blob: 7fc4040a14d250b839778086987a67dadb1de5c8 [file] [log] [blame]
Julian Hallcaa4af82021-05-19 12:02:36 +01001/*
2 * Copyright (c) 2021, Arm Limited and Contributors. All rights reserved.
3 *
4 * SPDX-License-Identifier: BSD-3-Clause
5 */
6
7#include <rpc/ffarpc/caller/sp/ffarpc_caller.h>
8#include <rpc/ffarpc/endpoint/ffarpc_call_ep.h>
9#include <protocols/rpc/common/packed-c/status.h>
10#include <config/ramstore/config_ramstore.h>
11#include <config/loader/sp/sp_config_loader.h>
12#include <service/attestation/provider/attest_provider.h>
13#include <service/attestation/provider/serializer/packed-c/packedc_attest_provider_serializer.h>
14#include <service/attestation/claims/claims_register.h>
15#include <service/attestation/claims/sources/event_log/event_log_claim_source.h>
16#include <service/attestation/claims/sources/boot_seed_generator/boot_seed_generator.h>
17#include <service/attestation/claims/sources/null_lifecycle/null_lifecycle_claim_source.h>
18#include <service/attestation/claims/sources/instance_id/instance_id_claim_source.h>
Julian Hall3b2fc5c2021-08-12 15:56:07 +010019#include <service/attestation/claims/sources/implementation_id/implementation_id_claim_source.h>
Julian Hall644b57a2021-06-30 08:45:19 +010020#include <service/attestation/key_mngr/local/local_attest_key_mngr.h>
Julian Hall6bab0212021-07-27 11:45:47 +010021#include <service/crypto/backend/mbedcrypto/mbedcrypto_backend.h>
22#include <service/secure_storage/backend/mock_store/mock_store.h>
Julian Hallcaa4af82021-05-19 12:02:36 +010023#include <ffa_api.h>
24#include <sp_api.h>
25#include <sp_rxtx.h>
26#include <trace.h>
27
28
29/* Temporary dependencies */
Julian Hallcaa4af82021-05-19 12:02:36 +010030#include <psa/crypto.h>
31
32
33uint16_t own_id = 0; /* !!Needs refactoring as parameter to ffarpc_caller_init */
34
35
36static int sp_init(uint16_t *own_sp_id);
37
38void __noreturn sp_main(struct ffa_init_info *init_info)
39{
40 /* Service provider objects */
41 struct attest_provider attest_provider;
42 struct rpc_interface *attest_iface;
43 struct ffa_call_ep ffarpc_call_ep;
Julian Hall22c47a92021-07-09 14:49:16 +010044 struct sp_msg req_msg;
Julian Hallcaa4af82021-05-19 12:02:36 +010045
46 /* Claim source objects */
47 struct claim_source *claim_source;
48 struct event_log_claim_source event_log_claim_source;
Julian Hall7048d302021-06-03 16:07:28 +010049 struct boot_seed_generator boot_seed_claim_source;
50 struct null_lifecycle_claim_source lifecycle_claim_source;
51 struct instance_id_claim_source instance_id_claim_source;
Julian Hall3b2fc5c2021-08-12 15:56:07 +010052 struct implementation_id_claim_source implementation_id_claim_source;
Julian Hallcaa4af82021-05-19 12:02:36 +010053
54 /*********************************************************
55 * Boot phase
56 *********************************************************/
57 if (sp_init(&own_id) != 0) goto fatal_error;
58
59 config_ramstore_init();
60 sp_config_load(init_info);
61
62 /**
Julian Hall6bab0212021-07-27 11:45:47 +010063 * Initialize the mbedcrypto - to be replaced by crypto client
64 */
65 struct mock_store key_store;
66 mbedcrypto_backend_init(mock_store_init(&key_store), 0);
67
68 /**
Julian Hallcaa4af82021-05-19 12:02:36 +010069 * Register claim sources for deployment
Julian Hall7048d302021-06-03 16:07:28 +010070 */
Julian Hallcaa4af82021-05-19 12:02:36 +010071 claims_register_init();
72
Julian Hall7048d302021-06-03 16:07:28 +010073 /* Boot measurement claim source */
74 claim_source = event_log_claim_source_init_from_config(&event_log_claim_source);
75 claims_register_add_claim_source(CLAIM_CATEGORY_BOOT_MEASUREMENT, claim_source);
Julian Hallcaa4af82021-05-19 12:02:36 +010076
Julian Hall7048d302021-06-03 16:07:28 +010077 /* Boot seed claim source */
78 claim_source = boot_seed_generator_init(&boot_seed_claim_source);
79 claims_register_add_claim_source(CLAIM_CATEGORY_DEVICE, claim_source);
Julian Hallcaa4af82021-05-19 12:02:36 +010080
Julian Hall7048d302021-06-03 16:07:28 +010081 /* Lifecycle state claim source */
82 claim_source = null_lifecycle_claim_source_init(&lifecycle_claim_source);
83 claims_register_add_claim_source(CLAIM_CATEGORY_DEVICE, claim_source);
Julian Hallcaa4af82021-05-19 12:02:36 +010084
Julian Hall7048d302021-06-03 16:07:28 +010085 /* Instance ID claim source */
86 claim_source = instance_id_claim_source_init(&instance_id_claim_source);
87 claims_register_add_claim_source(CLAIM_CATEGORY_DEVICE, claim_source);
Julian Hallcaa4af82021-05-19 12:02:36 +010088
Julian Hall3b2fc5c2021-08-12 15:56:07 +010089 /* Implementation ID claim source */
90 claim_source = implementation_id_claim_source_init(&implementation_id_claim_source,
91 "trustedfirmware.org.ts.attestation_sp");
92 claims_register_add_claim_source(CLAIM_CATEGORY_DEVICE, claim_source);
93
Julian Hallcaa4af82021-05-19 12:02:36 +010094 /**
95 * Initialize the service provider
Julian Hall7048d302021-06-03 16:07:28 +010096 */
Julian Hall644b57a2021-06-30 08:45:19 +010097 local_attest_key_mngr_init(LOCAL_ATTEST_KEY_MNGR_VOLATILE_IAK);
98 attest_iface = attest_provider_init(&attest_provider);
Julian Hallcaa4af82021-05-19 12:02:36 +010099
Julian Hall7048d302021-06-03 16:07:28 +0100100 attest_provider_register_serializer(&attest_provider,
101 TS_RPC_ENCODING_PACKED_C, packedc_attest_provider_serializer_instance());
Julian Hallcaa4af82021-05-19 12:02:36 +0100102
103 ffa_call_ep_init(&ffarpc_call_ep, attest_iface);
104
105 /*********************************************************
106 * End of boot phase
107 *********************************************************/
Julian Hall22c47a92021-07-09 14:49:16 +0100108 sp_msg_wait(&req_msg);
Julian Hallcaa4af82021-05-19 12:02:36 +0100109
110 while (1) {
Julian Hallcaa4af82021-05-19 12:02:36 +0100111
Julian Hall22c47a92021-07-09 14:49:16 +0100112 struct sp_msg resp_msg;
Julian Hallcaa4af82021-05-19 12:02:36 +0100113
Julian Hall22c47a92021-07-09 14:49:16 +0100114 ffa_call_ep_receive(&ffarpc_call_ep, &req_msg, &resp_msg);
Julian Hallcaa4af82021-05-19 12:02:36 +0100115
Julian Hall22c47a92021-07-09 14:49:16 +0100116 resp_msg.source_id = req_msg.destination_id;
117 resp_msg.destination_id = req_msg.source_id;
118
119 sp_msg_send_direct_resp(&resp_msg, &req_msg);
Julian Hallcaa4af82021-05-19 12:02:36 +0100120 }
121
122fatal_error:
123 /* SP is not viable */
124 EMSG("Attestation SP error");
125 while (1) {}
126}
127
128void sp_interrupt_handler(uint32_t interrupt_id)
129{
130 (void)interrupt_id;
131}
132
133static int sp_init(uint16_t *own_sp_id)
134{
135 int status = -1;
136 ffa_result ffa_res;
137 sp_result sp_res;
138 static uint8_t tx_buffer[4096] __aligned(4096);
139 static uint8_t rx_buffer[4096] __aligned(4096);
140
141 sp_res = sp_rxtx_buffer_map(tx_buffer, rx_buffer, sizeof(rx_buffer));
142 if (sp_res == SP_RESULT_OK) {
143 ffa_res = ffa_id_get(own_sp_id);
144 if (ffa_res == FFA_OK) {
145 status = 0;
146 }
147 }
148
149 return status;
150}