Skip to content

PSoC 6 Onboarding to AWS IoT Core using OPTIGA™ TPM SLx 9670 TPM2.0

License

Notifications You must be signed in to change notification settings

Infineon/psoc6-aws-iot-optiga-tpm

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Github actions

PSoC 6 Onboarding to AWS IoT Core
using OPTIGA™ TPM SLx 9670 TPM2.0

Introduction

This repository provides instructions for integrating the OPTIGA™ TPM SLx 9670 TPM2.0 into a PSoC 6 Wi-Fi BT Prototyping Kit. The project also contains examples of using TPM2-TSS libraries and Mbed TLS libraries with TPM as the configured crypto hardware acceleration. It includes a demonstration of TPM-based device onboarding to AWS IoT Core.

Table of Contents

Prerequisites

Hardware prerequisites:

  • PSoC 6 Wi-Fi BT Prototyping Kit (CY8CPROTO-062-4343W).
  • IRIDIUM9670 TPM2.0.
  • The connection table:
    IRIDIUM9670 TPM2.0 CY8CPROTO-062-4343W Description
    Pin 19 P6_0 MOSI
    Pin 21 P6_1 MISO
    Pin 23 P6_2 SCLK
    Pin 26 P6_3 CS
    Pin 7 P9_0 RESET
    Pin 1 VDD VDD
    Pin 6 GND GND

Software prerequisites:

Installing ModusToolbox for First Use

  1. Download the ModusToolbox™ Software for Linux (tested on version 3.0.0.9369 and 3.1.0.12257) to your host and unpack it:
    # Set the MTB version. Option 1:
    $ export MTB_VERSION_FULL=3.1.0.12257
    $ export MTB_VERSION_SHORT=3.1
    
    # Option 2:
    $ export MTB_VERSION_FULL=3.0.0.9369
    $ export MTB_VERSION_SHORT=3.0
    
    $ cd ~
    $ tar -C $HOME -xzf ModusToolbox_${MTB_VERSION_FULL}-linux-install.tar.gz
    
  2. Set the environment variables:
    $ export PATH=${HOME}/ModusToolbox/tools_${MTB_VERSION_SHORT}/project-creator/bin:$PATH
    $ export CY_TOOLS_PATHS=${HOME}/ModusToolbox/tools_${MTB_VERSION_SHORT}
    
  3. Install packages:
    $ sudo apt update
    $ sudo apt -y install libglib2.0-0 libgl1 make git ttylog
    
    $ ${CY_TOOLS_PATHS}/modus-shell/postinstall
    
    In addition, if you plan to run the project on the Eclipse IDE instead of just using the CLI:
    $ sudo apt -y install libxcb-xinerama0 libncurses5
    
    $ ${CY_TOOLS_PATHS}/openocd/udev_rules/install_rules.sh
    $ ${CY_TOOLS_PATHS}/driver_media/install_rules.sh
    $ ${CY_TOOLS_PATHS}/fw-loader/udev_rules/install_rules.sh
    $ ${CY_TOOLS_PATHS}/modus-shell/postinstall
    
    # Launch the IDE and import the project by: Quick Panel > Import Existing Application In-Place
    $ ~/ModusToolbox/ide_3.1/eclipse/modustoolbox-eclipse
    
  4. Initialize the mtb-example-wifi-mqtt-client project:
    $ mkdir ~/mtb_projects
    $ project-creator-cli \
        --board-uri https://github.com/cypresssemiconductorco/TARGET_CY8CPROTO-062-4343W \
        --board-id CY8CPROTO-062-4343W \
        --board-commit release-v4.1.0 \
        --app-uri https://github.com/Infineon/mtb-example-wifi-mqtt-client \
        --app-id mtb-example-wifi-mqtt-client \
        --app-commit release-v5.1.0 \
        --user-app-name mtb_example_wifi_mqtt_client \
        --target-dir ~/mtb_projects
    
  5. Test build the project:
    $ cd ~/mtb_projects/mtb_example_wifi_mqtt_client
    $ make build -j$(nproc)
    
  6. Program the application artifact onto the board, and remember to connect your board to the host before proceeding:
    $ make program
    
  7. Connect to the serial port to view the debug messages:
    # Look for the serial port, e.g., /dev/ttyACM0
    $ dmesg | grep tty
    
    # Reading from the serial port
    $ sudo ttylog -b 115200 -d /dev/ttyACM0
    

Cross-compile TPM2-TSS for PSoC 6

  1. Install packages:
    $ sudo apt update
    $ sudo apt -y install autoconf-archive libcmocka0 libcmocka-dev procps iproute2 build-essential git \
        pkg-config gcc libtool automake libssl-dev uthash-dev autoconf doxygen libjson-c-dev \
        libini-config-dev libcurl4-openssl-dev uuid-dev pandoc acl libglib2.0-dev xxd jq
    
  2. Set the environment variables:
    $ export PATH=${HOME}/ModusToolbox/tools_${MTB_VERSION_SHORT}/gcc/bin:$PATH
    
  3. Download tpm2-tss and its dependencies:
    $ git clone https://github.com/tpm2-software/tpm2-tss ~/tpm2-tss
    $ cd ~/tpm2-tss
    $ git checkout d0632dabe8557754705f8d38ffffdafc9f4865d1
    
    $ git clone https://github.com/infineon/psoc6-aws-iot-optiga-tpm ~/psoc6-aws-iot-optiga-tpm
    
  4. Extract the compilation flags from the MTB project:
    # Extract the raw compilation flags from the MTB project.
    $ mtb_command=$(jq '.[] | select(.file == "source/main.c") | .command' $HOME/mtb_projects/mtb_example_wifi_mqtt_client/build/compile_commands.json)
    
    # Trim the beginning and the end.
    $ mtb_command_trimmed_head=$(echo $mtb_command | sed "s/.*-c //")
    $ mtb_command_trimmed_tail=$(echo $mtb_command_trimmed_head | sed "s/ -o.*//")
    
    # Remove single quotes and escape characters.
    $ mtb_command_cleaned_quote=$(echo $mtb_command_trimmed_tail | sed "s/'\\\\\\\"/\\\"/")
    $ mtb_command_cleaned_quote=$(echo $mtb_command_cleaned_quote | sed "s/\\\\\\\"'/\\\"/")
    
    # Update the path.
    $ compiler_flags=$(echo $mtb_command_cleaned_quote | sed "s#-I\.\.#-I$HOME/mtb_projects#g" | sed "s#-I\.#-I$HOME/mtb_projects/mtb_example_wifi_mqtt_client#g" | sed "s#-Ibsps#-I$HOME/mtb_projects/mtb_example_wifi_mqtt_client/bsps#g")
    
    # Modify and add compilation flags.
    $ compiler_flags=$(echo $compiler_flags | sed "s/nano\.specs/nosys\.specs/")
    $ compiler_flags=$(echo $compiler_flags | sed "s/\(-pipe\)/\1 -fno-pie/")
    
    $ echo $compiler_flags
    
  5. Cross-compile:
    $ ./bootstrap
    $ ./configure --host=arm-none-eabi \
      --with-crypto=mbed \
      --enable-nodl --with-maxloglevel=none --disable-util-io --disable-tcti-device \
      --disable-tcti-mssim --disable-tcti-swtpm --disable-tcti-pcap \
      --disable-tcti-spi-ftdi --disable-tcti-spi-ltt2go --disable-tcti-i2c-ftdi \
      --disable-tcti-libtpms --disable-tcti-cmd --disable-fapi --disable-policy \
      CFLAGS="-DPATH_MAX=256 -DTSS2_TCTI_SUPPRESS_POLL_WARNINGS $compiler_flags"
    
    # Overwrite the CFLAGS to modify the value of MEDTLS_USER_CONFIG_FILE to include escape characters.
    # We are doing this here because autoconf does not accept escape characters.
    $ compiler_flags="-DPATH_MAX=256 -DTSS2_TCTI_SUPPRESS_POLL_WARNINGS \
      $(echo $compiler_flags | sed 's/\"mbedtls_user_config.h\"/\\\"mbedtls_user_config.h\\\"/')"
    
    $ make CFLAGS="$compiler_flags" -j$(nproc)
    
  6. Install the resulting libraries in the /tmp/tpm2-tss directory:
    $ mkdir /tmp/tpm2-tss
    $ make DESTDIR=/tmp/tpm2-tss install -j$(nproc)
    

Add TPM2-TSS Libraries to the MTB Project

What's currently absent from the TSS library is the platform-specific TCTI module (Tss2_Tcti_Spi_Psoc6_Init(...)). Once this module is implemented in MTB, the TSS library will have the capability to access the PSoC 6 SPI interface for communication with the TPM.

The following steps describe how to add TSS libraries to your MTB project:

  1. Copy the platform-specific TCTI implementation into your MTB project by:
    $ cp ~/psoc6-aws-iot-optiga-tpm/src/tcti_spi_psoc6.* ~/mtb_projects/mtb_example_wifi_mqtt_client/source/
    
  2. Include the TSS libraries in the build by modifying the MTB Makefile:
    $ line=`awk '/^INCLUDES/ {c++} c==1{ print NR+1; exit }' ~/mtb_projects/mtb_example_wifi_mqtt_client/Makefile`
    $ sed -i ${line}'i INCLUDES+=/tmp/tpm2-tss/usr/local/include' ~/mtb_projects/mtb_example_wifi_mqtt_client/Makefile
    
    $ line=`awk '/^LDLIBS/ {c++} c==1{ print NR+1; exit }' ~/mtb_projects/mtb_example_wifi_mqtt_client/Makefile`
    $ sed -i ${line}'i LDLIBS+=/tmp/tpm2-tss/usr/local/lib/libtss2-mu.a /tmp/tpm2-tss/usr/local/lib/libtss2-rc.a /tmp/tpm2-tss/usr/local/lib/libtss2-sys.a /tmp/tpm2-tss/usr/local/lib/libtss2-esys.a /tmp/tpm2-tss/usr/local/lib/libtss2-tctildr.a /tmp/tpm2-tss/usr/local/lib/libtss2-tcti-spi-helper.a' ~/mtb_projects/mtb_example_wifi_mqtt_client/Makefile
    
  3. Copy the code along with the examples into your MTB project by:
    $ cp ~/psoc6-aws-iot-optiga-tpm/src/tss2_* ~/mtb_projects/mtb_example_wifi_mqtt_client/source/
    
  4. Rebuild the project:
    $ cd ~/mtb_projects/mtb_example_wifi_mqtt_client
    $ make clean
    $ make build -j$(nproc)
    

Example Applications

Once the TSS libraries are ready for use, they can be tested with some examples:

TPM2-TSS Examples

Add the following code snippets to the main.c file in the MTB project. However, hold on! Scripts are provided below to automate the copying of code for your convenience.

#include <stdio.h>

#include <tss2/tss2_rc.h>
#include <tss2/tss2_mu.h>
#include <tss2/tss2_sys.h>
#include <tss2/tss2_esys.h>
#include <tss2/tss2_tctildr.h>

#include "tcti_spi_psoc6.h"

void snippet_1()
{
    TSS2_TCTI_CONTEXT *tcti_ctx = NULL;
    ESYS_CONTEXT *esys_ctx = NULL;
    TPM2B_DIGEST *b = NULL;
    TSS2_RC rc;
    size_t size;

    rc = Tss2_Tcti_Spi_Psoc6_Init(NULL, &size, NULL);
    if (rc != TSS2_RC_SUCCESS) {
        printf("Tss2_Tcti_Spi_Psoc6_Init failed with error code: 0x%" PRIX32 "(%s).\n", rc, Tss2_RC_Decode(rc));
        goto out;
    }

    tcti_ctx = calloc(1, size);
    if (!tcti_ctx) {
        printf("calloc has failed.\n");
        goto out;
    }

    rc = Tss2_Tcti_Spi_Psoc6_Init(tcti_ctx, &size, NULL);
    if (rc == TSS2_RC_SUCCESS) {
        rc = Esys_Initialize(&esys_ctx, tcti_ctx, NULL);
        if (rc != TSS2_RC_SUCCESS) {
            goto out_tcti_finalize;
        } else {
            rc = Esys_Startup(esys_ctx, TPM2_SU_CLEAR);
            if (rc != TPM2_RC_SUCCESS && rc != TPM2_RC_INITIALIZE) {
                printf("Esys_Startup failed with error code: 0x%" PRIX32 "(%s).\n", rc, Tss2_RC_Decode(rc));
                goto out_esys_finalize;
            } else {
                rc = Esys_GetRandom(esys_ctx,
                                    ESYS_TR_NONE, ESYS_TR_NONE, ESYS_TR_NONE,
                                    32, &b);
                if (rc != TSS2_RC_SUCCESS) {
                    printf("Esys_GetRandom failed with error code: 0x%" PRIX32 "(%s).\n", rc, Tss2_RC_Decode(rc));
                } else {
                    int i;

                    printf("Esys_GetRandom returns 0x");
                    for (i = 0; i < b->size; i++) {
                        printf("%02x", b->buffer[i]);
                    }
                    printf("\n");
                }

                free(b);
            }
        }
    } else {
        goto out_free_tcti_ctx;
    }

out_esys_finalize:
    Esys_Finalize(&esys_ctx);
out_tcti_finalize:
    Tss2_Tcti_Finalize(tcti_ctx);
out_free_tcti_ctx:
    free(tcti_ctx);
out:
    return;
}

#include "tss2_examples.h"

void snippet_2()
{
    tss2_examples();
}

Here is a script for automating the copying of the code snippets:

$ cd ~/psoc6-aws-iot-optiga-tpm
$ sed -n $(expr `awk '/\`\`\`snippet1/{c++} c==1{ print NR; exit }' README.md` + 1)',$p' README.md > .README.md.tmp
$ sed `awk '/\`\`\`/{c++} c==1{ print NR; exit }' .README.md.tmp`',$d' .README.md.tmp > .snippet1.c
$ cat ~/mtb_projects/mtb_example_wifi_mqtt_client/source/main.c >> .snippet1.c
$ cp ~/mtb_projects/mtb_example_wifi_mqtt_client/source/main.c ~/mtb_projects/mtb_example_wifi_mqtt_client/source/main.c.bkup
$ cp .snippet1.c ~/mtb_projects/mtb_example_wifi_mqtt_client/source/main.c

$ line=$(expr `awk '/==========/{c++} c==2{ print NR; exit }' ~/mtb_projects/mtb_example_wifi_mqtt_client/source/main.c` + 1)
$ sed -i ${line}'i\\n    snippet_1();\n    snippet_2();' ~/mtb_projects/mtb_example_wifi_mqtt_client/source/main.c

Rebuild the project:

$ cd ~/mtb_projects/mtb_example_wifi_mqtt_client
$ make clean
$ make build -j$(nproc)

Mbed TLS Examples

To run the Mbed TLS examples on the MTB project, some features of the Mbed TLS library, which are disabled by default, need to be enabled:

$ cp ~/mtb_projects/mtb_example_wifi_mqtt_client/configs/mbedtls_user_config.h ~/mtb_projects/mtb_example_wifi_mqtt_client/configs/mbedtls_user_config.h.bkup
$ sed -i 's/#undef MBEDTLS_X509_CSR_WRITE_C//g' ~/mtb_projects/mtb_example_wifi_mqtt_client/configs/mbedtls_user_config.h
$ sed -i 's/#undef MBEDTLS_X509_CRT_WRITE_C//g' ~/mtb_projects/mtb_example_wifi_mqtt_client/configs/mbedtls_user_config.h
$ sed -i 's/#undef MBEDTLS_X509_CREATE_C//g' ~/mtb_projects/mtb_example_wifi_mqtt_client/configs/mbedtls_user_config.h
$ sed -i 's/#undef MBEDTLS_X509_CSR_PARSE_C//g' ~/mtb_projects/mtb_example_wifi_mqtt_client/configs/mbedtls_user_config.h

Copy the code along with the examples into your MTB project by:

$ cp ~/psoc6-aws-iot-optiga-tpm/src/mbedtls_* ~/mtb_projects/mtb_example_wifi_mqtt_client/source/

Add the following code snippets to the main.c file in the MTB project. However, hold on! Scripts are provided below to automate the copying of code for your convenience.:

#include "mbedtls_examples.h"

void snippet_1()
{
    mbedtls_examples();
}

Here is a script for automating the copying of the code snippets:

$ cd ~/psoc6-aws-iot-optiga-tpm
$ sed -n $(expr `awk '/\`\`\`snippet2/{c++} c==1{ print NR; exit }' README.md` + 1)',$p' README.md > .README.md.tmp
$ sed `awk '/\`\`\`/{c++} c==1{ print NR; exit }' .README.md.tmp`',$d' .README.md.tmp > .snippet2.c
$ cat ~/mtb_projects/mtb_example_wifi_mqtt_client/source/main.c.bkup >> .snippet2.c
$ cp .snippet2.c ~/mtb_projects/mtb_example_wifi_mqtt_client/source/main.c

$ line=$(expr `awk '/==========/{c++} c==2{ print NR; exit }' ~/mtb_projects/mtb_example_wifi_mqtt_client/source/main.c` + 1)
$ sed -i ${line}'i\\n    snippet_1();' ~/mtb_projects/mtb_example_wifi_mqtt_client/source/main.c

Rebuild the project:

$ cd ~/mtb_projects/mtb_example_wifi_mqtt_client
$ make clean
$ make build -j$(nproc)

TPM-based Device Onboarding to AWS IoT Core

Based on what you have learned from the Mbed TLS examples, you can now prepare the MTB project for device onboarding to AWS IoT Core:

  1. Provision the TPM with the desired key. For your convenience, you can reuse the project from the "Mbed TLS Examples" section and make modifications to the ~/mtb_projects/mtb_example_wifi_mqtt_client/source/mbedtls_examples.c file.
    int mbedtls_examples()
    {
        if (rsa(true)) {
            return 1;
        }
    
        return 0;
    }
    
  2. Capture the Certificate Signing Request (CSR) printed on the serial port. Create a file at ~/psoc6-aws-iot-optiga-tpm/aws-iot-core/out/tpm.csr and store the CSR within it.
    -----BEGIN CERTIFICATE REQUEST-----
    ...
    -----END CERTIFICATE REQUEST-----
    
  3. Onboard the PSoC6 to AWS IoT Core by submitting the CSR and, in exchange, obtaining the AWS CA-signed client certificate. For your convenience:
    # Install dependencies.
    $ sudo apt install awscli curl
    
    # Configure AWS account credentials and region.
    $ aws configure
    
    # Retrive the endpoint for later use.
    $ aws iot describe-endpoint --endpoint-type iot:Data-ATS
    
    # Create a thing in AWS IoT Core.
    # The CSR will be sent to AWS, and in return, you will receive
    # the client certificate (tpm.crt). Additionally, the script will
    # fetch the AWS CA certificate for you. You will find all the certificates
    # in ~/psoc6-aws-iot-optiga-tpm/aws-iot-core/out.
    $ cd ~/psoc6-aws-iot-optiga-tpm/aws-iot-core
    $ ./1_create_thing.sh
    
    # Convert the certificates to C code format for later use.
    $ ./2_pem_to_clang.sh
    
  4. Instead of using a software key, modify the code to accept the TPM-based mbedtls_pk_context key object. The file to be modified is ~/mtb_projects/mtb_shared/secure-sockets/release-v3.3.0/source/COMPONENT_MBEDTLS/cy_tls.c; look for mbedtls_pk_init(...). The initialization of the key object can be found in the provided Mbed TLS examples. For your convenience, you may use the following snippet:
    /* load key */
    #if 0
    mbedtls_pk_init( &identity->private_key );
    
    ret = mbedtls_pk_parse_key( &identity->private_key, (const unsigned char *) private_key, private_key_len+1, NULL, 0 );
    if ( ret != 0 )
    {
        tls_cy_log_msg(CYLF_MIDDLEWARE, CY_LOG_ERR, "mbedtls_pk_parse_key failed with error %d\r\n", ret);
        result = CY_RSLT_MODULE_TLS_PARSE_KEY;
    }
    #endif
    
    #include "mbedtls_tpm_pk.h"
    
    ESYS_CONTEXT *esys_ctx;
    mbedtls_tpm_rsa_context *tpm_rsa_ctx;
    
    tpm_open(&esys_ctx, NULL);
    
    mbedtls_pk_init(&identity->private_key);
    mbedtls_pk_setup(&identity->private_key, &tpm_rsa_pkcs_v15_info);
    
    tpm_rsa_ctx = (mbedtls_tpm_rsa_context *)identity->private_key.pk_ctx;
    tpm_rsa_init(tpm_rsa_ctx, true, esys_ctx);
    
  5. Configure the WiFi connection in ~/mtb_projects/mtb_example_wifi_mqtt_client/configs/wifi_config.h.
  6. Lastly, configure the MQTT connection in ~/mtb_projects/mtb_example_wifi_mqtt_client/configs/mqtt_client_config.h:
    • MQTT_BROKER_ADDRESS: The endpoint address from step 3.
    • MQTT_PORT: 8883
    • MQTT_SECURE_CONNECTION: 1
    • CLIENT_CERTIFICATE: The client certificate from step 3.
    • ROOT_CA_CERTIFICATE: The AWS CA certificate from step 3.
  7. When you have finished testing, remove the thing from AWS IoT Core:
    $ cd ~/psoc6-aws-iot-optiga-tpm/aws-iot-core
    $ ./3_clean_thing.sh
    

Miscellaneous

Running TPM2-TSS Examples on Linux

Build and install tpm2-tss on the host machine:

$ cd ~/tpm2-tss
$ git clean -fxd
$ git reset --hard
$ ./bootstrap
$ ./configure
$ make -j$(nproc)
$ sudo make install -j$(nproc)

Set up a TPM simulator:

# Install dependencies
$ sudo apt install -y dh-autoreconf libtasn1-6-dev net-tools libgnutls28-dev expect gawk socat libfuse-dev libseccomp-dev make libjson-glib-dev gnutls-bin

# Install libtpms-devel
$ git clone https://github.com/stefanberger/libtpms ~/libtpms
$ cd ~/libtpms
$ git checkout v0.9.5
$ ./autogen.sh --with-tpm2 --with-openssl
$ make -j$(nproc)
$ sudo make install
$ sudo ldconfig

# Install Libtpms-based TPM emulator
$ git clone https://github.com/stefanberger/swtpm ~/swtpm
$ cd ~/swtpm
$ git checkout v0.7.3
$ ./autogen.sh --with-openssl --prefix=/usr
$ make -j$(nproc)
$ sudo make install
$ sudo ldconfig

Launch the TPM simulator:

$ mkdir /tmp/emulated_tpm
$ swtpm_setup --tpm2 --create-config-files overwrite,root

# Initialize the swtpm
$ swtpm_setup --tpm2 --config ~/.config/swtpm_setup.conf --tpm-state /tmp/emulated_tpm --overwrite --create-ek-cert --create-platform-cert --write-ek-cert-files /tmp/emulated_tpm

# Launch the swtpm
$ swtpm socket --tpm2 --flags not-need-init --tpmstate dir=/tmp/emulated_tpm --server type=tcp,port=2321 --ctrl type=tcp,port=2322 &
$ sleep 5

Build the example:

$ cd ~/psoc6-aws-iot-optiga-tpm/src
$ gcc -Wall -o test \
  linux_main.c tss2_examples.c tss2_util.c \
  -ltss2-tctildr -ltss2-esys -ltss2-rc \
  -fsanitize=address \
  -DDEBUG \
  -DTCTILDR_ENABLE \
  -DPLATFORM_LOCK_TEST \
  -DTCTI_NAME_CONF=\"swtpm:host=localhost,port=2321\"

Execute the example:

$ ./test

# Perform a hardware TPM reset to re-enable the platform hierarchy.
# For further details, refer to PLATFORM_LOCK_TEST in the source code.
$ swtpm_ioctl --tcp localhost:2322 -i

Running Mbed TLS Examples on Linux

Launch the TPM simulator according to prior instructions.

Set up the Mbed TLS library on your Linux system:

# Install dependencies
$ sudo apt install -y cmake

# Install Mbed TLS library
$ git clone https://github.com/Mbed-TLS/mbedtls/ ~/mbedtls
$ cd ~/mbedtls
$ git checkout mbedtls-2.25.0
$ mkdir build_dir
$ cd build_dir
$ cmake -DCMAKE_BUILD_TYPE=Debug -DUSE_SHARED_MBEDTLS_LIBRARY=On -DCMAKE_C_FLAGS="-Wno-error=free-nonheap-object" ..
$ cmake --build .

Build the example:

$ cd ~/psoc6-aws-iot-optiga-tpm/src
$ gcc -Wall -o test \
  linux_mbedtls_main.c mbedtls_examples.c mbedtls_tpm.c \
  mbedtls_tpm_pk_rsa.c mbedtls_tpm_pk_ecp.c \
  mbedtls_tpm_entropy.c tss2_util.c \
  -I${HOME}/mbedtls/library \
  -I${HOME}/mbedtls/build_dir/include \
  -L${HOME}/mbedtls/build_dir/library \
  -lmbedcrypto -lmbedtls -lmbedx509 \
  -ltss2-tctildr -ltss2-esys -ltss2-rc \
  -fsanitize=address \
  -DDEBUG \
  -DTCTILDR_ENABLE \
  -DTCTI_NAME_CONF=\"swtpm:host=localhost,port=2321\"

Execute the example:

$ LD_LIBRARY_PATH=${HOME}/mbedtls/build_dir/library ./test

License

This project is licensed under the MIT License - see the LICENSE file for details.

About

PSoC 6 Onboarding to AWS IoT Core using OPTIGA™ TPM SLx 9670 TPM2.0

Resources

License

Stars

Watchers

Forks

Packages

No packages published