blob: 3ca3b3b4a62f40e60d6d93fa70b2578803fa7ce2 [file] [log] [blame]
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +05301/*
Stefan Roese4acd2d22014-10-22 12:13:23 +02002 * Image manipulator for Marvell SoCs
Mario Sixa1b6b0a2017-01-11 16:01:00 +01003 * supports Kirkwood, Dove, Armada 370, Armada XP, and Armada 38x
Stefan Roese4acd2d22014-10-22 12:13:23 +02004 *
5 * (C) Copyright 2013 Thomas Petazzoni
6 * <thomas.petazzoni@free-electrons.com>
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +05307 *
Wolfgang Denk1a459662013-07-08 09:37:19 +02008 * SPDX-License-Identifier: GPL-2.0+
Stefan Roese4acd2d22014-10-22 12:13:23 +02009 *
Mario Sixa1b6b0a2017-01-11 16:01:00 +010010 * Not implemented: support for the register headers in v1 images
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +053011 */
12
Guilherme Maciel Ferreiraf86ed6a2013-12-01 12:43:10 -070013#include "imagetool.h"
Andreas Bießmanne5f1a582014-10-24 23:39:11 +020014#include <limits.h>
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +053015#include <image.h>
Mario Sixa1b6b0a2017-01-11 16:01:00 +010016#include <stdarg.h>
Stefan Roese4acd2d22014-10-22 12:13:23 +020017#include <stdint.h>
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +053018#include "kwbimage.h"
19
Mario Sixa1b6b0a2017-01-11 16:01:00 +010020#ifdef CONFIG_KWB_SECURE
Jelle van der Waae15843b2017-05-08 21:31:20 +020021#include <openssl/bn.h>
Mario Sixa1b6b0a2017-01-11 16:01:00 +010022#include <openssl/rsa.h>
23#include <openssl/pem.h>
24#include <openssl/err.h>
25#include <openssl/evp.h>
Jelle van der Waae15843b2017-05-08 21:31:20 +020026
Jonathan Graya2d5efd2018-02-21 02:59:01 +110027#if OPENSSL_VERSION_NUMBER < 0x10100000L || \
28 (defined(LIBRESSL_VERSION_NUMBER) && LIBRESSL_VERSION_NUMBER < 0x2070000fL)
Jelle van der Waae15843b2017-05-08 21:31:20 +020029static void RSA_get0_key(const RSA *r,
30 const BIGNUM **n, const BIGNUM **e, const BIGNUM **d)
31{
32 if (n != NULL)
33 *n = r->n;
34 if (e != NULL)
35 *e = r->e;
36 if (d != NULL)
37 *d = r->d;
38}
39
Jonathan Graya2d5efd2018-02-21 02:59:01 +110040#elif !defined(LIBRESSL_VERSION_NUMBER)
Jelle van der Waae15843b2017-05-08 21:31:20 +020041void EVP_MD_CTX_cleanup(EVP_MD_CTX *ctx)
42{
43 EVP_MD_CTX_reset(ctx);
44}
45#endif
Mario Sixa1b6b0a2017-01-11 16:01:00 +010046#endif
47
Stefan Roese4acd2d22014-10-22 12:13:23 +020048static struct image_cfg_element *image_cfg;
49static int cfgn;
Mario Sixa1b6b0a2017-01-11 16:01:00 +010050#ifdef CONFIG_KWB_SECURE
51static int verbose_mode;
52#endif
Stefan Roese4acd2d22014-10-22 12:13:23 +020053
54struct boot_mode {
55 unsigned int id;
56 const char *name;
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +053057};
58
Mario Sixa1b6b0a2017-01-11 16:01:00 +010059/*
60 * SHA2-256 hash
61 */
62struct hash_v1 {
63 uint8_t hash[32];
64};
65
Stefan Roese4acd2d22014-10-22 12:13:23 +020066struct boot_mode boot_modes[] = {
67 { 0x4D, "i2c" },
68 { 0x5A, "spi" },
69 { 0x8B, "nand" },
70 { 0x78, "sata" },
71 { 0x9C, "pex" },
72 { 0x69, "uart" },
Stefan Roese1bbe63c2015-07-20 11:20:37 +020073 { 0xAE, "sdio" },
Stefan Roese4acd2d22014-10-22 12:13:23 +020074 {},
75};
76
77struct nand_ecc_mode {
78 unsigned int id;
79 const char *name;
80};
81
82struct nand_ecc_mode nand_ecc_modes[] = {
83 { 0x00, "default" },
84 { 0x01, "hamming" },
85 { 0x02, "rs" },
86 { 0x03, "disabled" },
87 {},
88};
89
90/* Used to identify an undefined execution or destination address */
91#define ADDR_INVALID ((uint32_t)-1)
92
93#define BINARY_MAX_ARGS 8
94
95/* In-memory representation of a line of the configuration file */
Mario Six4991b4f2017-01-11 16:00:59 +010096
97enum image_cfg_type {
98 IMAGE_CFG_VERSION = 0x1,
99 IMAGE_CFG_BOOT_FROM,
100 IMAGE_CFG_DEST_ADDR,
101 IMAGE_CFG_EXEC_ADDR,
102 IMAGE_CFG_NAND_BLKSZ,
103 IMAGE_CFG_NAND_BADBLK_LOCATION,
104 IMAGE_CFG_NAND_ECC_MODE,
105 IMAGE_CFG_NAND_PAGESZ,
106 IMAGE_CFG_BINARY,
107 IMAGE_CFG_PAYLOAD,
108 IMAGE_CFG_DATA,
109 IMAGE_CFG_BAUDRATE,
110 IMAGE_CFG_DEBUG,
Mario Sixa1b6b0a2017-01-11 16:01:00 +0100111 IMAGE_CFG_KAK,
112 IMAGE_CFG_CSK,
113 IMAGE_CFG_CSK_INDEX,
114 IMAGE_CFG_JTAG_DELAY,
115 IMAGE_CFG_BOX_ID,
116 IMAGE_CFG_FLASH_ID,
117 IMAGE_CFG_SEC_COMMON_IMG,
118 IMAGE_CFG_SEC_SPECIALIZED_IMG,
119 IMAGE_CFG_SEC_BOOT_DEV,
120 IMAGE_CFG_SEC_FUSE_DUMP,
Mario Six4991b4f2017-01-11 16:00:59 +0100121
122 IMAGE_CFG_COUNT
123} type;
124
125static const char * const id_strs[] = {
126 [IMAGE_CFG_VERSION] = "VERSION",
127 [IMAGE_CFG_BOOT_FROM] = "BOOT_FROM",
128 [IMAGE_CFG_DEST_ADDR] = "DEST_ADDR",
129 [IMAGE_CFG_EXEC_ADDR] = "EXEC_ADDR",
130 [IMAGE_CFG_NAND_BLKSZ] = "NAND_BLKSZ",
131 [IMAGE_CFG_NAND_BADBLK_LOCATION] = "NAND_BADBLK_LOCATION",
132 [IMAGE_CFG_NAND_ECC_MODE] = "NAND_ECC_MODE",
133 [IMAGE_CFG_NAND_PAGESZ] = "NAND_PAGE_SIZE",
134 [IMAGE_CFG_BINARY] = "BINARY",
135 [IMAGE_CFG_PAYLOAD] = "PAYLOAD",
136 [IMAGE_CFG_DATA] = "DATA",
137 [IMAGE_CFG_BAUDRATE] = "BAUDRATE",
138 [IMAGE_CFG_DEBUG] = "DEBUG",
Mario Sixa1b6b0a2017-01-11 16:01:00 +0100139 [IMAGE_CFG_KAK] = "KAK",
140 [IMAGE_CFG_CSK] = "CSK",
141 [IMAGE_CFG_CSK_INDEX] = "CSK_INDEX",
142 [IMAGE_CFG_JTAG_DELAY] = "JTAG_DELAY",
143 [IMAGE_CFG_BOX_ID] = "BOX_ID",
144 [IMAGE_CFG_FLASH_ID] = "FLASH_ID",
145 [IMAGE_CFG_SEC_COMMON_IMG] = "SEC_COMMON_IMG",
146 [IMAGE_CFG_SEC_SPECIALIZED_IMG] = "SEC_SPECIALIZED_IMG",
147 [IMAGE_CFG_SEC_BOOT_DEV] = "SEC_BOOT_DEV",
148 [IMAGE_CFG_SEC_FUSE_DUMP] = "SEC_FUSE_DUMP"
Mario Six4991b4f2017-01-11 16:00:59 +0100149};
150
Stefan Roese4acd2d22014-10-22 12:13:23 +0200151struct image_cfg_element {
Mario Six4991b4f2017-01-11 16:00:59 +0100152 enum image_cfg_type type;
Stefan Roese4acd2d22014-10-22 12:13:23 +0200153 union {
154 unsigned int version;
155 unsigned int bootfrom;
156 struct {
157 const char *file;
158 unsigned int args[BINARY_MAX_ARGS];
159 unsigned int nargs;
160 } binary;
161 const char *payload;
162 unsigned int dstaddr;
163 unsigned int execaddr;
164 unsigned int nandblksz;
165 unsigned int nandbadblklocation;
166 unsigned int nandeccmode;
167 unsigned int nandpagesz;
168 struct ext_hdr_v0_reg regdata;
Chris Packham4bdb5472016-11-09 22:07:45 +1300169 unsigned int baudrate;
Chris Packham2611c052016-11-09 22:21:45 +1300170 unsigned int debug;
Mario Sixa1b6b0a2017-01-11 16:01:00 +0100171 const char *key_name;
172 int csk_idx;
173 uint8_t jtag_delay;
174 uint32_t boxid;
175 uint32_t flashid;
176 bool sec_specialized_img;
177 unsigned int sec_boot_dev;
178 const char *name;
Stefan Roese4acd2d22014-10-22 12:13:23 +0200179 };
180};
181
182#define IMAGE_CFG_ELEMENT_MAX 256
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530183
184/*
Stefan Roese4acd2d22014-10-22 12:13:23 +0200185 * Utility functions to manipulate boot mode and ecc modes (convert
186 * them back and forth between description strings and the
187 * corresponding numerical identifiers).
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530188 */
Stefan Roese4acd2d22014-10-22 12:13:23 +0200189
190static const char *image_boot_mode_name(unsigned int id)
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530191{
Stefan Roese4acd2d22014-10-22 12:13:23 +0200192 int i;
Mario Six94490a42017-01-11 16:00:54 +0100193
Stefan Roese4acd2d22014-10-22 12:13:23 +0200194 for (i = 0; boot_modes[i].name; i++)
195 if (boot_modes[i].id == id)
196 return boot_modes[i].name;
197 return NULL;
198}
199
200int image_boot_mode_id(const char *boot_mode_name)
201{
202 int i;
Mario Six94490a42017-01-11 16:00:54 +0100203
Stefan Roese4acd2d22014-10-22 12:13:23 +0200204 for (i = 0; boot_modes[i].name; i++)
205 if (!strcmp(boot_modes[i].name, boot_mode_name))
206 return boot_modes[i].id;
207
208 return -1;
209}
210
211int image_nand_ecc_mode_id(const char *nand_ecc_mode_name)
212{
213 int i;
Mario Six94490a42017-01-11 16:00:54 +0100214
Stefan Roese4acd2d22014-10-22 12:13:23 +0200215 for (i = 0; nand_ecc_modes[i].name; i++)
216 if (!strcmp(nand_ecc_modes[i].name, nand_ecc_mode_name))
217 return nand_ecc_modes[i].id;
218 return -1;
219}
220
221static struct image_cfg_element *
222image_find_option(unsigned int optiontype)
223{
224 int i;
225
226 for (i = 0; i < cfgn; i++) {
227 if (image_cfg[i].type == optiontype)
228 return &image_cfg[i];
229 }
230
231 return NULL;
232}
233
234static unsigned int
235image_count_options(unsigned int optiontype)
236{
237 int i;
238 unsigned int count = 0;
239
240 for (i = 0; i < cfgn; i++)
241 if (image_cfg[i].type == optiontype)
242 count++;
243
244 return count;
245}
246
Mario Sixa1b6b0a2017-01-11 16:01:00 +0100247#if defined(CONFIG_KWB_SECURE)
248
249static int image_get_csk_index(void)
250{
251 struct image_cfg_element *e;
252
253 e = image_find_option(IMAGE_CFG_CSK_INDEX);
254 if (!e)
255 return -1;
256
257 return e->csk_idx;
258}
259
260static bool image_get_spezialized_img(void)
261{
262 struct image_cfg_element *e;
263
264 e = image_find_option(IMAGE_CFG_SEC_SPECIALIZED_IMG);
265 if (!e)
266 return false;
267
268 return e->sec_specialized_img;
269}
270
271#endif
272
Stefan Roese4acd2d22014-10-22 12:13:23 +0200273/*
274 * Compute a 8-bit checksum of a memory area. This algorithm follows
275 * the requirements of the Marvell SoC BootROM specifications.
276 */
277static uint8_t image_checksum8(void *start, uint32_t len)
278{
279 uint8_t csum = 0;
280 uint8_t *p = start;
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530281
282 /* check len and return zero checksum if invalid */
283 if (!len)
284 return 0;
285
286 do {
Stefan Roese4acd2d22014-10-22 12:13:23 +0200287 csum += *p;
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530288 p++;
289 } while (--len);
Stefan Roese4acd2d22014-10-22 12:13:23 +0200290
291 return csum;
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530292}
293
Baruch Siachdb7cd4ed2017-07-04 20:23:40 +0300294size_t kwbimage_header_size(unsigned char *ptr)
295{
296 if (image_version((void *)ptr) == 0)
297 return sizeof(struct main_hdr_v0);
298 else
299 return KWBHEADER_V1_SIZE((struct main_hdr_v1 *)ptr);
300}
301
302/*
303 * Verify checksum over a complete header that includes the checksum field.
304 * Return 1 when OK, otherwise 0.
305 */
306static int main_hdr_checksum_ok(void *hdr)
307{
308 /* Offsets of checksum in v0 and v1 headers are the same */
309 struct main_hdr_v0 *main_hdr = (struct main_hdr_v0 *)hdr;
310 uint8_t checksum;
311
312 checksum = image_checksum8(hdr, kwbimage_header_size(hdr));
313 /* Calculated checksum includes the header checksum field. Compensate
314 * for that.
315 */
316 checksum -= main_hdr->checksum;
317
318 return checksum == main_hdr->checksum;
319}
320
Stefan Roese4acd2d22014-10-22 12:13:23 +0200321static uint32_t image_checksum32(void *start, uint32_t len)
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530322{
Stefan Roese4acd2d22014-10-22 12:13:23 +0200323 uint32_t csum = 0;
324 uint32_t *p = start;
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530325
326 /* check len and return zero checksum if invalid */
327 if (!len)
328 return 0;
329
330 if (len % sizeof(uint32_t)) {
Stefan Roese4acd2d22014-10-22 12:13:23 +0200331 fprintf(stderr, "Length %d is not in multiple of %zu\n",
332 len, sizeof(uint32_t));
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530333 return 0;
334 }
335
336 do {
Stefan Roese4acd2d22014-10-22 12:13:23 +0200337 csum += *p;
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530338 p++;
339 len -= sizeof(uint32_t);
340 } while (len > 0);
Stefan Roese4acd2d22014-10-22 12:13:23 +0200341
342 return csum;
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530343}
344
Chris Packham4bdb5472016-11-09 22:07:45 +1300345static uint8_t baudrate_to_option(unsigned int baudrate)
346{
347 switch (baudrate) {
348 case 2400:
349 return MAIN_HDR_V1_OPT_BAUD_2400;
350 case 4800:
351 return MAIN_HDR_V1_OPT_BAUD_4800;
352 case 9600:
353 return MAIN_HDR_V1_OPT_BAUD_9600;
354 case 19200:
355 return MAIN_HDR_V1_OPT_BAUD_19200;
356 case 38400:
357 return MAIN_HDR_V1_OPT_BAUD_38400;
358 case 57600:
359 return MAIN_HDR_V1_OPT_BAUD_57600;
360 case 115200:
361 return MAIN_HDR_V1_OPT_BAUD_115200;
362 default:
363 return MAIN_HDR_V1_OPT_BAUD_DEFAULT;
364 }
365}
366
Mario Sixa1b6b0a2017-01-11 16:01:00 +0100367#if defined(CONFIG_KWB_SECURE)
368static void kwb_msg(const char *fmt, ...)
369{
370 if (verbose_mode) {
371 va_list ap;
372
373 va_start(ap, fmt);
374 vfprintf(stdout, fmt, ap);
375 va_end(ap);
376 }
377}
378
379static int openssl_err(const char *msg)
380{
381 unsigned long ssl_err = ERR_get_error();
382
383 fprintf(stderr, "%s", msg);
384 fprintf(stderr, ": %s\n",
385 ERR_error_string(ssl_err, 0));
386
387 return -1;
388}
389
390static int kwb_load_rsa_key(const char *keydir, const char *name, RSA **p_rsa)
391{
392 char path[PATH_MAX];
393 RSA *rsa;
394 FILE *f;
395
396 if (!keydir)
397 keydir = ".";
398
399 snprintf(path, sizeof(path), "%s/%s.key", keydir, name);
400 f = fopen(path, "r");
401 if (!f) {
402 fprintf(stderr, "Couldn't open RSA private key: '%s': %s\n",
403 path, strerror(errno));
404 return -ENOENT;
405 }
406
407 rsa = PEM_read_RSAPrivateKey(f, 0, NULL, "");
408 if (!rsa) {
409 openssl_err("Failure reading private key");
410 fclose(f);
411 return -EPROTO;
412 }
413 fclose(f);
414 *p_rsa = rsa;
415
416 return 0;
417}
418
419static int kwb_load_cfg_key(struct image_tool_params *params,
420 unsigned int cfg_option, const char *key_name,
421 RSA **p_key)
422{
423 struct image_cfg_element *e_key;
424 RSA *key;
425 int res;
426
427 *p_key = NULL;
428
429 e_key = image_find_option(cfg_option);
430 if (!e_key) {
431 fprintf(stderr, "%s not configured\n", key_name);
432 return -ENOENT;
433 }
434
435 res = kwb_load_rsa_key(params->keydir, e_key->key_name, &key);
436 if (res < 0) {
437 fprintf(stderr, "Failed to load %s\n", key_name);
438 return -ENOENT;
439 }
440
441 *p_key = key;
442
443 return 0;
444}
445
446static int kwb_load_kak(struct image_tool_params *params, RSA **p_kak)
447{
448 return kwb_load_cfg_key(params, IMAGE_CFG_KAK, "KAK", p_kak);
449}
450
451static int kwb_load_csk(struct image_tool_params *params, RSA **p_csk)
452{
453 return kwb_load_cfg_key(params, IMAGE_CFG_CSK, "CSK", p_csk);
454}
455
456static int kwb_compute_pubkey_hash(struct pubkey_der_v1 *pk,
457 struct hash_v1 *hash)
458{
459 EVP_MD_CTX *ctx;
460 unsigned int key_size;
461 unsigned int hash_size;
462 int ret = 0;
463
464 if (!pk || !hash || pk->key[0] != 0x30 || pk->key[1] != 0x82)
465 return -EINVAL;
466
467 key_size = (pk->key[2] << 8) + pk->key[3] + 4;
468
469 ctx = EVP_MD_CTX_create();
470 if (!ctx)
471 return openssl_err("EVP context creation failed");
472
473 EVP_MD_CTX_init(ctx);
474 if (!EVP_DigestInit(ctx, EVP_sha256())) {
475 ret = openssl_err("Digest setup failed");
476 goto hash_err_ctx;
477 }
478
479 if (!EVP_DigestUpdate(ctx, pk->key, key_size)) {
480 ret = openssl_err("Hashing data failed");
481 goto hash_err_ctx;
482 }
483
484 if (!EVP_DigestFinal(ctx, hash->hash, &hash_size)) {
485 ret = openssl_err("Could not obtain hash");
486 goto hash_err_ctx;
487 }
488
489 EVP_MD_CTX_cleanup(ctx);
490
491hash_err_ctx:
492 EVP_MD_CTX_destroy(ctx);
493 return ret;
494}
495
496static int kwb_import_pubkey(RSA **key, struct pubkey_der_v1 *src, char *keyname)
497{
498 RSA *rsa;
499 const unsigned char *ptr;
500
501 if (!key || !src)
502 goto fail;
503
504 ptr = src->key;
505 rsa = d2i_RSAPublicKey(key, &ptr, sizeof(src->key));
506 if (!rsa) {
507 openssl_err("error decoding public key");
508 goto fail;
509 }
510
511 return 0;
512fail:
513 fprintf(stderr, "Failed to decode %s pubkey\n", keyname);
514 return -EINVAL;
515}
516
517static int kwb_export_pubkey(RSA *key, struct pubkey_der_v1 *dst, FILE *hashf,
518 char *keyname)
519{
520 int size_exp, size_mod, size_seq;
Jelle van der Waae15843b2017-05-08 21:31:20 +0200521 const BIGNUM *key_e, *key_n;
Mario Sixa1b6b0a2017-01-11 16:01:00 +0100522 uint8_t *cur;
523 char *errmsg = "Failed to encode %s\n";
524
Jelle van der Waae15843b2017-05-08 21:31:20 +0200525 RSA_get0_key(key, NULL, &key_e, NULL);
526 RSA_get0_key(key, &key_n, NULL, NULL);
527
528 if (!key || !key_e || !key_n || !dst) {
Mario Sixa1b6b0a2017-01-11 16:01:00 +0100529 fprintf(stderr, "export pk failed: (%p, %p, %p, %p)",
Jelle van der Waae15843b2017-05-08 21:31:20 +0200530 key, key_e, key_n, dst);
Mario Sixa1b6b0a2017-01-11 16:01:00 +0100531 fprintf(stderr, errmsg, keyname);
532 return -EINVAL;
533 }
534
535 /*
536 * According to the specs, the key should be PKCS#1 DER encoded.
537 * But unfortunately the really required encoding seems to be different;
538 * it violates DER...! (But it still conformes to BER.)
539 * (Length always in long form w/ 2 byte length code; no leading zero
540 * when MSB of first byte is set...)
541 * So we cannot use the encoding func provided by OpenSSL and have to
542 * do the encoding manually.
543 */
544
Jelle van der Waae15843b2017-05-08 21:31:20 +0200545 size_exp = BN_num_bytes(key_e);
546 size_mod = BN_num_bytes(key_n);
Mario Sixa1b6b0a2017-01-11 16:01:00 +0100547 size_seq = 4 + size_mod + 4 + size_exp;
548
549 if (size_mod > 256) {
550 fprintf(stderr, "export pk failed: wrong mod size: %d\n",
551 size_mod);
552 fprintf(stderr, errmsg, keyname);
553 return -EINVAL;
554 }
555
556 if (4 + size_seq > sizeof(dst->key)) {
557 fprintf(stderr, "export pk failed: seq too large (%d, %lu)\n",
558 4 + size_seq, sizeof(dst->key));
559 fprintf(stderr, errmsg, keyname);
560 return -ENOBUFS;
561 }
562
563 cur = dst->key;
564
565 /* PKCS#1 (RFC3447) RSAPublicKey structure */
566 *cur++ = 0x30; /* SEQUENCE */
567 *cur++ = 0x82;
568 *cur++ = (size_seq >> 8) & 0xFF;
569 *cur++ = size_seq & 0xFF;
570 /* Modulus */
571 *cur++ = 0x02; /* INTEGER */
572 *cur++ = 0x82;
573 *cur++ = (size_mod >> 8) & 0xFF;
574 *cur++ = size_mod & 0xFF;
Jelle van der Waae15843b2017-05-08 21:31:20 +0200575 BN_bn2bin(key_n, cur);
Mario Sixa1b6b0a2017-01-11 16:01:00 +0100576 cur += size_mod;
577 /* Exponent */
578 *cur++ = 0x02; /* INTEGER */
579 *cur++ = 0x82;
580 *cur++ = (size_exp >> 8) & 0xFF;
581 *cur++ = size_exp & 0xFF;
Jelle van der Waae15843b2017-05-08 21:31:20 +0200582 BN_bn2bin(key_e, cur);
Mario Sixa1b6b0a2017-01-11 16:01:00 +0100583
584 if (hashf) {
585 struct hash_v1 pk_hash;
586 int i;
587 int ret = 0;
588
589 ret = kwb_compute_pubkey_hash(dst, &pk_hash);
590 if (ret < 0) {
591 fprintf(stderr, errmsg, keyname);
592 return ret;
593 }
594
595 fprintf(hashf, "SHA256 = ");
596 for (i = 0 ; i < sizeof(pk_hash.hash); ++i)
597 fprintf(hashf, "%02X", pk_hash.hash[i]);
598 fprintf(hashf, "\n");
599 }
600
601 return 0;
602}
603
604int kwb_sign(RSA *key, void *data, int datasz, struct sig_v1 *sig, char *signame)
605{
606 EVP_PKEY *evp_key;
607 EVP_MD_CTX *ctx;
608 unsigned int sig_size;
609 int size;
610 int ret = 0;
611
612 evp_key = EVP_PKEY_new();
613 if (!evp_key)
614 return openssl_err("EVP_PKEY object creation failed");
615
616 if (!EVP_PKEY_set1_RSA(evp_key, key)) {
617 ret = openssl_err("EVP key setup failed");
618 goto err_key;
619 }
620
621 size = EVP_PKEY_size(evp_key);
622 if (size > sizeof(sig->sig)) {
623 fprintf(stderr, "Buffer to small for signature (%d bytes)\n",
624 size);
625 ret = -ENOBUFS;
626 goto err_key;
627 }
628
629 ctx = EVP_MD_CTX_create();
630 if (!ctx) {
631 ret = openssl_err("EVP context creation failed");
632 goto err_key;
633 }
634 EVP_MD_CTX_init(ctx);
635 if (!EVP_SignInit(ctx, EVP_sha256())) {
636 ret = openssl_err("Signer setup failed");
637 goto err_ctx;
638 }
639
640 if (!EVP_SignUpdate(ctx, data, datasz)) {
641 ret = openssl_err("Signing data failed");
642 goto err_ctx;
643 }
644
645 if (!EVP_SignFinal(ctx, sig->sig, &sig_size, evp_key)) {
646 ret = openssl_err("Could not obtain signature");
647 goto err_ctx;
648 }
649
650 EVP_MD_CTX_cleanup(ctx);
651 EVP_MD_CTX_destroy(ctx);
652 EVP_PKEY_free(evp_key);
653
654 return 0;
655
656err_ctx:
657 EVP_MD_CTX_destroy(ctx);
658err_key:
659 EVP_PKEY_free(evp_key);
660 fprintf(stderr, "Failed to create %s signature\n", signame);
661 return ret;
662}
663
664int kwb_verify(RSA *key, void *data, int datasz, struct sig_v1 *sig,
665 char *signame)
666{
667 EVP_PKEY *evp_key;
668 EVP_MD_CTX *ctx;
669 int size;
670 int ret = 0;
671
672 evp_key = EVP_PKEY_new();
673 if (!evp_key)
674 return openssl_err("EVP_PKEY object creation failed");
675
676 if (!EVP_PKEY_set1_RSA(evp_key, key)) {
677 ret = openssl_err("EVP key setup failed");
678 goto err_key;
679 }
680
681 size = EVP_PKEY_size(evp_key);
682 if (size > sizeof(sig->sig)) {
683 fprintf(stderr, "Invalid signature size (%d bytes)\n",
684 size);
685 ret = -EINVAL;
686 goto err_key;
687 }
688
689 ctx = EVP_MD_CTX_create();
690 if (!ctx) {
691 ret = openssl_err("EVP context creation failed");
692 goto err_key;
693 }
694 EVP_MD_CTX_init(ctx);
695 if (!EVP_VerifyInit(ctx, EVP_sha256())) {
696 ret = openssl_err("Verifier setup failed");
697 goto err_ctx;
698 }
699
700 if (!EVP_VerifyUpdate(ctx, data, datasz)) {
701 ret = openssl_err("Hashing data failed");
702 goto err_ctx;
703 }
704
705 if (!EVP_VerifyFinal(ctx, sig->sig, sizeof(sig->sig), evp_key)) {
706 ret = openssl_err("Could not verify signature");
707 goto err_ctx;
708 }
709
710 EVP_MD_CTX_cleanup(ctx);
711 EVP_MD_CTX_destroy(ctx);
712 EVP_PKEY_free(evp_key);
713
714 return 0;
715
716err_ctx:
717 EVP_MD_CTX_destroy(ctx);
718err_key:
719 EVP_PKEY_free(evp_key);
720 fprintf(stderr, "Failed to verify %s signature\n", signame);
721 return ret;
722}
723
724int kwb_sign_and_verify(RSA *key, void *data, int datasz, struct sig_v1 *sig,
725 char *signame)
726{
727 if (kwb_sign(key, data, datasz, sig, signame) < 0)
728 return -1;
729
730 if (kwb_verify(key, data, datasz, sig, signame) < 0)
731 return -1;
732
733 return 0;
734}
735
736
737int kwb_dump_fuse_cmds_38x(FILE *out, struct secure_hdr_v1 *sec_hdr)
738{
739 struct hash_v1 kak_pub_hash;
740 struct image_cfg_element *e;
741 unsigned int fuse_line;
742 int i, idx;
743 uint8_t *ptr;
744 uint32_t val;
745 int ret = 0;
746
747 if (!out || !sec_hdr)
748 return -EINVAL;
749
750 ret = kwb_compute_pubkey_hash(&sec_hdr->kak, &kak_pub_hash);
751 if (ret < 0)
752 goto done;
753
754 fprintf(out, "# burn KAK pub key hash\n");
755 ptr = kak_pub_hash.hash;
756 for (fuse_line = 26; fuse_line <= 30; ++fuse_line) {
757 fprintf(out, "fuse prog -y %u 0 ", fuse_line);
758
759 for (i = 4; i-- > 0;)
760 fprintf(out, "%02hx", (ushort)ptr[i]);
761 ptr += 4;
762 fprintf(out, " 00");
763
764 if (fuse_line < 30) {
765 for (i = 3; i-- > 0;)
766 fprintf(out, "%02hx", (ushort)ptr[i]);
767 ptr += 3;
768 } else {
769 fprintf(out, "000000");
770 }
771
772 fprintf(out, " 1\n");
773 }
774
775 fprintf(out, "# burn CSK selection\n");
776
777 idx = image_get_csk_index();
778 if (idx < 0 || idx > 15) {
779 ret = -EINVAL;
780 goto done;
781 }
782 if (idx > 0) {
783 for (fuse_line = 31; fuse_line < 31 + idx; ++fuse_line)
784 fprintf(out, "fuse prog -y %u 0 00000001 00000000 1\n",
785 fuse_line);
786 } else {
787 fprintf(out, "# CSK index is 0; no mods needed\n");
788 }
789
790 e = image_find_option(IMAGE_CFG_BOX_ID);
791 if (e) {
792 fprintf(out, "# set box ID\n");
793 fprintf(out, "fuse prog -y 48 0 %08x 00000000 1\n", e->boxid);
794 }
795
796 e = image_find_option(IMAGE_CFG_FLASH_ID);
797 if (e) {
798 fprintf(out, "# set flash ID\n");
799 fprintf(out, "fuse prog -y 47 0 %08x 00000000 1\n", e->flashid);
800 }
801
802 fprintf(out, "# enable secure mode ");
803 fprintf(out, "(must be the last fuse line written)\n");
804
805 val = 1;
806 e = image_find_option(IMAGE_CFG_SEC_BOOT_DEV);
807 if (!e) {
808 fprintf(stderr, "ERROR: secured mode boot device not given\n");
809 ret = -EINVAL;
810 goto done;
811 }
812
813 if (e->sec_boot_dev > 0xff) {
814 fprintf(stderr, "ERROR: secured mode boot device invalid\n");
815 ret = -EINVAL;
816 goto done;
817 }
818
819 val |= (e->sec_boot_dev << 8);
820
821 fprintf(out, "fuse prog -y 24 0 %08x 0103e0a9 1\n", val);
822
823 fprintf(out, "# lock (unused) fuse lines (0-23)s\n");
824 for (fuse_line = 0; fuse_line < 24; ++fuse_line)
825 fprintf(out, "fuse prog -y %u 2 1\n", fuse_line);
826
827 fprintf(out, "# OK, that's all :-)\n");
828
829done:
830 return ret;
831}
832
833static int kwb_dump_fuse_cmds(struct secure_hdr_v1 *sec_hdr)
834{
835 int ret = 0;
836 struct image_cfg_element *e;
837
838 e = image_find_option(IMAGE_CFG_SEC_FUSE_DUMP);
839 if (!e)
840 return 0;
841
842 if (!strcmp(e->name, "a38x")) {
843 FILE *out = fopen("kwb_fuses_a38x.txt", "w+");
844
845 kwb_dump_fuse_cmds_38x(out, sec_hdr);
846 fclose(out);
847 goto done;
848 }
849
850 ret = -ENOSYS;
851
852done:
853 return ret;
854}
855
856#endif
857
Stefan Roese4acd2d22014-10-22 12:13:23 +0200858static void *image_create_v0(size_t *imagesz, struct image_tool_params *params,
859 int payloadsz)
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530860{
Stefan Roese4acd2d22014-10-22 12:13:23 +0200861 struct image_cfg_element *e;
862 size_t headersz;
863 struct main_hdr_v0 *main_hdr;
Mario Six885fba12017-01-11 16:00:55 +0100864 uint8_t *image;
Stefan Roese4acd2d22014-10-22 12:13:23 +0200865 int has_ext = 0;
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530866
Stefan Roese4acd2d22014-10-22 12:13:23 +0200867 /*
868 * Calculate the size of the header and the size of the
869 * payload
870 */
871 headersz = sizeof(struct main_hdr_v0);
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530872
Stefan Roese4acd2d22014-10-22 12:13:23 +0200873 if (image_count_options(IMAGE_CFG_DATA) > 0) {
874 has_ext = 1;
875 headersz += sizeof(struct ext_hdr_v0);
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530876 }
877
Stefan Roese4acd2d22014-10-22 12:13:23 +0200878 if (image_count_options(IMAGE_CFG_PAYLOAD) > 1) {
879 fprintf(stderr, "More than one payload, not possible\n");
880 return NULL;
881 }
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530882
Stefan Roese4acd2d22014-10-22 12:13:23 +0200883 image = malloc(headersz);
884 if (!image) {
885 fprintf(stderr, "Cannot allocate memory for image\n");
886 return NULL;
887 }
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530888
Stefan Roese4acd2d22014-10-22 12:13:23 +0200889 memset(image, 0, headersz);
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530890
Mario Six885fba12017-01-11 16:00:55 +0100891 main_hdr = (struct main_hdr_v0 *)image;
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530892
Stefan Roese4acd2d22014-10-22 12:13:23 +0200893 /* Fill in the main header */
Reinhard Pfaua8840dc2015-11-29 15:48:25 +0100894 main_hdr->blocksize =
895 cpu_to_le32(payloadsz + sizeof(uint32_t) - headersz);
896 main_hdr->srcaddr = cpu_to_le32(headersz);
Stefan Roese4acd2d22014-10-22 12:13:23 +0200897 main_hdr->ext = has_ext;
Reinhard Pfaua8840dc2015-11-29 15:48:25 +0100898 main_hdr->destaddr = cpu_to_le32(params->addr);
899 main_hdr->execaddr = cpu_to_le32(params->ep);
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530900
Stefan Roese4acd2d22014-10-22 12:13:23 +0200901 e = image_find_option(IMAGE_CFG_BOOT_FROM);
902 if (e)
903 main_hdr->blockid = e->bootfrom;
904 e = image_find_option(IMAGE_CFG_NAND_ECC_MODE);
905 if (e)
906 main_hdr->nandeccmode = e->nandeccmode;
907 e = image_find_option(IMAGE_CFG_NAND_PAGESZ);
908 if (e)
Reinhard Pfaua8840dc2015-11-29 15:48:25 +0100909 main_hdr->nandpagesize = cpu_to_le16(e->nandpagesz);
Stefan Roese4acd2d22014-10-22 12:13:23 +0200910 main_hdr->checksum = image_checksum8(image,
911 sizeof(struct main_hdr_v0));
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530912
Stefan Roese4acd2d22014-10-22 12:13:23 +0200913 /* Generate the ext header */
914 if (has_ext) {
Mario Sixe89016c2017-01-11 16:00:56 +0100915 struct ext_hdr_v0 *ext_hdr;
Stefan Roese4acd2d22014-10-22 12:13:23 +0200916 int cfgi, datai;
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530917
Mario Six885fba12017-01-11 16:00:55 +0100918 ext_hdr = (struct ext_hdr_v0 *)
919 (image + sizeof(struct main_hdr_v0));
Reinhard Pfaua8840dc2015-11-29 15:48:25 +0100920 ext_hdr->offset = cpu_to_le32(0x40);
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530921
Stefan Roese4acd2d22014-10-22 12:13:23 +0200922 for (cfgi = 0, datai = 0; cfgi < cfgn; cfgi++) {
923 e = &image_cfg[cfgi];
924 if (e->type != IMAGE_CFG_DATA)
925 continue;
926
Reinhard Pfaua8840dc2015-11-29 15:48:25 +0100927 ext_hdr->rcfg[datai].raddr =
928 cpu_to_le32(e->regdata.raddr);
929 ext_hdr->rcfg[datai].rdata =
930 cpu_to_le32(e->regdata.rdata);
Stefan Roese4acd2d22014-10-22 12:13:23 +0200931 datai++;
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530932 }
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530933
Stefan Roese4acd2d22014-10-22 12:13:23 +0200934 ext_hdr->checksum = image_checksum8(ext_hdr,
935 sizeof(struct ext_hdr_v0));
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530936 }
937
Stefan Roese4acd2d22014-10-22 12:13:23 +0200938 *imagesz = headersz;
939 return image;
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530940}
941
Mario Sixe93cf532017-01-11 16:00:57 +0100942static size_t image_headersz_v1(int *hasext)
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530943{
Stefan Roese4acd2d22014-10-22 12:13:23 +0200944 struct image_cfg_element *binarye;
945 size_t headersz;
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530946
Stefan Roese4acd2d22014-10-22 12:13:23 +0200947 /*
948 * Calculate the size of the header and the size of the
949 * payload
950 */
951 headersz = sizeof(struct main_hdr_v1);
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +0530952
Stefan Roese4acd2d22014-10-22 12:13:23 +0200953 if (image_count_options(IMAGE_CFG_BINARY) > 1) {
954 fprintf(stderr, "More than one binary blob, not supported\n");
955 return 0;
956 }
957
958 if (image_count_options(IMAGE_CFG_PAYLOAD) > 1) {
959 fprintf(stderr, "More than one payload, not possible\n");
960 return 0;
961 }
962
963 binarye = image_find_option(IMAGE_CFG_BINARY);
964 if (binarye) {
Mario Sixe89016c2017-01-11 16:00:56 +0100965 int ret;
Stefan Roese4acd2d22014-10-22 12:13:23 +0200966 struct stat s;
967
968 ret = stat(binarye->binary.file, &s);
969 if (ret < 0) {
Andreas Bießmanne5f1a582014-10-24 23:39:11 +0200970 char cwd[PATH_MAX];
971 char *dir = cwd;
972
973 memset(cwd, 0, sizeof(cwd));
974 if (!getcwd(cwd, sizeof(cwd))) {
975 dir = "current working directory";
976 perror("getcwd() failed");
977 }
978
Stefan Roese4acd2d22014-10-22 12:13:23 +0200979 fprintf(stderr,
980 "Didn't find the file '%s' in '%s' which is mandatory to generate the image\n"
981 "This file generally contains the DDR3 training code, and should be extracted from an existing bootable\n"
982 "image for your board. See 'kwbimage -x' to extract it from an existing image.\n",
Andreas Bießmanne5f1a582014-10-24 23:39:11 +0200983 binarye->binary.file, dir);
Stefan Roese4acd2d22014-10-22 12:13:23 +0200984 return 0;
985 }
986
Reinhard Pfau76b391c2015-11-29 15:52:14 +0100987 headersz += sizeof(struct opt_hdr_v1) +
988 s.st_size +
989 (binarye->binary.nargs + 2) * sizeof(uint32_t);
Stefan Roese4acd2d22014-10-22 12:13:23 +0200990 if (hasext)
991 *hasext = 1;
992 }
993
Mario Sixa1b6b0a2017-01-11 16:01:00 +0100994#if defined(CONFIG_KWB_SECURE)
995 if (image_get_csk_index() >= 0) {
996 headersz += sizeof(struct secure_hdr_v1);
997 if (hasext)
998 *hasext = 1;
999 }
1000#endif
1001
Stefan Roese7ddf8cf2015-07-20 11:20:38 +02001002#if defined(CONFIG_SYS_U_BOOT_OFFS)
1003 if (headersz > CONFIG_SYS_U_BOOT_OFFS) {
Mario Six94490a42017-01-11 16:00:54 +01001004 fprintf(stderr,
1005 "Error: Image header (incl. SPL image) too big!\n");
Stefan Roese7ddf8cf2015-07-20 11:20:38 +02001006 fprintf(stderr, "header=0x%x CONFIG_SYS_U_BOOT_OFFS=0x%x!\n",
1007 (int)headersz, CONFIG_SYS_U_BOOT_OFFS);
1008 fprintf(stderr, "Increase CONFIG_SYS_U_BOOT_OFFS!\n");
Kevin Smitha0aad122015-03-16 14:58:21 +00001009 return 0;
Kevin Smitha0aad122015-03-16 14:58:21 +00001010 }
Mario Six79066ef2017-01-11 16:00:58 +01001011
Mario Six94490a42017-01-11 16:00:54 +01001012 headersz = CONFIG_SYS_U_BOOT_OFFS;
Kevin Smitha0aad122015-03-16 14:58:21 +00001013#endif
1014
Stefan Roese4acd2d22014-10-22 12:13:23 +02001015 /*
1016 * The payload should be aligned on some reasonable
1017 * boundary
1018 */
1019 return ALIGN_SUP(headersz, 4096);
1020}
1021
Mario Six79066ef2017-01-11 16:00:58 +01001022int add_binary_header_v1(uint8_t *cur)
1023{
1024 struct image_cfg_element *binarye;
1025 struct opt_hdr_v1 *hdr = (struct opt_hdr_v1 *)cur;
1026 uint32_t *args;
1027 size_t binhdrsz;
1028 struct stat s;
1029 int argi;
1030 FILE *bin;
1031 int ret;
1032
1033 binarye = image_find_option(IMAGE_CFG_BINARY);
1034
1035 if (!binarye)
1036 return 0;
1037
1038 hdr->headertype = OPT_HDR_V1_BINARY_TYPE;
1039
1040 bin = fopen(binarye->binary.file, "r");
1041 if (!bin) {
1042 fprintf(stderr, "Cannot open binary file %s\n",
1043 binarye->binary.file);
1044 return -1;
1045 }
1046
Mario Six1f6c8a52017-02-13 10:11:55 +01001047 if (fstat(fileno(bin), &s)) {
1048 fprintf(stderr, "Cannot stat binary file %s\n",
1049 binarye->binary.file);
1050 goto err_close;
1051 }
Mario Six79066ef2017-01-11 16:00:58 +01001052
1053 binhdrsz = sizeof(struct opt_hdr_v1) +
1054 (binarye->binary.nargs + 2) * sizeof(uint32_t) +
1055 s.st_size;
1056
1057 /*
1058 * The size includes the binary image size, rounded
1059 * up to a 4-byte boundary. Plus 4 bytes for the
1060 * next-header byte and 3-byte alignment at the end.
1061 */
1062 binhdrsz = ALIGN_SUP(binhdrsz, 4) + 4;
1063 hdr->headersz_lsb = cpu_to_le16(binhdrsz & 0xFFFF);
1064 hdr->headersz_msb = (binhdrsz & 0xFFFF0000) >> 16;
1065
1066 cur += sizeof(struct opt_hdr_v1);
1067
1068 args = (uint32_t *)cur;
1069 *args = cpu_to_le32(binarye->binary.nargs);
1070 args++;
1071 for (argi = 0; argi < binarye->binary.nargs; argi++)
1072 args[argi] = cpu_to_le32(binarye->binary.args[argi]);
1073
1074 cur += (binarye->binary.nargs + 1) * sizeof(uint32_t);
1075
1076 ret = fread(cur, s.st_size, 1, bin);
1077 if (ret != 1) {
1078 fprintf(stderr,
1079 "Could not read binary image %s\n",
1080 binarye->binary.file);
Mario Six1f6c8a52017-02-13 10:11:55 +01001081 goto err_close;
Mario Six79066ef2017-01-11 16:00:58 +01001082 }
1083
1084 fclose(bin);
1085
1086 cur += ALIGN_SUP(s.st_size, 4);
1087
1088 /*
1089 * For now, we don't support more than one binary
1090 * header, and no other header types are
1091 * supported. So, the binary header is necessarily the
1092 * last one
1093 */
1094 *((uint32_t *)cur) = 0x00000000;
1095
1096 cur += sizeof(uint32_t);
1097
1098 return 0;
Mario Six1f6c8a52017-02-13 10:11:55 +01001099
1100err_close:
1101 fclose(bin);
1102
1103 return -1;
Mario Six79066ef2017-01-11 16:00:58 +01001104}
1105
Mario Sixa1b6b0a2017-01-11 16:01:00 +01001106#if defined(CONFIG_KWB_SECURE)
1107
1108int export_pub_kak_hash(RSA *kak, struct secure_hdr_v1 *secure_hdr)
1109{
1110 FILE *hashf;
1111 int res;
1112
1113 hashf = fopen("pub_kak_hash.txt", "w");
1114
1115 res = kwb_export_pubkey(kak, &secure_hdr->kak, hashf, "KAK");
1116
1117 fclose(hashf);
1118
1119 return res < 0 ? 1 : 0;
1120}
1121
1122int kwb_sign_csk_with_kak(struct image_tool_params *params,
1123 struct secure_hdr_v1 *secure_hdr, RSA *csk)
1124{
1125 RSA *kak = NULL;
1126 RSA *kak_pub = NULL;
1127 int csk_idx = image_get_csk_index();
1128 struct sig_v1 tmp_sig;
1129
1130 if (csk_idx >= 16) {
1131 fprintf(stderr, "Invalid CSK index %d\n", csk_idx);
1132 return 1;
1133 }
1134
1135 if (kwb_load_kak(params, &kak) < 0)
1136 return 1;
1137
1138 if (export_pub_kak_hash(kak, secure_hdr))
1139 return 1;
1140
1141 if (kwb_import_pubkey(&kak_pub, &secure_hdr->kak, "KAK") < 0)
1142 return 1;
1143
1144 if (kwb_export_pubkey(csk, &secure_hdr->csk[csk_idx], NULL, "CSK") < 0)
1145 return 1;
1146
1147 if (kwb_sign_and_verify(kak, &secure_hdr->csk,
1148 sizeof(secure_hdr->csk) +
1149 sizeof(secure_hdr->csksig),
1150 &tmp_sig, "CSK") < 0)
1151 return 1;
1152
1153 if (kwb_verify(kak_pub, &secure_hdr->csk,
1154 sizeof(secure_hdr->csk) +
1155 sizeof(secure_hdr->csksig),
1156 &tmp_sig, "CSK (2)") < 0)
1157 return 1;
1158
1159 secure_hdr->csksig = tmp_sig;
1160
1161 return 0;
1162}
1163
1164int add_secure_header_v1(struct image_tool_params *params, uint8_t *ptr,
1165 int payloadsz, size_t headersz, uint8_t *image,
1166 struct secure_hdr_v1 *secure_hdr)
1167{
1168 struct image_cfg_element *e_jtagdelay;
1169 struct image_cfg_element *e_boxid;
1170 struct image_cfg_element *e_flashid;
1171 RSA *csk = NULL;
1172 unsigned char *image_ptr;
1173 size_t image_size;
1174 struct sig_v1 tmp_sig;
1175 bool specialized_img = image_get_spezialized_img();
1176
1177 kwb_msg("Create secure header content\n");
1178
1179 e_jtagdelay = image_find_option(IMAGE_CFG_JTAG_DELAY);
1180 e_boxid = image_find_option(IMAGE_CFG_BOX_ID);
1181 e_flashid = image_find_option(IMAGE_CFG_FLASH_ID);
1182
1183 if (kwb_load_csk(params, &csk) < 0)
1184 return 1;
1185
1186 secure_hdr->headertype = OPT_HDR_V1_SECURE_TYPE;
1187 secure_hdr->headersz_msb = 0;
1188 secure_hdr->headersz_lsb = cpu_to_le16(sizeof(struct secure_hdr_v1));
1189 if (e_jtagdelay)
1190 secure_hdr->jtag_delay = e_jtagdelay->jtag_delay;
1191 if (e_boxid && specialized_img)
1192 secure_hdr->boxid = cpu_to_le32(e_boxid->boxid);
1193 if (e_flashid && specialized_img)
1194 secure_hdr->flashid = cpu_to_le32(e_flashid->flashid);
1195
1196 if (kwb_sign_csk_with_kak(params, secure_hdr, csk))
1197 return 1;
1198
1199 image_ptr = ptr + headersz;
1200 image_size = payloadsz - headersz;
1201
1202 if (kwb_sign_and_verify(csk, image_ptr, image_size,
1203 &secure_hdr->imgsig, "image") < 0)
1204 return 1;
1205
1206 if (kwb_sign_and_verify(csk, image, headersz, &tmp_sig, "header") < 0)
1207 return 1;
1208
1209 secure_hdr->hdrsig = tmp_sig;
1210
1211 kwb_dump_fuse_cmds(secure_hdr);
1212
1213 return 0;
1214}
1215#endif
1216
Stefan Roese4acd2d22014-10-22 12:13:23 +02001217static void *image_create_v1(size_t *imagesz, struct image_tool_params *params,
Mario Sixa1b6b0a2017-01-11 16:01:00 +01001218 uint8_t *ptr, int payloadsz)
Stefan Roese4acd2d22014-10-22 12:13:23 +02001219{
Mario Six79066ef2017-01-11 16:00:58 +01001220 struct image_cfg_element *e;
Stefan Roese4acd2d22014-10-22 12:13:23 +02001221 struct main_hdr_v1 *main_hdr;
Mario Sixa1b6b0a2017-01-11 16:01:00 +01001222#if defined(CONFIG_KWB_SECURE)
1223 struct secure_hdr_v1 *secure_hdr = NULL;
1224#endif
Stefan Roese4acd2d22014-10-22 12:13:23 +02001225 size_t headersz;
Mario Six885fba12017-01-11 16:00:55 +01001226 uint8_t *image, *cur;
Stefan Roese4acd2d22014-10-22 12:13:23 +02001227 int hasext = 0;
Mario Sixa1b6b0a2017-01-11 16:01:00 +01001228 uint8_t *next_ext = NULL;
Stefan Roese4acd2d22014-10-22 12:13:23 +02001229
1230 /*
1231 * Calculate the size of the header and the size of the
1232 * payload
1233 */
Mario Sixe93cf532017-01-11 16:00:57 +01001234 headersz = image_headersz_v1(&hasext);
Stefan Roese4acd2d22014-10-22 12:13:23 +02001235 if (headersz == 0)
1236 return NULL;
1237
1238 image = malloc(headersz);
1239 if (!image) {
1240 fprintf(stderr, "Cannot allocate memory for image\n");
1241 return NULL;
1242 }
1243
1244 memset(image, 0, headersz);
1245
Mario Six885fba12017-01-11 16:00:55 +01001246 main_hdr = (struct main_hdr_v1 *)image;
Mario Sixa1b6b0a2017-01-11 16:01:00 +01001247 cur = image;
1248 cur += sizeof(struct main_hdr_v1);
1249 next_ext = &main_hdr->ext;
Stefan Roese4acd2d22014-10-22 12:13:23 +02001250
1251 /* Fill the main header */
Reinhard Pfaua8840dc2015-11-29 15:48:25 +01001252 main_hdr->blocksize =
1253 cpu_to_le32(payloadsz - headersz + sizeof(uint32_t));
1254 main_hdr->headersz_lsb = cpu_to_le16(headersz & 0xFFFF);
Stefan Roese4acd2d22014-10-22 12:13:23 +02001255 main_hdr->headersz_msb = (headersz & 0xFFFF0000) >> 16;
Mario Six94084ee2017-01-11 16:00:53 +01001256 main_hdr->destaddr = cpu_to_le32(params->addr)
1257 - sizeof(image_header_t);
Reinhard Pfaua8840dc2015-11-29 15:48:25 +01001258 main_hdr->execaddr = cpu_to_le32(params->ep);
1259 main_hdr->srcaddr = cpu_to_le32(headersz);
Stefan Roese4acd2d22014-10-22 12:13:23 +02001260 main_hdr->ext = hasext;
1261 main_hdr->version = 1;
1262 e = image_find_option(IMAGE_CFG_BOOT_FROM);
1263 if (e)
1264 main_hdr->blockid = e->bootfrom;
1265 e = image_find_option(IMAGE_CFG_NAND_BLKSZ);
1266 if (e)
1267 main_hdr->nandblocksize = e->nandblksz / (64 * 1024);
1268 e = image_find_option(IMAGE_CFG_NAND_BADBLK_LOCATION);
1269 if (e)
1270 main_hdr->nandbadblklocation = e->nandbadblklocation;
Chris Packham4bdb5472016-11-09 22:07:45 +13001271 e = image_find_option(IMAGE_CFG_BAUDRATE);
1272 if (e)
1273 main_hdr->options = baudrate_to_option(e->baudrate);
Chris Packham2611c052016-11-09 22:21:45 +13001274 e = image_find_option(IMAGE_CFG_DEBUG);
1275 if (e)
1276 main_hdr->flags = e->debug ? 0x1 : 0;
Stefan Roese4acd2d22014-10-22 12:13:23 +02001277
Mario Sixa1b6b0a2017-01-11 16:01:00 +01001278#if defined(CONFIG_KWB_SECURE)
1279 if (image_get_csk_index() >= 0) {
1280 /*
1281 * only reserve the space here; we fill the header later since
1282 * we need the header to be complete to compute the signatures
1283 */
1284 secure_hdr = (struct secure_hdr_v1 *)cur;
1285 cur += sizeof(struct secure_hdr_v1);
1286 next_ext = &secure_hdr->next;
1287 }
1288#endif
1289 *next_ext = 1;
1290
Mario Six79066ef2017-01-11 16:00:58 +01001291 if (add_binary_header_v1(cur))
1292 return NULL;
Stefan Roese4acd2d22014-10-22 12:13:23 +02001293
Mario Sixa1b6b0a2017-01-11 16:01:00 +01001294#if defined(CONFIG_KWB_SECURE)
1295 if (secure_hdr && add_secure_header_v1(params, ptr, payloadsz,
1296 headersz, image, secure_hdr))
1297 return NULL;
1298#endif
1299
Stefan Roese4acd2d22014-10-22 12:13:23 +02001300 /* Calculate and set the header checksum */
1301 main_hdr->checksum = image_checksum8(main_hdr, headersz);
1302
1303 *imagesz = headersz;
1304 return image;
1305}
1306
Mario Six4991b4f2017-01-11 16:00:59 +01001307int recognize_keyword(char *keyword)
1308{
1309 int kw_id;
1310
1311 for (kw_id = 1; kw_id < IMAGE_CFG_COUNT; ++kw_id)
1312 if (!strcmp(keyword, id_strs[kw_id]))
1313 return kw_id;
1314
1315 return 0;
1316}
1317
Stefan Roese4acd2d22014-10-22 12:13:23 +02001318static int image_create_config_parse_oneline(char *line,
1319 struct image_cfg_element *el)
1320{
Mario Six4991b4f2017-01-11 16:00:59 +01001321 char *keyword, *saveptr, *value1, *value2;
1322 char delimiters[] = " \t";
1323 int keyword_id, ret, argi;
1324 char *unknown_msg = "Ignoring unknown line '%s'\n";
Stefan Roese4acd2d22014-10-22 12:13:23 +02001325
Mario Six4991b4f2017-01-11 16:00:59 +01001326 keyword = strtok_r(line, delimiters, &saveptr);
1327 keyword_id = recognize_keyword(keyword);
Mario Six94490a42017-01-11 16:00:54 +01001328
Mario Six4991b4f2017-01-11 16:00:59 +01001329 if (!keyword_id) {
1330 fprintf(stderr, unknown_msg, line);
1331 return 0;
1332 }
1333
1334 el->type = keyword_id;
1335
1336 value1 = strtok_r(NULL, delimiters, &saveptr);
1337
1338 if (!value1) {
1339 fprintf(stderr, "Parameter missing in line '%s'\n", line);
1340 return -1;
1341 }
1342
1343 switch (keyword_id) {
1344 case IMAGE_CFG_VERSION:
1345 el->version = atoi(value1);
1346 break;
1347 case IMAGE_CFG_BOOT_FROM:
1348 ret = image_boot_mode_id(value1);
Mario Six94490a42017-01-11 16:00:54 +01001349
Andreas Bießmannf411b8f2014-10-24 23:25:52 +02001350 if (ret < 0) {
Mario Six4991b4f2017-01-11 16:00:59 +01001351 fprintf(stderr, "Invalid boot media '%s'\n", value1);
Stefan Roese4acd2d22014-10-22 12:13:23 +02001352 return -1;
1353 }
Andreas Bießmannf411b8f2014-10-24 23:25:52 +02001354 el->bootfrom = ret;
Mario Six4991b4f2017-01-11 16:00:59 +01001355 break;
1356 case IMAGE_CFG_NAND_BLKSZ:
1357 el->nandblksz = strtoul(value1, NULL, 16);
1358 break;
1359 case IMAGE_CFG_NAND_BADBLK_LOCATION:
1360 el->nandbadblklocation = strtoul(value1, NULL, 16);
1361 break;
1362 case IMAGE_CFG_NAND_ECC_MODE:
1363 ret = image_nand_ecc_mode_id(value1);
Mario Six94490a42017-01-11 16:00:54 +01001364
Andreas Bießmannf411b8f2014-10-24 23:25:52 +02001365 if (ret < 0) {
Mario Six4991b4f2017-01-11 16:00:59 +01001366 fprintf(stderr, "Invalid NAND ECC mode '%s'\n", value1);
Stefan Roese4acd2d22014-10-22 12:13:23 +02001367 return -1;
1368 }
Andreas Bießmannf411b8f2014-10-24 23:25:52 +02001369 el->nandeccmode = ret;
Mario Six4991b4f2017-01-11 16:00:59 +01001370 break;
1371 case IMAGE_CFG_NAND_PAGESZ:
1372 el->nandpagesz = strtoul(value1, NULL, 16);
1373 break;
1374 case IMAGE_CFG_BINARY:
1375 argi = 0;
Mario Six94490a42017-01-11 16:00:54 +01001376
Mario Six4991b4f2017-01-11 16:00:59 +01001377 el->binary.file = strdup(value1);
Stefan Roese4acd2d22014-10-22 12:13:23 +02001378 while (1) {
Mario Six4991b4f2017-01-11 16:00:59 +01001379 char *value = strtok_r(NULL, delimiters, &saveptr);
1380
Stefan Roese4acd2d22014-10-22 12:13:23 +02001381 if (!value)
1382 break;
1383 el->binary.args[argi] = strtoul(value, NULL, 16);
1384 argi++;
1385 if (argi >= BINARY_MAX_ARGS) {
1386 fprintf(stderr,
Mario Six4991b4f2017-01-11 16:00:59 +01001387 "Too many arguments for BINARY\n");
Stefan Roese4acd2d22014-10-22 12:13:23 +02001388 return -1;
1389 }
1390 }
1391 el->binary.nargs = argi;
Mario Six4991b4f2017-01-11 16:00:59 +01001392 break;
1393 case IMAGE_CFG_DATA:
1394 value2 = strtok_r(NULL, delimiters, &saveptr);
Stefan Roese4acd2d22014-10-22 12:13:23 +02001395
1396 if (!value1 || !value2) {
1397 fprintf(stderr,
1398 "Invalid number of arguments for DATA\n");
1399 return -1;
1400 }
1401
Stefan Roese4acd2d22014-10-22 12:13:23 +02001402 el->regdata.raddr = strtoul(value1, NULL, 16);
1403 el->regdata.rdata = strtoul(value2, NULL, 16);
Mario Six4991b4f2017-01-11 16:00:59 +01001404 break;
1405 case IMAGE_CFG_BAUDRATE:
1406 el->baudrate = strtoul(value1, NULL, 10);
1407 break;
1408 case IMAGE_CFG_DEBUG:
1409 el->debug = strtoul(value1, NULL, 10);
1410 break;
Mario Sixa1b6b0a2017-01-11 16:01:00 +01001411 case IMAGE_CFG_KAK:
1412 el->key_name = strdup(value1);
1413 break;
1414 case IMAGE_CFG_CSK:
1415 el->key_name = strdup(value1);
1416 break;
1417 case IMAGE_CFG_CSK_INDEX:
1418 el->csk_idx = strtol(value1, NULL, 0);
1419 break;
1420 case IMAGE_CFG_JTAG_DELAY:
1421 el->jtag_delay = strtoul(value1, NULL, 0);
1422 break;
1423 case IMAGE_CFG_BOX_ID:
1424 el->boxid = strtoul(value1, NULL, 0);
1425 break;
1426 case IMAGE_CFG_FLASH_ID:
1427 el->flashid = strtoul(value1, NULL, 0);
1428 break;
1429 case IMAGE_CFG_SEC_SPECIALIZED_IMG:
1430 el->sec_specialized_img = true;
1431 break;
1432 case IMAGE_CFG_SEC_COMMON_IMG:
1433 el->sec_specialized_img = false;
1434 break;
1435 case IMAGE_CFG_SEC_BOOT_DEV:
1436 el->sec_boot_dev = strtoul(value1, NULL, 0);
1437 break;
1438 case IMAGE_CFG_SEC_FUSE_DUMP:
1439 el->name = strdup(value1);
1440 break;
Mario Six4991b4f2017-01-11 16:00:59 +01001441 default:
1442 fprintf(stderr, unknown_msg, line);
Stefan Roese4acd2d22014-10-22 12:13:23 +02001443 }
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +05301444
1445 return 0;
1446}
1447
Stefan Roese4acd2d22014-10-22 12:13:23 +02001448/*
1449 * Parse the configuration file 'fcfg' into the array of configuration
1450 * elements 'image_cfg', and return the number of configuration
1451 * elements in 'cfgn'.
1452 */
1453static int image_create_config_parse(FILE *fcfg)
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +05301454{
Stefan Roese4acd2d22014-10-22 12:13:23 +02001455 int ret;
1456 int cfgi = 0;
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +05301457
Stefan Roese4acd2d22014-10-22 12:13:23 +02001458 /* Parse the configuration file */
1459 while (!feof(fcfg)) {
1460 char *line;
1461 char buf[256];
1462
1463 /* Read the current line */
1464 memset(buf, 0, sizeof(buf));
1465 line = fgets(buf, sizeof(buf), fcfg);
1466 if (!line)
1467 break;
1468
1469 /* Ignore useless lines */
1470 if (line[0] == '\n' || line[0] == '#')
1471 continue;
1472
1473 /* Strip final newline */
1474 if (line[strlen(line) - 1] == '\n')
1475 line[strlen(line) - 1] = 0;
1476
1477 /* Parse the current line */
1478 ret = image_create_config_parse_oneline(line,
1479 &image_cfg[cfgi]);
1480 if (ret)
1481 return ret;
1482
1483 cfgi++;
1484
1485 if (cfgi >= IMAGE_CFG_ELEMENT_MAX) {
1486 fprintf(stderr,
1487 "Too many configuration elements in .cfg file\n");
1488 return -1;
1489 }
1490 }
1491
1492 cfgn = cfgi;
1493 return 0;
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +05301494}
1495
Stefan Roese4acd2d22014-10-22 12:13:23 +02001496static int image_get_version(void)
1497{
1498 struct image_cfg_element *e;
1499
1500 e = image_find_option(IMAGE_CFG_VERSION);
1501 if (!e)
1502 return -1;
1503
1504 return e->version;
1505}
1506
Stefan Roese4acd2d22014-10-22 12:13:23 +02001507static void kwbimage_set_header(void *ptr, struct stat *sbuf, int ifd,
1508 struct image_tool_params *params)
1509{
1510 FILE *fcfg;
1511 void *image = NULL;
1512 int version;
Łukasz Majewski93e93712014-11-21 09:22:43 +01001513 size_t headersz = 0;
Stefan Roese4acd2d22014-10-22 12:13:23 +02001514 uint32_t checksum;
1515 int ret;
1516 int size;
1517
1518 fcfg = fopen(params->imagename, "r");
1519 if (!fcfg) {
1520 fprintf(stderr, "Could not open input file %s\n",
1521 params->imagename);
1522 exit(EXIT_FAILURE);
1523 }
1524
1525 image_cfg = malloc(IMAGE_CFG_ELEMENT_MAX *
1526 sizeof(struct image_cfg_element));
1527 if (!image_cfg) {
1528 fprintf(stderr, "Cannot allocate memory\n");
1529 fclose(fcfg);
1530 exit(EXIT_FAILURE);
1531 }
1532
1533 memset(image_cfg, 0,
1534 IMAGE_CFG_ELEMENT_MAX * sizeof(struct image_cfg_element));
1535 rewind(fcfg);
1536
1537 ret = image_create_config_parse(fcfg);
1538 fclose(fcfg);
1539 if (ret) {
1540 free(image_cfg);
1541 exit(EXIT_FAILURE);
1542 }
1543
Stefan Roese9b163d82015-09-01 13:46:35 +02001544 /* The MVEBU BootROM does not allow non word aligned payloads */
1545 sbuf->st_size = ALIGN_SUP(sbuf->st_size, 4);
1546
Stefan Roese4acd2d22014-10-22 12:13:23 +02001547 version = image_get_version();
Stefan Roese934a5292014-10-28 11:32:24 +01001548 switch (version) {
1549 /*
1550 * Fallback to version 0 if no version is provided in the
1551 * cfg file
1552 */
1553 case -1:
1554 case 0:
Stefan Roese4acd2d22014-10-22 12:13:23 +02001555 image = image_create_v0(&headersz, params, sbuf->st_size);
Stefan Roese934a5292014-10-28 11:32:24 +01001556 break;
1557
1558 case 1:
Mario Sixa1b6b0a2017-01-11 16:01:00 +01001559 image = image_create_v1(&headersz, params, ptr, sbuf->st_size);
Stefan Roese934a5292014-10-28 11:32:24 +01001560 break;
1561
1562 default:
1563 fprintf(stderr, "Unsupported version %d\n", version);
1564 free(image_cfg);
1565 exit(EXIT_FAILURE);
1566 }
Stefan Roese4acd2d22014-10-22 12:13:23 +02001567
1568 if (!image) {
1569 fprintf(stderr, "Could not create image\n");
1570 free(image_cfg);
1571 exit(EXIT_FAILURE);
1572 }
1573
1574 free(image_cfg);
1575
1576 /* Build and add image checksum header */
Reinhard Pfaua8840dc2015-11-29 15:48:25 +01001577 checksum =
1578 cpu_to_le32(image_checksum32((uint32_t *)ptr, sbuf->st_size));
Stefan Roese4acd2d22014-10-22 12:13:23 +02001579 size = write(ifd, &checksum, sizeof(uint32_t));
1580 if (size != sizeof(uint32_t)) {
1581 fprintf(stderr, "Error:%s - Checksum write %d bytes %s\n",
1582 params->cmdname, size, params->imagefile);
1583 exit(EXIT_FAILURE);
1584 }
1585
1586 sbuf->st_size += sizeof(uint32_t);
1587
1588 /* Finally copy the header into the image area */
1589 memcpy(ptr, image, headersz);
1590
1591 free(image);
1592}
1593
1594static void kwbimage_print_header(const void *ptr)
1595{
1596 struct main_hdr_v0 *mhdr = (struct main_hdr_v0 *)ptr;
1597
1598 printf("Image Type: MVEBU Boot from %s Image\n",
1599 image_boot_mode_name(mhdr->blockid));
Stefan Roese4acd2d22014-10-22 12:13:23 +02001600 printf("Image version:%d\n", image_version((void *)ptr));
Gerald Kerma26f195c2014-10-31 01:03:27 +01001601 printf("Data Size: ");
Stefan Roese4acd2d22014-10-22 12:13:23 +02001602 genimg_print_size(mhdr->blocksize - sizeof(uint32_t));
1603 printf("Load Address: %08x\n", mhdr->destaddr);
1604 printf("Entry Point: %08x\n", mhdr->execaddr);
1605}
1606
1607static int kwbimage_check_image_types(uint8_t type)
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +05301608{
1609 if (type == IH_TYPE_KWBIMAGE)
1610 return EXIT_SUCCESS;
Mario Six94490a42017-01-11 16:00:54 +01001611
1612 return EXIT_FAILURE;
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +05301613}
1614
Stefan Roese4acd2d22014-10-22 12:13:23 +02001615static int kwbimage_verify_header(unsigned char *ptr, int image_size,
1616 struct image_tool_params *params)
1617{
Stefan Roese4acd2d22014-10-22 12:13:23 +02001618 uint8_t checksum;
1619
Baruch Siachdb7cd4ed2017-07-04 20:23:40 +03001620 if (!main_hdr_checksum_ok(ptr))
Stefan Roese4acd2d22014-10-22 12:13:23 +02001621 return -FDT_ERR_BADSTRUCTURE;
1622
1623 /* Only version 0 extended header has checksum */
1624 if (image_version((void *)ptr) == 0) {
Mario Sixe89016c2017-01-11 16:00:56 +01001625 struct ext_hdr_v0 *ext_hdr;
1626
Mario Six885fba12017-01-11 16:00:55 +01001627 ext_hdr = (struct ext_hdr_v0 *)
1628 (ptr + sizeof(struct main_hdr_v0));
Stefan Roese4acd2d22014-10-22 12:13:23 +02001629 checksum = image_checksum8(ext_hdr,
Gerald Kerma26f195c2014-10-31 01:03:27 +01001630 sizeof(struct ext_hdr_v0)
1631 - sizeof(uint8_t));
Stefan Roese4acd2d22014-10-22 12:13:23 +02001632 if (checksum != ext_hdr->checksum)
1633 return -FDT_ERR_BADSTRUCTURE;
1634 }
1635
1636 return 0;
1637}
1638
1639static int kwbimage_generate(struct image_tool_params *params,
1640 struct image_type_params *tparams)
1641{
Patrick Wildt6cbf7ed2017-05-10 22:18:54 +02001642 FILE *fcfg;
Stefan Roese4acd2d22014-10-22 12:13:23 +02001643 int alloc_len;
Patrick Wildt6cbf7ed2017-05-10 22:18:54 +02001644 int version;
Stefan Roese4acd2d22014-10-22 12:13:23 +02001645 void *hdr;
Patrick Wildt6cbf7ed2017-05-10 22:18:54 +02001646 int ret;
Stefan Roese4acd2d22014-10-22 12:13:23 +02001647
Patrick Wildt6cbf7ed2017-05-10 22:18:54 +02001648 fcfg = fopen(params->imagename, "r");
1649 if (!fcfg) {
1650 fprintf(stderr, "Could not open input file %s\n",
1651 params->imagename);
1652 exit(EXIT_FAILURE);
1653 }
1654
1655 image_cfg = malloc(IMAGE_CFG_ELEMENT_MAX *
1656 sizeof(struct image_cfg_element));
1657 if (!image_cfg) {
1658 fprintf(stderr, "Cannot allocate memory\n");
1659 fclose(fcfg);
1660 exit(EXIT_FAILURE);
1661 }
1662
1663 memset(image_cfg, 0,
1664 IMAGE_CFG_ELEMENT_MAX * sizeof(struct image_cfg_element));
1665 rewind(fcfg);
1666
1667 ret = image_create_config_parse(fcfg);
1668 fclose(fcfg);
1669 if (ret) {
1670 free(image_cfg);
1671 exit(EXIT_FAILURE);
1672 }
1673
1674 version = image_get_version();
1675 switch (version) {
1676 /*
1677 * Fallback to version 0 if no version is provided in the
1678 * cfg file
1679 */
1680 case -1:
1681 case 0:
Stefan Roese4acd2d22014-10-22 12:13:23 +02001682 alloc_len = sizeof(struct main_hdr_v0) +
1683 sizeof(struct ext_hdr_v0);
Patrick Wildt6cbf7ed2017-05-10 22:18:54 +02001684 break;
1685
1686 case 1:
Mario Sixe93cf532017-01-11 16:00:57 +01001687 alloc_len = image_headersz_v1(NULL);
Patrick Wildt6cbf7ed2017-05-10 22:18:54 +02001688 break;
1689
1690 default:
1691 fprintf(stderr, "Unsupported version %d\n", version);
1692 free(image_cfg);
1693 exit(EXIT_FAILURE);
Stefan Roese4acd2d22014-10-22 12:13:23 +02001694 }
1695
Patrick Wildt6cbf7ed2017-05-10 22:18:54 +02001696 free(image_cfg);
1697
Stefan Roese4acd2d22014-10-22 12:13:23 +02001698 hdr = malloc(alloc_len);
1699 if (!hdr) {
1700 fprintf(stderr, "%s: malloc return failure: %s\n",
1701 params->cmdname, strerror(errno));
1702 exit(EXIT_FAILURE);
1703 }
1704
1705 memset(hdr, 0, alloc_len);
1706 tparams->header_size = alloc_len;
1707 tparams->hdr = hdr;
1708
Stefan Roese77720852015-11-24 09:14:59 +01001709 /*
1710 * The resulting image needs to be 4-byte aligned. At least
1711 * the Marvell hdrparser tool complains if its unaligned.
1712 * By returning 1 here in this function, called via
1713 * tparams->vrec_header() in mkimage.c, mkimage will
1714 * automatically pad the the resulting image to a 4-byte
1715 * size if necessary.
1716 */
1717 return 1;
Stefan Roese4acd2d22014-10-22 12:13:23 +02001718}
1719
1720/*
1721 * Report Error if xflag is set in addition to default
1722 */
1723static int kwbimage_check_params(struct image_tool_params *params)
1724{
1725 if (!strlen(params->imagename)) {
Mario Six94490a42017-01-11 16:00:54 +01001726 char *msg = "Configuration file for kwbimage creation omitted";
1727
1728 fprintf(stderr, "Error:%s - %s\n", params->cmdname, msg);
Stefan Roese4acd2d22014-10-22 12:13:23 +02001729 return CFG_INVALID;
1730 }
1731
1732 return (params->dflag && (params->fflag || params->lflag)) ||
1733 (params->fflag && (params->dflag || params->lflag)) ||
1734 (params->lflag && (params->dflag || params->fflag)) ||
1735 (params->xflag) || !(strlen(params->imagename));
1736}
1737
Prafulla Wadaskaraa0c7a82009-09-07 15:05:02 +05301738/*
1739 * kwbimage type parameters definition
1740 */
Guilherme Maciel Ferreiraa93648d2015-01-15 02:48:07 -02001741U_BOOT_IMAGE_TYPE(
1742 kwbimage,
1743 "Marvell MVEBU Boot Image support",
1744 0,
1745 NULL,
1746 kwbimage_check_params,
1747 kwbimage_verify_header,
1748 kwbimage_print_header,
1749 kwbimage_set_header,
1750 NULL,
1751 kwbimage_check_image_types,
1752 NULL,
1753 kwbimage_generate
1754);