Soby Mathew | b4c6df4 | 2022-11-09 11:13:29 +0000 | [diff] [blame] | 1 | /* |
| 2 | * SPDX-License-Identifier: BSD-3-Clause |
| 3 | * SPDX-FileCopyrightText: Copyright TF-RMM Contributors. |
| 4 | */ |
| 5 | |
| 6 | #include <assert.h> |
| 7 | #include <attestation.h> |
| 8 | #include <attestation_priv.h> |
| 9 | #include <debug.h> |
| 10 | #include <errno.h> |
Soby Mathew | b4c6df4 | 2022-11-09 11:13:29 +0000 | [diff] [blame] | 11 | #include <mbedtls/memory_buffer_alloc.h> |
| 12 | #include <memory_alloc.h> |
Mate Toth-Pal | c69951d | 2023-03-17 17:30:50 +0100 | [diff] [blame] | 13 | #include <psa/crypto.h> |
Arunachalam Ganapathy | f649121 | 2023-02-23 16:04:34 +0000 | [diff] [blame] | 14 | #include <simd.h> |
Soby Mathew | b4c6df4 | 2022-11-09 11:13:29 +0000 | [diff] [blame] | 15 | #include <sizes.h> |
| 16 | |
| 17 | /* |
| 18 | * Memory buffer for the allocator during key initialization. |
| 19 | * |
| 20 | * Used to compute the public key and setup a PRNG object per CPU. PRNGs are |
| 21 | * needed for key blinding during EC signing. |
| 22 | * |
| 23 | * Memory requirements: |
Jean-Philippe Brucker | ba22385 | 2023-07-31 15:26:35 +0100 | [diff] [blame] | 24 | * +------------------------+-------+-------------------------+ |
Soby Mathew | b4c6df4 | 2022-11-09 11:13:29 +0000 | [diff] [blame] | 25 | * | | MAX | Persisting allocation | |
| 26 | * +------------------------+-------+-------------------------+ |
Jean-Philippe Brucker | ba22385 | 2023-07-31 15:26:35 +0100 | [diff] [blame] | 27 | * | Public key computation | 2.9K | 0.1K | |
Soby Mathew | b4c6df4 | 2022-11-09 11:13:29 +0000 | [diff] [blame] | 28 | * +------------------------+-------+-------------------------+ |
Jean-Philippe Brucker | ba22385 | 2023-07-31 15:26:35 +0100 | [diff] [blame] | 29 | * | one SHA256 HMAC_DRBG | | | |
| 30 | * | buffer | 364B | 364B | |
| 31 | * | | | | |
| 32 | * | PRNG setup for 32 CPUs | 12K | 11.6K | |
Soby Mathew | b4c6df4 | 2022-11-09 11:13:29 +0000 | [diff] [blame] | 33 | * +------------------------+-------+-------------------------+ |
| 34 | * |
Jean-Philippe Brucker | ba22385 | 2023-07-31 15:26:35 +0100 | [diff] [blame] | 35 | * Measured with eg: |
Soby Mathew | b4c6df4 | 2022-11-09 11:13:29 +0000 | [diff] [blame] | 36 | * src/lib/memory_buffer_alloc.c: mbedtls_memory_buffer_alloc_status() |
Jean-Philippe Brucker | ba22385 | 2023-07-31 15:26:35 +0100 | [diff] [blame] | 37 | * |
| 38 | * Reserve enough space for the temporary PRNG and per-CPU ones (see |
| 39 | * attest_rnd_prng_init()), plus a page for other allocations. |
Soby Mathew | b4c6df4 | 2022-11-09 11:13:29 +0000 | [diff] [blame] | 40 | */ |
Jean-Philippe Brucker | ba22385 | 2023-07-31 15:26:35 +0100 | [diff] [blame] | 41 | #define PRNG_INIT_HEAP_SIZE ((MAX_CPUS + 1) * 364) |
| 42 | #define INIT_HEAP_SIZE (PRNG_INIT_HEAP_SIZE + SZ_4K) |
Soby Mathew | b4c6df4 | 2022-11-09 11:13:29 +0000 | [diff] [blame] | 43 | |
Jean-Philippe Brucker | ba22385 | 2023-07-31 15:26:35 +0100 | [diff] [blame] | 44 | static unsigned char mem_buf[INIT_HEAP_SIZE] |
Soby Mathew | b4c6df4 | 2022-11-09 11:13:29 +0000 | [diff] [blame] | 45 | __aligned(sizeof(unsigned long)); |
| 46 | |
| 47 | static bool attest_initialized; |
| 48 | |
AlexeiFedorov | 4bbb0e0 | 2023-08-22 14:15:21 +0100 | [diff] [blame] | 49 | static struct buffer_alloc_ctx init_ctx; |
Soby Mathew | b4c6df4 | 2022-11-09 11:13:29 +0000 | [diff] [blame] | 50 | |
| 51 | int attestation_init(void) |
| 52 | { |
| 53 | int ret; |
Mate Toth-Pal | c69951d | 2023-03-17 17:30:50 +0100 | [diff] [blame] | 54 | psa_status_t psa_status; |
Soby Mathew | b4c6df4 | 2022-11-09 11:13:29 +0000 | [diff] [blame] | 55 | |
| 56 | /* |
| 57 | * Associate the allocated heap for mbedtls with the current CPU. |
| 58 | */ |
AlexeiFedorov | 44a76a3 | 2023-08-29 16:53:26 +0100 | [diff] [blame] | 59 | ret = buffer_alloc_ctx_assign(&init_ctx); |
| 60 | if (ret != 0) { |
| 61 | return ret; |
| 62 | } |
Soby Mathew | b4c6df4 | 2022-11-09 11:13:29 +0000 | [diff] [blame] | 63 | |
Arunachalam Ganapathy | 5111993 | 2023-03-23 12:32:49 +0000 | [diff] [blame] | 64 | SIMD_FPU_ALLOW(mbedtls_memory_buffer_alloc_init(mem_buf, |
| 65 | sizeof(mem_buf))); |
Soby Mathew | b4c6df4 | 2022-11-09 11:13:29 +0000 | [diff] [blame] | 66 | |
Arunachalam Ganapathy | 5111993 | 2023-03-23 12:32:49 +0000 | [diff] [blame] | 67 | SIMD_FPU_ALLOW(ret = attest_rnd_prng_init()); |
Soby Mathew | b4c6df4 | 2022-11-09 11:13:29 +0000 | [diff] [blame] | 68 | if (ret != 0) { |
| 69 | return ret; |
| 70 | } |
| 71 | |
Mate Toth-Pal | c69951d | 2023-03-17 17:30:50 +0100 | [diff] [blame] | 72 | SIMD_FPU_ALLOW(psa_status = psa_crypto_init()); |
| 73 | if (psa_status != PSA_SUCCESS) { |
| 74 | return -EINVAL; |
| 75 | } |
| 76 | |
| 77 | /* |
| 78 | * Set the number of max operations per ECC signing iteration to the |
| 79 | * configured value. |
| 80 | * |
| 81 | * This adjusts the length of a single signing loop. |
| 82 | */ |
| 83 | SIMD_FPU_ALLOW(psa_interruptible_set_max_ops(MBEDTLS_ECP_MAX_OPS)); |
| 84 | |
Soby Mathew | b4c6df4 | 2022-11-09 11:13:29 +0000 | [diff] [blame] | 85 | /* Retrieve the platform key from root world */ |
Arunachalam Ganapathy | 5111993 | 2023-03-23 12:32:49 +0000 | [diff] [blame] | 86 | SIMD_FPU_ALLOW(ret = attest_init_realm_attestation_key()); |
Soby Mathew | b4c6df4 | 2022-11-09 11:13:29 +0000 | [diff] [blame] | 87 | if (ret != 0) { |
| 88 | return ret; |
| 89 | } |
| 90 | |
Soby Mathew | b4c6df4 | 2022-11-09 11:13:29 +0000 | [diff] [blame] | 91 | /* Retrieve the platform token from root world */ |
| 92 | ret = attest_setup_platform_token(); |
| 93 | if (ret != 0) { |
| 94 | return ret; |
| 95 | } |
| 96 | |
| 97 | buffer_alloc_ctx_unassign(); |
| 98 | |
| 99 | attest_initialized = true; |
| 100 | |
| 101 | return 0; |
| 102 | } |
| 103 | |
| 104 | int attestation_heap_ctx_init(unsigned char *buf, size_t buf_size) |
| 105 | { |
| 106 | assert(buf != NULL); |
| 107 | |
| 108 | if (attest_initialized == false) { |
| 109 | return -EINVAL; |
| 110 | } |
| 111 | |
| 112 | /* Initialise the mbedTLS heap */ |
Arunachalam Ganapathy | 5111993 | 2023-03-23 12:32:49 +0000 | [diff] [blame] | 113 | mbedtls_memory_buffer_alloc_init(buf, buf_size); |
Soby Mathew | b4c6df4 | 2022-11-09 11:13:29 +0000 | [diff] [blame] | 114 | |
| 115 | return 0; |
| 116 | } |
| 117 | |
| 118 | int attestation_heap_ctx_assign_pe(struct buffer_alloc_ctx *ctx) |
| 119 | { |
| 120 | assert(ctx != NULL); |
| 121 | |
| 122 | if (attest_initialized == false) { |
| 123 | return -EINVAL; |
| 124 | } |
| 125 | |
| 126 | /* |
| 127 | * Associate the buffer_alloc_ctx to this CPU |
| 128 | */ |
AlexeiFedorov | 44a76a3 | 2023-08-29 16:53:26 +0100 | [diff] [blame] | 129 | return buffer_alloc_ctx_assign(ctx); |
Soby Mathew | b4c6df4 | 2022-11-09 11:13:29 +0000 | [diff] [blame] | 130 | } |
| 131 | |
Shruti Gupta | 9debb13 | 2022-12-13 14:38:49 +0000 | [diff] [blame] | 132 | int attestation_heap_ctx_unassign_pe(void) |
Soby Mathew | b4c6df4 | 2022-11-09 11:13:29 +0000 | [diff] [blame] | 133 | { |
Soby Mathew | b4c6df4 | 2022-11-09 11:13:29 +0000 | [diff] [blame] | 134 | if (attest_initialized == false) { |
| 135 | return -EINVAL; |
| 136 | } |
| 137 | |
| 138 | buffer_alloc_ctx_unassign(); |
| 139 | return 0; |
| 140 | } |
| 141 | |
| 142 | inline int attestation_heap_reinit_pe(unsigned char *buf, size_t buf_size) |
| 143 | { |
Arunachalam Ganapathy | 5111993 | 2023-03-23 12:32:49 +0000 | [diff] [blame] | 144 | mbedtls_memory_buffer_alloc_init(buf, buf_size); |
Soby Mathew | b4c6df4 | 2022-11-09 11:13:29 +0000 | [diff] [blame] | 145 | |
| 146 | return 0; |
| 147 | } |