdef __cplusplus
} }
#endif #endif