fsl_validate.c 23 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903
  1. /*
  2. * Copyright 2015 Freescale Semiconductor, Inc.
  3. *
  4. * SPDX-License-Identifier: GPL-2.0+
  5. */
  6. #include <common.h>
  7. #include <fsl_validate.h>
  8. #include <fsl_secboot_err.h>
  9. #include <fsl_sfp.h>
  10. #include <fsl_sec.h>
  11. #include <command.h>
  12. #include <malloc.h>
  13. #include <dm/uclass.h>
  14. #include <u-boot/rsa-mod-exp.h>
  15. #include <hash.h>
  16. #include <fsl_secboot_err.h>
  17. #ifdef CONFIG_LS102XA
  18. #include <asm/arch/immap_ls102xa.h>
  19. #endif
  20. #define SHA256_BITS 256
  21. #define SHA256_BYTES (256/8)
  22. #define SHA256_NIBBLES (256/4)
  23. #define NUM_HEX_CHARS (sizeof(ulong) * 2)
  24. #define CHECK_KEY_LEN(key_len) (((key_len) == 2 * KEY_SIZE_BYTES / 4) || \
  25. ((key_len) == 2 * KEY_SIZE_BYTES / 2) || \
  26. ((key_len) == 2 * KEY_SIZE_BYTES))
  27. /* This array contains DER value for SHA-256 */
  28. static const u8 hash_identifier[] = { 0x30, 0x31, 0x30, 0x0d, 0x06, 0x09, 0x60,
  29. 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x01, 0x05, 0x00,
  30. 0x04, 0x20
  31. };
  32. static u8 hash_val[SHA256_BYTES];
  33. #ifdef CONFIG_ESBC_HDR_LS
  34. /* New Barker Code for LS ESBC Header */
  35. static const u8 barker_code[ESBC_BARKER_LEN] = { 0x12, 0x19, 0x20, 0x01 };
  36. #else
  37. static const u8 barker_code[ESBC_BARKER_LEN] = { 0x68, 0x39, 0x27, 0x81 };
  38. #endif
  39. void branch_to_self(void) __attribute__ ((noreturn));
  40. /*
  41. * This function will put core in infinite loop.
  42. * This will be called when the ESBC can not proceed further due
  43. * to some unknown errors.
  44. */
  45. void branch_to_self(void)
  46. {
  47. printf("Core is in infinite loop due to errors.\n");
  48. self:
  49. goto self;
  50. }
  51. #if defined(CONFIG_FSL_ISBC_KEY_EXT)
  52. static u32 check_ie(struct fsl_secboot_img_priv *img)
  53. {
  54. if (img->hdr.ie_flag)
  55. return 1;
  56. return 0;
  57. }
  58. /* This function returns the CSF Header Address of uboot
  59. * For MPC85xx based platforms, the LAW mapping for NOR
  60. * flash changes in uboot code. Hence the offset needs
  61. * to be calculated and added to the new NOR flash base
  62. * address
  63. */
  64. #if defined(CONFIG_MPC85xx)
  65. int get_csf_base_addr(u32 *csf_addr, u32 *flash_base_addr)
  66. {
  67. struct ccsr_gur __iomem *gur = (void *)(CONFIG_SYS_MPC85xx_GUTS_ADDR);
  68. u32 csf_hdr_addr = in_be32(&gur->scratchrw[0]);
  69. u32 csf_flash_offset = csf_hdr_addr & ~(CONFIG_SYS_PBI_FLASH_BASE);
  70. u32 flash_addr, addr;
  71. int found = 0;
  72. int i = 0;
  73. for (i = 0; i < CONFIG_SYS_MAX_FLASH_BANKS; i++) {
  74. flash_addr = flash_info[i].start[0];
  75. addr = flash_info[i].start[0] + csf_flash_offset;
  76. if (memcmp((u8 *)addr, barker_code, ESBC_BARKER_LEN) == 0) {
  77. debug("Barker found on addr %x\n", addr);
  78. found = 1;
  79. break;
  80. }
  81. }
  82. if (!found)
  83. return -1;
  84. *csf_addr = addr;
  85. *flash_base_addr = flash_addr;
  86. return 0;
  87. }
  88. #else
  89. /* For platforms like LS1020, correct flash address is present in
  90. * the header. So the function reqturns flash base address as 0
  91. */
  92. int get_csf_base_addr(u32 *csf_addr, u32 *flash_base_addr)
  93. {
  94. struct ccsr_gur __iomem *gur = (void *)(CONFIG_SYS_FSL_GUTS_ADDR);
  95. u32 csf_hdr_addr = in_be32(&gur->scratchrw[0]);
  96. if (memcmp((u8 *)(uintptr_t)csf_hdr_addr,
  97. barker_code, ESBC_BARKER_LEN))
  98. return -1;
  99. *csf_addr = csf_hdr_addr;
  100. *flash_base_addr = 0;
  101. return 0;
  102. }
  103. #endif
  104. static int get_ie_info_addr(u32 *ie_addr)
  105. {
  106. struct fsl_secboot_img_hdr *hdr;
  107. struct fsl_secboot_sg_table *sg_tbl;
  108. u32 flash_base_addr, csf_addr;
  109. if (get_csf_base_addr(&csf_addr, &flash_base_addr))
  110. return -1;
  111. hdr = (struct fsl_secboot_img_hdr *)(uintptr_t)csf_addr;
  112. /* For SoC's with Trust Architecture v1 with corenet bus
  113. * the sg table field in CSF header has absolute address
  114. * for sg table in memory. In other Trust Architecture,
  115. * this field specifies the offset of sg table from the
  116. * base address of CSF Header
  117. */
  118. #if defined(CONFIG_FSL_TRUST_ARCH_v1) && defined(CONFIG_FSL_CORENET)
  119. sg_tbl = (struct fsl_secboot_sg_table *)
  120. (((u32)hdr->psgtable & ~(CONFIG_SYS_PBI_FLASH_BASE)) +
  121. flash_base_addr);
  122. #else
  123. sg_tbl = (struct fsl_secboot_sg_table *)(uintptr_t)(csf_addr +
  124. (u32)hdr->psgtable);
  125. #endif
  126. /* IE Key Table is the first entry in the SG Table */
  127. #if defined(CONFIG_MPC85xx)
  128. *ie_addr = (sg_tbl->src_addr & ~(CONFIG_SYS_PBI_FLASH_BASE)) +
  129. flash_base_addr;
  130. #else
  131. *ie_addr = sg_tbl->src_addr;
  132. #endif
  133. debug("IE Table address is %x\n", *ie_addr);
  134. return 0;
  135. }
  136. #endif
  137. #ifdef CONFIG_KEY_REVOCATION
  138. /* This function checks srk_table_flag in header and set/reset srk_flag.*/
  139. static u32 check_srk(struct fsl_secboot_img_priv *img)
  140. {
  141. #ifdef CONFIG_ESBC_HDR_LS
  142. /* In LS, No SRK Flag as SRK is always present*/
  143. return 1;
  144. #else
  145. if (img->hdr.len_kr.srk_table_flag & SRK_FLAG)
  146. return 1;
  147. return 0;
  148. #endif
  149. }
  150. /* This function returns ospr's key_revoc values.*/
  151. static u32 get_key_revoc(void)
  152. {
  153. struct ccsr_sfp_regs *sfp_regs = (void *)(CONFIG_SYS_SFP_ADDR);
  154. return (sfp_in32(&sfp_regs->ospr) & OSPR_KEY_REVOC_MASK) >>
  155. OSPR_KEY_REVOC_SHIFT;
  156. }
  157. /* This function checks if selected key is revoked or not.*/
  158. static u32 is_key_revoked(u32 keynum, u32 rev_flag)
  159. {
  160. if (keynum == UNREVOCABLE_KEY)
  161. return 0;
  162. if ((u32)(1 << (ALIGN_REVOC_KEY - keynum)) & rev_flag)
  163. return 1;
  164. return 0;
  165. }
  166. /* It read validates srk_table key lengths.*/
  167. static u32 read_validate_srk_tbl(struct fsl_secboot_img_priv *img)
  168. {
  169. int i = 0;
  170. u32 ret, key_num, key_revoc_flag, size;
  171. struct fsl_secboot_img_hdr *hdr = &img->hdr;
  172. void *esbc = (u8 *)(uintptr_t)img->ehdrloc;
  173. if ((hdr->len_kr.num_srk == 0) ||
  174. (hdr->len_kr.num_srk > MAX_KEY_ENTRIES))
  175. return ERROR_ESBC_CLIENT_HEADER_INVALID_SRK_NUM_ENTRY;
  176. key_num = hdr->len_kr.srk_sel;
  177. if (key_num == 0 || key_num > hdr->len_kr.num_srk)
  178. return ERROR_ESBC_CLIENT_HEADER_INVALID_KEY_NUM;
  179. /* Get revoc key from sfp */
  180. key_revoc_flag = get_key_revoc();
  181. ret = is_key_revoked(key_num, key_revoc_flag);
  182. if (ret)
  183. return ERROR_ESBC_CLIENT_HEADER_KEY_REVOKED;
  184. size = hdr->len_kr.num_srk * sizeof(struct srk_table);
  185. memcpy(&img->srk_tbl, esbc + hdr->srk_tbl_off, size);
  186. for (i = 0; i < hdr->len_kr.num_srk; i++) {
  187. if (!CHECK_KEY_LEN(img->srk_tbl[i].key_len))
  188. return ERROR_ESBC_CLIENT_HEADER_INV_SRK_ENTRY_KEYLEN;
  189. }
  190. img->key_len = img->srk_tbl[key_num - 1].key_len;
  191. memcpy(&img->img_key, &(img->srk_tbl[key_num - 1].pkey),
  192. img->key_len);
  193. return 0;
  194. }
  195. #endif
  196. #ifndef CONFIG_ESBC_HDR_LS
  197. static u32 read_validate_single_key(struct fsl_secboot_img_priv *img)
  198. {
  199. struct fsl_secboot_img_hdr *hdr = &img->hdr;
  200. void *esbc = (u8 *)(uintptr_t)img->ehdrloc;
  201. /* check key length */
  202. if (!CHECK_KEY_LEN(hdr->key_len))
  203. return ERROR_ESBC_CLIENT_HEADER_KEY_LEN;
  204. memcpy(&img->img_key, esbc + hdr->pkey, hdr->key_len);
  205. img->key_len = hdr->key_len;
  206. return 0;
  207. }
  208. #endif /* CONFIG_ESBC_HDR_LS */
  209. #if defined(CONFIG_FSL_ISBC_KEY_EXT)
  210. static u32 read_validate_ie_tbl(struct fsl_secboot_img_priv *img)
  211. {
  212. struct fsl_secboot_img_hdr *hdr = &img->hdr;
  213. u32 ie_key_len, ie_revoc_flag, ie_num;
  214. struct ie_key_info *ie_info;
  215. if (get_ie_info_addr(&img->ie_addr))
  216. return ERROR_IE_TABLE_NOT_FOUND;
  217. ie_info = (struct ie_key_info *)(uintptr_t)img->ie_addr;
  218. if (ie_info->num_keys == 0 || ie_info->num_keys > 32)
  219. return ERROR_ESBC_CLIENT_HEADER_INVALID_IE_NUM_ENTRY;
  220. ie_num = hdr->ie_key_sel;
  221. if (ie_num == 0 || ie_num > ie_info->num_keys)
  222. return ERROR_ESBC_CLIENT_HEADER_INVALID_IE_KEY_NUM;
  223. ie_revoc_flag = ie_info->key_revok;
  224. if ((u32)(1 << (ie_num - 1)) & ie_revoc_flag)
  225. return ERROR_ESBC_CLIENT_HEADER_IE_KEY_REVOKED;
  226. ie_key_len = ie_info->ie_key_tbl[ie_num - 1].key_len;
  227. if (!CHECK_KEY_LEN(ie_key_len))
  228. return ERROR_ESBC_CLIENT_HEADER_INV_IE_ENTRY_KEYLEN;
  229. memcpy(&img->img_key, &(ie_info->ie_key_tbl[ie_num - 1].pkey),
  230. ie_key_len);
  231. img->key_len = ie_key_len;
  232. return 0;
  233. }
  234. #endif
  235. /* This function return length of public key.*/
  236. static inline u32 get_key_len(struct fsl_secboot_img_priv *img)
  237. {
  238. return img->key_len;
  239. }
  240. /*
  241. * Handles the ESBC uboot client header verification failure.
  242. * This function handles all the errors which might occur in the
  243. * parsing and checking of ESBC uboot client header. It will also
  244. * set the error bits in the SEC_MON.
  245. */
  246. static void fsl_secboot_header_verification_failure(void)
  247. {
  248. struct ccsr_sfp_regs *sfp_regs = (void *)(CONFIG_SYS_SFP_ADDR);
  249. /* 29th bit of OSPR is ITS */
  250. u32 its = sfp_in32(&sfp_regs->ospr) >> 2;
  251. if (its == 1)
  252. set_sec_mon_state(HPSR_SSM_ST_SOFT_FAIL);
  253. else
  254. set_sec_mon_state(HPSR_SSM_ST_NON_SECURE);
  255. printf("Generating reset request\n");
  256. do_reset(NULL, 0, 0, NULL);
  257. /* If reset doesn't coocur, halt execution */
  258. do_esbc_halt(NULL, 0, 0, NULL);
  259. }
  260. /*
  261. * Handles the ESBC uboot client image verification failure.
  262. * This function handles all the errors which might occur in the
  263. * public key hash comparison and signature verification of
  264. * ESBC uboot client image. It will also
  265. * set the error bits in the SEC_MON.
  266. */
  267. static void fsl_secboot_image_verification_failure(void)
  268. {
  269. struct ccsr_sfp_regs *sfp_regs = (void *)(CONFIG_SYS_SFP_ADDR);
  270. u32 its = (sfp_in32(&sfp_regs->ospr) & ITS_MASK) >> ITS_BIT;
  271. if (its == 1) {
  272. set_sec_mon_state(HPSR_SSM_ST_SOFT_FAIL);
  273. printf("Generating reset request\n");
  274. do_reset(NULL, 0, 0, NULL);
  275. /* If reset doesn't coocur, halt execution */
  276. do_esbc_halt(NULL, 0, 0, NULL);
  277. } else {
  278. set_sec_mon_state(HPSR_SSM_ST_NON_SECURE);
  279. }
  280. }
  281. static void fsl_secboot_bootscript_parse_failure(void)
  282. {
  283. fsl_secboot_header_verification_failure();
  284. }
  285. /*
  286. * Handles the errors in esbc boot.
  287. * This function handles all the errors which might occur in the
  288. * esbc boot phase. It will call the appropriate api to log the
  289. * errors and set the error bits in the SEC_MON.
  290. */
  291. void fsl_secboot_handle_error(int error)
  292. {
  293. const struct fsl_secboot_errcode *e;
  294. for (e = fsl_secboot_errcodes; e->errcode != ERROR_ESBC_CLIENT_MAX;
  295. e++) {
  296. if (e->errcode == error)
  297. printf("ERROR :: %x :: %s\n", error, e->name);
  298. }
  299. /* If Boot Mode is secure, transition the SNVS state and issue
  300. * reset based on type of failure and ITS setting.
  301. * If Boot mode is non-secure, return from this function.
  302. */
  303. if (fsl_check_boot_mode_secure() == 0)
  304. return;
  305. switch (error) {
  306. case ERROR_ESBC_CLIENT_HEADER_BARKER:
  307. case ERROR_ESBC_CLIENT_HEADER_IMG_SIZE:
  308. case ERROR_ESBC_CLIENT_HEADER_KEY_LEN:
  309. case ERROR_ESBC_CLIENT_HEADER_SIG_LEN:
  310. case ERROR_ESBC_CLIENT_HEADER_KEY_LEN_NOT_TWICE_SIG_LEN:
  311. case ERROR_ESBC_CLIENT_HEADER_KEY_MOD_1:
  312. case ERROR_ESBC_CLIENT_HEADER_KEY_MOD_2:
  313. case ERROR_ESBC_CLIENT_HEADER_SIG_KEY_MOD:
  314. case ERROR_ESBC_CLIENT_HEADER_SG_ESBC_EP:
  315. case ERROR_ESBC_CLIENT_HEADER_SG_ENTIRES_BAD:
  316. case ERROR_KEY_TABLE_NOT_FOUND:
  317. #ifdef CONFIG_KEY_REVOCATION
  318. case ERROR_ESBC_CLIENT_HEADER_KEY_REVOKED:
  319. case ERROR_ESBC_CLIENT_HEADER_INVALID_SRK_NUM_ENTRY:
  320. case ERROR_ESBC_CLIENT_HEADER_INVALID_KEY_NUM:
  321. case ERROR_ESBC_CLIENT_HEADER_INV_SRK_ENTRY_KEYLEN:
  322. #endif
  323. #if defined(CONFIG_FSL_ISBC_KEY_EXT)
  324. /*@fallthrough@*/
  325. case ERROR_ESBC_CLIENT_HEADER_IE_KEY_REVOKED:
  326. case ERROR_ESBC_CLIENT_HEADER_INVALID_IE_NUM_ENTRY:
  327. case ERROR_ESBC_CLIENT_HEADER_INVALID_IE_KEY_NUM:
  328. case ERROR_ESBC_CLIENT_HEADER_INV_IE_ENTRY_KEYLEN:
  329. case ERROR_IE_TABLE_NOT_FOUND:
  330. #endif
  331. fsl_secboot_header_verification_failure();
  332. break;
  333. case ERROR_ESBC_SEC_RESET:
  334. case ERROR_ESBC_SEC_DEQ:
  335. case ERROR_ESBC_SEC_ENQ:
  336. case ERROR_ESBC_SEC_DEQ_TO:
  337. case ERROR_ESBC_SEC_JOBQ_STATUS:
  338. case ERROR_ESBC_CLIENT_HASH_COMPARE_KEY:
  339. case ERROR_ESBC_CLIENT_HASH_COMPARE_EM:
  340. fsl_secboot_image_verification_failure();
  341. break;
  342. case ERROR_ESBC_MISSING_BOOTM:
  343. fsl_secboot_bootscript_parse_failure();
  344. break;
  345. case ERROR_ESBC_WRONG_CMD:
  346. default:
  347. branch_to_self();
  348. break;
  349. }
  350. }
  351. static void fsl_secblk_handle_error(int error)
  352. {
  353. switch (error) {
  354. case ERROR_ESBC_SEC_ENQ:
  355. fsl_secboot_handle_error(ERROR_ESBC_SEC_ENQ);
  356. break;
  357. case ERROR_ESBC_SEC_DEQ:
  358. fsl_secboot_handle_error(ERROR_ESBC_SEC_DEQ);
  359. break;
  360. case ERROR_ESBC_SEC_DEQ_TO:
  361. fsl_secboot_handle_error(ERROR_ESBC_SEC_DEQ_TO);
  362. break;
  363. default:
  364. printf("Job Queue Output status %x\n", error);
  365. fsl_secboot_handle_error(ERROR_ESBC_SEC_JOBQ_STATUS);
  366. break;
  367. }
  368. }
  369. /*
  370. * Calculate hash of key obtained via offset present in ESBC uboot
  371. * client hdr. This function calculates the hash of key which is obtained
  372. * through offset present in ESBC uboot client header.
  373. */
  374. static int calc_img_key_hash(struct fsl_secboot_img_priv *img)
  375. {
  376. struct hash_algo *algo;
  377. void *ctx;
  378. int i, srk = 0;
  379. int ret = 0;
  380. const char *algo_name = "sha256";
  381. /* Calculate hash of the esbc key */
  382. ret = hash_progressive_lookup_algo(algo_name, &algo);
  383. if (ret)
  384. return ret;
  385. ret = algo->hash_init(algo, &ctx);
  386. if (ret)
  387. return ret;
  388. /* Update hash for ESBC key */
  389. #ifdef CONFIG_KEY_REVOCATION
  390. if (check_srk(img)) {
  391. ret = algo->hash_update(algo, ctx,
  392. (u8 *)(uintptr_t)(img->ehdrloc + img->hdr.srk_tbl_off),
  393. img->hdr.len_kr.num_srk * sizeof(struct srk_table), 1);
  394. srk = 1;
  395. }
  396. #endif
  397. if (!srk)
  398. ret = algo->hash_update(algo, ctx,
  399. img->img_key, img->key_len, 1);
  400. if (ret)
  401. return ret;
  402. /* Copy hash at destination buffer */
  403. ret = algo->hash_finish(algo, ctx, hash_val, algo->digest_size);
  404. if (ret)
  405. return ret;
  406. for (i = 0; i < SHA256_BYTES; i++)
  407. img->img_key_hash[i] = hash_val[i];
  408. return 0;
  409. }
  410. /*
  411. * Calculate hash of ESBC hdr and ESBC. This function calculates the
  412. * single hash of ESBC header and ESBC image. If SG flag is on, all
  413. * SG entries are also hashed alongwith the complete SG table.
  414. */
  415. static int calc_esbchdr_esbc_hash(struct fsl_secboot_img_priv *img)
  416. {
  417. struct hash_algo *algo;
  418. void *ctx;
  419. int ret = 0;
  420. int key_hash = 0;
  421. const char *algo_name = "sha256";
  422. /* Calculate the hash of the ESBC */
  423. ret = hash_progressive_lookup_algo(algo_name, &algo);
  424. if (ret)
  425. return ret;
  426. ret = algo->hash_init(algo, &ctx);
  427. /* Copy hash at destination buffer */
  428. if (ret)
  429. return ret;
  430. /* Update hash for CSF Header */
  431. ret = algo->hash_update(algo, ctx,
  432. (u8 *)&img->hdr, sizeof(struct fsl_secboot_img_hdr), 0);
  433. if (ret)
  434. return ret;
  435. /* Update the hash with that of srk table if srk flag is 1
  436. * If IE Table is selected, key is not added in the hash
  437. * If neither srk table nor IE key table available, add key
  438. * from header in the hash calculation
  439. */
  440. #ifdef CONFIG_KEY_REVOCATION
  441. if (check_srk(img)) {
  442. ret = algo->hash_update(algo, ctx,
  443. (u8 *)(uintptr_t)(img->ehdrloc + img->hdr.srk_tbl_off),
  444. img->hdr.len_kr.num_srk * sizeof(struct srk_table), 0);
  445. key_hash = 1;
  446. }
  447. #endif
  448. #if defined(CONFIG_FSL_ISBC_KEY_EXT)
  449. if (!key_hash && check_ie(img))
  450. key_hash = 1;
  451. #endif
  452. #ifndef CONFIG_ESBC_HDR_LS
  453. /* No single key support in LS ESBC header */
  454. if (!key_hash) {
  455. ret = algo->hash_update(algo, ctx,
  456. img->img_key, img->hdr.key_len, 0);
  457. key_hash = 1;
  458. }
  459. #endif
  460. if (ret)
  461. return ret;
  462. if (!key_hash)
  463. return ERROR_KEY_TABLE_NOT_FOUND;
  464. /* Update hash for actual Image */
  465. ret = algo->hash_update(algo, ctx,
  466. (u8 *)(*(img->img_addr_ptr)), img->img_size, 1);
  467. if (ret)
  468. return ret;
  469. /* Copy hash at destination buffer */
  470. ret = algo->hash_finish(algo, ctx, hash_val, algo->digest_size);
  471. if (ret)
  472. return ret;
  473. return 0;
  474. }
  475. /*
  476. * Construct encoded hash EM' wrt PKCSv1.5. This function calculates the
  477. * pointers for padding, DER value and hash. And finally, constructs EM'
  478. * which includes hash of complete CSF header and ESBC image. If SG flag
  479. * is on, hash of SG table and entries is also included.
  480. */
  481. static void construct_img_encoded_hash_second(struct fsl_secboot_img_priv *img)
  482. {
  483. /*
  484. * RSA PKCSv1.5 encoding format for encoded message is below
  485. * EM = 0x0 || 0x1 || PS || 0x0 || DER || Hash
  486. * PS is Padding String
  487. * DER is DER value for SHA-256
  488. * Hash is SHA-256 hash
  489. * *********************************************************
  490. * representative points to first byte of EM initially and is
  491. * filled with 0x0
  492. * representative is incremented by 1 and second byte is filled
  493. * with 0x1
  494. * padding points to third byte of EM
  495. * digest points to full length of EM - 32 bytes
  496. * hash_id (DER value) points to 19 bytes before pDigest
  497. * separator is one byte which separates padding and DER
  498. */
  499. size_t len;
  500. u8 *representative;
  501. u8 *padding, *digest;
  502. u8 *hash_id, *separator;
  503. int i;
  504. len = (get_key_len(img) / 2) - 1;
  505. representative = img->img_encoded_hash_second;
  506. representative[0] = 0;
  507. representative[1] = 1; /* block type 1 */
  508. padding = &representative[2];
  509. digest = &representative[1] + len - 32;
  510. hash_id = digest - sizeof(hash_identifier);
  511. separator = hash_id - 1;
  512. /* fill padding area pointed by padding with 0xff */
  513. memset(padding, 0xff, separator - padding);
  514. /* fill byte pointed by separator */
  515. *separator = 0;
  516. /* fill SHA-256 DER value pointed by HashId */
  517. memcpy(hash_id, hash_identifier, sizeof(hash_identifier));
  518. /* fill hash pointed by Digest */
  519. for (i = 0; i < SHA256_BYTES; i++)
  520. digest[i] = hash_val[i];
  521. }
  522. /*
  523. * Reads and validates the ESBC client header.
  524. * This function reads key and signature from the ESBC client header.
  525. * If Scatter/Gather flag is on, lengths and offsets of images
  526. * present as SG entries are also read. This function also checks
  527. * whether the header is valid or not.
  528. */
  529. static int read_validate_esbc_client_header(struct fsl_secboot_img_priv *img)
  530. {
  531. struct fsl_secboot_img_hdr *hdr = &img->hdr;
  532. void *esbc = (u8 *)(uintptr_t)img->ehdrloc;
  533. u8 *k, *s;
  534. u32 ret = 0;
  535. int key_found = 0;
  536. /* check barker code */
  537. if (memcmp(hdr->barker, barker_code, ESBC_BARKER_LEN))
  538. return ERROR_ESBC_CLIENT_HEADER_BARKER;
  539. /* If Image Address is not passed as argument to function,
  540. * then Address and Size must be read from the Header.
  541. */
  542. if (*(img->img_addr_ptr) == 0) {
  543. #ifdef CONFIG_ESBC_ADDR_64BIT
  544. *(img->img_addr_ptr) = hdr->pimg64;
  545. #else
  546. *(img->img_addr_ptr) = hdr->pimg;
  547. #endif
  548. }
  549. if (!hdr->img_size)
  550. return ERROR_ESBC_CLIENT_HEADER_IMG_SIZE;
  551. img->img_size = hdr->img_size;
  552. /* Key checking*/
  553. #ifdef CONFIG_KEY_REVOCATION
  554. if (check_srk(img)) {
  555. ret = read_validate_srk_tbl(img);
  556. if (ret != 0)
  557. return ret;
  558. key_found = 1;
  559. }
  560. #endif
  561. #if defined(CONFIG_FSL_ISBC_KEY_EXT)
  562. if (!key_found && check_ie(img)) {
  563. ret = read_validate_ie_tbl(img);
  564. if (ret != 0)
  565. return ret;
  566. key_found = 1;
  567. }
  568. #endif
  569. #ifndef CONFIG_ESBC_HDR_LS
  570. /* Single Key Feature not available in LS ESBC Header */
  571. if (key_found == 0) {
  572. ret = read_validate_single_key(img);
  573. if (ret != 0)
  574. return ret;
  575. key_found = 1;
  576. }
  577. #endif
  578. if (!key_found)
  579. return ERROR_KEY_TABLE_NOT_FOUND;
  580. /* check signaure */
  581. if (get_key_len(img) == 2 * hdr->sign_len) {
  582. /* check signature length */
  583. if (!((hdr->sign_len == KEY_SIZE_BYTES / 4) ||
  584. (hdr->sign_len == KEY_SIZE_BYTES / 2) ||
  585. (hdr->sign_len == KEY_SIZE_BYTES)))
  586. return ERROR_ESBC_CLIENT_HEADER_SIG_LEN;
  587. } else {
  588. return ERROR_ESBC_CLIENT_HEADER_KEY_LEN_NOT_TWICE_SIG_LEN;
  589. }
  590. memcpy(&img->img_sign, esbc + hdr->psign, hdr->sign_len);
  591. /* No SG support in LS-CH3 */
  592. #ifndef CONFIG_ESBC_HDR_LS
  593. /* No SG support */
  594. if (hdr->sg_flag)
  595. return ERROR_ESBC_CLIENT_HEADER_SG;
  596. #endif
  597. /* modulus most significant bit should be set */
  598. k = (u8 *)&img->img_key;
  599. if ((k[0] & 0x80) == 0)
  600. return ERROR_ESBC_CLIENT_HEADER_KEY_MOD_1;
  601. /* modulus value should be odd */
  602. if ((k[get_key_len(img) / 2 - 1] & 0x1) == 0)
  603. return ERROR_ESBC_CLIENT_HEADER_KEY_MOD_2;
  604. /* Check signature value < modulus value */
  605. s = (u8 *)&img->img_sign;
  606. if (!(memcmp(s, k, hdr->sign_len) < 0))
  607. return ERROR_ESBC_CLIENT_HEADER_SIG_KEY_MOD;
  608. return ESBC_VALID_HDR;
  609. }
  610. static inline int str2longbe(const char *p, ulong *num)
  611. {
  612. char *endptr;
  613. ulong tmp;
  614. if (!p) {
  615. return 0;
  616. } else {
  617. tmp = simple_strtoul(p, &endptr, 16);
  618. if (sizeof(ulong) == 4)
  619. *num = cpu_to_be32(tmp);
  620. else
  621. *num = cpu_to_be64(tmp);
  622. }
  623. return *p != '\0' && *endptr == '\0';
  624. }
  625. /* Function to calculate the ESBC Image Hash
  626. * and hash from Digital signature.
  627. * The Two hash's are compared to yield the
  628. * result of signature validation.
  629. */
  630. static int calculate_cmp_img_sig(struct fsl_secboot_img_priv *img)
  631. {
  632. int ret;
  633. uint32_t key_len;
  634. struct key_prop prop;
  635. #if !defined(USE_HOSTCC)
  636. struct udevice *mod_exp_dev;
  637. #endif
  638. ret = calc_esbchdr_esbc_hash(img);
  639. if (ret)
  640. return ret;
  641. /* Construct encoded hash EM' wrt PKCSv1.5 */
  642. construct_img_encoded_hash_second(img);
  643. /* Fill prop structure for public key */
  644. memset(&prop, 0, sizeof(struct key_prop));
  645. key_len = get_key_len(img) / 2;
  646. prop.modulus = img->img_key;
  647. prop.public_exponent = img->img_key + key_len;
  648. prop.num_bits = key_len * 8;
  649. prop.exp_len = key_len;
  650. ret = uclass_get_device(UCLASS_MOD_EXP, 0, &mod_exp_dev);
  651. if (ret) {
  652. printf("RSA: Can't find Modular Exp implementation\n");
  653. return -EINVAL;
  654. }
  655. ret = rsa_mod_exp(mod_exp_dev, img->img_sign, img->hdr.sign_len,
  656. &prop, img->img_encoded_hash);
  657. if (ret)
  658. return ret;
  659. /*
  660. * compare the encoded messages EM' and EM wrt RSA PKCSv1.5
  661. * memcmp returns zero on success
  662. * memcmp returns non-zero on failure
  663. */
  664. ret = memcmp(&img->img_encoded_hash_second, &img->img_encoded_hash,
  665. img->hdr.sign_len);
  666. if (ret)
  667. return ERROR_ESBC_CLIENT_HASH_COMPARE_EM;
  668. return 0;
  669. }
  670. /* haddr - Address of the header of image to be validated.
  671. * arg_hash_str - Option hash string. If provided, this
  672. * overrides the key hash in the SFP fuses.
  673. * img_addr_ptr - Optional pointer to address of image to be validated.
  674. * If non zero addr, this overrides the addr of image in header,
  675. * otherwise updated to image addr in header.
  676. * Acts as both input and output of function.
  677. * This pointer shouldn't be NULL.
  678. */
  679. int fsl_secboot_validate(uintptr_t haddr, char *arg_hash_str,
  680. uintptr_t *img_addr_ptr)
  681. {
  682. struct ccsr_sfp_regs *sfp_regs = (void *)(CONFIG_SYS_SFP_ADDR);
  683. ulong hash[SHA256_BYTES/sizeof(ulong)];
  684. char hash_str[NUM_HEX_CHARS + 1];
  685. struct fsl_secboot_img_priv *img;
  686. struct fsl_secboot_img_hdr *hdr;
  687. void *esbc;
  688. int ret, i, hash_cmd = 0;
  689. u32 srk_hash[8];
  690. if (arg_hash_str != NULL) {
  691. const char *cp = arg_hash_str;
  692. int i = 0;
  693. if (*cp == '0' && *(cp + 1) == 'x')
  694. cp += 2;
  695. /* The input string expected is in hex, where
  696. * each 4 bits would be represented by a hex
  697. * sha256 hash is 256 bits long, which would mean
  698. * num of characters = 256 / 4
  699. */
  700. if (strlen(cp) != SHA256_NIBBLES) {
  701. printf("%s is not a 256 bits hex string as expected\n",
  702. arg_hash_str);
  703. return -1;
  704. }
  705. for (i = 0; i < sizeof(hash)/sizeof(ulong); i++) {
  706. strncpy(hash_str, cp + (i * NUM_HEX_CHARS),
  707. NUM_HEX_CHARS);
  708. hash_str[NUM_HEX_CHARS] = '\0';
  709. if (!str2longbe(hash_str, &hash[i])) {
  710. printf("%s is not a 256 bits hex string ",
  711. arg_hash_str);
  712. return -1;
  713. }
  714. }
  715. hash_cmd = 1;
  716. }
  717. img = malloc(sizeof(struct fsl_secboot_img_priv));
  718. if (!img)
  719. return -1;
  720. memset(img, 0, sizeof(struct fsl_secboot_img_priv));
  721. /* Update the information in Private Struct */
  722. hdr = &img->hdr;
  723. img->ehdrloc = haddr;
  724. img->img_addr_ptr = img_addr_ptr;
  725. esbc = (u8 *)img->ehdrloc;
  726. memcpy(hdr, esbc, sizeof(struct fsl_secboot_img_hdr));
  727. /* read and validate esbc header */
  728. ret = read_validate_esbc_client_header(img);
  729. if (ret != ESBC_VALID_HDR) {
  730. fsl_secboot_handle_error(ret);
  731. goto exit;
  732. }
  733. /* SRKH present in SFP */
  734. for (i = 0; i < NUM_SRKH_REGS; i++)
  735. srk_hash[i] = srk_in32(&sfp_regs->srk_hash[i]);
  736. /*
  737. * Calculate hash of key obtained via offset present in
  738. * ESBC uboot client hdr
  739. */
  740. ret = calc_img_key_hash(img);
  741. if (ret) {
  742. fsl_secblk_handle_error(ret);
  743. goto exit;
  744. }
  745. /* Compare hash obtained above with SRK hash present in SFP */
  746. if (hash_cmd)
  747. ret = memcmp(&hash, &img->img_key_hash, SHA256_BYTES);
  748. else
  749. ret = memcmp(srk_hash, img->img_key_hash, SHA256_BYTES);
  750. #if defined(CONFIG_FSL_ISBC_KEY_EXT)
  751. if (!hash_cmd && check_ie(img))
  752. ret = 0;
  753. #endif
  754. if (ret != 0) {
  755. fsl_secboot_handle_error(ERROR_ESBC_CLIENT_HASH_COMPARE_KEY);
  756. goto exit;
  757. }
  758. ret = calculate_cmp_img_sig(img);
  759. if (ret) {
  760. fsl_secboot_handle_error(ret);
  761. goto exit;
  762. }
  763. exit:
  764. return ret;
  765. }