blob: 8c0e730e7bbb6f04934417764bfb448676baf08d [file] [log] [blame]
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +05301/*
Stefan Roese4acd2d22014-10-22 12:13:23 +02002 * Image manipulator for Marvell SoCs
Mario Sixa1b6b0a2017-01-11 16:01:00 +01003 * supports Kirkwood, Dove, Armada 370, Armada XP, and Armada 38x
Stefan Roese4acd2d22014-10-22 12:13:23 +02004 *
5 * (C) Copyright 2013 Thomas Petazzoni
6 * <thomas.petazzoni@free-electrons.com>
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +05307 *
Wolfgang Denk1a459662013-07-08 09:37:19 +02008 * SPDX-License-Identifier: GPL-2.0+
Stefan Roese4acd2d22014-10-22 12:13:23 +02009 *
Mario Sixa1b6b0a2017-01-11 16:01:00 +010010 * Not implemented: support for the register headers in v1 images
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +053011 */
12
Guilherme Maciel Ferreiraf86ed6a2013-12-01 12:43:10 -070013#include "imagetool.h"
Andreas Bießmanne5f1a582014-10-24 23:39:11 +020014#include <limits.h>
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +053015#include <image.h>
Mario Sixa1b6b0a2017-01-11 16:01:00 +010016#include <stdarg.h>
Stefan Roese4acd2d22014-10-22 12:13:23 +020017#include <stdint.h>
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +053018#include "kwbimage.h"
19
Mario Sixa1b6b0a2017-01-11 16:01:00 +010020#ifdef CONFIG_KWB_SECURE
Jelle van der Waae15843b2017-05-08 21:31:20 +020021#include <openssl/bn.h>
Mario Sixa1b6b0a2017-01-11 16:01:00 +010022#include <openssl/rsa.h>
23#include <openssl/pem.h>
24#include <openssl/err.h>
25#include <openssl/evp.h>
Jelle van der Waae15843b2017-05-08 21:31:20 +020026
27#if OPENSSL_VERSION_NUMBER < 0x10100000L
28static void RSA_get0_key(const RSA *r,
29 const BIGNUM **n, const BIGNUM **e, const BIGNUM **d)
30{
31 if (n != NULL)
32 *n = r->n;
33 if (e != NULL)
34 *e = r->e;
35 if (d != NULL)
36 *d = r->d;
37}
38
39#else
40void EVP_MD_CTX_cleanup(EVP_MD_CTX *ctx)
41{
42 EVP_MD_CTX_reset(ctx);
43}
44#endif
Mario Sixa1b6b0a2017-01-11 16:01:00 +010045#endif
46
Stefan Roese4acd2d22014-10-22 12:13:23 +020047static struct image_cfg_element *image_cfg;
48static int cfgn;
Mario Sixa1b6b0a2017-01-11 16:01:00 +010049#ifdef CONFIG_KWB_SECURE
50static int verbose_mode;
51#endif
Stefan Roese4acd2d22014-10-22 12:13:23 +020052
53struct boot_mode {
54 unsigned int id;
55 const char *name;
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +053056};
57
Mario Sixa1b6b0a2017-01-11 16:01:00 +010058/*
59 * SHA2-256 hash
60 */
61struct hash_v1 {
62 uint8_t hash[32];
63};
64
Stefan Roese4acd2d22014-10-22 12:13:23 +020065struct boot_mode boot_modes[] = {
66 { 0x4D, "i2c" },
67 { 0x5A, "spi" },
68 { 0x8B, "nand" },
69 { 0x78, "sata" },
70 { 0x9C, "pex" },
71 { 0x69, "uart" },
Stefan Roese1bbe63c2015-07-20 11:20:37 +020072 { 0xAE, "sdio" },
Stefan Roese4acd2d22014-10-22 12:13:23 +020073 {},
74};
75
76struct nand_ecc_mode {
77 unsigned int id;
78 const char *name;
79};
80
81struct nand_ecc_mode nand_ecc_modes[] = {
82 { 0x00, "default" },
83 { 0x01, "hamming" },
84 { 0x02, "rs" },
85 { 0x03, "disabled" },
86 {},
87};
88
89/* Used to identify an undefined execution or destination address */
90#define ADDR_INVALID ((uint32_t)-1)
91
92#define BINARY_MAX_ARGS 8
93
94/* In-memory representation of a line of the configuration file */
Mario Six4991b4f2017-01-11 16:00:59 +010095
96enum image_cfg_type {
97 IMAGE_CFG_VERSION = 0x1,
98 IMAGE_CFG_BOOT_FROM,
99 IMAGE_CFG_DEST_ADDR,
100 IMAGE_CFG_EXEC_ADDR,
101 IMAGE_CFG_NAND_BLKSZ,
102 IMAGE_CFG_NAND_BADBLK_LOCATION,
103 IMAGE_CFG_NAND_ECC_MODE,
104 IMAGE_CFG_NAND_PAGESZ,
105 IMAGE_CFG_BINARY,
106 IMAGE_CFG_PAYLOAD,
107 IMAGE_CFG_DATA,
108 IMAGE_CFG_BAUDRATE,
109 IMAGE_CFG_DEBUG,
Mario Sixa1b6b0a2017-01-11 16:01:00 +0100110 IMAGE_CFG_KAK,
111 IMAGE_CFG_CSK,
112 IMAGE_CFG_CSK_INDEX,
113 IMAGE_CFG_JTAG_DELAY,
114 IMAGE_CFG_BOX_ID,
115 IMAGE_CFG_FLASH_ID,
116 IMAGE_CFG_SEC_COMMON_IMG,
117 IMAGE_CFG_SEC_SPECIALIZED_IMG,
118 IMAGE_CFG_SEC_BOOT_DEV,
119 IMAGE_CFG_SEC_FUSE_DUMP,
Mario Six4991b4f2017-01-11 16:00:59 +0100120
121 IMAGE_CFG_COUNT
122} type;
123
124static const char * const id_strs[] = {
125 [IMAGE_CFG_VERSION] = "VERSION",
126 [IMAGE_CFG_BOOT_FROM] = "BOOT_FROM",
127 [IMAGE_CFG_DEST_ADDR] = "DEST_ADDR",
128 [IMAGE_CFG_EXEC_ADDR] = "EXEC_ADDR",
129 [IMAGE_CFG_NAND_BLKSZ] = "NAND_BLKSZ",
130 [IMAGE_CFG_NAND_BADBLK_LOCATION] = "NAND_BADBLK_LOCATION",
131 [IMAGE_CFG_NAND_ECC_MODE] = "NAND_ECC_MODE",
132 [IMAGE_CFG_NAND_PAGESZ] = "NAND_PAGE_SIZE",
133 [IMAGE_CFG_BINARY] = "BINARY",
134 [IMAGE_CFG_PAYLOAD] = "PAYLOAD",
135 [IMAGE_CFG_DATA] = "DATA",
136 [IMAGE_CFG_BAUDRATE] = "BAUDRATE",
137 [IMAGE_CFG_DEBUG] = "DEBUG",
Mario Sixa1b6b0a2017-01-11 16:01:00 +0100138 [IMAGE_CFG_KAK] = "KAK",
139 [IMAGE_CFG_CSK] = "CSK",
140 [IMAGE_CFG_CSK_INDEX] = "CSK_INDEX",
141 [IMAGE_CFG_JTAG_DELAY] = "JTAG_DELAY",
142 [IMAGE_CFG_BOX_ID] = "BOX_ID",
143 [IMAGE_CFG_FLASH_ID] = "FLASH_ID",
144 [IMAGE_CFG_SEC_COMMON_IMG] = "SEC_COMMON_IMG",
145 [IMAGE_CFG_SEC_SPECIALIZED_IMG] = "SEC_SPECIALIZED_IMG",
146 [IMAGE_CFG_SEC_BOOT_DEV] = "SEC_BOOT_DEV",
147 [IMAGE_CFG_SEC_FUSE_DUMP] = "SEC_FUSE_DUMP"
Mario Six4991b4f2017-01-11 16:00:59 +0100148};
149
Stefan Roese4acd2d22014-10-22 12:13:23 +0200150struct image_cfg_element {
Mario Six4991b4f2017-01-11 16:00:59 +0100151 enum image_cfg_type type;
Stefan Roese4acd2d22014-10-22 12:13:23 +0200152 union {
153 unsigned int version;
154 unsigned int bootfrom;
155 struct {
156 const char *file;
157 unsigned int args[BINARY_MAX_ARGS];
158 unsigned int nargs;
159 } binary;
160 const char *payload;
161 unsigned int dstaddr;
162 unsigned int execaddr;
163 unsigned int nandblksz;
164 unsigned int nandbadblklocation;
165 unsigned int nandeccmode;
166 unsigned int nandpagesz;
167 struct ext_hdr_v0_reg regdata;
Chris Packham4bdb5472016-11-09 22:07:45 +1300168 unsigned int baudrate;
Chris Packham2611c052016-11-09 22:21:45 +1300169 unsigned int debug;
Mario Sixa1b6b0a2017-01-11 16:01:00 +0100170 const char *key_name;
171 int csk_idx;
172 uint8_t jtag_delay;
173 uint32_t boxid;
174 uint32_t flashid;
175 bool sec_specialized_img;
176 unsigned int sec_boot_dev;
177 const char *name;
Stefan Roese4acd2d22014-10-22 12:13:23 +0200178 };
179};
180
181#define IMAGE_CFG_ELEMENT_MAX 256
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530182
183/*
Stefan Roese4acd2d22014-10-22 12:13:23 +0200184 * Utility functions to manipulate boot mode and ecc modes (convert
185 * them back and forth between description strings and the
186 * corresponding numerical identifiers).
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530187 */
Stefan Roese4acd2d22014-10-22 12:13:23 +0200188
189static const char *image_boot_mode_name(unsigned int id)
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530190{
Stefan Roese4acd2d22014-10-22 12:13:23 +0200191 int i;
Mario Six94490a42017-01-11 16:00:54 +0100192
Stefan Roese4acd2d22014-10-22 12:13:23 +0200193 for (i = 0; boot_modes[i].name; i++)
194 if (boot_modes[i].id == id)
195 return boot_modes[i].name;
196 return NULL;
197}
198
199int image_boot_mode_id(const char *boot_mode_name)
200{
201 int i;
Mario Six94490a42017-01-11 16:00:54 +0100202
Stefan Roese4acd2d22014-10-22 12:13:23 +0200203 for (i = 0; boot_modes[i].name; i++)
204 if (!strcmp(boot_modes[i].name, boot_mode_name))
205 return boot_modes[i].id;
206
207 return -1;
208}
209
210int image_nand_ecc_mode_id(const char *nand_ecc_mode_name)
211{
212 int i;
Mario Six94490a42017-01-11 16:00:54 +0100213
Stefan Roese4acd2d22014-10-22 12:13:23 +0200214 for (i = 0; nand_ecc_modes[i].name; i++)
215 if (!strcmp(nand_ecc_modes[i].name, nand_ecc_mode_name))
216 return nand_ecc_modes[i].id;
217 return -1;
218}
219
220static struct image_cfg_element *
221image_find_option(unsigned int optiontype)
222{
223 int i;
224
225 for (i = 0; i < cfgn; i++) {
226 if (image_cfg[i].type == optiontype)
227 return &image_cfg[i];
228 }
229
230 return NULL;
231}
232
233static unsigned int
234image_count_options(unsigned int optiontype)
235{
236 int i;
237 unsigned int count = 0;
238
239 for (i = 0; i < cfgn; i++)
240 if (image_cfg[i].type == optiontype)
241 count++;
242
243 return count;
244}
245
Mario Sixa1b6b0a2017-01-11 16:01:00 +0100246#if defined(CONFIG_KWB_SECURE)
247
248static int image_get_csk_index(void)
249{
250 struct image_cfg_element *e;
251
252 e = image_find_option(IMAGE_CFG_CSK_INDEX);
253 if (!e)
254 return -1;
255
256 return e->csk_idx;
257}
258
259static bool image_get_spezialized_img(void)
260{
261 struct image_cfg_element *e;
262
263 e = image_find_option(IMAGE_CFG_SEC_SPECIALIZED_IMG);
264 if (!e)
265 return false;
266
267 return e->sec_specialized_img;
268}
269
270#endif
271
Stefan Roese4acd2d22014-10-22 12:13:23 +0200272/*
273 * Compute a 8-bit checksum of a memory area. This algorithm follows
274 * the requirements of the Marvell SoC BootROM specifications.
275 */
276static uint8_t image_checksum8(void *start, uint32_t len)
277{
278 uint8_t csum = 0;
279 uint8_t *p = start;
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530280
281 /* check len and return zero checksum if invalid */
282 if (!len)
283 return 0;
284
285 do {
Stefan Roese4acd2d22014-10-22 12:13:23 +0200286 csum += *p;
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530287 p++;
288 } while (--len);
Stefan Roese4acd2d22014-10-22 12:13:23 +0200289
290 return csum;
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530291}
292
Stefan Roese4acd2d22014-10-22 12:13:23 +0200293static uint32_t image_checksum32(void *start, uint32_t len)
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530294{
Stefan Roese4acd2d22014-10-22 12:13:23 +0200295 uint32_t csum = 0;
296 uint32_t *p = start;
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530297
298 /* check len and return zero checksum if invalid */
299 if (!len)
300 return 0;
301
302 if (len % sizeof(uint32_t)) {
Stefan Roese4acd2d22014-10-22 12:13:23 +0200303 fprintf(stderr, "Length %d is not in multiple of %zu\n",
304 len, sizeof(uint32_t));
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530305 return 0;
306 }
307
308 do {
Stefan Roese4acd2d22014-10-22 12:13:23 +0200309 csum += *p;
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530310 p++;
311 len -= sizeof(uint32_t);
312 } while (len > 0);
Stefan Roese4acd2d22014-10-22 12:13:23 +0200313
314 return csum;
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530315}
316
Chris Packham4bdb5472016-11-09 22:07:45 +1300317static uint8_t baudrate_to_option(unsigned int baudrate)
318{
319 switch (baudrate) {
320 case 2400:
321 return MAIN_HDR_V1_OPT_BAUD_2400;
322 case 4800:
323 return MAIN_HDR_V1_OPT_BAUD_4800;
324 case 9600:
325 return MAIN_HDR_V1_OPT_BAUD_9600;
326 case 19200:
327 return MAIN_HDR_V1_OPT_BAUD_19200;
328 case 38400:
329 return MAIN_HDR_V1_OPT_BAUD_38400;
330 case 57600:
331 return MAIN_HDR_V1_OPT_BAUD_57600;
332 case 115200:
333 return MAIN_HDR_V1_OPT_BAUD_115200;
334 default:
335 return MAIN_HDR_V1_OPT_BAUD_DEFAULT;
336 }
337}
338
Mario Sixa1b6b0a2017-01-11 16:01:00 +0100339#if defined(CONFIG_KWB_SECURE)
340static void kwb_msg(const char *fmt, ...)
341{
342 if (verbose_mode) {
343 va_list ap;
344
345 va_start(ap, fmt);
346 vfprintf(stdout, fmt, ap);
347 va_end(ap);
348 }
349}
350
351static int openssl_err(const char *msg)
352{
353 unsigned long ssl_err = ERR_get_error();
354
355 fprintf(stderr, "%s", msg);
356 fprintf(stderr, ": %s\n",
357 ERR_error_string(ssl_err, 0));
358
359 return -1;
360}
361
362static int kwb_load_rsa_key(const char *keydir, const char *name, RSA **p_rsa)
363{
364 char path[PATH_MAX];
365 RSA *rsa;
366 FILE *f;
367
368 if (!keydir)
369 keydir = ".";
370
371 snprintf(path, sizeof(path), "%s/%s.key", keydir, name);
372 f = fopen(path, "r");
373 if (!f) {
374 fprintf(stderr, "Couldn't open RSA private key: '%s': %s\n",
375 path, strerror(errno));
376 return -ENOENT;
377 }
378
379 rsa = PEM_read_RSAPrivateKey(f, 0, NULL, "");
380 if (!rsa) {
381 openssl_err("Failure reading private key");
382 fclose(f);
383 return -EPROTO;
384 }
385 fclose(f);
386 *p_rsa = rsa;
387
388 return 0;
389}
390
391static int kwb_load_cfg_key(struct image_tool_params *params,
392 unsigned int cfg_option, const char *key_name,
393 RSA **p_key)
394{
395 struct image_cfg_element *e_key;
396 RSA *key;
397 int res;
398
399 *p_key = NULL;
400
401 e_key = image_find_option(cfg_option);
402 if (!e_key) {
403 fprintf(stderr, "%s not configured\n", key_name);
404 return -ENOENT;
405 }
406
407 res = kwb_load_rsa_key(params->keydir, e_key->key_name, &key);
408 if (res < 0) {
409 fprintf(stderr, "Failed to load %s\n", key_name);
410 return -ENOENT;
411 }
412
413 *p_key = key;
414
415 return 0;
416}
417
418static int kwb_load_kak(struct image_tool_params *params, RSA **p_kak)
419{
420 return kwb_load_cfg_key(params, IMAGE_CFG_KAK, "KAK", p_kak);
421}
422
423static int kwb_load_csk(struct image_tool_params *params, RSA **p_csk)
424{
425 return kwb_load_cfg_key(params, IMAGE_CFG_CSK, "CSK", p_csk);
426}
427
428static int kwb_compute_pubkey_hash(struct pubkey_der_v1 *pk,
429 struct hash_v1 *hash)
430{
431 EVP_MD_CTX *ctx;
432 unsigned int key_size;
433 unsigned int hash_size;
434 int ret = 0;
435
436 if (!pk || !hash || pk->key[0] != 0x30 || pk->key[1] != 0x82)
437 return -EINVAL;
438
439 key_size = (pk->key[2] << 8) + pk->key[3] + 4;
440
441 ctx = EVP_MD_CTX_create();
442 if (!ctx)
443 return openssl_err("EVP context creation failed");
444
445 EVP_MD_CTX_init(ctx);
446 if (!EVP_DigestInit(ctx, EVP_sha256())) {
447 ret = openssl_err("Digest setup failed");
448 goto hash_err_ctx;
449 }
450
451 if (!EVP_DigestUpdate(ctx, pk->key, key_size)) {
452 ret = openssl_err("Hashing data failed");
453 goto hash_err_ctx;
454 }
455
456 if (!EVP_DigestFinal(ctx, hash->hash, &hash_size)) {
457 ret = openssl_err("Could not obtain hash");
458 goto hash_err_ctx;
459 }
460
461 EVP_MD_CTX_cleanup(ctx);
462
463hash_err_ctx:
464 EVP_MD_CTX_destroy(ctx);
465 return ret;
466}
467
468static int kwb_import_pubkey(RSA **key, struct pubkey_der_v1 *src, char *keyname)
469{
470 RSA *rsa;
471 const unsigned char *ptr;
472
473 if (!key || !src)
474 goto fail;
475
476 ptr = src->key;
477 rsa = d2i_RSAPublicKey(key, &ptr, sizeof(src->key));
478 if (!rsa) {
479 openssl_err("error decoding public key");
480 goto fail;
481 }
482
483 return 0;
484fail:
485 fprintf(stderr, "Failed to decode %s pubkey\n", keyname);
486 return -EINVAL;
487}
488
489static int kwb_export_pubkey(RSA *key, struct pubkey_der_v1 *dst, FILE *hashf,
490 char *keyname)
491{
492 int size_exp, size_mod, size_seq;
Jelle van der Waae15843b2017-05-08 21:31:20 +0200493 const BIGNUM *key_e, *key_n;
Mario Sixa1b6b0a2017-01-11 16:01:00 +0100494 uint8_t *cur;
495 char *errmsg = "Failed to encode %s\n";
496
Jelle van der Waae15843b2017-05-08 21:31:20 +0200497 RSA_get0_key(key, NULL, &key_e, NULL);
498 RSA_get0_key(key, &key_n, NULL, NULL);
499
500 if (!key || !key_e || !key_n || !dst) {
Mario Sixa1b6b0a2017-01-11 16:01:00 +0100501 fprintf(stderr, "export pk failed: (%p, %p, %p, %p)",
Jelle van der Waae15843b2017-05-08 21:31:20 +0200502 key, key_e, key_n, dst);
Mario Sixa1b6b0a2017-01-11 16:01:00 +0100503 fprintf(stderr, errmsg, keyname);
504 return -EINVAL;
505 }
506
507 /*
508 * According to the specs, the key should be PKCS#1 DER encoded.
509 * But unfortunately the really required encoding seems to be different;
510 * it violates DER...! (But it still conformes to BER.)
511 * (Length always in long form w/ 2 byte length code; no leading zero
512 * when MSB of first byte is set...)
513 * So we cannot use the encoding func provided by OpenSSL and have to
514 * do the encoding manually.
515 */
516
Jelle van der Waae15843b2017-05-08 21:31:20 +0200517 size_exp = BN_num_bytes(key_e);
518 size_mod = BN_num_bytes(key_n);
Mario Sixa1b6b0a2017-01-11 16:01:00 +0100519 size_seq = 4 + size_mod + 4 + size_exp;
520
521 if (size_mod > 256) {
522 fprintf(stderr, "export pk failed: wrong mod size: %d\n",
523 size_mod);
524 fprintf(stderr, errmsg, keyname);
525 return -EINVAL;
526 }
527
528 if (4 + size_seq > sizeof(dst->key)) {
529 fprintf(stderr, "export pk failed: seq too large (%d, %lu)\n",
530 4 + size_seq, sizeof(dst->key));
531 fprintf(stderr, errmsg, keyname);
532 return -ENOBUFS;
533 }
534
535 cur = dst->key;
536
537 /* PKCS#1 (RFC3447) RSAPublicKey structure */
538 *cur++ = 0x30; /* SEQUENCE */
539 *cur++ = 0x82;
540 *cur++ = (size_seq >> 8) & 0xFF;
541 *cur++ = size_seq & 0xFF;
542 /* Modulus */
543 *cur++ = 0x02; /* INTEGER */
544 *cur++ = 0x82;
545 *cur++ = (size_mod >> 8) & 0xFF;
546 *cur++ = size_mod & 0xFF;
Jelle van der Waae15843b2017-05-08 21:31:20 +0200547 BN_bn2bin(key_n, cur);
Mario Sixa1b6b0a2017-01-11 16:01:00 +0100548 cur += size_mod;
549 /* Exponent */
550 *cur++ = 0x02; /* INTEGER */
551 *cur++ = 0x82;
552 *cur++ = (size_exp >> 8) & 0xFF;
553 *cur++ = size_exp & 0xFF;
Jelle van der Waae15843b2017-05-08 21:31:20 +0200554 BN_bn2bin(key_e, cur);
Mario Sixa1b6b0a2017-01-11 16:01:00 +0100555
556 if (hashf) {
557 struct hash_v1 pk_hash;
558 int i;
559 int ret = 0;
560
561 ret = kwb_compute_pubkey_hash(dst, &pk_hash);
562 if (ret < 0) {
563 fprintf(stderr, errmsg, keyname);
564 return ret;
565 }
566
567 fprintf(hashf, "SHA256 = ");
568 for (i = 0 ; i < sizeof(pk_hash.hash); ++i)
569 fprintf(hashf, "%02X", pk_hash.hash[i]);
570 fprintf(hashf, "\n");
571 }
572
573 return 0;
574}
575
576int kwb_sign(RSA *key, void *data, int datasz, struct sig_v1 *sig, char *signame)
577{
578 EVP_PKEY *evp_key;
579 EVP_MD_CTX *ctx;
580 unsigned int sig_size;
581 int size;
582 int ret = 0;
583
584 evp_key = EVP_PKEY_new();
585 if (!evp_key)
586 return openssl_err("EVP_PKEY object creation failed");
587
588 if (!EVP_PKEY_set1_RSA(evp_key, key)) {
589 ret = openssl_err("EVP key setup failed");
590 goto err_key;
591 }
592
593 size = EVP_PKEY_size(evp_key);
594 if (size > sizeof(sig->sig)) {
595 fprintf(stderr, "Buffer to small for signature (%d bytes)\n",
596 size);
597 ret = -ENOBUFS;
598 goto err_key;
599 }
600
601 ctx = EVP_MD_CTX_create();
602 if (!ctx) {
603 ret = openssl_err("EVP context creation failed");
604 goto err_key;
605 }
606 EVP_MD_CTX_init(ctx);
607 if (!EVP_SignInit(ctx, EVP_sha256())) {
608 ret = openssl_err("Signer setup failed");
609 goto err_ctx;
610 }
611
612 if (!EVP_SignUpdate(ctx, data, datasz)) {
613 ret = openssl_err("Signing data failed");
614 goto err_ctx;
615 }
616
617 if (!EVP_SignFinal(ctx, sig->sig, &sig_size, evp_key)) {
618 ret = openssl_err("Could not obtain signature");
619 goto err_ctx;
620 }
621
622 EVP_MD_CTX_cleanup(ctx);
623 EVP_MD_CTX_destroy(ctx);
624 EVP_PKEY_free(evp_key);
625
626 return 0;
627
628err_ctx:
629 EVP_MD_CTX_destroy(ctx);
630err_key:
631 EVP_PKEY_free(evp_key);
632 fprintf(stderr, "Failed to create %s signature\n", signame);
633 return ret;
634}
635
636int kwb_verify(RSA *key, void *data, int datasz, struct sig_v1 *sig,
637 char *signame)
638{
639 EVP_PKEY *evp_key;
640 EVP_MD_CTX *ctx;
641 int size;
642 int ret = 0;
643
644 evp_key = EVP_PKEY_new();
645 if (!evp_key)
646 return openssl_err("EVP_PKEY object creation failed");
647
648 if (!EVP_PKEY_set1_RSA(evp_key, key)) {
649 ret = openssl_err("EVP key setup failed");
650 goto err_key;
651 }
652
653 size = EVP_PKEY_size(evp_key);
654 if (size > sizeof(sig->sig)) {
655 fprintf(stderr, "Invalid signature size (%d bytes)\n",
656 size);
657 ret = -EINVAL;
658 goto err_key;
659 }
660
661 ctx = EVP_MD_CTX_create();
662 if (!ctx) {
663 ret = openssl_err("EVP context creation failed");
664 goto err_key;
665 }
666 EVP_MD_CTX_init(ctx);
667 if (!EVP_VerifyInit(ctx, EVP_sha256())) {
668 ret = openssl_err("Verifier setup failed");
669 goto err_ctx;
670 }
671
672 if (!EVP_VerifyUpdate(ctx, data, datasz)) {
673 ret = openssl_err("Hashing data failed");
674 goto err_ctx;
675 }
676
677 if (!EVP_VerifyFinal(ctx, sig->sig, sizeof(sig->sig), evp_key)) {
678 ret = openssl_err("Could not verify signature");
679 goto err_ctx;
680 }
681
682 EVP_MD_CTX_cleanup(ctx);
683 EVP_MD_CTX_destroy(ctx);
684 EVP_PKEY_free(evp_key);
685
686 return 0;
687
688err_ctx:
689 EVP_MD_CTX_destroy(ctx);
690err_key:
691 EVP_PKEY_free(evp_key);
692 fprintf(stderr, "Failed to verify %s signature\n", signame);
693 return ret;
694}
695
696int kwb_sign_and_verify(RSA *key, void *data, int datasz, struct sig_v1 *sig,
697 char *signame)
698{
699 if (kwb_sign(key, data, datasz, sig, signame) < 0)
700 return -1;
701
702 if (kwb_verify(key, data, datasz, sig, signame) < 0)
703 return -1;
704
705 return 0;
706}
707
708
709int kwb_dump_fuse_cmds_38x(FILE *out, struct secure_hdr_v1 *sec_hdr)
710{
711 struct hash_v1 kak_pub_hash;
712 struct image_cfg_element *e;
713 unsigned int fuse_line;
714 int i, idx;
715 uint8_t *ptr;
716 uint32_t val;
717 int ret = 0;
718
719 if (!out || !sec_hdr)
720 return -EINVAL;
721
722 ret = kwb_compute_pubkey_hash(&sec_hdr->kak, &kak_pub_hash);
723 if (ret < 0)
724 goto done;
725
726 fprintf(out, "# burn KAK pub key hash\n");
727 ptr = kak_pub_hash.hash;
728 for (fuse_line = 26; fuse_line <= 30; ++fuse_line) {
729 fprintf(out, "fuse prog -y %u 0 ", fuse_line);
730
731 for (i = 4; i-- > 0;)
732 fprintf(out, "%02hx", (ushort)ptr[i]);
733 ptr += 4;
734 fprintf(out, " 00");
735
736 if (fuse_line < 30) {
737 for (i = 3; i-- > 0;)
738 fprintf(out, "%02hx", (ushort)ptr[i]);
739 ptr += 3;
740 } else {
741 fprintf(out, "000000");
742 }
743
744 fprintf(out, " 1\n");
745 }
746
747 fprintf(out, "# burn CSK selection\n");
748
749 idx = image_get_csk_index();
750 if (idx < 0 || idx > 15) {
751 ret = -EINVAL;
752 goto done;
753 }
754 if (idx > 0) {
755 for (fuse_line = 31; fuse_line < 31 + idx; ++fuse_line)
756 fprintf(out, "fuse prog -y %u 0 00000001 00000000 1\n",
757 fuse_line);
758 } else {
759 fprintf(out, "# CSK index is 0; no mods needed\n");
760 }
761
762 e = image_find_option(IMAGE_CFG_BOX_ID);
763 if (e) {
764 fprintf(out, "# set box ID\n");
765 fprintf(out, "fuse prog -y 48 0 %08x 00000000 1\n", e->boxid);
766 }
767
768 e = image_find_option(IMAGE_CFG_FLASH_ID);
769 if (e) {
770 fprintf(out, "# set flash ID\n");
771 fprintf(out, "fuse prog -y 47 0 %08x 00000000 1\n", e->flashid);
772 }
773
774 fprintf(out, "# enable secure mode ");
775 fprintf(out, "(must be the last fuse line written)\n");
776
777 val = 1;
778 e = image_find_option(IMAGE_CFG_SEC_BOOT_DEV);
779 if (!e) {
780 fprintf(stderr, "ERROR: secured mode boot device not given\n");
781 ret = -EINVAL;
782 goto done;
783 }
784
785 if (e->sec_boot_dev > 0xff) {
786 fprintf(stderr, "ERROR: secured mode boot device invalid\n");
787 ret = -EINVAL;
788 goto done;
789 }
790
791 val |= (e->sec_boot_dev << 8);
792
793 fprintf(out, "fuse prog -y 24 0 %08x 0103e0a9 1\n", val);
794
795 fprintf(out, "# lock (unused) fuse lines (0-23)s\n");
796 for (fuse_line = 0; fuse_line < 24; ++fuse_line)
797 fprintf(out, "fuse prog -y %u 2 1\n", fuse_line);
798
799 fprintf(out, "# OK, that's all :-)\n");
800
801done:
802 return ret;
803}
804
805static int kwb_dump_fuse_cmds(struct secure_hdr_v1 *sec_hdr)
806{
807 int ret = 0;
808 struct image_cfg_element *e;
809
810 e = image_find_option(IMAGE_CFG_SEC_FUSE_DUMP);
811 if (!e)
812 return 0;
813
814 if (!strcmp(e->name, "a38x")) {
815 FILE *out = fopen("kwb_fuses_a38x.txt", "w+");
816
817 kwb_dump_fuse_cmds_38x(out, sec_hdr);
818 fclose(out);
819 goto done;
820 }
821
822 ret = -ENOSYS;
823
824done:
825 return ret;
826}
827
828#endif
829
Stefan Roese4acd2d22014-10-22 12:13:23 +0200830static void *image_create_v0(size_t *imagesz, struct image_tool_params *params,
831 int payloadsz)
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530832{
Stefan Roese4acd2d22014-10-22 12:13:23 +0200833 struct image_cfg_element *e;
834 size_t headersz;
835 struct main_hdr_v0 *main_hdr;
Mario Six885fba12017-01-11 16:00:55 +0100836 uint8_t *image;
Stefan Roese4acd2d22014-10-22 12:13:23 +0200837 int has_ext = 0;
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530838
Stefan Roese4acd2d22014-10-22 12:13:23 +0200839 /*
840 * Calculate the size of the header and the size of the
841 * payload
842 */
843 headersz = sizeof(struct main_hdr_v0);
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530844
Stefan Roese4acd2d22014-10-22 12:13:23 +0200845 if (image_count_options(IMAGE_CFG_DATA) > 0) {
846 has_ext = 1;
847 headersz += sizeof(struct ext_hdr_v0);
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530848 }
849
Stefan Roese4acd2d22014-10-22 12:13:23 +0200850 if (image_count_options(IMAGE_CFG_PAYLOAD) > 1) {
851 fprintf(stderr, "More than one payload, not possible\n");
852 return NULL;
853 }
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530854
Stefan Roese4acd2d22014-10-22 12:13:23 +0200855 image = malloc(headersz);
856 if (!image) {
857 fprintf(stderr, "Cannot allocate memory for image\n");
858 return NULL;
859 }
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530860
Stefan Roese4acd2d22014-10-22 12:13:23 +0200861 memset(image, 0, headersz);
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530862
Mario Six885fba12017-01-11 16:00:55 +0100863 main_hdr = (struct main_hdr_v0 *)image;
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530864
Stefan Roese4acd2d22014-10-22 12:13:23 +0200865 /* Fill in the main header */
Reinhard Pfaua8840dc2015-11-29 15:48:25 +0100866 main_hdr->blocksize =
867 cpu_to_le32(payloadsz + sizeof(uint32_t) - headersz);
868 main_hdr->srcaddr = cpu_to_le32(headersz);
Stefan Roese4acd2d22014-10-22 12:13:23 +0200869 main_hdr->ext = has_ext;
Reinhard Pfaua8840dc2015-11-29 15:48:25 +0100870 main_hdr->destaddr = cpu_to_le32(params->addr);
871 main_hdr->execaddr = cpu_to_le32(params->ep);
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530872
Stefan Roese4acd2d22014-10-22 12:13:23 +0200873 e = image_find_option(IMAGE_CFG_BOOT_FROM);
874 if (e)
875 main_hdr->blockid = e->bootfrom;
876 e = image_find_option(IMAGE_CFG_NAND_ECC_MODE);
877 if (e)
878 main_hdr->nandeccmode = e->nandeccmode;
879 e = image_find_option(IMAGE_CFG_NAND_PAGESZ);
880 if (e)
Reinhard Pfaua8840dc2015-11-29 15:48:25 +0100881 main_hdr->nandpagesize = cpu_to_le16(e->nandpagesz);
Stefan Roese4acd2d22014-10-22 12:13:23 +0200882 main_hdr->checksum = image_checksum8(image,
883 sizeof(struct main_hdr_v0));
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530884
Stefan Roese4acd2d22014-10-22 12:13:23 +0200885 /* Generate the ext header */
886 if (has_ext) {
Mario Sixe89016c2017-01-11 16:00:56 +0100887 struct ext_hdr_v0 *ext_hdr;
Stefan Roese4acd2d22014-10-22 12:13:23 +0200888 int cfgi, datai;
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530889
Mario Six885fba12017-01-11 16:00:55 +0100890 ext_hdr = (struct ext_hdr_v0 *)
891 (image + sizeof(struct main_hdr_v0));
Reinhard Pfaua8840dc2015-11-29 15:48:25 +0100892 ext_hdr->offset = cpu_to_le32(0x40);
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530893
Stefan Roese4acd2d22014-10-22 12:13:23 +0200894 for (cfgi = 0, datai = 0; cfgi < cfgn; cfgi++) {
895 e = &image_cfg[cfgi];
896 if (e->type != IMAGE_CFG_DATA)
897 continue;
898
Reinhard Pfaua8840dc2015-11-29 15:48:25 +0100899 ext_hdr->rcfg[datai].raddr =
900 cpu_to_le32(e->regdata.raddr);
901 ext_hdr->rcfg[datai].rdata =
902 cpu_to_le32(e->regdata.rdata);
Stefan Roese4acd2d22014-10-22 12:13:23 +0200903 datai++;
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530904 }
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530905
Stefan Roese4acd2d22014-10-22 12:13:23 +0200906 ext_hdr->checksum = image_checksum8(ext_hdr,
907 sizeof(struct ext_hdr_v0));
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530908 }
909
Stefan Roese4acd2d22014-10-22 12:13:23 +0200910 *imagesz = headersz;
911 return image;
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530912}
913
Mario Sixe93cf532017-01-11 16:00:57 +0100914static size_t image_headersz_v1(int *hasext)
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530915{
Stefan Roese4acd2d22014-10-22 12:13:23 +0200916 struct image_cfg_element *binarye;
917 size_t headersz;
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530918
Stefan Roese4acd2d22014-10-22 12:13:23 +0200919 /*
920 * Calculate the size of the header and the size of the
921 * payload
922 */
923 headersz = sizeof(struct main_hdr_v1);
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530924
Stefan Roese4acd2d22014-10-22 12:13:23 +0200925 if (image_count_options(IMAGE_CFG_BINARY) > 1) {
926 fprintf(stderr, "More than one binary blob, not supported\n");
927 return 0;
928 }
929
930 if (image_count_options(IMAGE_CFG_PAYLOAD) > 1) {
931 fprintf(stderr, "More than one payload, not possible\n");
932 return 0;
933 }
934
935 binarye = image_find_option(IMAGE_CFG_BINARY);
936 if (binarye) {
Mario Sixe89016c2017-01-11 16:00:56 +0100937 int ret;
Stefan Roese4acd2d22014-10-22 12:13:23 +0200938 struct stat s;
939
940 ret = stat(binarye->binary.file, &s);
941 if (ret < 0) {
Andreas Bießmanne5f1a582014-10-24 23:39:11 +0200942 char cwd[PATH_MAX];
943 char *dir = cwd;
944
945 memset(cwd, 0, sizeof(cwd));
946 if (!getcwd(cwd, sizeof(cwd))) {
947 dir = "current working directory";
948 perror("getcwd() failed");
949 }
950
Stefan Roese4acd2d22014-10-22 12:13:23 +0200951 fprintf(stderr,
952 "Didn't find the file '%s' in '%s' which is mandatory to generate the image\n"
953 "This file generally contains the DDR3 training code, and should be extracted from an existing bootable\n"
954 "image for your board. See 'kwbimage -x' to extract it from an existing image.\n",
Andreas Bießmanne5f1a582014-10-24 23:39:11 +0200955 binarye->binary.file, dir);
Stefan Roese4acd2d22014-10-22 12:13:23 +0200956 return 0;
957 }
958
Reinhard Pfau76b391c2015-11-29 15:52:14 +0100959 headersz += sizeof(struct opt_hdr_v1) +
960 s.st_size +
961 (binarye->binary.nargs + 2) * sizeof(uint32_t);
Stefan Roese4acd2d22014-10-22 12:13:23 +0200962 if (hasext)
963 *hasext = 1;
964 }
965
Mario Sixa1b6b0a2017-01-11 16:01:00 +0100966#if defined(CONFIG_KWB_SECURE)
967 if (image_get_csk_index() >= 0) {
968 headersz += sizeof(struct secure_hdr_v1);
969 if (hasext)
970 *hasext = 1;
971 }
972#endif
973
Stefan Roese7ddf8cf2015-07-20 11:20:38 +0200974#if defined(CONFIG_SYS_U_BOOT_OFFS)
975 if (headersz > CONFIG_SYS_U_BOOT_OFFS) {
Mario Six94490a42017-01-11 16:00:54 +0100976 fprintf(stderr,
977 "Error: Image header (incl. SPL image) too big!\n");
Stefan Roese7ddf8cf2015-07-20 11:20:38 +0200978 fprintf(stderr, "header=0x%x CONFIG_SYS_U_BOOT_OFFS=0x%x!\n",
979 (int)headersz, CONFIG_SYS_U_BOOT_OFFS);
980 fprintf(stderr, "Increase CONFIG_SYS_U_BOOT_OFFS!\n");
Kevin Smitha0aad122015-03-16 14:58:21 +0000981 return 0;
Kevin Smitha0aad122015-03-16 14:58:21 +0000982 }
Mario Six79066ef2017-01-11 16:00:58 +0100983
Mario Six94490a42017-01-11 16:00:54 +0100984 headersz = CONFIG_SYS_U_BOOT_OFFS;
Kevin Smitha0aad122015-03-16 14:58:21 +0000985#endif
986
Stefan Roese4acd2d22014-10-22 12:13:23 +0200987 /*
988 * The payload should be aligned on some reasonable
989 * boundary
990 */
991 return ALIGN_SUP(headersz, 4096);
992}
993
Mario Six79066ef2017-01-11 16:00:58 +0100994int add_binary_header_v1(uint8_t *cur)
995{
996 struct image_cfg_element *binarye;
997 struct opt_hdr_v1 *hdr = (struct opt_hdr_v1 *)cur;
998 uint32_t *args;
999 size_t binhdrsz;
1000 struct stat s;
1001 int argi;
1002 FILE *bin;
1003 int ret;
1004
1005 binarye = image_find_option(IMAGE_CFG_BINARY);
1006
1007 if (!binarye)
1008 return 0;
1009
1010 hdr->headertype = OPT_HDR_V1_BINARY_TYPE;
1011
1012 bin = fopen(binarye->binary.file, "r");
1013 if (!bin) {
1014 fprintf(stderr, "Cannot open binary file %s\n",
1015 binarye->binary.file);
1016 return -1;
1017 }
1018
Mario Six1f6c8a52017-02-13 10:11:55 +01001019 if (fstat(fileno(bin), &s)) {
1020 fprintf(stderr, "Cannot stat binary file %s\n",
1021 binarye->binary.file);
1022 goto err_close;
1023 }
Mario Six79066ef2017-01-11 16:00:58 +01001024
1025 binhdrsz = sizeof(struct opt_hdr_v1) +
1026 (binarye->binary.nargs + 2) * sizeof(uint32_t) +
1027 s.st_size;
1028
1029 /*
1030 * The size includes the binary image size, rounded
1031 * up to a 4-byte boundary. Plus 4 bytes for the
1032 * next-header byte and 3-byte alignment at the end.
1033 */
1034 binhdrsz = ALIGN_SUP(binhdrsz, 4) + 4;
1035 hdr->headersz_lsb = cpu_to_le16(binhdrsz & 0xFFFF);
1036 hdr->headersz_msb = (binhdrsz & 0xFFFF0000) >> 16;
1037
1038 cur += sizeof(struct opt_hdr_v1);
1039
1040 args = (uint32_t *)cur;
1041 *args = cpu_to_le32(binarye->binary.nargs);
1042 args++;
1043 for (argi = 0; argi < binarye->binary.nargs; argi++)
1044 args[argi] = cpu_to_le32(binarye->binary.args[argi]);
1045
1046 cur += (binarye->binary.nargs + 1) * sizeof(uint32_t);
1047
1048 ret = fread(cur, s.st_size, 1, bin);
1049 if (ret != 1) {
1050 fprintf(stderr,
1051 "Could not read binary image %s\n",
1052 binarye->binary.file);
Mario Six1f6c8a52017-02-13 10:11:55 +01001053 goto err_close;
Mario Six79066ef2017-01-11 16:00:58 +01001054 }
1055
1056 fclose(bin);
1057
1058 cur += ALIGN_SUP(s.st_size, 4);
1059
1060 /*
1061 * For now, we don't support more than one binary
1062 * header, and no other header types are
1063 * supported. So, the binary header is necessarily the
1064 * last one
1065 */
1066 *((uint32_t *)cur) = 0x00000000;
1067
1068 cur += sizeof(uint32_t);
1069
1070 return 0;
Mario Six1f6c8a52017-02-13 10:11:55 +01001071
1072err_close:
1073 fclose(bin);
1074
1075 return -1;
Mario Six79066ef2017-01-11 16:00:58 +01001076}
1077
Mario Sixa1b6b0a2017-01-11 16:01:00 +01001078#if defined(CONFIG_KWB_SECURE)
1079
1080int export_pub_kak_hash(RSA *kak, struct secure_hdr_v1 *secure_hdr)
1081{
1082 FILE *hashf;
1083 int res;
1084
1085 hashf = fopen("pub_kak_hash.txt", "w");
1086
1087 res = kwb_export_pubkey(kak, &secure_hdr->kak, hashf, "KAK");
1088
1089 fclose(hashf);
1090
1091 return res < 0 ? 1 : 0;
1092}
1093
1094int kwb_sign_csk_with_kak(struct image_tool_params *params,
1095 struct secure_hdr_v1 *secure_hdr, RSA *csk)
1096{
1097 RSA *kak = NULL;
1098 RSA *kak_pub = NULL;
1099 int csk_idx = image_get_csk_index();
1100 struct sig_v1 tmp_sig;
1101
1102 if (csk_idx >= 16) {
1103 fprintf(stderr, "Invalid CSK index %d\n", csk_idx);
1104 return 1;
1105 }
1106
1107 if (kwb_load_kak(params, &kak) < 0)
1108 return 1;
1109
1110 if (export_pub_kak_hash(kak, secure_hdr))
1111 return 1;
1112
1113 if (kwb_import_pubkey(&kak_pub, &secure_hdr->kak, "KAK") < 0)
1114 return 1;
1115
1116 if (kwb_export_pubkey(csk, &secure_hdr->csk[csk_idx], NULL, "CSK") < 0)
1117 return 1;
1118
1119 if (kwb_sign_and_verify(kak, &secure_hdr->csk,
1120 sizeof(secure_hdr->csk) +
1121 sizeof(secure_hdr->csksig),
1122 &tmp_sig, "CSK") < 0)
1123 return 1;
1124
1125 if (kwb_verify(kak_pub, &secure_hdr->csk,
1126 sizeof(secure_hdr->csk) +
1127 sizeof(secure_hdr->csksig),
1128 &tmp_sig, "CSK (2)") < 0)
1129 return 1;
1130
1131 secure_hdr->csksig = tmp_sig;
1132
1133 return 0;
1134}
1135
1136int add_secure_header_v1(struct image_tool_params *params, uint8_t *ptr,
1137 int payloadsz, size_t headersz, uint8_t *image,
1138 struct secure_hdr_v1 *secure_hdr)
1139{
1140 struct image_cfg_element *e_jtagdelay;
1141 struct image_cfg_element *e_boxid;
1142 struct image_cfg_element *e_flashid;
1143 RSA *csk = NULL;
1144 unsigned char *image_ptr;
1145 size_t image_size;
1146 struct sig_v1 tmp_sig;
1147 bool specialized_img = image_get_spezialized_img();
1148
1149 kwb_msg("Create secure header content\n");
1150
1151 e_jtagdelay = image_find_option(IMAGE_CFG_JTAG_DELAY);
1152 e_boxid = image_find_option(IMAGE_CFG_BOX_ID);
1153 e_flashid = image_find_option(IMAGE_CFG_FLASH_ID);
1154
1155 if (kwb_load_csk(params, &csk) < 0)
1156 return 1;
1157
1158 secure_hdr->headertype = OPT_HDR_V1_SECURE_TYPE;
1159 secure_hdr->headersz_msb = 0;
1160 secure_hdr->headersz_lsb = cpu_to_le16(sizeof(struct secure_hdr_v1));
1161 if (e_jtagdelay)
1162 secure_hdr->jtag_delay = e_jtagdelay->jtag_delay;
1163 if (e_boxid && specialized_img)
1164 secure_hdr->boxid = cpu_to_le32(e_boxid->boxid);
1165 if (e_flashid && specialized_img)
1166 secure_hdr->flashid = cpu_to_le32(e_flashid->flashid);
1167
1168 if (kwb_sign_csk_with_kak(params, secure_hdr, csk))
1169 return 1;
1170
1171 image_ptr = ptr + headersz;
1172 image_size = payloadsz - headersz;
1173
1174 if (kwb_sign_and_verify(csk, image_ptr, image_size,
1175 &secure_hdr->imgsig, "image") < 0)
1176 return 1;
1177
1178 if (kwb_sign_and_verify(csk, image, headersz, &tmp_sig, "header") < 0)
1179 return 1;
1180
1181 secure_hdr->hdrsig = tmp_sig;
1182
1183 kwb_dump_fuse_cmds(secure_hdr);
1184
1185 return 0;
1186}
1187#endif
1188
Stefan Roese4acd2d22014-10-22 12:13:23 +02001189static void *image_create_v1(size_t *imagesz, struct image_tool_params *params,
Mario Sixa1b6b0a2017-01-11 16:01:00 +01001190 uint8_t *ptr, int payloadsz)
Stefan Roese4acd2d22014-10-22 12:13:23 +02001191{
Mario Six79066ef2017-01-11 16:00:58 +01001192 struct image_cfg_element *e;
Stefan Roese4acd2d22014-10-22 12:13:23 +02001193 struct main_hdr_v1 *main_hdr;
Mario Sixa1b6b0a2017-01-11 16:01:00 +01001194#if defined(CONFIG_KWB_SECURE)
1195 struct secure_hdr_v1 *secure_hdr = NULL;
1196#endif
Stefan Roese4acd2d22014-10-22 12:13:23 +02001197 size_t headersz;
Mario Six885fba12017-01-11 16:00:55 +01001198 uint8_t *image, *cur;
Stefan Roese4acd2d22014-10-22 12:13:23 +02001199 int hasext = 0;
Mario Sixa1b6b0a2017-01-11 16:01:00 +01001200 uint8_t *next_ext = NULL;
Stefan Roese4acd2d22014-10-22 12:13:23 +02001201
1202 /*
1203 * Calculate the size of the header and the size of the
1204 * payload
1205 */
Mario Sixe93cf532017-01-11 16:00:57 +01001206 headersz = image_headersz_v1(&hasext);
Stefan Roese4acd2d22014-10-22 12:13:23 +02001207 if (headersz == 0)
1208 return NULL;
1209
1210 image = malloc(headersz);
1211 if (!image) {
1212 fprintf(stderr, "Cannot allocate memory for image\n");
1213 return NULL;
1214 }
1215
1216 memset(image, 0, headersz);
1217
Mario Six885fba12017-01-11 16:00:55 +01001218 main_hdr = (struct main_hdr_v1 *)image;
Mario Sixa1b6b0a2017-01-11 16:01:00 +01001219 cur = image;
1220 cur += sizeof(struct main_hdr_v1);
1221 next_ext = &main_hdr->ext;
Stefan Roese4acd2d22014-10-22 12:13:23 +02001222
1223 /* Fill the main header */
Reinhard Pfaua8840dc2015-11-29 15:48:25 +01001224 main_hdr->blocksize =
1225 cpu_to_le32(payloadsz - headersz + sizeof(uint32_t));
1226 main_hdr->headersz_lsb = cpu_to_le16(headersz & 0xFFFF);
Stefan Roese4acd2d22014-10-22 12:13:23 +02001227 main_hdr->headersz_msb = (headersz & 0xFFFF0000) >> 16;
Mario Six94084ee2017-01-11 16:00:53 +01001228 main_hdr->destaddr = cpu_to_le32(params->addr)
1229 - sizeof(image_header_t);
Reinhard Pfaua8840dc2015-11-29 15:48:25 +01001230 main_hdr->execaddr = cpu_to_le32(params->ep);
1231 main_hdr->srcaddr = cpu_to_le32(headersz);
Stefan Roese4acd2d22014-10-22 12:13:23 +02001232 main_hdr->ext = hasext;
1233 main_hdr->version = 1;
1234 e = image_find_option(IMAGE_CFG_BOOT_FROM);
1235 if (e)
1236 main_hdr->blockid = e->bootfrom;
1237 e = image_find_option(IMAGE_CFG_NAND_BLKSZ);
1238 if (e)
1239 main_hdr->nandblocksize = e->nandblksz / (64 * 1024);
1240 e = image_find_option(IMAGE_CFG_NAND_BADBLK_LOCATION);
1241 if (e)
1242 main_hdr->nandbadblklocation = e->nandbadblklocation;
Chris Packham4bdb5472016-11-09 22:07:45 +13001243 e = image_find_option(IMAGE_CFG_BAUDRATE);
1244 if (e)
1245 main_hdr->options = baudrate_to_option(e->baudrate);
Chris Packham2611c052016-11-09 22:21:45 +13001246 e = image_find_option(IMAGE_CFG_DEBUG);
1247 if (e)
1248 main_hdr->flags = e->debug ? 0x1 : 0;
Stefan Roese4acd2d22014-10-22 12:13:23 +02001249
Mario Sixa1b6b0a2017-01-11 16:01:00 +01001250#if defined(CONFIG_KWB_SECURE)
1251 if (image_get_csk_index() >= 0) {
1252 /*
1253 * only reserve the space here; we fill the header later since
1254 * we need the header to be complete to compute the signatures
1255 */
1256 secure_hdr = (struct secure_hdr_v1 *)cur;
1257 cur += sizeof(struct secure_hdr_v1);
1258 next_ext = &secure_hdr->next;
1259 }
1260#endif
1261 *next_ext = 1;
1262
Mario Six79066ef2017-01-11 16:00:58 +01001263 if (add_binary_header_v1(cur))
1264 return NULL;
Stefan Roese4acd2d22014-10-22 12:13:23 +02001265
Mario Sixa1b6b0a2017-01-11 16:01:00 +01001266#if defined(CONFIG_KWB_SECURE)
1267 if (secure_hdr && add_secure_header_v1(params, ptr, payloadsz,
1268 headersz, image, secure_hdr))
1269 return NULL;
1270#endif
1271
Stefan Roese4acd2d22014-10-22 12:13:23 +02001272 /* Calculate and set the header checksum */
1273 main_hdr->checksum = image_checksum8(main_hdr, headersz);
1274
1275 *imagesz = headersz;
1276 return image;
1277}
1278
Mario Six4991b4f2017-01-11 16:00:59 +01001279int recognize_keyword(char *keyword)
1280{
1281 int kw_id;
1282
1283 for (kw_id = 1; kw_id < IMAGE_CFG_COUNT; ++kw_id)
1284 if (!strcmp(keyword, id_strs[kw_id]))
1285 return kw_id;
1286
1287 return 0;
1288}
1289
Stefan Roese4acd2d22014-10-22 12:13:23 +02001290static int image_create_config_parse_oneline(char *line,
1291 struct image_cfg_element *el)
1292{
Mario Six4991b4f2017-01-11 16:00:59 +01001293 char *keyword, *saveptr, *value1, *value2;
1294 char delimiters[] = " \t";
1295 int keyword_id, ret, argi;
1296 char *unknown_msg = "Ignoring unknown line '%s'\n";
Stefan Roese4acd2d22014-10-22 12:13:23 +02001297
Mario Six4991b4f2017-01-11 16:00:59 +01001298 keyword = strtok_r(line, delimiters, &saveptr);
1299 keyword_id = recognize_keyword(keyword);
Mario Six94490a42017-01-11 16:00:54 +01001300
Mario Six4991b4f2017-01-11 16:00:59 +01001301 if (!keyword_id) {
1302 fprintf(stderr, unknown_msg, line);
1303 return 0;
1304 }
1305
1306 el->type = keyword_id;
1307
1308 value1 = strtok_r(NULL, delimiters, &saveptr);
1309
1310 if (!value1) {
1311 fprintf(stderr, "Parameter missing in line '%s'\n", line);
1312 return -1;
1313 }
1314
1315 switch (keyword_id) {
1316 case IMAGE_CFG_VERSION:
1317 el->version = atoi(value1);
1318 break;
1319 case IMAGE_CFG_BOOT_FROM:
1320 ret = image_boot_mode_id(value1);
Mario Six94490a42017-01-11 16:00:54 +01001321
Andreas Bießmannf411b8f2014-10-24 23:25:52 +02001322 if (ret < 0) {
Mario Six4991b4f2017-01-11 16:00:59 +01001323 fprintf(stderr, "Invalid boot media '%s'\n", value1);
Stefan Roese4acd2d22014-10-22 12:13:23 +02001324 return -1;
1325 }
Andreas Bießmannf411b8f2014-10-24 23:25:52 +02001326 el->bootfrom = ret;
Mario Six4991b4f2017-01-11 16:00:59 +01001327 break;
1328 case IMAGE_CFG_NAND_BLKSZ:
1329 el->nandblksz = strtoul(value1, NULL, 16);
1330 break;
1331 case IMAGE_CFG_NAND_BADBLK_LOCATION:
1332 el->nandbadblklocation = strtoul(value1, NULL, 16);
1333 break;
1334 case IMAGE_CFG_NAND_ECC_MODE:
1335 ret = image_nand_ecc_mode_id(value1);
Mario Six94490a42017-01-11 16:00:54 +01001336
Andreas Bießmannf411b8f2014-10-24 23:25:52 +02001337 if (ret < 0) {
Mario Six4991b4f2017-01-11 16:00:59 +01001338 fprintf(stderr, "Invalid NAND ECC mode '%s'\n", value1);
Stefan Roese4acd2d22014-10-22 12:13:23 +02001339 return -1;
1340 }
Andreas Bießmannf411b8f2014-10-24 23:25:52 +02001341 el->nandeccmode = ret;
Mario Six4991b4f2017-01-11 16:00:59 +01001342 break;
1343 case IMAGE_CFG_NAND_PAGESZ:
1344 el->nandpagesz = strtoul(value1, NULL, 16);
1345 break;
1346 case IMAGE_CFG_BINARY:
1347 argi = 0;
Mario Six94490a42017-01-11 16:00:54 +01001348
Mario Six4991b4f2017-01-11 16:00:59 +01001349 el->binary.file = strdup(value1);
Stefan Roese4acd2d22014-10-22 12:13:23 +02001350 while (1) {
Mario Six4991b4f2017-01-11 16:00:59 +01001351 char *value = strtok_r(NULL, delimiters, &saveptr);
1352
Stefan Roese4acd2d22014-10-22 12:13:23 +02001353 if (!value)
1354 break;
1355 el->binary.args[argi] = strtoul(value, NULL, 16);
1356 argi++;
1357 if (argi >= BINARY_MAX_ARGS) {
1358 fprintf(stderr,
Mario Six4991b4f2017-01-11 16:00:59 +01001359 "Too many arguments for BINARY\n");
Stefan Roese4acd2d22014-10-22 12:13:23 +02001360 return -1;
1361 }
1362 }
1363 el->binary.nargs = argi;
Mario Six4991b4f2017-01-11 16:00:59 +01001364 break;
1365 case IMAGE_CFG_DATA:
1366 value2 = strtok_r(NULL, delimiters, &saveptr);
Stefan Roese4acd2d22014-10-22 12:13:23 +02001367
1368 if (!value1 || !value2) {
1369 fprintf(stderr,
1370 "Invalid number of arguments for DATA\n");
1371 return -1;
1372 }
1373
Stefan Roese4acd2d22014-10-22 12:13:23 +02001374 el->regdata.raddr = strtoul(value1, NULL, 16);
1375 el->regdata.rdata = strtoul(value2, NULL, 16);
Mario Six4991b4f2017-01-11 16:00:59 +01001376 break;
1377 case IMAGE_CFG_BAUDRATE:
1378 el->baudrate = strtoul(value1, NULL, 10);
1379 break;
1380 case IMAGE_CFG_DEBUG:
1381 el->debug = strtoul(value1, NULL, 10);
1382 break;
Mario Sixa1b6b0a2017-01-11 16:01:00 +01001383 case IMAGE_CFG_KAK:
1384 el->key_name = strdup(value1);
1385 break;
1386 case IMAGE_CFG_CSK:
1387 el->key_name = strdup(value1);
1388 break;
1389 case IMAGE_CFG_CSK_INDEX:
1390 el->csk_idx = strtol(value1, NULL, 0);
1391 break;
1392 case IMAGE_CFG_JTAG_DELAY:
1393 el->jtag_delay = strtoul(value1, NULL, 0);
1394 break;
1395 case IMAGE_CFG_BOX_ID:
1396 el->boxid = strtoul(value1, NULL, 0);
1397 break;
1398 case IMAGE_CFG_FLASH_ID:
1399 el->flashid = strtoul(value1, NULL, 0);
1400 break;
1401 case IMAGE_CFG_SEC_SPECIALIZED_IMG:
1402 el->sec_specialized_img = true;
1403 break;
1404 case IMAGE_CFG_SEC_COMMON_IMG:
1405 el->sec_specialized_img = false;
1406 break;
1407 case IMAGE_CFG_SEC_BOOT_DEV:
1408 el->sec_boot_dev = strtoul(value1, NULL, 0);
1409 break;
1410 case IMAGE_CFG_SEC_FUSE_DUMP:
1411 el->name = strdup(value1);
1412 break;
Mario Six4991b4f2017-01-11 16:00:59 +01001413 default:
1414 fprintf(stderr, unknown_msg, line);
Stefan Roese4acd2d22014-10-22 12:13:23 +02001415 }
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +05301416
1417 return 0;
1418}
1419
Stefan Roese4acd2d22014-10-22 12:13:23 +02001420/*
1421 * Parse the configuration file 'fcfg' into the array of configuration
1422 * elements 'image_cfg', and return the number of configuration
1423 * elements in 'cfgn'.
1424 */
1425static int image_create_config_parse(FILE *fcfg)
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +05301426{
Stefan Roese4acd2d22014-10-22 12:13:23 +02001427 int ret;
1428 int cfgi = 0;
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +05301429
Stefan Roese4acd2d22014-10-22 12:13:23 +02001430 /* Parse the configuration file */
1431 while (!feof(fcfg)) {
1432 char *line;
1433 char buf[256];
1434
1435 /* Read the current line */
1436 memset(buf, 0, sizeof(buf));
1437 line = fgets(buf, sizeof(buf), fcfg);
1438 if (!line)
1439 break;
1440
1441 /* Ignore useless lines */
1442 if (line[0] == '\n' || line[0] == '#')
1443 continue;
1444
1445 /* Strip final newline */
1446 if (line[strlen(line) - 1] == '\n')
1447 line[strlen(line) - 1] = 0;
1448
1449 /* Parse the current line */
1450 ret = image_create_config_parse_oneline(line,
1451 &image_cfg[cfgi]);
1452 if (ret)
1453 return ret;
1454
1455 cfgi++;
1456
1457 if (cfgi >= IMAGE_CFG_ELEMENT_MAX) {
1458 fprintf(stderr,
1459 "Too many configuration elements in .cfg file\n");
1460 return -1;
1461 }
1462 }
1463
1464 cfgn = cfgi;
1465 return 0;
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +05301466}
1467
Stefan Roese4acd2d22014-10-22 12:13:23 +02001468static int image_get_version(void)
1469{
1470 struct image_cfg_element *e;
1471
1472 e = image_find_option(IMAGE_CFG_VERSION);
1473 if (!e)
1474 return -1;
1475
1476 return e->version;
1477}
1478
1479static int image_version_file(const char *input)
1480{
1481 FILE *fcfg;
1482 int version;
1483 int ret;
1484
1485 fcfg = fopen(input, "r");
1486 if (!fcfg) {
1487 fprintf(stderr, "Could not open input file %s\n", input);
1488 return -1;
1489 }
1490
1491 image_cfg = malloc(IMAGE_CFG_ELEMENT_MAX *
1492 sizeof(struct image_cfg_element));
1493 if (!image_cfg) {
1494 fprintf(stderr, "Cannot allocate memory\n");
1495 fclose(fcfg);
1496 return -1;
1497 }
1498
1499 memset(image_cfg, 0,
1500 IMAGE_CFG_ELEMENT_MAX * sizeof(struct image_cfg_element));
1501 rewind(fcfg);
1502
1503 ret = image_create_config_parse(fcfg);
1504 fclose(fcfg);
1505 if (ret) {
1506 free(image_cfg);
1507 return -1;
1508 }
1509
1510 version = image_get_version();
1511 /* Fallback to version 0 is no version is provided in the cfg file */
1512 if (version == -1)
1513 version = 0;
1514
1515 free(image_cfg);
1516
1517 return version;
1518}
1519
1520static void kwbimage_set_header(void *ptr, struct stat *sbuf, int ifd,
1521 struct image_tool_params *params)
1522{
1523 FILE *fcfg;
1524 void *image = NULL;
1525 int version;
Łukasz Majewski93e93712014-11-21 09:22:43 +01001526 size_t headersz = 0;
Stefan Roese4acd2d22014-10-22 12:13:23 +02001527 uint32_t checksum;
1528 int ret;
1529 int size;
1530
1531 fcfg = fopen(params->imagename, "r");
1532 if (!fcfg) {
1533 fprintf(stderr, "Could not open input file %s\n",
1534 params->imagename);
1535 exit(EXIT_FAILURE);
1536 }
1537
1538 image_cfg = malloc(IMAGE_CFG_ELEMENT_MAX *
1539 sizeof(struct image_cfg_element));
1540 if (!image_cfg) {
1541 fprintf(stderr, "Cannot allocate memory\n");
1542 fclose(fcfg);
1543 exit(EXIT_FAILURE);
1544 }
1545
1546 memset(image_cfg, 0,
1547 IMAGE_CFG_ELEMENT_MAX * sizeof(struct image_cfg_element));
1548 rewind(fcfg);
1549
1550 ret = image_create_config_parse(fcfg);
1551 fclose(fcfg);
1552 if (ret) {
1553 free(image_cfg);
1554 exit(EXIT_FAILURE);
1555 }
1556
Stefan Roese9b163d82015-09-01 13:46:35 +02001557 /* The MVEBU BootROM does not allow non word aligned payloads */
1558 sbuf->st_size = ALIGN_SUP(sbuf->st_size, 4);
1559
Stefan Roese4acd2d22014-10-22 12:13:23 +02001560 version = image_get_version();
Stefan Roese934a5292014-10-28 11:32:24 +01001561 switch (version) {
1562 /*
1563 * Fallback to version 0 if no version is provided in the
1564 * cfg file
1565 */
1566 case -1:
1567 case 0:
Stefan Roese4acd2d22014-10-22 12:13:23 +02001568 image = image_create_v0(&headersz, params, sbuf->st_size);
Stefan Roese934a5292014-10-28 11:32:24 +01001569 break;
1570
1571 case 1:
Mario Sixa1b6b0a2017-01-11 16:01:00 +01001572 image = image_create_v1(&headersz, params, ptr, sbuf->st_size);
Stefan Roese934a5292014-10-28 11:32:24 +01001573 break;
1574
1575 default:
1576 fprintf(stderr, "Unsupported version %d\n", version);
1577 free(image_cfg);
1578 exit(EXIT_FAILURE);
1579 }
Stefan Roese4acd2d22014-10-22 12:13:23 +02001580
1581 if (!image) {
1582 fprintf(stderr, "Could not create image\n");
1583 free(image_cfg);
1584 exit(EXIT_FAILURE);
1585 }
1586
1587 free(image_cfg);
1588
1589 /* Build and add image checksum header */
Reinhard Pfaua8840dc2015-11-29 15:48:25 +01001590 checksum =
1591 cpu_to_le32(image_checksum32((uint32_t *)ptr, sbuf->st_size));
Stefan Roese4acd2d22014-10-22 12:13:23 +02001592 size = write(ifd, &checksum, sizeof(uint32_t));
1593 if (size != sizeof(uint32_t)) {
1594 fprintf(stderr, "Error:%s - Checksum write %d bytes %s\n",
1595 params->cmdname, size, params->imagefile);
1596 exit(EXIT_FAILURE);
1597 }
1598
1599 sbuf->st_size += sizeof(uint32_t);
1600
1601 /* Finally copy the header into the image area */
1602 memcpy(ptr, image, headersz);
1603
1604 free(image);
1605}
1606
1607static void kwbimage_print_header(const void *ptr)
1608{
1609 struct main_hdr_v0 *mhdr = (struct main_hdr_v0 *)ptr;
1610
1611 printf("Image Type: MVEBU Boot from %s Image\n",
1612 image_boot_mode_name(mhdr->blockid));
Stefan Roese4acd2d22014-10-22 12:13:23 +02001613 printf("Image version:%d\n", image_version((void *)ptr));
Gerald Kerma26f195c2014-10-31 01:03:27 +01001614 printf("Data Size: ");
Stefan Roese4acd2d22014-10-22 12:13:23 +02001615 genimg_print_size(mhdr->blocksize - sizeof(uint32_t));
1616 printf("Load Address: %08x\n", mhdr->destaddr);
1617 printf("Entry Point: %08x\n", mhdr->execaddr);
1618}
1619
1620static int kwbimage_check_image_types(uint8_t type)
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +05301621{
1622 if (type == IH_TYPE_KWBIMAGE)
1623 return EXIT_SUCCESS;
Mario Six94490a42017-01-11 16:00:54 +01001624
1625 return EXIT_FAILURE;
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +05301626}
1627
Stefan Roese4acd2d22014-10-22 12:13:23 +02001628static int kwbimage_verify_header(unsigned char *ptr, int image_size,
1629 struct image_tool_params *params)
1630{
1631 struct main_hdr_v0 *main_hdr;
Stefan Roese4acd2d22014-10-22 12:13:23 +02001632 uint8_t checksum;
1633
Mario Six885fba12017-01-11 16:00:55 +01001634 main_hdr = (struct main_hdr_v0 *)ptr;
Stefan Roese4acd2d22014-10-22 12:13:23 +02001635 checksum = image_checksum8(ptr,
Gerald Kerma26f195c2014-10-31 01:03:27 +01001636 sizeof(struct main_hdr_v0)
1637 - sizeof(uint8_t));
Stefan Roese4acd2d22014-10-22 12:13:23 +02001638 if (checksum != main_hdr->checksum)
1639 return -FDT_ERR_BADSTRUCTURE;
1640
1641 /* Only version 0 extended header has checksum */
1642 if (image_version((void *)ptr) == 0) {
Mario Sixe89016c2017-01-11 16:00:56 +01001643 struct ext_hdr_v0 *ext_hdr;
1644
Mario Six885fba12017-01-11 16:00:55 +01001645 ext_hdr = (struct ext_hdr_v0 *)
1646 (ptr + sizeof(struct main_hdr_v0));
Stefan Roese4acd2d22014-10-22 12:13:23 +02001647 checksum = image_checksum8(ext_hdr,
Gerald Kerma26f195c2014-10-31 01:03:27 +01001648 sizeof(struct ext_hdr_v0)
1649 - sizeof(uint8_t));
Stefan Roese4acd2d22014-10-22 12:13:23 +02001650 if (checksum != ext_hdr->checksum)
1651 return -FDT_ERR_BADSTRUCTURE;
1652 }
1653
1654 return 0;
1655}
1656
1657static int kwbimage_generate(struct image_tool_params *params,
1658 struct image_type_params *tparams)
1659{
1660 int alloc_len;
1661 void *hdr;
1662 int version = 0;
1663
1664 version = image_version_file(params->imagename);
1665 if (version == 0) {
1666 alloc_len = sizeof(struct main_hdr_v0) +
1667 sizeof(struct ext_hdr_v0);
1668 } else {
Mario Sixe93cf532017-01-11 16:00:57 +01001669 alloc_len = image_headersz_v1(NULL);
Stefan Roese4acd2d22014-10-22 12:13:23 +02001670 }
1671
1672 hdr = malloc(alloc_len);
1673 if (!hdr) {
1674 fprintf(stderr, "%s: malloc return failure: %s\n",
1675 params->cmdname, strerror(errno));
1676 exit(EXIT_FAILURE);
1677 }
1678
1679 memset(hdr, 0, alloc_len);
1680 tparams->header_size = alloc_len;
1681 tparams->hdr = hdr;
1682
Stefan Roese77720852015-11-24 09:14:59 +01001683 /*
1684 * The resulting image needs to be 4-byte aligned. At least
1685 * the Marvell hdrparser tool complains if its unaligned.
1686 * By returning 1 here in this function, called via
1687 * tparams->vrec_header() in mkimage.c, mkimage will
1688 * automatically pad the the resulting image to a 4-byte
1689 * size if necessary.
1690 */
1691 return 1;
Stefan Roese4acd2d22014-10-22 12:13:23 +02001692}
1693
1694/*
1695 * Report Error if xflag is set in addition to default
1696 */
1697static int kwbimage_check_params(struct image_tool_params *params)
1698{
1699 if (!strlen(params->imagename)) {
Mario Six94490a42017-01-11 16:00:54 +01001700 char *msg = "Configuration file for kwbimage creation omitted";
1701
1702 fprintf(stderr, "Error:%s - %s\n", params->cmdname, msg);
Stefan Roese4acd2d22014-10-22 12:13:23 +02001703 return CFG_INVALID;
1704 }
1705
1706 return (params->dflag && (params->fflag || params->lflag)) ||
1707 (params->fflag && (params->dflag || params->lflag)) ||
1708 (params->lflag && (params->dflag || params->fflag)) ||
1709 (params->xflag) || !(strlen(params->imagename));
1710}
1711
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +05301712/*
1713 * kwbimage type parameters definition
1714 */
Guilherme Maciel Ferreiraa93648d2015-01-15 02:48:07 -02001715U_BOOT_IMAGE_TYPE(
1716 kwbimage,
1717 "Marvell MVEBU Boot Image support",
1718 0,
1719 NULL,
1720 kwbimage_check_params,
1721 kwbimage_verify_header,
1722 kwbimage_print_header,
1723 kwbimage_set_header,
1724 NULL,
1725 kwbimage_check_image_types,
1726 NULL,
1727 kwbimage_generate
1728);