blob: bca971b3e551917cba0baffc464985a3604113b6 [file] [log] [blame]
Julian Hall4061ed62020-11-23 18:24:06 +01001// SPDX-License-Identifier: BSD-3-Clause
2/*
Balint Dobszay1b631eb2021-01-15 11:09:36 +01003 * Copyright (c) 2020-2021, Arm Limited and Contributors. All rights reserved.
Julian Hall4061ed62020-11-23 18:24:06 +01004 */
5
julhal013a4207d2021-03-08 13:32:08 +00006
Julian Hall4061ed62020-11-23 18:24:06 +01007#include <rpc/ffarpc/endpoint/ffarpc_call_ep.h>
julhal013a4207d2021-03-08 13:32:08 +00008#include <service/secure_storage/factory/storage_factory.h>
Julian Hall9061e6c2021-06-29 14:24:20 +01009#include <service/crypto/provider/crypto_provider.h>
julhal01c3f4e9a2020-12-15 13:39:01 +000010#include <service/crypto/provider/serializer/protobuf/pb_crypto_provider_serializer.h>
julhal01734dbad2020-12-21 10:27:41 +000011#include <service/crypto/provider/serializer/packed-c/packedc_crypto_provider_serializer.h>
Julian Hall9061e6c2021-06-29 14:24:20 +010012#include <service/crypto/backend/mbedcrypto/mbedcrypto_backend.h>
Julian Hall4061ed62020-11-23 18:24:06 +010013#include <protocols/rpc/common/packed-c/status.h>
julhal0137e1aea2021-02-09 15:22:20 +000014#include <config/ramstore/config_ramstore.h>
15#include <config/loader/sp/sp_config_loader.h>
Julian Hall4061ed62020-11-23 18:24:06 +010016#include <ffa_api.h>
17#include <sp_api.h>
Imre Kis76e8a3c2021-04-16 16:54:17 +020018#include <sp_messaging.h>
Julian Hall4061ed62020-11-23 18:24:06 +010019#include <sp_rxtx.h>
20#include <trace.h>
21
22
Julian Hall4061ed62020-11-23 18:24:06 +010023uint16_t own_id = 0; /* !!Needs refactoring as parameter to ffarpc_caller_init */
Julian Hall4061ed62020-11-23 18:24:06 +010024
25
26static int sp_init(uint16_t *own_sp_id);
27
28void __noreturn sp_main(struct ffa_init_info *init_info)
29{
Julian Hall9061e6c2021-06-29 14:24:20 +010030 struct crypto_provider crypto_provider;
Julian Hall4061ed62020-11-23 18:24:06 +010031 struct ffa_call_ep ffarpc_call_ep;
julhal01c3f4e9a2020-12-15 13:39:01 +000032 struct rpc_interface *crypto_iface;
Imre Kis76e8a3c2021-04-16 16:54:17 +020033 struct sp_msg req_msg = { 0 };
34 struct sp_msg resp_msg = { 0 };
julhal013a4207d2021-03-08 13:32:08 +000035 struct storage_backend *storage_backend;
Julian Hall4061ed62020-11-23 18:24:06 +010036
julhal013a4207d2021-03-08 13:32:08 +000037 /* Boot phase */
Julian Hall4061ed62020-11-23 18:24:06 +010038 if (sp_init(&own_id) != 0) goto fatal_error;
39
julhal012c18fbf2021-02-01 08:29:28 +000040 config_ramstore_init();
julhal0137e1aea2021-02-09 15:22:20 +000041 sp_config_load(init_info);
julhal012c18fbf2021-02-01 08:29:28 +000042
julhal013a4207d2021-03-08 13:32:08 +000043 /* Create a storage backend for persistent key storage - prefer ITS */
44 storage_backend = storage_factory_create(storage_factory_security_class_INTERNAL_TRUSTED);
45 if (!storage_backend) goto fatal_error;
Julian Hall4061ed62020-11-23 18:24:06 +010046
47 /* Initialize the crypto service */
Julian Hall9061e6c2021-06-29 14:24:20 +010048 crypto_iface = NULL;
julhal01734dbad2020-12-21 10:27:41 +000049
Julian Hall9061e6c2021-06-29 14:24:20 +010050 if (mbedcrypto_backend_init(storage_backend, 0) == PSA_SUCCESS) {
51
52 crypto_iface = crypto_provider_init(&crypto_provider);
53
54 crypto_provider_register_serializer(&crypto_provider,
julhal01c3f4e9a2020-12-15 13:39:01 +000055 TS_RPC_ENCODING_PROTOBUF, pb_crypto_provider_serializer_instance());
56
Julian Hall9061e6c2021-06-29 14:24:20 +010057 crypto_provider_register_serializer(&crypto_provider,
julhal01734dbad2020-12-21 10:27:41 +000058 TS_RPC_ENCODING_PACKED_C, packedc_crypto_provider_serializer_instance());
Julian Hall9061e6c2021-06-29 14:24:20 +010059 }
julhal01734dbad2020-12-21 10:27:41 +000060
julhal01c3f4e9a2020-12-15 13:39:01 +000061 ffa_call_ep_init(&ffarpc_call_ep, crypto_iface);
Julian Hall4061ed62020-11-23 18:24:06 +010062
julhal011260f102021-02-15 17:34:08 +000063 /* End of boot phase */
Imre Kis76e8a3c2021-04-16 16:54:17 +020064 sp_msg_wait(&req_msg);
Julian Hall4061ed62020-11-23 18:24:06 +010065
66 while (1) {
Imre Kis76e8a3c2021-04-16 16:54:17 +020067 ffa_call_ep_receive(&ffarpc_call_ep, &req_msg, &resp_msg);
Julian Hall4061ed62020-11-23 18:24:06 +010068
Imre Kis76e8a3c2021-04-16 16:54:17 +020069 resp_msg.source_id = req_msg.destination_id;
70 resp_msg.destination_id = req_msg.source_id;
Julian Hall4061ed62020-11-23 18:24:06 +010071
Imre Kis76e8a3c2021-04-16 16:54:17 +020072 sp_msg_send_direct_resp(&resp_msg, &req_msg);
Julian Hall4061ed62020-11-23 18:24:06 +010073 }
74
75fatal_error:
76 /* SP is not viable */
77 EMSG("Crypto SP error");
78 while (1) {}
79}
80
81void sp_interrupt_handler(uint32_t interrupt_id)
82{
83 (void)interrupt_id;
84}
85
86static int sp_init(uint16_t *own_sp_id)
87{
88 int status = -1;
89 ffa_result ffa_res;
90 sp_result sp_res;
91 static uint8_t tx_buffer[4096] __aligned(4096);
92 static uint8_t rx_buffer[4096] __aligned(4096);
93
94 sp_res = sp_rxtx_buffer_map(tx_buffer, rx_buffer, sizeof(rx_buffer));
95 if (sp_res == SP_RESULT_OK) {
96 ffa_res = ffa_id_get(own_sp_id);
97 if (ffa_res == FFA_OK) {
98 status = 0;
99 }
100 }
101
102 return status;
103}