blob: 6e05a041c7cfa0faf9744b8d0f63b92f8ce33b1c [file] [log] [blame]
Julian Hallcaa4af82021-05-19 12:02:36 +01001/*
2 * Copyright (c) 2021, Arm Limited and Contributors. All rights reserved.
3 *
4 * SPDX-License-Identifier: BSD-3-Clause
5 */
6
Julian Hallcaa4af82021-05-19 12:02:36 +01007#include <rpc/ffarpc/endpoint/ffarpc_call_ep.h>
8#include <protocols/rpc/common/packed-c/status.h>
9#include <config/ramstore/config_ramstore.h>
10#include <config/loader/sp/sp_config_loader.h>
11#include <service/attestation/provider/attest_provider.h>
12#include <service/attestation/provider/serializer/packed-c/packedc_attest_provider_serializer.h>
13#include <service/attestation/claims/claims_register.h>
14#include <service/attestation/claims/sources/event_log/event_log_claim_source.h>
15#include <service/attestation/claims/sources/boot_seed_generator/boot_seed_generator.h>
16#include <service/attestation/claims/sources/null_lifecycle/null_lifecycle_claim_source.h>
17#include <service/attestation/claims/sources/instance_id/instance_id_claim_source.h>
Julian Hall3b2fc5c2021-08-12 15:56:07 +010018#include <service/attestation/claims/sources/implementation_id/implementation_id_claim_source.h>
Julian Hall644b57a2021-06-30 08:45:19 +010019#include <service/attestation/key_mngr/local/local_attest_key_mngr.h>
Julian Hallc52807c2021-08-13 15:15:18 +010020#include <service/crypto/client/psa/psa_crypto_client.h>
21#include <service_locator.h>
22#include <psa/crypto.h>
Julian Hallcaa4af82021-05-19 12:02:36 +010023#include <ffa_api.h>
24#include <sp_api.h>
25#include <sp_rxtx.h>
26#include <trace.h>
27
Julian Hallcaa4af82021-05-19 12:02:36 +010028uint16_t own_id = 0; /* !!Needs refactoring as parameter to ffarpc_caller_init */
29
30
31static int sp_init(uint16_t *own_sp_id);
Julian Hallc52807c2021-08-13 15:15:18 +010032static void locate_crypto_service(void);
Julian Hallcaa4af82021-05-19 12:02:36 +010033
34void __noreturn sp_main(struct ffa_init_info *init_info)
35{
36 /* Service provider objects */
37 struct attest_provider attest_provider;
38 struct rpc_interface *attest_iface;
39 struct ffa_call_ep ffarpc_call_ep;
Julian Hall22c47a92021-07-09 14:49:16 +010040 struct sp_msg req_msg;
Julian Hallcaa4af82021-05-19 12:02:36 +010041
42 /* Claim source objects */
43 struct claim_source *claim_source;
44 struct event_log_claim_source event_log_claim_source;
Julian Hall7048d302021-06-03 16:07:28 +010045 struct boot_seed_generator boot_seed_claim_source;
46 struct null_lifecycle_claim_source lifecycle_claim_source;
47 struct instance_id_claim_source instance_id_claim_source;
Julian Hall3b2fc5c2021-08-12 15:56:07 +010048 struct implementation_id_claim_source implementation_id_claim_source;
Julian Hallcaa4af82021-05-19 12:02:36 +010049
50 /*********************************************************
51 * Boot phase
52 *********************************************************/
53 if (sp_init(&own_id) != 0) goto fatal_error;
54
55 config_ramstore_init();
56 sp_config_load(init_info);
57
58 /**
Julian Hallc52807c2021-08-13 15:15:18 +010059 * Locate crypto service endpoint and establish RPC session
Julian Hall6bab0212021-07-27 11:45:47 +010060 */
Julian Hallc52807c2021-08-13 15:15:18 +010061 locate_crypto_service();
Julian Hall6bab0212021-07-27 11:45:47 +010062
63 /**
Julian Hallcaa4af82021-05-19 12:02:36 +010064 * Register claim sources for deployment
Julian Hall7048d302021-06-03 16:07:28 +010065 */
Julian Hallcaa4af82021-05-19 12:02:36 +010066 claims_register_init();
67
Julian Hall7048d302021-06-03 16:07:28 +010068 /* Boot measurement claim source */
69 claim_source = event_log_claim_source_init_from_config(&event_log_claim_source);
70 claims_register_add_claim_source(CLAIM_CATEGORY_BOOT_MEASUREMENT, claim_source);
Julian Hallcaa4af82021-05-19 12:02:36 +010071
Julian Hall7048d302021-06-03 16:07:28 +010072 /* Boot seed claim source */
73 claim_source = boot_seed_generator_init(&boot_seed_claim_source);
74 claims_register_add_claim_source(CLAIM_CATEGORY_DEVICE, claim_source);
Julian Hallcaa4af82021-05-19 12:02:36 +010075
Julian Hall7048d302021-06-03 16:07:28 +010076 /* Lifecycle state claim source */
77 claim_source = null_lifecycle_claim_source_init(&lifecycle_claim_source);
78 claims_register_add_claim_source(CLAIM_CATEGORY_DEVICE, claim_source);
Julian Hallcaa4af82021-05-19 12:02:36 +010079
Julian Hall7048d302021-06-03 16:07:28 +010080 /* Instance ID claim source */
81 claim_source = instance_id_claim_source_init(&instance_id_claim_source);
82 claims_register_add_claim_source(CLAIM_CATEGORY_DEVICE, claim_source);
Julian Hallcaa4af82021-05-19 12:02:36 +010083
Julian Hall3b2fc5c2021-08-12 15:56:07 +010084 /* Implementation ID claim source */
85 claim_source = implementation_id_claim_source_init(&implementation_id_claim_source,
86 "trustedfirmware.org.ts.attestation_sp");
87 claims_register_add_claim_source(CLAIM_CATEGORY_DEVICE, claim_source);
88
Julian Hallcaa4af82021-05-19 12:02:36 +010089 /**
90 * Initialize the service provider
Julian Hall7048d302021-06-03 16:07:28 +010091 */
Julian Hall644b57a2021-06-30 08:45:19 +010092 local_attest_key_mngr_init(LOCAL_ATTEST_KEY_MNGR_VOLATILE_IAK);
93 attest_iface = attest_provider_init(&attest_provider);
Julian Hallcaa4af82021-05-19 12:02:36 +010094
Julian Hall7048d302021-06-03 16:07:28 +010095 attest_provider_register_serializer(&attest_provider,
96 TS_RPC_ENCODING_PACKED_C, packedc_attest_provider_serializer_instance());
Julian Hallcaa4af82021-05-19 12:02:36 +010097
98 ffa_call_ep_init(&ffarpc_call_ep, attest_iface);
99
100 /*********************************************************
101 * End of boot phase
102 *********************************************************/
Julian Hall22c47a92021-07-09 14:49:16 +0100103 sp_msg_wait(&req_msg);
Julian Hallcaa4af82021-05-19 12:02:36 +0100104
105 while (1) {
Julian Hallcaa4af82021-05-19 12:02:36 +0100106
Julian Hall22c47a92021-07-09 14:49:16 +0100107 struct sp_msg resp_msg;
Julian Hallcaa4af82021-05-19 12:02:36 +0100108
Julian Hall22c47a92021-07-09 14:49:16 +0100109 ffa_call_ep_receive(&ffarpc_call_ep, &req_msg, &resp_msg);
Julian Hallcaa4af82021-05-19 12:02:36 +0100110
Julian Hall22c47a92021-07-09 14:49:16 +0100111 resp_msg.source_id = req_msg.destination_id;
112 resp_msg.destination_id = req_msg.source_id;
113
114 sp_msg_send_direct_resp(&resp_msg, &req_msg);
Julian Hallcaa4af82021-05-19 12:02:36 +0100115 }
116
117fatal_error:
118 /* SP is not viable */
119 EMSG("Attestation SP error");
120 while (1) {}
121}
122
123void sp_interrupt_handler(uint32_t interrupt_id)
124{
125 (void)interrupt_id;
126}
127
128static int sp_init(uint16_t *own_sp_id)
129{
130 int status = -1;
131 ffa_result ffa_res;
132 sp_result sp_res;
133 static uint8_t tx_buffer[4096] __aligned(4096);
134 static uint8_t rx_buffer[4096] __aligned(4096);
135
136 sp_res = sp_rxtx_buffer_map(tx_buffer, rx_buffer, sizeof(rx_buffer));
137 if (sp_res == SP_RESULT_OK) {
138 ffa_res = ffa_id_get(own_sp_id);
139 if (ffa_res == FFA_OK) {
140 status = 0;
141 }
142 }
143
144 return status;
145}
Julian Hallc52807c2021-08-13 15:15:18 +0100146
147void locate_crypto_service(void)
148{
149 service_locator_init();
150
151 int status;
152
153 /* todo - add option to use configurable crypto service location */
154 struct service_context *crypto_service_context =
155 service_locator_query("sn:ffa:d9df52d5-16a2-4bb2-9aa4-d26d3b84e8c0:0", &status);
156
157 if (crypto_service_context) {
158
159 struct rpc_caller *caller;
160
161 if (service_context_open(crypto_service_context, TS_RPC_ENCODING_PACKED_C, &caller)) {
162
163 psa_crypto_client_init(caller);
164 }
165 }
166
167 psa_crypto_init();
168}