blob: 53467202945a113184cb8b4116f1aab995bf5bbb [file] [log] [blame]
Soby Mathewb4c6df42022-11-09 11:13:29 +00001/*
2 * SPDX-License-Identifier: BSD-3-Clause
3 * SPDX-FileCopyrightText: Copyright TF-RMM Contributors.
4 */
5
6#include <assert.h>
7#include <attestation.h>
8#include <attestation_priv.h>
9#include <debug.h>
10#include <errno.h>
Soby Mathewb4c6df42022-11-09 11:13:29 +000011#include <mbedtls/memory_buffer_alloc.h>
12#include <memory_alloc.h>
Mate Toth-Palc69951d2023-03-17 17:30:50 +010013#include <psa/crypto.h>
Arunachalam Ganapathyf6491212023-02-23 16:04:34 +000014#include <simd.h>
Soby Mathewb4c6df42022-11-09 11:13:29 +000015#include <sizes.h>
16
17/*
18 * Memory buffer for the allocator during key initialization.
19 *
20 * Used to compute the public key and setup a PRNG object per CPU. PRNGs are
21 * needed for key blinding during EC signing.
22 *
23 * Memory requirements:
Jean-Philippe Bruckerba223852023-07-31 15:26:35 +010024 * +------------------------+-------+-------------------------+
Soby Mathewb4c6df42022-11-09 11:13:29 +000025 * | | MAX | Persisting allocation |
26 * +------------------------+-------+-------------------------+
Jean-Philippe Bruckerba223852023-07-31 15:26:35 +010027 * | Public key computation | 2.9K | 0.1K |
Soby Mathewb4c6df42022-11-09 11:13:29 +000028 * +------------------------+-------+-------------------------+
Jean-Philippe Bruckerba223852023-07-31 15:26:35 +010029 * | one SHA256 HMAC_DRBG | | |
30 * | buffer | 364B | 364B |
31 * | | | |
32 * | PRNG setup for 32 CPUs | 12K | 11.6K |
Soby Mathewb4c6df42022-11-09 11:13:29 +000033 * +------------------------+-------+-------------------------+
34 *
Jean-Philippe Bruckerba223852023-07-31 15:26:35 +010035 * Measured with eg:
Soby Mathewb4c6df42022-11-09 11:13:29 +000036 * src/lib/memory_buffer_alloc.c: mbedtls_memory_buffer_alloc_status()
Jean-Philippe Bruckerba223852023-07-31 15:26:35 +010037 *
38 * Reserve enough space for the temporary PRNG and per-CPU ones (see
Mathieu Poirierd8e1f302024-06-03 10:50:13 -060039 * attest_rnd_prng_init()), plus more space for other allocations.
Soby Mathewb4c6df42022-11-09 11:13:29 +000040 */
Chuyue Luobcfe4c32023-10-24 13:48:19 +010041#define PRNG_INIT_HEAP_SIZE ((MAX_CPUS + 1UL) * 364UL)
Mathieu Poirierd8e1f302024-06-03 10:50:13 -060042#define MISC_PER_CPU (SZ_4K / 16U)
43#define INIT_HEAP_SIZE (PRNG_INIT_HEAP_SIZE + (MISC_PER_CPU * MAX_CPUS))
Soby Mathewb4c6df42022-11-09 11:13:29 +000044
Jean-Philippe Bruckerba223852023-07-31 15:26:35 +010045static unsigned char mem_buf[INIT_HEAP_SIZE]
Soby Mathewb4c6df42022-11-09 11:13:29 +000046 __aligned(sizeof(unsigned long));
47
48static bool attest_initialized;
49
AlexeiFedorov4bbb0e02023-08-22 14:15:21 +010050static struct buffer_alloc_ctx init_ctx;
Soby Mathewb4c6df42022-11-09 11:13:29 +000051
52int attestation_init(void)
53{
54 int ret;
Mate Toth-Palc69951d2023-03-17 17:30:50 +010055 psa_status_t psa_status;
Soby Mathewb4c6df42022-11-09 11:13:29 +000056
57 /*
58 * Associate the allocated heap for mbedtls with the current CPU.
59 */
AlexeiFedorov44a76a32023-08-29 16:53:26 +010060 ret = buffer_alloc_ctx_assign(&init_ctx);
61 if (ret != 0) {
62 return ret;
63 }
Soby Mathewb4c6df42022-11-09 11:13:29 +000064
Arunachalam Ganapathy51119932023-03-23 12:32:49 +000065 SIMD_FPU_ALLOW(mbedtls_memory_buffer_alloc_init(mem_buf,
66 sizeof(mem_buf)));
Soby Mathewb4c6df42022-11-09 11:13:29 +000067
Arunachalam Ganapathy51119932023-03-23 12:32:49 +000068 SIMD_FPU_ALLOW(ret = attest_rnd_prng_init());
Soby Mathewb4c6df42022-11-09 11:13:29 +000069 if (ret != 0) {
Soby Mathew376ffa42024-10-04 14:01:59 +010070 goto attest_init_fail;
Soby Mathewb4c6df42022-11-09 11:13:29 +000071 }
72
Mate Toth-Palc69951d2023-03-17 17:30:50 +010073 SIMD_FPU_ALLOW(psa_status = psa_crypto_init());
74 if (psa_status != PSA_SUCCESS) {
Soby Mathew376ffa42024-10-04 14:01:59 +010075 ret = -EINVAL;
76 goto attest_init_fail;
Mate Toth-Palc69951d2023-03-17 17:30:50 +010077 }
78
79 /*
80 * Set the number of max operations per ECC signing iteration to the
81 * configured value.
82 *
83 * This adjusts the length of a single signing loop.
84 */
85 SIMD_FPU_ALLOW(psa_interruptible_set_max_ops(MBEDTLS_ECP_MAX_OPS));
86
Soby Mathewb4c6df42022-11-09 11:13:29 +000087 /* Retrieve the platform key from root world */
Arunachalam Ganapathy51119932023-03-23 12:32:49 +000088 SIMD_FPU_ALLOW(ret = attest_init_realm_attestation_key());
Soby Mathewb4c6df42022-11-09 11:13:29 +000089 if (ret != 0) {
Soby Mathew376ffa42024-10-04 14:01:59 +010090 goto attest_init_fail;
Soby Mathewb4c6df42022-11-09 11:13:29 +000091 }
92
Soby Mathewb4c6df42022-11-09 11:13:29 +000093 /* Retrieve the platform token from root world */
94 ret = attest_setup_platform_token();
95 if (ret != 0) {
Soby Mathew376ffa42024-10-04 14:01:59 +010096 goto attest_init_fail;
Soby Mathewb4c6df42022-11-09 11:13:29 +000097 }
98
Soby Mathew9ca57552024-10-03 12:21:36 +010099#if ATTEST_EL3_TOKEN_SIGN
100 /* Initialize the EL3 queue */
101 if (el3_token_sign_queue_init() != 0) {
102 WARN("EL3 queue init failed.\n");
103 ret = -ENOTSUP;
104 goto attest_init_fail;
105 }
106#endif
Soby Mathewb4c6df42022-11-09 11:13:29 +0000107 attest_initialized = true;
108
Soby Mathew376ffa42024-10-04 14:01:59 +0100109attest_init_fail :
110 buffer_alloc_ctx_unassign();
111 return ret;
Soby Mathewb4c6df42022-11-09 11:13:29 +0000112}
113
114int attestation_heap_ctx_init(unsigned char *buf, size_t buf_size)
115{
116 assert(buf != NULL);
117
118 if (attest_initialized == false) {
Soby Mathew376ffa42024-10-04 14:01:59 +0100119 ERROR("Attestation init failed.\n");
Soby Mathewb4c6df42022-11-09 11:13:29 +0000120 return -EINVAL;
121 }
122
123 /* Initialise the mbedTLS heap */
Arunachalam Ganapathy51119932023-03-23 12:32:49 +0000124 mbedtls_memory_buffer_alloc_init(buf, buf_size);
Soby Mathewb4c6df42022-11-09 11:13:29 +0000125
126 return 0;
127}
128
Soby Mathew376ffa42024-10-04 14:01:59 +0100129void attestation_heap_ctx_assign_pe(struct buffer_alloc_ctx *ctx)
Soby Mathewb4c6df42022-11-09 11:13:29 +0000130{
Soby Mathew376ffa42024-10-04 14:01:59 +0100131 int ret __unused;
Soby Mathewb4c6df42022-11-09 11:13:29 +0000132 assert(ctx != NULL);
133
Soby Mathew376ffa42024-10-04 14:01:59 +0100134 /* Associate the buffer_alloc_ctx to this CPU */
135 ret = buffer_alloc_ctx_assign(ctx);
136 assert(ret == 0);
Soby Mathewb4c6df42022-11-09 11:13:29 +0000137}
138
Soby Mathew376ffa42024-10-04 14:01:59 +0100139void attestation_heap_ctx_unassign_pe(void)
Soby Mathewb4c6df42022-11-09 11:13:29 +0000140{
Soby Mathewb4c6df42022-11-09 11:13:29 +0000141 buffer_alloc_ctx_unassign();
Soby Mathewb4c6df42022-11-09 11:13:29 +0000142}