Soby Mathew | b4c6df4 | 2022-11-09 11:13:29 +0000 | [diff] [blame] | 1 | /* |
| 2 | * SPDX-License-Identifier: BSD-3-Clause |
| 3 | * SPDX-FileCopyrightText: Copyright TF-RMM Contributors. |
| 4 | */ |
| 5 | |
| 6 | #include <assert.h> |
| 7 | #include <attestation.h> |
| 8 | #include <attestation_priv.h> |
| 9 | #include <debug.h> |
| 10 | #include <errno.h> |
Soby Mathew | b4c6df4 | 2022-11-09 11:13:29 +0000 | [diff] [blame] | 11 | #include <mbedtls/memory_buffer_alloc.h> |
| 12 | #include <memory_alloc.h> |
Mate Toth-Pal | c69951d | 2023-03-17 17:30:50 +0100 | [diff] [blame] | 13 | #include <psa/crypto.h> |
Arunachalam Ganapathy | f649121 | 2023-02-23 16:04:34 +0000 | [diff] [blame] | 14 | #include <simd.h> |
Soby Mathew | b4c6df4 | 2022-11-09 11:13:29 +0000 | [diff] [blame] | 15 | #include <sizes.h> |
| 16 | |
| 17 | /* |
| 18 | * Memory buffer for the allocator during key initialization. |
| 19 | * |
| 20 | * Used to compute the public key and setup a PRNG object per CPU. PRNGs are |
| 21 | * needed for key blinding during EC signing. |
| 22 | * |
| 23 | * Memory requirements: |
Jean-Philippe Brucker | ba22385 | 2023-07-31 15:26:35 +0100 | [diff] [blame] | 24 | * +------------------------+-------+-------------------------+ |
Soby Mathew | b4c6df4 | 2022-11-09 11:13:29 +0000 | [diff] [blame] | 25 | * | | MAX | Persisting allocation | |
| 26 | * +------------------------+-------+-------------------------+ |
Jean-Philippe Brucker | ba22385 | 2023-07-31 15:26:35 +0100 | [diff] [blame] | 27 | * | Public key computation | 2.9K | 0.1K | |
Soby Mathew | b4c6df4 | 2022-11-09 11:13:29 +0000 | [diff] [blame] | 28 | * +------------------------+-------+-------------------------+ |
Jean-Philippe Brucker | ba22385 | 2023-07-31 15:26:35 +0100 | [diff] [blame] | 29 | * | one SHA256 HMAC_DRBG | | | |
| 30 | * | buffer | 364B | 364B | |
| 31 | * | | | | |
| 32 | * | PRNG setup for 32 CPUs | 12K | 11.6K | |
Soby Mathew | b4c6df4 | 2022-11-09 11:13:29 +0000 | [diff] [blame] | 33 | * +------------------------+-------+-------------------------+ |
| 34 | * |
Jean-Philippe Brucker | ba22385 | 2023-07-31 15:26:35 +0100 | [diff] [blame] | 35 | * Measured with eg: |
Soby Mathew | b4c6df4 | 2022-11-09 11:13:29 +0000 | [diff] [blame] | 36 | * src/lib/memory_buffer_alloc.c: mbedtls_memory_buffer_alloc_status() |
Jean-Philippe Brucker | ba22385 | 2023-07-31 15:26:35 +0100 | [diff] [blame] | 37 | * |
| 38 | * Reserve enough space for the temporary PRNG and per-CPU ones (see |
Mathieu Poirier | d8e1f30 | 2024-06-03 10:50:13 -0600 | [diff] [blame^] | 39 | * attest_rnd_prng_init()), plus more space for other allocations. |
Soby Mathew | b4c6df4 | 2022-11-09 11:13:29 +0000 | [diff] [blame] | 40 | */ |
Chuyue Luo | bcfe4c3 | 2023-10-24 13:48:19 +0100 | [diff] [blame] | 41 | #define PRNG_INIT_HEAP_SIZE ((MAX_CPUS + 1UL) * 364UL) |
Mathieu Poirier | d8e1f30 | 2024-06-03 10:50:13 -0600 | [diff] [blame^] | 42 | #define MISC_PER_CPU (SZ_4K / 16U) |
| 43 | #define INIT_HEAP_SIZE (PRNG_INIT_HEAP_SIZE + (MISC_PER_CPU * MAX_CPUS)) |
Soby Mathew | b4c6df4 | 2022-11-09 11:13:29 +0000 | [diff] [blame] | 44 | |
Jean-Philippe Brucker | ba22385 | 2023-07-31 15:26:35 +0100 | [diff] [blame] | 45 | static unsigned char mem_buf[INIT_HEAP_SIZE] |
Soby Mathew | b4c6df4 | 2022-11-09 11:13:29 +0000 | [diff] [blame] | 46 | __aligned(sizeof(unsigned long)); |
| 47 | |
| 48 | static bool attest_initialized; |
| 49 | |
AlexeiFedorov | 4bbb0e0 | 2023-08-22 14:15:21 +0100 | [diff] [blame] | 50 | static struct buffer_alloc_ctx init_ctx; |
Soby Mathew | b4c6df4 | 2022-11-09 11:13:29 +0000 | [diff] [blame] | 51 | |
| 52 | int attestation_init(void) |
| 53 | { |
| 54 | int ret; |
Mate Toth-Pal | c69951d | 2023-03-17 17:30:50 +0100 | [diff] [blame] | 55 | psa_status_t psa_status; |
Soby Mathew | b4c6df4 | 2022-11-09 11:13:29 +0000 | [diff] [blame] | 56 | |
| 57 | /* |
| 58 | * Associate the allocated heap for mbedtls with the current CPU. |
| 59 | */ |
AlexeiFedorov | 44a76a3 | 2023-08-29 16:53:26 +0100 | [diff] [blame] | 60 | ret = buffer_alloc_ctx_assign(&init_ctx); |
| 61 | if (ret != 0) { |
| 62 | return ret; |
| 63 | } |
Soby Mathew | b4c6df4 | 2022-11-09 11:13:29 +0000 | [diff] [blame] | 64 | |
Arunachalam Ganapathy | 5111993 | 2023-03-23 12:32:49 +0000 | [diff] [blame] | 65 | SIMD_FPU_ALLOW(mbedtls_memory_buffer_alloc_init(mem_buf, |
| 66 | sizeof(mem_buf))); |
Soby Mathew | b4c6df4 | 2022-11-09 11:13:29 +0000 | [diff] [blame] | 67 | |
Arunachalam Ganapathy | 5111993 | 2023-03-23 12:32:49 +0000 | [diff] [blame] | 68 | SIMD_FPU_ALLOW(ret = attest_rnd_prng_init()); |
Soby Mathew | b4c6df4 | 2022-11-09 11:13:29 +0000 | [diff] [blame] | 69 | if (ret != 0) { |
Soby Mathew | 376ffa4 | 2024-10-04 14:01:59 +0100 | [diff] [blame] | 70 | goto attest_init_fail; |
Soby Mathew | b4c6df4 | 2022-11-09 11:13:29 +0000 | [diff] [blame] | 71 | } |
| 72 | |
Mate Toth-Pal | c69951d | 2023-03-17 17:30:50 +0100 | [diff] [blame] | 73 | SIMD_FPU_ALLOW(psa_status = psa_crypto_init()); |
| 74 | if (psa_status != PSA_SUCCESS) { |
Soby Mathew | 376ffa4 | 2024-10-04 14:01:59 +0100 | [diff] [blame] | 75 | ret = -EINVAL; |
| 76 | goto attest_init_fail; |
Mate Toth-Pal | c69951d | 2023-03-17 17:30:50 +0100 | [diff] [blame] | 77 | } |
| 78 | |
| 79 | /* |
| 80 | * Set the number of max operations per ECC signing iteration to the |
| 81 | * configured value. |
| 82 | * |
| 83 | * This adjusts the length of a single signing loop. |
| 84 | */ |
| 85 | SIMD_FPU_ALLOW(psa_interruptible_set_max_ops(MBEDTLS_ECP_MAX_OPS)); |
| 86 | |
Soby Mathew | b4c6df4 | 2022-11-09 11:13:29 +0000 | [diff] [blame] | 87 | /* Retrieve the platform key from root world */ |
Arunachalam Ganapathy | 5111993 | 2023-03-23 12:32:49 +0000 | [diff] [blame] | 88 | SIMD_FPU_ALLOW(ret = attest_init_realm_attestation_key()); |
Soby Mathew | b4c6df4 | 2022-11-09 11:13:29 +0000 | [diff] [blame] | 89 | if (ret != 0) { |
Soby Mathew | 376ffa4 | 2024-10-04 14:01:59 +0100 | [diff] [blame] | 90 | goto attest_init_fail; |
Soby Mathew | b4c6df4 | 2022-11-09 11:13:29 +0000 | [diff] [blame] | 91 | } |
| 92 | |
Soby Mathew | b4c6df4 | 2022-11-09 11:13:29 +0000 | [diff] [blame] | 93 | /* Retrieve the platform token from root world */ |
| 94 | ret = attest_setup_platform_token(); |
| 95 | if (ret != 0) { |
Soby Mathew | 376ffa4 | 2024-10-04 14:01:59 +0100 | [diff] [blame] | 96 | goto attest_init_fail; |
Soby Mathew | b4c6df4 | 2022-11-09 11:13:29 +0000 | [diff] [blame] | 97 | } |
| 98 | |
Soby Mathew | 9ca5755 | 2024-10-03 12:21:36 +0100 | [diff] [blame] | 99 | #if ATTEST_EL3_TOKEN_SIGN |
| 100 | /* Initialize the EL3 queue */ |
| 101 | if (el3_token_sign_queue_init() != 0) { |
| 102 | WARN("EL3 queue init failed.\n"); |
| 103 | ret = -ENOTSUP; |
| 104 | goto attest_init_fail; |
| 105 | } |
| 106 | #endif |
Soby Mathew | b4c6df4 | 2022-11-09 11:13:29 +0000 | [diff] [blame] | 107 | attest_initialized = true; |
| 108 | |
Soby Mathew | 376ffa4 | 2024-10-04 14:01:59 +0100 | [diff] [blame] | 109 | attest_init_fail : |
| 110 | buffer_alloc_ctx_unassign(); |
| 111 | return ret; |
Soby Mathew | b4c6df4 | 2022-11-09 11:13:29 +0000 | [diff] [blame] | 112 | } |
| 113 | |
| 114 | int attestation_heap_ctx_init(unsigned char *buf, size_t buf_size) |
| 115 | { |
| 116 | assert(buf != NULL); |
| 117 | |
| 118 | if (attest_initialized == false) { |
Soby Mathew | 376ffa4 | 2024-10-04 14:01:59 +0100 | [diff] [blame] | 119 | ERROR("Attestation init failed.\n"); |
Soby Mathew | b4c6df4 | 2022-11-09 11:13:29 +0000 | [diff] [blame] | 120 | return -EINVAL; |
| 121 | } |
| 122 | |
| 123 | /* Initialise the mbedTLS heap */ |
Arunachalam Ganapathy | 5111993 | 2023-03-23 12:32:49 +0000 | [diff] [blame] | 124 | mbedtls_memory_buffer_alloc_init(buf, buf_size); |
Soby Mathew | b4c6df4 | 2022-11-09 11:13:29 +0000 | [diff] [blame] | 125 | |
| 126 | return 0; |
| 127 | } |
| 128 | |
Soby Mathew | 376ffa4 | 2024-10-04 14:01:59 +0100 | [diff] [blame] | 129 | void attestation_heap_ctx_assign_pe(struct buffer_alloc_ctx *ctx) |
Soby Mathew | b4c6df4 | 2022-11-09 11:13:29 +0000 | [diff] [blame] | 130 | { |
Soby Mathew | 376ffa4 | 2024-10-04 14:01:59 +0100 | [diff] [blame] | 131 | int ret __unused; |
Soby Mathew | b4c6df4 | 2022-11-09 11:13:29 +0000 | [diff] [blame] | 132 | assert(ctx != NULL); |
| 133 | |
Soby Mathew | 376ffa4 | 2024-10-04 14:01:59 +0100 | [diff] [blame] | 134 | /* Associate the buffer_alloc_ctx to this CPU */ |
| 135 | ret = buffer_alloc_ctx_assign(ctx); |
| 136 | assert(ret == 0); |
Soby Mathew | b4c6df4 | 2022-11-09 11:13:29 +0000 | [diff] [blame] | 137 | } |
| 138 | |
Soby Mathew | 376ffa4 | 2024-10-04 14:01:59 +0100 | [diff] [blame] | 139 | void attestation_heap_ctx_unassign_pe(void) |
Soby Mathew | b4c6df4 | 2022-11-09 11:13:29 +0000 | [diff] [blame] | 140 | { |
Soby Mathew | b4c6df4 | 2022-11-09 11:13:29 +0000 | [diff] [blame] | 141 | buffer_alloc_ctx_unassign(); |
Soby Mathew | b4c6df4 | 2022-11-09 11:13:29 +0000 | [diff] [blame] | 142 | } |