blob: d3bed76312e2338958b0028d04261f1b260de9b9 [file] [log] [blame]
Yann Gautiera3f46382023-06-14 10:40:59 +02001/*
2 * Copyright (c) 2023, STMicroelectronics - All Rights Reserved
3 *
4 * SPDX-License-Identifier: BSD-3-Clause
5 */
6
7#ifndef BOOT_API_H
8#define BOOT_API_H
9
10#include <stdint.h>
11#include <stdio.h>
12
13/*
14 * Exported constants
15 */
16
17/*
18 * Boot Context related definitions
19 */
20
21/*
22 * Possible value of boot context field 'auth_status'
23 */
24/* No authentication done */
25#define BOOT_API_CTX_AUTH_NO 0x0U
26/* Authentication done and failed */
27#define BOOT_API_CTX_AUTH_FAILED 0x1U
28/* Authentication done and succeeded */
29#define BOOT_API_CTX_AUTH_SUCCESS 0x2U
30
31/*
32 * Possible value of boot context field 'boot_interface_sel'
33 */
34
35/* Value of field 'boot_interface_sel' when no boot occurred */
36#define BOOT_API_CTX_BOOT_INTERFACE_SEL_NO 0x0U
37
38/* Boot occurred on SD */
39#define BOOT_API_CTX_BOOT_INTERFACE_SEL_FLASH_SD 0x1U
40
41/* Boot occurred on EMMC */
42#define BOOT_API_CTX_BOOT_INTERFACE_SEL_FLASH_EMMC 0x2U
43
44/* Boot occurred on FMC */
45#define BOOT_API_CTX_BOOT_INTERFACE_SEL_FLASH_NAND_FMC 0x3U
46
47/* Boot occurred on OSPI NOR */
48#define BOOT_API_CTX_BOOT_INTERFACE_SEL_FLASH_NOR_SPI 0x4U
49
50/* Boot occurred on UART */
51#define BOOT_API_CTX_BOOT_INTERFACE_SEL_SERIAL_UART 0x5U
52
53/* Boot occurred on USB */
54#define BOOT_API_CTX_BOOT_INTERFACE_SEL_SERIAL_USB 0x6U
55
56/* Boot occurred on OSPI NAND */
57#define BOOT_API_CTX_BOOT_INTERFACE_SEL_FLASH_NAND_SPI 0x7U
58
59/* Boot occurred on HyperFlash QSPI */
60#define BOOT_API_CTX_BOOT_INTERFACE_SEL_HYPERFLASH_OSPI 0x8U
61
62/*
63 * Possible value of boot context field 'emmc_xfer_status'
64 */
65#define BOOT_API_CTX_EMMC_XFER_STATUS_NOT_STARTED 0x0U
66#define BOOT_API_CTX_EMMC_XFER_STATUS_DATAEND_DETECTED 0x1U
67#define BOOT_API_CTX_EMMC_XFER_STATUS_XFER_DATA_TIMEOUT 0x2U
68
69/*
70 * Possible value of boot context field 'emmc_error_status'
71 */
72#define BOOT_API_CTX_EMMC_ERROR_STATUS_NONE 0x0U
73#define BOOT_API_CTX_EMMC_ERROR_STATUS_CMD_TIMEOUT 0x1U
74#define BOOT_API_CTX_EMMC_ERROR_STATUS_ACK_TIMEOUT 0x2U
75#define BOOT_API_CTX_EMMC_ERROR_STATUS_DATA_CRC_FAIL 0x3U
76#define BOOT_API_CTX_EMMC_ERROR_STATUS_NOT_ENOUGH_BOOT_DATA_RX 0x4U
77#define BOOT_API_CTX_EMMC_ERROR_STATUS_HEADER_NOT_FOUND 0x5U
78#define BOOT_API_CTX_EMMC_ERROR_STATUS_HEADER_SIZE_ZERO 0x6U
79#define BOOT_API_CTX_EMMC_ERROR_STATUS_IMAGE_NOT_COMPLETE 0x7U
80#define BOOT_API_CTX_EMMC_ERROR_STATUS_ACK_ERROR 0x8U
81
82/* Definitions relative to 'p_rom_version_info->platform_type_ver' field */
83#define BOOT_API_CTX_ROM_VERSION_PLAT_VER_IC_EMU_FPGA 0xAA
84#define BOOT_API_CTX_ROM_VERSION_PLAT_VER_FPGA_ONLY 0xBB
85
86/* Image Header related definitions */
87
88/* Definition of header version */
89#define BOOT_API_HEADER_VERSION 0x00020000U
90
91/*
92 * Magic number used to detect header in memory
93 * Its value must be 'S' 'T' 'M' 0x32, i.e 0x324D5453 as field
94 * 'bootapi_image_header_t.magic'
95 * This identifies the start of a boot image.
96 */
97#define BOOT_API_IMAGE_HEADER_MAGIC_NB 0x324D5453U
98
99/* Definitions related to Authentication used in image header structure */
100#define BOOT_API_ECDSA_PUB_KEY_LEN_IN_BYTES 64
101#define BOOT_API_ECDSA_SIGNATURE_LEN_IN_BYTES 64
102#define BOOT_API_SHA256_DIGEST_SIZE_IN_BYTES 32
103
104/* Possible values of the field 'boot_api_image_header_t.ecc_algo_type' */
105#define BOOT_API_ECDSA_ALGO_TYPE_P256NIST 1
106#define BOOT_API_ECDSA_ALGO_TYPE_BRAINPOOL256 2
107
108/*
109 * Extension headers related definitions
110 */
111/* 'bootapi_image_header_t.extension_flag' used for authentication feature */
112#define BOOT_API_AUTHENTICATION_EXTENSION_BIT BIT(0)
113/* 'bootapi_image_header_t.extension_flag' used for FSBL decryption feature */
114#define BOOT_API_FSBL_DECRYPTION_EXTENSION_BIT BIT(1)
115/* 'bootapi_image_header_t.extension_flag' used for padding header feature */
116#define BOOT_API_PADDING_EXTENSION_BIT BIT(31)
117/*
118 * mask of bits of field 'bootapi_image_header_t.extension_flag'
119 * used for extension headers
120 */
121#define BOOT_API_ALL_EXTENSIONS_MASK \
122 (BOOT_API_AUTHENTICATION_EXTENSION_BIT | \
123 BOOT_API_FSBL_DECRYPTION_EXTENSION_BIT | \
124 BOOT_API_PADDING_EXTENSION_BIT)
125/*
126 * Magic number of FSBL decryption extension header
127 * The value shall gives the four bytes 'S','T',0x00,0x01 in memory
128 */
129#define BOOT_API_FSBL_DECRYPTION_HEADER_MAGIC_NB 0x01005453U
130
131/*
132 * Magic number of PKH revocation extension header
133 * The value shall gives the four bytes 'S','T',0x00,0x02 in memory
134 */
135#define BOOT_API_AUTHENTICATION_HEADER_MAGIC_NB 0x02005453U
136
137/* Max number of ECDSA public key hash in table */
138#define BOOT_API_AUTHENTICATION_NB_PKH_MAX 8U
139
140/* ECDSA public key hash table size in bytes */
141#define BOOT_API_AUTHENTICATION_TABLE_SIZE_BYTES \
142 (BOOT_API_AUTHENTICATION_NB_PKH_MAX * \
143 BOOT_API_SHA256_DIGEST_SIZE_IN_BYTES)
144
145/*
146 * Magic number of padding extension header
147 * The value shall gives the four bytes 'S','T',0xFF,0xFF in memory
148 */
149#define BOOT_API_PADDING_HEADER_MAGIC_NB 0xFFFF5453U
150
151/*
152 * Related to binaryType
153 * 0x00: U-Boot
154 * 0x10-0x1F: TF-A
155 * 0x20-0X2F: OPTEE
156 * 0x30: CM33 image
157 */
158#define BOOT_API_IMAGE_TYPE_UBOOT 0x0
159#define BOOT_API_IMAGE_TYPE_M33 0x30
160
161/*
162 * Cores secure magic numbers
163 * Constant to be stored in bakcup register
164 * BOOT_API_MAGIC_NUMBER_TAMP_BCK_REG_IDX
165 */
166#define BOOT_API_A35_CORE0_MAGIC_NUMBER 0xCA7FACE0U
167#define BOOT_API_A35_CORE1_MAGIC_NUMBER 0xCA7FACE1U
168
169/*
170 * TAMP_BCK9R register index
171 * This register is used to write a Magic Number in order to restart
172 * Cortex A35 Core 1 and make it execute @ branch address from TAMP_BCK5R
173 */
174#define BOOT_API_CORE1_MAGIC_NUMBER_TAMP_BCK_REG_IDX 9U
175
176/*
177 * TAMP_BCK10R register index
178 * This register is used to contain the branch address of
179 * Cortex A35 Core 1 when restarted by a TAMP_BCK4R magic number writing
180 */
181#define BOOT_API_CORE1_BRANCH_ADDRESS_TAMP_BCK_REG_IDX 10U
182
183/*
184 * Possible value of boot context field 'hse_clock_value_in_hz'
185 */
186#define BOOT_API_CTX_HSE_CLOCK_VALUE_UNDEFINED 0U
187#define BOOT_API_CTX_HSE_CLOCK_VALUE_19_2_MHZ 19200000U
188#define BOOT_API_CTX_HSE_CLOCK_VALUE_24_MHZ 24000000U
189#define BOOT_API_CTX_HSE_CLOCK_VALUE_25_MHZ 25000000U
190#define BOOT_API_CTX_HSE_CLOCK_VALUE_26_MHZ 26000000U
191#define BOOT_API_CTX_HSE_CLOCK_VALUE_40_MHZ 40000000U
192#define BOOT_API_CTX_HSE_CLOCK_VALUE_48_MHZ 48000000U
193
194/*
195 * Possible value of boot context field 'boot_partition_used_toboot'
196 */
197#define BOOT_API_CTX_BOOT_PARTITION_UNDEFINED 0U
198
199/* Used FSBL1 to boot */
200#define BOOT_API_CTX_BOOT_PARTITION_FSBL1 1U
201
202/* Used FSBL2 to boot */
203#define BOOT_API_CTX_BOOT_PARTITION_FSBL2 2U
204
205#define BOOT_API_RETURN_OK 0x66U
206
207/*
208 * Possible values of boot context field
209 * 'ssp_config_ptr_in->ssp_cmd'
210 */
211/* 'K' 'B' 'U' 'P' -.> 'PUBK' */
212#define BOOT_API_CTX_SSP_CMD_CALC_CHIP_PUBK 0x4B425550
213
214/*
215 * Exported types
216 */
217
218/*
219 * bootROM version information structure definition
220 * Total size = 24 bytes = 6 uint32_t
221 */
222typedef struct {
223 /* Chip Version */
224 uint32_t chip_ver;
225
226 /* Cut version within a fixed chip version */
227 uint32_t cut_ver;
228
229 /* Version of ROM Mask within a fixed cut version */
230 uint32_t rom_mask_ver;
231
232 /* Internal Version of bootROM code */
233 uint32_t bootrom_ver;
234
235 /* Version of bootROM adapted */
236 uint32_t for_chip_design_rtl_ver;
237
238 /* Restriction on compiled platform when it applies */
239 uint32_t platform_type_ver;
240} boot_api_rom_version_info_t;
241
242/*
243 * Boot Context related definitions
244 */
245
246/*
247 * Boot core boot configuration structure
248 * Specifies all items of the secure boot configuration
249 * Memory and peripheral part.
250 */
251typedef struct {
252 /* Boot partition: ie FSBL partition on which the boot was successful */
253 uint32_t boot_partition_used_toboot;
254
255 uint32_t reserved1[3];
256
257 /*
258 * Information specific to an SD boot
259 * Updated each time an SD boot is at least attempted,
260 * even if not successful
261 * Note : This is useful to understand why an SD boot failed
262 * in particular
263 */
264 uint32_t sd_err_internal_timeout_cnt;
265 uint32_t sd_err_dcrc_fail_cnt;
266 uint32_t sd_err_dtimeout_cnt;
267 uint32_t sd_err_ctimeout_cnt;
268 uint32_t sd_err_ccrc_fail_cnt;
269 uint32_t sd_overall_retry_cnt;
270 /*
271 * Information specific to an eMMC boot
272 * Updated each time an eMMC boot is at least attempted,
273 * even if not successful
274 * Note : This is useful to understand why an eMMC boot failed
275 * in particular
276 */
277 uint32_t emmc_xfer_status;
278 uint32_t emmc_error_status;
279 uint32_t emmc_nbbytes_rxcopied_tosysram_download_area;
280
281 uint32_t reserved[4];
282 /*
283 * Boot interface used to boot : take values from defines
284 * BOOT_API_CTX_BOOT_INTERFACE_SEL_XXX above
285 */
286 uint16_t boot_interface_selected;
287 uint16_t boot_interface_instance;
288
289 uint32_t hse_clock_value_in_hz;
290
291 uint32_t nand_fsbl_first_block;
292
293 /*
294 * Returned authentication status : take values from defines
295 * BOOT_API_CTX_AUTH_XXX above
296 */
297 uint32_t auth_status;
298
299 /* Pointer on ROM constant containing ROM information */
300 const boot_api_rom_version_info_t *p_rom_version_info;
301} __packed boot_api_context_t;
302
303/*
304 * Image Header related definitions
305 */
306
307/*
308 * Structure used to define the common Header format used for FSBL, xloader,
309 * ... and in particular used by bootROM for FSBL header readout.
310 * FSBL header size is 256 Bytes = 0x100
311 */
312typedef struct {
313 /* BOOT_API_IMAGE_HEADER_MAGIC_NB */
314 uint32_t magic;
315 uint8_t image_signature[BOOT_API_ECDSA_SIGNATURE_LEN_IN_BYTES];
316 /*
317 * Checksum of payload
318 * 32-bit sum all payload bytes considered as 8 bit unsigned
319 * numbers, discarding any overflow bits.
320 * Use to check UART/USB downloaded image integrity when signature
321 * is not used
322 */
323 uint32_t payload_checksum;
324 /* Image header version : should have value BOOT_API_HEADER_VERSION */
325 uint32_t header_version;
326 /* Image length in bytes */
327 uint32_t image_length;
328 /*
329 * Image Entry point address : should be in the SYSRAM area
330 * and at least within the download area range
331 */
332 uint32_t image_entry_point;
333 /* Reserved */
334 uint32_t reserved1;
335 /*
336 * Image load address : not used by bootROM but to be consistent
337 * with header format for other packages (xloader, ...)
338 */
339 uint32_t load_address;
340 /* Reserved */
341 uint32_t reserved2;
342 /* Image version to be compared by bootROM with FSBL_A or FSBL_M version
343 * counter value in OTP prior executing the downloaded image
344 */
345 uint32_t image_version;
346 /*
347 * Extension flags :
348 *
349 * Bit 0 : Authentication extension header
350 * value 0 : No signature check request
351 * Bit 1 : Encryption extension header
352 * Bit 2 : Padding extension header
353 */
354 uint32_t extension_flags;
355 /* Length in bytes of all extension headers */
356 uint32_t extension_headers_length;
357 /* Add binary type information */
358 uint32_t binary_type;
359 /* Pad up to 128 byte total size */
360 uint8_t pad[16];
361 /* Followed by extension header */
362 uint8_t ext_header[];
363} __packed boot_api_image_header_t;
364
365typedef uint8_t boot_api_sha256_t[BOOT_API_SHA256_DIGEST_SIZE_IN_BYTES];
366
367typedef struct {
368 /* Extension header type:
369 * BOOT_API_FSBL_DECRYPTION_HEADER_MAGIC_NB or
370 * BOOT_API_AUTHENTICATION_HEADER_MAGIC_NB
371 * BOOT_API_PADDING_HEADER_MAGIC_NB
372 */
373 uint32_t type;
374 /* Extension header len in byte */
375 uint32_t len;
376 /* parameters of this extension */
377 uint8_t params[];
378} __packed boot_extension_header_t;
379
380typedef struct {
381 /* Idx of ECDSA public key to be used in table */
382 uint32_t pk_idx;
383 /* Number of ECDSA public key in table */
384 uint32_t nb_pk;
385 /*
386 * Type of ECC algorithm to use :
387 * value 1 : for P-256 NIST algorithm
388 * value 2 : for Brainpool 256 algorithm
389 * See definitions 'BOOT_API_ECDSA_ALGO_TYPE_XXX' above.
390 */
391 uint32_t ecc_algo_type;
392 /* ECDSA public key to be used to check signature. */
393 uint8_t ecc_pubk[BOOT_API_ECDSA_PUB_KEY_LEN_IN_BYTES];
394 /* table of Hash of Algo+ECDSA public key */
395 boot_api_sha256_t pk_hashes[];
396} __packed boot_ext_header_params_authentication_t;
397
398typedef struct {
399 /* Size of encryption key (128 or 256) */
400 uint32_t key_size;
401 uint32_t derivation_cont;
402 /* 128 msb bits of plain payload SHA256 */
403 uint32_t hash[4];
404} __packed boot_ext_header_params_encrypted_fsbl_t;
405
406#endif /* BOOT_API_H */