blob: f3679d1800f2c66808208deb9652ba01471639ca [file] [log] [blame]
Julian Hall4061ed62020-11-23 18:24:06 +01001// SPDX-License-Identifier: BSD-3-Clause
2/*
Balint Dobszay1b631eb2021-01-15 11:09:36 +01003 * Copyright (c) 2020-2021, Arm Limited and Contributors. All rights reserved.
Julian Hall4061ed62020-11-23 18:24:06 +01004 */
5
julhal013a4207d2021-03-08 13:32:08 +00006
Julian Hall4061ed62020-11-23 18:24:06 +01007#include <rpc/ffarpc/endpoint/ffarpc_call_ep.h>
julhal013a4207d2021-03-08 13:32:08 +00008#include <service/secure_storage/factory/storage_factory.h>
Julian Hall4061ed62020-11-23 18:24:06 +01009#include <service/crypto/provider/mbedcrypto/crypto_provider.h>
julhal01c3f4e9a2020-12-15 13:39:01 +000010#include <service/crypto/provider/serializer/protobuf/pb_crypto_provider_serializer.h>
julhal01734dbad2020-12-21 10:27:41 +000011#include <service/crypto/provider/serializer/packed-c/packedc_crypto_provider_serializer.h>
Julian Hall4061ed62020-11-23 18:24:06 +010012#include <protocols/rpc/common/packed-c/status.h>
julhal0137e1aea2021-02-09 15:22:20 +000013#include <config/ramstore/config_ramstore.h>
14#include <config/loader/sp/sp_config_loader.h>
Julian Hall4061ed62020-11-23 18:24:06 +010015#include <ffa_api.h>
16#include <sp_api.h>
Imre Kis76e8a3c2021-04-16 16:54:17 +020017#include <sp_messaging.h>
Julian Hall4061ed62020-11-23 18:24:06 +010018#include <sp_rxtx.h>
19#include <trace.h>
20
21
Julian Hall4061ed62020-11-23 18:24:06 +010022uint16_t own_id = 0; /* !!Needs refactoring as parameter to ffarpc_caller_init */
Julian Hall4061ed62020-11-23 18:24:06 +010023
24
25static int sp_init(uint16_t *own_sp_id);
26
27void __noreturn sp_main(struct ffa_init_info *init_info)
28{
29 struct mbed_crypto_provider crypto_provider;
30 struct ffa_call_ep ffarpc_call_ep;
julhal01c3f4e9a2020-12-15 13:39:01 +000031 struct rpc_interface *crypto_iface;
Imre Kis76e8a3c2021-04-16 16:54:17 +020032 struct sp_msg req_msg = { 0 };
33 struct sp_msg resp_msg = { 0 };
julhal013a4207d2021-03-08 13:32:08 +000034 struct storage_backend *storage_backend;
Julian Hall4061ed62020-11-23 18:24:06 +010035
julhal013a4207d2021-03-08 13:32:08 +000036 /* Boot phase */
Julian Hall4061ed62020-11-23 18:24:06 +010037 if (sp_init(&own_id) != 0) goto fatal_error;
38
julhal012c18fbf2021-02-01 08:29:28 +000039 config_ramstore_init();
julhal0137e1aea2021-02-09 15:22:20 +000040 sp_config_load(init_info);
julhal012c18fbf2021-02-01 08:29:28 +000041
julhal013a4207d2021-03-08 13:32:08 +000042 /* Create a storage backend for persistent key storage - prefer ITS */
43 storage_backend = storage_factory_create(storage_factory_security_class_INTERNAL_TRUSTED);
44 if (!storage_backend) goto fatal_error;
Julian Hall4061ed62020-11-23 18:24:06 +010045
46 /* Initialize the crypto service */
julhal013a4207d2021-03-08 13:32:08 +000047 crypto_iface = mbed_crypto_provider_init(&crypto_provider, storage_backend, 0);
julhal01734dbad2020-12-21 10:27:41 +000048
49 mbed_crypto_provider_register_serializer(&crypto_provider,
julhal01c3f4e9a2020-12-15 13:39:01 +000050 TS_RPC_ENCODING_PROTOBUF, pb_crypto_provider_serializer_instance());
51
julhal01734dbad2020-12-21 10:27:41 +000052 mbed_crypto_provider_register_serializer(&crypto_provider,
53 TS_RPC_ENCODING_PACKED_C, packedc_crypto_provider_serializer_instance());
54
julhal01c3f4e9a2020-12-15 13:39:01 +000055 ffa_call_ep_init(&ffarpc_call_ep, crypto_iface);
Julian Hall4061ed62020-11-23 18:24:06 +010056
julhal011260f102021-02-15 17:34:08 +000057 /* End of boot phase */
Imre Kis76e8a3c2021-04-16 16:54:17 +020058 sp_msg_wait(&req_msg);
Julian Hall4061ed62020-11-23 18:24:06 +010059
60 while (1) {
Imre Kis76e8a3c2021-04-16 16:54:17 +020061 ffa_call_ep_receive(&ffarpc_call_ep, &req_msg, &resp_msg);
Julian Hall4061ed62020-11-23 18:24:06 +010062
Imre Kis76e8a3c2021-04-16 16:54:17 +020063 resp_msg.source_id = req_msg.destination_id;
64 resp_msg.destination_id = req_msg.source_id;
Julian Hall4061ed62020-11-23 18:24:06 +010065
Imre Kis76e8a3c2021-04-16 16:54:17 +020066 sp_msg_send_direct_resp(&resp_msg, &req_msg);
Julian Hall4061ed62020-11-23 18:24:06 +010067 }
68
69fatal_error:
70 /* SP is not viable */
71 EMSG("Crypto SP error");
72 while (1) {}
73}
74
75void sp_interrupt_handler(uint32_t interrupt_id)
76{
77 (void)interrupt_id;
78}
79
80static int sp_init(uint16_t *own_sp_id)
81{
82 int status = -1;
83 ffa_result ffa_res;
84 sp_result sp_res;
85 static uint8_t tx_buffer[4096] __aligned(4096);
86 static uint8_t rx_buffer[4096] __aligned(4096);
87
88 sp_res = sp_rxtx_buffer_map(tx_buffer, rx_buffer, sizeof(rx_buffer));
89 if (sp_res == SP_RESULT_OK) {
90 ffa_res = ffa_id_get(own_sp_id);
91 if (ffa_res == FFA_OK) {
92 status = 0;
93 }
94 }
95
96 return status;
97}