123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409 |
- /*
- * Copyright (c) 2017-2023, STMicroelectronics - All Rights Reserved
- *
- * SPDX-License-Identifier: BSD-3-Clause
- */
- #ifndef BOOT_API_H
- #define BOOT_API_H
- #include <stdint.h>
- #include <stdio.h>
- /*
- * Possible value of boot context field 'auth_status'
- */
- #if STM32MP13
- /* No authentication done */
- #define BOOT_API_CTX_AUTH_NO 0x7CFDD351U
- /* Authentication done and failed */
- #define BOOT_API_CTX_AUTH_FAILED 0x51330884U
- /* Authentication done and success */
- #define BOOT_API_CTX_AUTH_SUCCESS 0x67E8CAE1U
- #endif
- #if STM32MP15
- /* No authentication done */
- #define BOOT_API_CTX_AUTH_NO 0x0U
- /* Authentication done and failed */
- #define BOOT_API_CTX_AUTH_FAILED 0x1U
- /* Authentication done and succeeded */
- #define BOOT_API_CTX_AUTH_SUCCESS 0x2U
- #endif
- /*
- * Possible value of boot context field 'boot_interface_sel'
- */
- /* Value of field 'boot_interface_sel' when no boot occurred */
- #define BOOT_API_CTX_BOOT_INTERFACE_SEL_NO 0x0U
- /* Boot occurred on SD */
- #define BOOT_API_CTX_BOOT_INTERFACE_SEL_FLASH_SD 0x1U
- /* Boot occurred on EMMC */
- #define BOOT_API_CTX_BOOT_INTERFACE_SEL_FLASH_EMMC 0x2U
- /* Boot occurred on FMC */
- #define BOOT_API_CTX_BOOT_INTERFACE_SEL_FLASH_NAND_FMC 0x3U
- /* Boot occurred on QSPI NOR */
- #define BOOT_API_CTX_BOOT_INTERFACE_SEL_FLASH_NOR_SPI 0x4U
- /* Boot occurred on UART */
- #define BOOT_API_CTX_BOOT_INTERFACE_SEL_SERIAL_UART 0x5U
- /* Boot occurred on USB */
- #define BOOT_API_CTX_BOOT_INTERFACE_SEL_SERIAL_USB 0x6U
- /* Boot occurred on QSPI NAND */
- #define BOOT_API_CTX_BOOT_INTERFACE_SEL_FLASH_NAND_SPI 0x7U
- /**
- * @brief Possible value of boot context field 'EmmcXferStatus'
- */
- /*
- * Possible value of boot context field 'emmc_xfer_status'
- */
- #define BOOT_API_CTX_EMMC_XFER_STATUS_NOT_STARTED 0x0U
- #define BOOT_API_CTX_EMMC_XFER_STATUS_DATAEND_DETECTED 0x1U
- #define BOOT_API_CTX_EMMC_XFER_STATUS_XFER_OVERALL_TIMEOUT_DETECTED 0x2U
- #define BOOT_API_CTX_EMMC_XFER_STATUS_XFER_DATA_TIMEOUT 0x3U
- /*
- * Possible value of boot context field 'emmc_error_status'
- */
- #define BOOT_API_CTX_EMMC_ERROR_STATUS_NONE 0x0U
- #define BOOT_API_CTX_EMMC_ERROR_STATUS_CMD_TIMEOUT 0x1U
- #define BOOT_API_CTX_EMMC_ERROR_STATUS_ACK_TIMEOUT 0x2U
- #define BOOT_API_CTX_EMMC_ERROR_STATUS_DATA_CRC_FAIL 0x3U
- #define BOOT_API_CTX_EMMC_ERROR_STATUS_NOT_ENOUGH_BOOT_DATA_RX 0x4U
- #define BOOT_API_CTX_EMMC_ERROR_STATUS_HEADER_NOT_FOUND 0x5U
- #define BOOT_API_CTX_EMMC_ERROR_STATUS_HEADER_SIZE_ZERO 0x6U
- #define BOOT_API_CTX_EMMC_ERROR_STATUS_IMAGE_NOT_COMPLETE 0x7U
- #define BOOT_API_CTX_EMMC_ERROR_STATUS_ACK_ERROR 0x8U
- /* Image Header related definitions */
- /* Definition of header version */
- #if STM32MP13
- #define BOOT_API_HEADER_VERSION 0x00020000U
- #endif
- #if STM32MP15
- #define BOOT_API_HEADER_VERSION 0x00010000U
- #endif
- /*
- * Magic number used to detect header in memory
- * Its value must be 'S' 'T' 'M' 0x32, i.e 0x324D5453 as field
- * 'bootapi_image_header_t.magic'
- * This identifies the start of a boot image.
- */
- #define BOOT_API_IMAGE_HEADER_MAGIC_NB 0x324D5453U
- /* Definitions related to Authentication used in image header structure */
- #define BOOT_API_ECDSA_PUB_KEY_LEN_IN_BYTES 64
- #define BOOT_API_ECDSA_SIGNATURE_LEN_IN_BYTES 64
- #define BOOT_API_SHA256_DIGEST_SIZE_IN_BYTES 32
- /* Possible values of the field 'boot_api_image_header_t.ecc_algo_type' */
- #define BOOT_API_ECDSA_ALGO_TYPE_P256NIST 1
- #define BOOT_API_ECDSA_ALGO_TYPE_BRAINPOOL256 2
- /*
- * Extension headers related definitions
- */
- /* 'bootapi_image_header_t.extension_flag' used for authentication feature */
- #define BOOT_API_AUTHENTICATION_EXTENSION_BIT BIT(0)
- /* 'bootapi_image_header_t.extension_flag' used for FSBL decryption feature */
- #define BOOT_API_FSBL_DECRYPTION_EXTENSION_BIT BIT(1)
- /* 'bootapi_image_header_t.extension_flag' used for padding header feature */
- #define BOOT_API_PADDING_EXTENSION_BIT BIT(31)
- /*
- * mask of bits of field 'bootapi_image_header_t.extension_flag'
- * used for extension headers
- */
- #define BOOT_API_ALL_EXTENSIONS_MASK \
- (BOOT_API_AUTHENTICATION_EXTENSION_BIT | \
- BOOT_API_FSBL_DECRYPTION_EXTENSION_BIT | \
- BOOT_API_PADDING_EXTENSION_BIT)
- /*
- * Magic number of FSBL decryption extension header
- * The value shall gives the four bytes 'S','T',0x00,0x01 in memory
- */
- #define BOOT_API_FSBL_DECRYPTION_HEADER_MAGIC_NB 0x01005453U
- /*
- * Magic number of PKH revocation extension header
- * The value shall gives the four bytes 'S','T',0x00,0x02 in memory
- */
- #define BOOT_API_AUTHENTICATION_HEADER_MAGIC_NB 0x02005453U
- /* Max number of ECDSA public key hash in table */
- #define BOOT_API_AUTHENTICATION_NB_PKH_MAX 8U
- /* ECDSA public key hash table size in bytes */
- #define BOOT_API_AUTHENTICATION_TABLE_SIZE_BYTES \
- (BOOT_API_AUTHENTICATION_NB_PKH_MAX * \
- BOOT_API_SHA256_DIGEST_SIZE_IN_BYTES)
- /*
- * Magic number of padding extension header
- * The value shall gives the four bytes 'S','T',0xFF,0xFF in memory
- */
- #define BOOT_API_PADDING_HEADER_MAGIC_NB 0xFFFF5453U
- /*
- * Cores secure magic numbers
- * Constant to be stored in bakcup register
- * BOOT_API_MAGIC_NUMBER_TAMP_BCK_REG_IDX
- */
- #define BOOT_API_A7_CORE0_MAGIC_NUMBER 0xCA7FACE0U
- #define BOOT_API_A7_CORE1_MAGIC_NUMBER 0xCA7FACE1U
- /*
- * TAMP_BCK4R register index
- * This register is used to write a Magic Number in order to restart
- * Cortex A7 Core 1 and make it execute @ branch address from TAMP_BCK5R
- */
- #define BOOT_API_CORE1_MAGIC_NUMBER_TAMP_BCK_REG_IDX 4U
- /*
- * TAMP_BCK5R register index
- * This register is used to contain the branch address of
- * Cortex A7 Core 1 when restarted by a TAMP_BCK4R magic number writing
- */
- #define BOOT_API_CORE1_BRANCH_ADDRESS_TAMP_BCK_REG_IDX 5U
- /*
- * Possible value of boot context field 'hse_clock_value_in_hz'
- */
- #define BOOT_API_CTX_HSE_CLOCK_VALUE_UNDEFINED 0U
- #define BOOT_API_CTX_HSE_CLOCK_VALUE_24_MHZ 24000000U
- #define BOOT_API_CTX_HSE_CLOCK_VALUE_25_MHZ 25000000U
- #define BOOT_API_CTX_HSE_CLOCK_VALUE_26_MHZ 26000000U
- /*
- * Possible value of boot context field 'boot_partition_used_toboot'
- */
- #define BOOT_API_CTX_BOOT_PARTITION_UNDEFINED 0U
- /* Used FSBL1 to boot */
- #define BOOT_API_CTX_BOOT_PARTITION_FSBL1 1U
- /* Used FSBL2 to boot */
- #define BOOT_API_CTX_BOOT_PARTITION_FSBL2 2U
- /* OTP_CFG0 */
- #define BOOT_API_OTP_MODE_WORD_NB 0
- /* Closed = OTP_CFG0[6] */
- #define BOOT_API_OTP_MODE_CLOSED_BIT_POS 6
- #define BOOT_API_RETURN_OK 0x77U
- /*
- * Boot Context related definitions
- */
- /*
- * Boot core boot configuration structure
- * Specifies all items of the cold boot configuration
- * Memory and peripheral part.
- */
- typedef struct {
- /*
- * Boot interface used to boot : take values from defines
- * BOOT_API_CTX_BOOT_INTERFACE_SEL_XXX above
- */
- uint16_t boot_interface_selected;
- uint16_t boot_interface_instance;
- #if STM32MP13
- uint32_t reserved1[12];
- #endif
- #if STM32MP15
- uint32_t reserved1[13];
- #endif
- uint32_t otp_afmux_values[3];
- uint32_t reserved[3];
- #if STM32MP15
- uint32_t reserved2[2];
- #endif
- uint32_t auth_status;
- #if STM32MP15
- /*
- * Pointers to bootROM External Secure Services
- * - ECDSA verify signature
- */
- uint32_t reserved3;
- uint32_t (*bootrom_ecdsa_verify_signature)(uint8_t *hash_in,
- uint8_t *pubkey_in,
- uint8_t *signature,
- uint32_t ecc_algo);
- uint32_t reserved4;
- #endif
- /*
- * Information specific to an SD boot
- * Updated each time an SD boot is at least attempted,
- * even if not successful
- * Note : This is useful to understand why an SD boot failed
- * in particular
- */
- uint32_t sd_err_internal_timeout_cnt;
- uint32_t sd_err_dcrc_fail_cnt;
- uint32_t sd_err_dtimeout_cnt;
- uint32_t sd_err_ctimeout_cnt;
- uint32_t sd_err_ccrc_fail_cnt;
- uint32_t sd_overall_retry_cnt;
- /*
- * Information specific to an eMMC boot
- * Updated each time an eMMC boot is at least attempted,
- * even if not successful
- * Note : This is useful to understand why an eMMC boot failed
- * in particular
- */
- uint32_t emmc_xfer_status;
- uint32_t emmc_error_status;
- uint32_t emmc_nbbytes_rxcopied_tosysram_download_area;
- uint32_t hse_clock_value_in_hz;
- /*
- * Boot partition :
- * ie FSBL partition on which the boot was successful
- */
- uint32_t boot_partition_used_toboot;
- } __packed boot_api_context_t;
- /*
- * Image Header related definitions
- */
- /*
- * Structure used to define the common Header format used for FSBL, xloader,
- * ... and in particular used by bootROM for FSBL header readout.
- * FSBL header size is 256 Bytes = 0x100
- */
- typedef struct {
- /* BOOT_API_IMAGE_HEADER_MAGIC_NB */
- uint32_t magic;
- uint8_t image_signature[BOOT_API_ECDSA_SIGNATURE_LEN_IN_BYTES];
- /*
- * Checksum of payload
- * 32-bit sum all payload bytes considered as 8 bit unsigned
- * numbers, discarding any overflow bits.
- * Use to check UART/USB downloaded image integrity when signature
- * is not used
- */
- uint32_t payload_checksum;
- /* Image header version : should have value BOOT_API_HEADER_VERSION */
- uint32_t header_version;
- /* Image length in bytes */
- uint32_t image_length;
- /*
- * Image Entry point address : should be in the SYSRAM area
- * and at least within the download area range
- */
- uint32_t image_entry_point;
- /* Reserved */
- uint32_t reserved1;
- /*
- * Image load address : not used by bootROM but to be consistent
- * with header format for other packages (xloader, ...)
- */
- uint32_t load_address;
- /* Reserved */
- uint32_t reserved2;
- /* Image version to be compared by bootROM with monotonic
- * counter value in OTP_CFG4 prior executing the downloaded image
- */
- uint32_t image_version;
- #if STM32MP13
- /*
- * Extension flags :
- *
- * Bit 0 : Authentication extension header
- * value 0 : No signature check request
- * Bit 1 : Encryption extension header
- * Bit 2 : Padding extension header
- */
- uint32_t extension_flags;
- /* Length in bytes of all extension headers */
- uint32_t extension_headers_length;
- /* Add binary type information */
- uint32_t binary_type;
- /* Pad up to 128 byte total size */
- uint8_t pad[16];
- /* Followed by extension header */
- uint8_t ext_header[];
- #endif
- #if STM32MP15
- /*
- * Option flags:
- * Bit 0 : No signature check request : 'No_sig_check'
- * value 1 : for No signature check request
- * value 0 : No request to bypass the signature check
- * Note : No signature check is never allowed on a Secured chip
- */
- uint32_t option_flags;
- /*
- * Type of ECC algorithm to use :
- * value 1 : for P-256 NIST algorithm
- * value 2 : for Brainpool 256 algorithm
- * See definitions 'BOOT_API_ECDSA_ALGO_TYPE_XXX' above.
- */
- uint32_t ecc_algo_type;
- /*
- * OEM ECC Public Key (aka Root pubk) provided in header on 512 bits.
- * The SHA-256 hash of the OEM ECC pubk must match the one stored
- * in OTP cells.
- */
- uint8_t ecc_pubk[BOOT_API_ECDSA_PUB_KEY_LEN_IN_BYTES];
- /* Pad up to 256 byte total size */
- uint8_t pad[83];
- /* Add binary type information */
- uint8_t binary_type;
- #endif
- } __packed boot_api_image_header_t;
- typedef uint8_t boot_api_sha256_t[BOOT_API_SHA256_DIGEST_SIZE_IN_BYTES];
- typedef struct {
- /* Extension header type:
- * BOOT_API_FSBL_DECRYPTION_HEADER_MAGIC_NB or
- * BOOT_API_AUTHENTICATION_HEADER_MAGIC_NB
- * BOOT_API_PADDING_HEADER_MAGIC_NB
- */
- uint32_t type;
- /* Extension header len in byte */
- uint32_t len;
- /* parameters of this extension */
- uint8_t params[];
- } __packed boot_extension_header_t;
- typedef struct {
- /* Idx of ECDSA public key to be used in table */
- uint32_t pk_idx;
- /* Number of ECDSA public key in table */
- uint32_t nb_pk;
- /*
- * Type of ECC algorithm to use :
- * value 1 : for P-256 NIST algorithm
- * value 2 : for Brainpool 256 algorithm
- * See definitions 'BOOT_API_ECDSA_ALGO_TYPE_XXX' above.
- */
- uint32_t ecc_algo_type;
- /* ECDSA public key to be used to check signature. */
- uint8_t ecc_pubk[BOOT_API_ECDSA_PUB_KEY_LEN_IN_BYTES];
- /* table of Hash of Algo+ECDSA public key */
- boot_api_sha256_t pk_hashes[];
- } __packed boot_ext_header_params_authentication_t;
- typedef struct {
- /* Size of encryption key (128 or 256) */
- uint32_t key_size;
- uint32_t derivation_cont;
- /* 128 msb bits of plain payload SHA256 */
- uint32_t hash[4];
- } __packed boot_ext_header_params_encrypted_fsbl_t;
- #endif /* BOOT_API_H */
|