1 // SPDX-License-Identifier: BSD-2-Clause
2 /*
3  * Copyright (c) 2014, STMicroelectronics International N.V.
4  * All rights reserved.
5  */
6 #include <stdint.h>
7 
8 #include <ta_rpc.h>
9 #include <tee_api.h>
10 #include <trace.h>
11 #include <ta_crypt.h>
12 #include <ta_sims_test.h>
13 
14 static TEE_UUID cryp_uuid = TA_CRYPT_UUID;
15 
rpc_call_cryp(bool sec_mem,uint32_t nParamTypes,TEE_Param pParams[4],uint32_t cmd)16 static TEE_Result rpc_call_cryp(bool sec_mem, uint32_t nParamTypes,
17 				TEE_Param pParams[4], uint32_t cmd)
18 {
19 	TEE_TASessionHandle cryp_session = TEE_HANDLE_NULL;
20 	TEE_Result res = TEE_ERROR_GENERIC;
21 	uint32_t origin = 0;
22 	TEE_Param params[4] = { };
23 	size_t n = 0;
24 	uint32_t types =
25 	    TEE_PARAM_TYPES(TEE_PARAM_TYPE_NONE, TEE_PARAM_TYPE_NONE,
26 			    TEE_PARAM_TYPE_NONE, TEE_PARAM_TYPE_NONE);
27 
28 	res = TEE_OpenTASession(&cryp_uuid, TEE_TIMEOUT_INFINITE, types,
29 				params, &cryp_session, &origin);
30 
31 	if (res != TEE_SUCCESS) {
32 		EMSG("TEE_OpenTASession() returned %#"PRIx32, res);
33 		return res;
34 	}
35 
36 	types = nParamTypes;
37 	if (sec_mem) {
38 		TEE_MemFill(params, 0, sizeof(params));
39 		for (n = 0; n < 4; n++) {
40 			switch (TEE_PARAM_TYPE_GET(types, n)) {
41 			case TEE_PARAM_TYPE_VALUE_INPUT:
42 			case TEE_PARAM_TYPE_VALUE_INOUT:
43 				params[n].value = pParams[n].value;
44 				break;
45 
46 			case TEE_PARAM_TYPE_MEMREF_INPUT:
47 			case TEE_PARAM_TYPE_MEMREF_OUTPUT:
48 			case TEE_PARAM_TYPE_MEMREF_INOUT:
49 				params[n].memref.buffer =
50 					TEE_Malloc(pParams[n].memref.size, 0);
51 				if (!params[n].memref.buffer)
52 					TEE_Panic(0);
53 				params[n].memref.size = pParams[n].memref.size;
54 				if (TEE_PARAM_TYPE_GET(types, n) !=
55 				    TEE_PARAM_TYPE_MEMREF_OUTPUT)
56 					TEE_MemMove(params[n].memref.buffer,
57 						    pParams[n].memref.buffer,
58 						    pParams[n].memref.size);
59 				break;
60 			default:
61 				break;
62 			}
63 		}
64 	} else {
65 		TEE_MemMove(params, pParams, sizeof(params));
66 	}
67 
68 	res = TEE_InvokeTACommand(cryp_session, TEE_TIMEOUT_INFINITE, cmd,
69 				types, params, &origin);
70 	if (res != TEE_SUCCESS) {
71 		EMSG("TEE_InvokeTACommand() returned %#"PRIx32, res);
72 	}
73 
74 	TEE_CloseTASession(cryp_session);
75 
76 	if (sec_mem) {
77 		for (n = 0; n < 4; n++) {
78 			switch (TEE_PARAM_TYPE_GET(types, n)) {
79 			case TEE_PARAM_TYPE_VALUE_INOUT:
80 			case TEE_PARAM_TYPE_VALUE_OUTPUT:
81 				pParams[n].value = params[n].value;
82 				break;
83 
84 			case TEE_PARAM_TYPE_MEMREF_INPUT:
85 			case TEE_PARAM_TYPE_MEMREF_OUTPUT:
86 			case TEE_PARAM_TYPE_MEMREF_INOUT:
87 				if (TEE_PARAM_TYPE_GET(types, n) !=
88 				    TEE_PARAM_TYPE_MEMREF_INPUT)
89 					TEE_MemMove(pParams[n].memref.buffer,
90 						    params[n].memref.buffer,
91 						    params[n].memref.size);
92 				pParams[n].memref.size = params[n].memref.size;
93 				TEE_Free(params[n].memref.buffer);
94 				break;
95 			default:
96 				break;
97 			}
98 		}
99 
100 	}
101 
102 	return res;
103 }
104 
rpc_sha224(bool sec_mem,uint32_t nParamTypes,TEE_Param pParams[4])105 TEE_Result rpc_sha224(bool sec_mem, uint32_t nParamTypes, TEE_Param pParams[4])
106 {
107 	return rpc_call_cryp(sec_mem, nParamTypes, pParams,
108 			     TA_CRYPT_CMD_SHA224);
109 }
110 
rpc_sha256(bool sec_mem,uint32_t nParamTypes,TEE_Param pParams[4])111 TEE_Result rpc_sha256(bool sec_mem, uint32_t nParamTypes, TEE_Param pParams[4])
112 {
113 	return rpc_call_cryp(sec_mem, nParamTypes, pParams,
114 			     TA_CRYPT_CMD_SHA256);
115 }
116 
rpc_aes256ecb_encrypt(bool sec_mem,uint32_t nParamTypes,TEE_Param pParams[4])117 TEE_Result rpc_aes256ecb_encrypt(bool sec_mem, uint32_t nParamTypes,
118 				 TEE_Param pParams[4])
119 {
120 	return rpc_call_cryp(sec_mem, nParamTypes, pParams,
121 			     TA_CRYPT_CMD_AES256ECB_ENC);
122 }
123 
rpc_aes256ecb_decrypt(bool sec_mem,uint32_t nParamTypes,TEE_Param pParams[4])124 TEE_Result rpc_aes256ecb_decrypt(bool sec_mem, uint32_t nParamTypes,
125 				 TEE_Param pParams[4])
126 {
127 	return rpc_call_cryp(sec_mem, nParamTypes, pParams,
128 			     TA_CRYPT_CMD_AES256ECB_DEC);
129 }
130 
rpc_open(void * session_context,uint32_t param_types,TEE_Param params[4])131 TEE_Result rpc_open(void *session_context, uint32_t param_types,
132 		    TEE_Param params[4])
133 {
134 	TEE_TASessionHandle session = TEE_HANDLE_NULL;
135 	uint32_t orig = 0;
136 	TEE_Result res = TEE_ERROR_GENERIC;
137 	TEE_UUID uuid = TA_SIMS_TEST_UUID;
138 	uint32_t types =
139 	    TEE_PARAM_TYPES(TEE_PARAM_TYPE_VALUE_OUTPUT, TEE_PARAM_TYPE_NONE,
140 			    TEE_PARAM_TYPE_NONE, TEE_PARAM_TYPE_NONE);
141 	TEE_Param par[4] = { };
142 
143 	(void)session_context;
144 	(void)param_types;
145 
146 	res = TEE_OpenTASession(&uuid, TEE_TIMEOUT_INFINITE, 0, NULL, &session,
147 				&orig);
148 
149 	if (res != TEE_SUCCESS)
150 		return res;
151 
152 	TEE_MemFill(params, 0, sizeof(TEE_Param) * 4);
153 	res =
154 	    TEE_InvokeTACommand(session, TEE_TIMEOUT_INFINITE,
155 				TA_SIMS_CMD_GET_COUNTER, types, par, &orig);
156 
157 	if (res != TEE_SUCCESS)
158 		goto exit;
159 
160 exit:
161 	TEE_CloseTASession(session);
162 
163 	return res;
164 }
165