Commit Graph

144 Commits (d40c25d516bfec8f68e645fa2eb496ba977c2088)

Author SHA1 Message Date
Moran Peker aa5b79a480 generated file update 2019-02-27 14:14:24 +02:00
Moran Peker e60af99edb Attestation: Add comments from temporary data 2019-02-27 14:14:24 +02:00
Moran Peker 2720b5a73d Update include psa_defs -> psa/client 2019-02-27 14:14:23 +02:00
Moran Peker f8e4626098 Attestation: move t_code folder place 2019-02-27 14:14:22 +02:00
Moran Peker b3c6f709ca Attestation: move qcbor folder place 2019-02-27 14:14:21 +02:00
Moran Peker bd7061eaba Attestation: Add close key after open key 2019-02-27 14:14:20 +02:00
Moran Peker 715305accf Attestation: update boot status data
Epoc data to be 2 bytes instead of 4
2019-02-27 14:14:20 +02:00
Moran Peker e0c5df50be Attestation: Add parameter and entry size checks 2019-02-27 14:14:19 +02:00
Moran Peker 773fa44205 Update attestation asymmetric sign to use deterministic alg
- Add PSA_KEY_USAGE_VERIFY to attesttaion key usage
- Set deterministic alg to attestation key policy
- Call asymmetric sign with deterministic alg
2019-02-27 14:14:18 +02:00
Moran Peker 70a14b2f3a Update to last version of TFM-Attesttaion code
-update TFM attestation files
-update attest_crypto.c and psa_attestation_stubs.c file to support TFM
code changes
2019-02-27 14:14:18 +02:00
Moran Peker 2117a26cb1 Get security lifecycle by psa_security_lifecycle_state function
-Add bug fix for psa_security_lifecycle_state function - PR #9745
-Remove lifecycle data from temp boot status data
-Update attesttation_partition_json file to use
PSA_PLATFORM_LC_GET and generate partition
code - auto generated files update
2019-02-27 14:14:17 +02:00
Moran Peker 4101ee92df Add checks ,initialization,remove unneeded code and files license update 2019-02-27 14:14:14 +02:00
Moran Peker 080f4f4e69 Attestation: Update iat claims data
Add more iat claims: profile definition and verification service
Update boot status data: add more SW components for SW_S_NS module
2019-02-27 14:14:13 +02:00
Moran Peker 636753b404 Attestation: Add a new define for attestation private key id 2019-02-27 14:14:13 +02:00
Moran Peker 0a0bb04dfa Attestation: Change files license to Apache
change all files except tfm code.
2019-02-27 14:14:12 +02:00
Moran Peker 8fc9c8fdab Attestation: astyle fixs
Runing astyle over attestation file to pass CI
2019-02-27 14:14:11 +02:00
Moran Peker a994499bf3 Atteststaion: Update header files
-Remove psa_initial_attesttaion.h
-Move psa_initial_attesttaion_api.h and psa_attest_inject_key.h into
inc folder
-Update include in test file
2019-02-27 14:14:11 +02:00
Moran Peker 5f45b0af92 Attestation: aut- generated files by generate_partition_code.py
Atestation paration added.
2019-02-27 14:14:09 +02:00
Moran Peker 9a4ea3d319 Add PSA Initial Attestation service
Attestation service can create a token on request, which contains a fix set of
device specific data.
Implementation:
-‘psa_initial_attest_get_token_size’- get exact size of initial attestation token in bytes.
-‘psa_initial_attest_get_token’- get the initial attestation token.
-‘psa_attestation_inject_key’ - Generate or import the attestation key pair and export the public part.

-Including CBOR lib and TFM attestation implemantation.
-Temporary claim’s data – no bootloader over V7 Single & Dual
2019-02-27 14:14:08 +02:00
Martin Kojtal 5ab69d5d6b
Merge pull request #9575 from itayzafrir/crypto-64-bit-key-ids
Crypto IPC 64 bit key ids for ITS
2019-02-27 09:29:18 +01:00
Netanel Gonen 3e89a05e0b add invalid argument incase receiving uid==0 2019-02-26 18:35:38 +02:00
Netanel Gonen d2eb2e4eb5 add backward support to error values 2019-02-26 18:27:15 +02:00
itayzafrir fc2b0726b6 Remove duplicate inclusion of header files
Remove duplicate inclusion of psa/client.h and psa/service.h
2019-02-26 12:30:20 +02:00
itayzafrir ca94dc8673 Define MBEDTLS_PSA_CRYPTO_KEY_FILE_ID_ENCODES_OWNER
This enables crypto encoding an owner in key file IDs.
Added a static assert check in client side proxy.
2019-02-26 12:30:20 +02:00
itayzafrir 3992b83a52 crypto service: Assemble bit crypto key ids 2019-02-26 12:30:20 +02:00
itayzafrir 2b9b29455f crypto service: Remove unused IPC argument and unneeded casts 2019-02-26 12:27:55 +02:00
Cruz Monrreal 15ccb32d31
Merge pull request #9836 from kfnta/tfm_patch
TF-M: Fix issues found in SPM tests
2019-02-25 19:58:38 -06:00
Cruz Monrreal ed350dc533
Merge pull request #9758 from NirSonnenschein/large_buffer_support_for_hash_and_mac
allow hash or mac on large buffers with less memory use
2019-02-25 10:34:14 -06:00
Edison Ai ebc961dab8 TF-M patch: Free connection handle in psa_reply (TF-M issue #263)
- Link to bug tracking: https://developer.trustedfirmware.org/T263
2019-02-25 14:35:21 +02:00
Netanel Gonen b5b0e981f8 reopening #9754 after the changes where overrun
changing the SPM error codes from invalid argument to bad state aligned to PSA spec
2019-02-25 11:55:47 +02:00
Nir Sonnenschein 1d4c280d2a a-style fix for unrelated code 2019-02-25 00:46:06 +02:00
Nir Sonnenschein 84b618704b fix comment issues 2019-02-24 14:32:36 +02:00
Nir Sonnenschein ffaf083b75 a-style fixes for code 2019-02-24 14:25:25 +02:00
Netanel Gonen 165719d11f return the new values for key type & size even if function fails 2019-02-24 11:24:12 +02:00
Cruz Monrreal 497d0d65c3
Merge pull request #9802 from orenc17/patch-2
Fix psa_system_reset() on PSA IPC platform
2019-02-21 17:31:11 -06:00
Cruz Monrreal 870bd05904
Merge pull request #9708 from davidsaada/david_protected_storage
Implement PSA protected storage & restructure PSA storage implementation
2019-02-21 17:30:56 -06:00
Oren Cohen 922cdeab82 Update crypto IPC handling of negative errors 2019-02-21 20:59:18 +02:00
David Saada 41eb5cbfd9 Implement PSA protected storage & restructure PSA storage implementation
- Move all PSA storage code under psa/storage directory
- Create a global PSA error codes header, eliminating ITS specific ones
- Create a common header file for PSA storage type definitions,
  eliminating ITS specific ones
- Create a common implementation for PS & ITS
- Implement protected storage feature
- Change ITS test to be common to PS as well
2019-02-21 20:58:59 +02:00
Oren Cohen 6b68bf7fdf
Fix psa_system_reset on PSA IPC platform 2019-02-21 19:50:02 +02:00
Michael Schwarcz d2c433ccfe TFM Importer: Update SHAa of TFM patches 2019-02-21 17:42:56 +02:00
Oren Cohen 8800ad5c80 TFM: Add defines to mbed_lib.json 2019-02-21 17:38:30 +02:00
Michael Schwarcz 6354b9a473 TF-M patch: More fixes to tfm_memory_check issue (TF-M issue #224)
- Link to bug tracking: https://developer.trustedfirmware.org/T224
2019-02-21 17:38:30 +02:00
Cruz Monrreal 813c844fb4
Merge pull request #9745 from moranpeker/psa_security_lifecycle
Fix incorrect return value in psa_security_lifecycle_state (emul)
2019-02-20 12:12:56 -06:00
Cruz Monrreal 9f6ee7db66
Merge pull request #9754 from netanelgonen/SPM_return_value
Fix SPM returning the wrong value
2019-02-19 15:29:48 -06:00
Cruz Monrreal 4c04771c5d
Merge pull request #9653 from kfnta/tfm_src_integ
TF-M sources integration to Mbed-OS
2019-02-19 15:28:44 -06:00
Cruz Monrreal 19474fcab1
Merge pull request #9617 from kjbracey-arm/spe_atomics
SPE: Fix up atomic usage
2019-02-19 15:27:54 -06:00
Michael Schwarcz 6a90da42fa Add BSD3-clause license file to TF-M folder 2019-02-19 16:29:28 +02:00
Nir Sonnenschein 4a4af57c22 allow calling hash or mac on large buffers without large memory allocation
use a fixed size buffer for large inputs to process the input
in multiple smaller pieces.
2019-02-19 15:49:52 +02:00
Michael Schwarcz 9e33f0d8cd Re-generate TF-M partition files 2019-02-19 15:19:07 +02:00
Alexander Zilberkant 0ba963acfc Adding TF-M integration guide 2019-02-19 15:19:05 +02:00