inwudriver-weibo/boot/flashboot/cmd/flash_secure.c

739 lines
12 KiB
C
Raw Normal View History

/* *
* Copyright (c) CompanyNameMagicTag 2018-2019. All rights reserved.
* Description: falsh security
* Author: CompanyName
* Create: 2018-10-31
*/
#ifdef TEST_RANDOM_CMD
int do_get_random(cmd_tbl_t *cmdtp, int flag, int argc, char * const argv[])
{
td_u32 rng = 0;
if (uapi_get_random(&rng) == BOOT_FAILURE) {
boot_msg1("ERR , default random value is ", rng);
return 0;
}
boot_msg1("SUCCESS, random value is ", rng);
return 0;
}
#endif
#ifdef TEST_RSA_CMD
static unsigned char g_sha256_sum[32] = {
/* ARRAY 32B */
0x24,
0x8D,
0x6A,
0x61,
0xD2,
0x06,
0x38,
0xB8,
0xE5,
0xC0,
0x26,
0x93,
0x0C,
0x3E,
0x60,
0x39,
0xA3,
0x3C,
0xE4,
0x59,
0x64,
0xFF,
0x21,
0x67,
0xF6,
0xEC,
0xED,
0xD4,
0x19,
0xDB,
0x06,
0xC1,
};
static unsigned char g_sha256_sum2[32] = {
/* ARRAY 32B */
0x79,
0xfe,
0x2e,
0xe9,
0x24,
0x8b,
0x3e,
0x3d,
0x4a,
0xf5,
0x59,
0x75,
0xe5,
0x3d,
0x41,
0x22,
0x37,
0x7d,
0xf8,
0x01,
0x50,
0x5d,
0x52,
0x09,
0x1c,
0xbb,
0x23,
0x36,
0x78,
0xeb,
0xc7,
0xf6,
};
static unsigned char g_n[] = {
0x82, 0x78, 0xA0, 0xC5, 0x39, 0xE6, 0xF6, 0xA1, 0x5E, 0xD1, 0xC6, 0x8B, 0x9C, 0xF9, 0xC4, 0x3F,
0xEA, 0x19, 0x16, 0xB0, 0x96, 0x3A, 0xB0, 0x5A, 0x94, 0xED, 0x6A, 0xD3, 0x83, 0xE8, 0xA0, 0xFD,
0x01, 0x5E, 0x92, 0x2A, 0x7D, 0x0D, 0xF9, 0x72, 0x1E, 0x03, 0x8A, 0x68, 0x8B, 0x4D, 0x57, 0x55,
0xF5, 0x2F, 0x9A, 0xC9, 0x45, 0xCF, 0x9B, 0xB7, 0xF5, 0x11, 0x94, 0x7A, 0x16, 0x0B, 0xED, 0xD9,
0xA3, 0xF0, 0x63, 0x8A, 0xEC, 0xD3, 0x21, 0xAB, 0xCF, 0x74, 0xFC, 0x6B, 0xCE, 0x06, 0x4A, 0x51,
0xC9, 0x7C, 0x7C, 0xA3, 0xC4, 0x10, 0x63, 0x7B, 0x00, 0xEC, 0x2D, 0x02, 0x18, 0xD5, 0xF1, 0x8E,
0x19, 0x7F, 0xBE, 0xE2, 0x45, 0x5E, 0xD7, 0xA8, 0x95, 0x90, 0x88, 0xB0, 0x73, 0x35, 0x89, 0x66,
0x1C, 0x23, 0xB9, 0x6E, 0x88, 0xE0, 0x7A, 0x57, 0xB0, 0x55, 0x8B, 0x81, 0x9B, 0x9C, 0x34, 0x9F,
0x86, 0x0E, 0x15, 0x94, 0x2C, 0x6B, 0x12, 0xC3, 0xB9, 0x56, 0x60, 0x25, 0x59, 0x3E, 0x50, 0x7B,
0x62, 0x4A, 0xD0, 0xF0, 0xB6, 0xB1, 0x94, 0x83, 0x51, 0x66, 0x6F, 0x60, 0x4D, 0xEF, 0x8F, 0x94,
0xA6, 0xD1, 0xA2, 0x80, 0x06, 0x24, 0xF2, 0x6E, 0xD2, 0xC7, 0x01, 0x34, 0x8D, 0x2B, 0x6B, 0x03,
0xF7, 0x05, 0xA3, 0x99, 0xCC, 0xC5, 0x16, 0x75, 0x1A, 0x81, 0xC1, 0x67, 0xA0, 0x88, 0xE6, 0xE9,
0x00, 0xFA, 0x62, 0xAF, 0x2D, 0xA9, 0xFA, 0xC3, 0x30, 0x34, 0x98, 0x05, 0x4C, 0x1A, 0x81, 0x0C,
0x52, 0xCE, 0xBA, 0xD6, 0xEB, 0x9C, 0x1E, 0x76, 0x01, 0x41, 0x6C, 0x34, 0xFB, 0xC0, 0x83, 0xC5,
0x4E, 0xB3, 0xF2, 0x5B, 0x4F, 0x94, 0x08, 0x33, 0x87, 0x5E, 0xF8, 0x39, 0xEF, 0x7F, 0x72, 0x94,
0xFF, 0xD7, 0x51, 0xE8, 0xA2, 0x5E, 0x26, 0x25, 0x5F, 0xE9, 0xCC, 0x2A, 0x7D, 0xAC, 0x5B, 0x35
};
unsigned char g_e[] = {
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x01
};
unsigned char g_sign[] = {
0x5c,
0xfd,
0x7c,
0xb3,
0x9f,
0xf1,
0x2b,
0xd0,
0x73,
0x23,
0x21,
0x4e,
0x25,
0x3d,
0x68,
0x5c,
0x6c,
0x4b,
0x12,
0x77,
0x6b,
0x0e,
0x26,
0x80,
0x2a,
0xf4,
0xd2,
0x92,
0x66,
0x40,
0xe0,
0xb2,
0x5f,
0xbe,
0x81,
0xa1,
0xda,
0xa4,
0xc5,
0x07,
0x96,
0x17,
0x4a,
0x12,
0x5f,
0xa4,
0x33,
0x43,
0x3f,
0x94,
0x7e,
0xe7,
0xbb,
0xd1,
0x7b,
0xde,
0x03,
0xb8,
0xcc,
0xe5,
0x79,
0x5c,
0x3e,
0x5c,
0x3c,
0xa1,
0x49,
0xbf,
0xda,
0xc4,
0xb4,
0x73,
0x2d,
0x49,
0x9f,
0x7a,
0xf9,
0x1d,
0x8a,
0xbc,
0x39,
0x17,
0xbc,
0xd7,
0x45,
0xaf,
0xad,
0x38,
0x99,
0xc1,
0x1c,
0xf7,
0xe6,
0xf2,
0x7b,
0x16,
0x26,
0xaa,
0xa9,
0x16,
0x96,
0xff,
0x02,
0x41,
0x97,
0x1e,
0x81,
0x43,
0xab,
0xff,
0xa8,
0xb7,
0x19,
0xdf,
0x19,
0xac,
0x19,
0xdb,
0xbf,
0x15,
0x00,
0x12,
0xbe,
0x64,
0x2b,
0xd4,
0x50,
0x32,
0x87,
0xdf,
0x52,
0xb1,
0x78,
0x65,
0x53,
0x7d,
0x10,
0x2d,
0xc1,
0x39,
0xfc,
0x9d,
0x05,
0x15,
0x07,
0x84,
0xb2,
0xa1,
0x5b,
0x72,
0x82,
0x22,
0x73,
0x1f,
0x00,
0xbf,
0xf8,
0x71,
0x3a,
0xf3,
0x5a,
0x02,
0x60,
0x53,
0x40,
0x44,
0x65,
0x0e,
0xb1,
0x3b,
0xe4,
0x9a,
0xe9,
0x8d,
0x10,
0x81,
0xa4,
0x0b,
0xed,
0x02,
0xb7,
0x7f,
0x4a,
0x32,
0x90,
0xbb,
0xe7,
0xe6,
0xb8,
0x69,
0x0f,
0x95,
0xea,
0x93,
0x45,
0x2c,
0x5f,
0x76,
0xfd,
0xb6,
0xcb,
0x1a,
0x7b,
0xe9,
0xc1,
0x37,
0xf7,
0x77,
0xba,
0xb4,
0x1a,
0x26,
0xea,
0x68,
0x18,
0x35,
0x5d,
0x71,
0xe8,
0x3f,
0xdd,
0x97,
0x7d,
0x57,
0xa6,
0x40,
0x45,
0xd8,
0x0d,
0xe4,
0xc7,
0xc0,
0x04,
0xdf,
0x20,
0x9e,
0x3a,
0x85,
0x85,
0x44,
0x37,
0x45,
0x31,
0x96,
0x3b,
0xa8,
0xa7,
0xf6,
0xec,
0xff,
0xf1,
0xd1,
0xa4,
0x23,
0x7e,
0x8c,
};
unsigned char g_sign2[] = {
0x09,
0x7f,
0xd6,
0x56,
0x92,
0x74,
0x83,
0xcb,
0x15,
0x79,
0xbb,
0x5d,
0x04,
0x04,
0xec,
0xf8,
0x95,
0xe2,
0x13,
0x72,
0x1f,
0xb2,
0xfa,
0x67,
0x73,
0x12,
0x0e,
0xed,
0x2a,
0xdc,
0xf3,
0x7d,
0x2e,
0x36,
0x1e,
0x6e,
0x0b,
0x6a,
0x4b,
0xea,
0xde,
0xe9,
0x20,
0x53,
0x5d,
0xd9,
0xe5,
0x71,
0xc3,
0x43,
0x8e,
0x49,
0x75,
0x17,
0x8d,
0xff,
0xdc,
0xf9,
0x9a,
0xdb,
0x48,
0xea,
0x4b,
0x42,
0x96,
0xdc,
0x66,
0xc4,
0x8f,
0x3c,
0xf1,
0x21,
0x2c,
0x3a,
0x5d,
0x21,
0xc5,
0x8e,
0x6f,
0x2a,
0xc2,
0x53,
0x0d,
0xe1,
0xce,
0xa0,
0xac,
0x4e,
0xed,
0x07,
0x77,
0xef,
0x33,
0xce,
0xef,
0x4d,
0x5f,
0x9b,
0x8d,
0x1d,
0xf9,
0x57,
0xac,
0xc5,
0x1e,
0xa5,
0x5c,
0x63,
0x8e,
0x9a,
0x73,
0x7a,
0x7f,
0x6a,
0x0c,
0x7d,
0x24,
0x7e,
0x9c,
0xc9,
0xe3,
0xdf,
0xfc,
0xb9,
0x57,
0x11,
0x3e,
0x5e,
0xa2,
0xae,
0x08,
0x58,
0x52,
0x25,
0x26,
0xa9,
0xff,
0xa2,
0xce,
0x86,
0x04,
0xaf,
0x89,
0xb5,
0x71,
0xa9,
0xd5,
0xb4,
0xee,
0x59,
0xfa,
0xbb,
0xfd,
0x24,
0xc2,
0xeb,
0x8b,
0x92,
0x72,
0x4c,
0xa8,
0xe1,
0x9d,
0xf7,
0xd5,
0x02,
0x88,
0x58,
0x3b,
0x6a,
0x24,
0x1b,
0x74,
0xda,
0x54,
0x8a,
0xca,
0x04,
0xd5,
0xe0,
0x4c,
0xcb,
0x9a,
0xba,
0xd6,
0x70,
0x4c,
0x5e,
0x41,
0x98,
0xc5,
0xf9,
0x33,
0xb2,
0xd3,
0x43,
0xd4,
0xaa,
0xc6,
0x0c,
0xe6,
0xbf,
0xab,
0xe2,
0x63,
0x82,
0x7a,
0x09,
0x1a,
0xed,
0xc3,
0xa0,
0x06,
0x47,
0x84,
0x85,
0x22,
0x5f,
0xfe,
0xa5,
0x3e,
0xaa,
0xbe,
0x27,
0x2d,
0xeb,
0x1f,
0x6d,
0x0b,
0x1e,
0x32,
0xf5,
0xa1,
0x5f,
0x85,
0x03,
0x12,
0x70,
0x46,
0xfd,
0x6d,
0x40,
0x84,
0x35,
0x8d,
0xd3,
0x59,
0x23,
0x87,
0x55,
0xdb,
0x15,
0xba,
0xcc,
0xcb,
0xb3,
};
int do_test_rsa(cmd_tbl_t *cmdtp, int flag, int argc, char * const argv[])
{
if (uapi_rsa_verify(g_n, g_e, 256, /* key length 256 */
EXT_MODE_PKCS_V15, g_sha256_sum, g_sign) != BOOT_SUCCESS) {
boot_msg0("EXT_RSA_Verify failed\n");
return 1;
}
boot_msg0("RSA public verify OK\n");
if (uapi_rsa_verify(g_n, g_e, 256, /* key length 256 */
EXT_MODE_PKCS_PSS, g_sha256_sum2, g_sign2) != BOOT_SUCCESS) {
boot_msg0("EXT_RSA_Verify failed\n");
return 1;
}
boot_msg0("RSA public verify OK\n");
return 0;
}
#endif
#ifdef TEST_EFUSE_CMD
int do_efuse_test(cmd_tbl_t *cmdtp, int flag, int argc, char * const argv[])
{
td_s32 ret;
td_u8 data = 0xaf;
/* read or write a single bit */
ret = uapi_efuse_usr_write(0x100, 1, &data);
if (ret != BOOT_SUCCESS) {
boot_msg1("1 ret = ", ret);
}
data = 0;
ret = uapi_efuse_usr_read(0x100, 1, &data);
if (ret != BOOT_SUCCESS) {
boot_msg1("2 ret = ", ret);
} else {
boot_msg1("2 data = ", data);
}
/* read or write for not alingned address */
ret = uapi_efuse_usr_write(0x109, 1, &data);
if (ret != BOOT_SUCCESS) {
boot_msg1("3 ret = ", ret);
}
data = 0;
ret = uapi_efuse_usr_read(0x109, 1, &data);
if (ret != BOOT_SUCCESS) {
boot_msg1("4 ret = ", ret);
} else {
boot_msg1("4 data = ", data);
}
data = 0;
ret = uapi_efuse_usr_read(0x108, 1, &data);
if (ret != BOOT_SUCCESS) {
boot_msg1("4 ret = ", ret);
} else {
boot_msg1("4 data = ", data);
}
/* data is null */
ret = uapi_efuse_usr_write(0x110, 8, TD_NULL); /* start bit:0x110, size 8 */
if (ret != BOOT_SUCCESS) {
boot_msg1("5 ret = ", ret);
}
data = 0;
ret = uapi_efuse_usr_read(0x110, 8, TD_NULL); /* start bit:0x110, size 8 */
if (ret != BOOT_SUCCESS) {
boot_msg1("6 ret = ", ret);
} else {
boot_msg1("6 data = ", data);
}
}
#endif
#ifdef TEST_RANDOM_CMD
u_flash_boot_cmd(random, 1, 0, do_get_random, "random -get random number ");
#endif
#ifdef TEST_EFUSE_CMD
u_flash_boot_cmd(test_efuse, 1, 0, do_efuse_test, "test_efuse");
#endif
#ifdef TEST_RSA_CMD
u_flash_boot_cmd(test_rsa, 1, 0, do_test_rsa, "test_rsa");
#endif