blob: 555ce6164f8772d6223edafcc009cfe2f49eced9 [file] [log] [blame]
Julian Hallcaa4af82021-05-19 12:02:36 +01001/*
2 * Copyright (c) 2021, Arm Limited and Contributors. All rights reserved.
3 *
4 * SPDX-License-Identifier: BSD-3-Clause
5 */
6
7#include <rpc/ffarpc/caller/sp/ffarpc_caller.h>
8#include <rpc/ffarpc/endpoint/ffarpc_call_ep.h>
9#include <protocols/rpc/common/packed-c/status.h>
10#include <config/ramstore/config_ramstore.h>
11#include <config/loader/sp/sp_config_loader.h>
12#include <service/attestation/provider/attest_provider.h>
13#include <service/attestation/provider/serializer/packed-c/packedc_attest_provider_serializer.h>
14#include <service/attestation/claims/claims_register.h>
15#include <service/attestation/claims/sources/event_log/event_log_claim_source.h>
16#include <service/attestation/claims/sources/boot_seed_generator/boot_seed_generator.h>
17#include <service/attestation/claims/sources/null_lifecycle/null_lifecycle_claim_source.h>
18#include <service/attestation/claims/sources/instance_id/instance_id_claim_source.h>
Julian Hall644b57a2021-06-30 08:45:19 +010019#include <service/attestation/key_mngr/local/local_attest_key_mngr.h>
Julian Hall6bab0212021-07-27 11:45:47 +010020#include <service/crypto/backend/mbedcrypto/mbedcrypto_backend.h>
21#include <service/secure_storage/backend/mock_store/mock_store.h>
Julian Hallcaa4af82021-05-19 12:02:36 +010022#include <ffa_api.h>
23#include <sp_api.h>
24#include <sp_rxtx.h>
25#include <trace.h>
26
27
28/* Temporary dependencies */
Julian Hallcaa4af82021-05-19 12:02:36 +010029#include <psa/crypto.h>
30
31
32uint16_t own_id = 0; /* !!Needs refactoring as parameter to ffarpc_caller_init */
33
34
35static int sp_init(uint16_t *own_sp_id);
36
37void __noreturn sp_main(struct ffa_init_info *init_info)
38{
39 /* Service provider objects */
40 struct attest_provider attest_provider;
41 struct rpc_interface *attest_iface;
42 struct ffa_call_ep ffarpc_call_ep;
Julian Hall22c47a92021-07-09 14:49:16 +010043 struct sp_msg req_msg;
Julian Hallcaa4af82021-05-19 12:02:36 +010044
45 /* Claim source objects */
46 struct claim_source *claim_source;
47 struct event_log_claim_source event_log_claim_source;
Julian Hall7048d302021-06-03 16:07:28 +010048 struct boot_seed_generator boot_seed_claim_source;
49 struct null_lifecycle_claim_source lifecycle_claim_source;
50 struct instance_id_claim_source instance_id_claim_source;
Julian Hallcaa4af82021-05-19 12:02:36 +010051
52 /*********************************************************
53 * Boot phase
54 *********************************************************/
55 if (sp_init(&own_id) != 0) goto fatal_error;
56
57 config_ramstore_init();
58 sp_config_load(init_info);
59
60 /**
Julian Hall6bab0212021-07-27 11:45:47 +010061 * Initialize the mbedcrypto - to be replaced by crypto client
62 */
63 struct mock_store key_store;
64 mbedcrypto_backend_init(mock_store_init(&key_store), 0);
65
66 /**
Julian Hallcaa4af82021-05-19 12:02:36 +010067 * Register claim sources for deployment
Julian Hall7048d302021-06-03 16:07:28 +010068 */
Julian Hallcaa4af82021-05-19 12:02:36 +010069 claims_register_init();
70
Julian Hall7048d302021-06-03 16:07:28 +010071 /* Boot measurement claim source */
72 claim_source = event_log_claim_source_init_from_config(&event_log_claim_source);
73 claims_register_add_claim_source(CLAIM_CATEGORY_BOOT_MEASUREMENT, claim_source);
Julian Hallcaa4af82021-05-19 12:02:36 +010074
Julian Hall7048d302021-06-03 16:07:28 +010075 /* Boot seed claim source */
76 claim_source = boot_seed_generator_init(&boot_seed_claim_source);
77 claims_register_add_claim_source(CLAIM_CATEGORY_DEVICE, claim_source);
Julian Hallcaa4af82021-05-19 12:02:36 +010078
Julian Hall7048d302021-06-03 16:07:28 +010079 /* Lifecycle state claim source */
80 claim_source = null_lifecycle_claim_source_init(&lifecycle_claim_source);
81 claims_register_add_claim_source(CLAIM_CATEGORY_DEVICE, claim_source);
Julian Hallcaa4af82021-05-19 12:02:36 +010082
Julian Hall7048d302021-06-03 16:07:28 +010083 /* Instance ID claim source */
84 claim_source = instance_id_claim_source_init(&instance_id_claim_source);
85 claims_register_add_claim_source(CLAIM_CATEGORY_DEVICE, claim_source);
Julian Hallcaa4af82021-05-19 12:02:36 +010086
87 /**
88 * Initialize the service provider
Julian Hall7048d302021-06-03 16:07:28 +010089 */
Julian Hall644b57a2021-06-30 08:45:19 +010090 local_attest_key_mngr_init(LOCAL_ATTEST_KEY_MNGR_VOLATILE_IAK);
91 attest_iface = attest_provider_init(&attest_provider);
Julian Hallcaa4af82021-05-19 12:02:36 +010092
Julian Hall7048d302021-06-03 16:07:28 +010093 attest_provider_register_serializer(&attest_provider,
94 TS_RPC_ENCODING_PACKED_C, packedc_attest_provider_serializer_instance());
Julian Hallcaa4af82021-05-19 12:02:36 +010095
96 ffa_call_ep_init(&ffarpc_call_ep, attest_iface);
97
98 /*********************************************************
99 * End of boot phase
100 *********************************************************/
Julian Hall22c47a92021-07-09 14:49:16 +0100101 sp_msg_wait(&req_msg);
Julian Hallcaa4af82021-05-19 12:02:36 +0100102
103 while (1) {
Julian Hallcaa4af82021-05-19 12:02:36 +0100104
Julian Hall22c47a92021-07-09 14:49:16 +0100105 struct sp_msg resp_msg;
Julian Hallcaa4af82021-05-19 12:02:36 +0100106
Julian Hall22c47a92021-07-09 14:49:16 +0100107 ffa_call_ep_receive(&ffarpc_call_ep, &req_msg, &resp_msg);
Julian Hallcaa4af82021-05-19 12:02:36 +0100108
Julian Hall22c47a92021-07-09 14:49:16 +0100109 resp_msg.source_id = req_msg.destination_id;
110 resp_msg.destination_id = req_msg.source_id;
111
112 sp_msg_send_direct_resp(&resp_msg, &req_msg);
Julian Hallcaa4af82021-05-19 12:02:36 +0100113 }
114
115fatal_error:
116 /* SP is not viable */
117 EMSG("Attestation SP error");
118 while (1) {}
119}
120
121void sp_interrupt_handler(uint32_t interrupt_id)
122{
123 (void)interrupt_id;
124}
125
126static int sp_init(uint16_t *own_sp_id)
127{
128 int status = -1;
129 ffa_result ffa_res;
130 sp_result sp_res;
131 static uint8_t tx_buffer[4096] __aligned(4096);
132 static uint8_t rx_buffer[4096] __aligned(4096);
133
134 sp_res = sp_rxtx_buffer_map(tx_buffer, rx_buffer, sizeof(rx_buffer));
135 if (sp_res == SP_RESULT_OK) {
136 ffa_res = ffa_id_get(own_sp_id);
137 if (ffa_res == FFA_OK) {
138 status = 0;
139 }
140 }
141
142 return status;
143}