xref: /rk3399_rockchip-uboot/board/freescale/common/cmd_esbc_validate.c (revision 856b284617eea5688ccf5f4655f8d70ac5ae5fbb)
147151e4bSgaurav rana /*
247151e4bSgaurav rana  * Copyright 2015 Freescale Semiconductor, Inc.
347151e4bSgaurav rana  *
447151e4bSgaurav rana  * SPDX-License-Identifier:	GPL-2.0+
547151e4bSgaurav rana  */
647151e4bSgaurav rana 
747151e4bSgaurav rana #include <common.h>
847151e4bSgaurav rana #include <command.h>
947151e4bSgaurav rana #include <fsl_validate.h>
1047151e4bSgaurav rana 
1198cb0efdSgaurav rana static int do_esbc_halt(cmd_tbl_t *cmdtp, int flag, int argc,
1298cb0efdSgaurav rana 				char * const argv[])
1398cb0efdSgaurav rana {
14*856b2846SAneesh Bansal 	if (fsl_check_boot_mode_secure() == 0) {
15*856b2846SAneesh Bansal 		printf("Boot Mode is Non-Secure. Not entering spin loop.\n");
16*856b2846SAneesh Bansal 		return 0;
17*856b2846SAneesh Bansal 	}
18*856b2846SAneesh Bansal 
1998cb0efdSgaurav rana 	printf("Core is entering spin loop.\n");
2098cb0efdSgaurav rana loop:
2198cb0efdSgaurav rana 	goto loop;
2298cb0efdSgaurav rana 
2398cb0efdSgaurav rana 	return 0;
2498cb0efdSgaurav rana }
2598cb0efdSgaurav rana 
2647151e4bSgaurav rana static int do_esbc_validate(cmd_tbl_t *cmdtp, int flag, int argc,
2747151e4bSgaurav rana 				char * const argv[])
2847151e4bSgaurav rana {
29bc71f926SAneesh Bansal 	char *hash_str = NULL;
30b055a0fdSAneesh Bansal 	uintptr_t haddr;
31bc71f926SAneesh Bansal 	int ret;
32bc71f926SAneesh Bansal 
3347151e4bSgaurav rana 	if (argc < 2)
3447151e4bSgaurav rana 		return cmd_usage(cmdtp);
35bc71f926SAneesh Bansal 	else if (argc > 2)
36bc71f926SAneesh Bansal 		/* Second arg - Optional - Hash Str*/
37bc71f926SAneesh Bansal 		hash_str = argv[2];
3847151e4bSgaurav rana 
39bc71f926SAneesh Bansal 	/* First argument - header address -32/64bit */
40b055a0fdSAneesh Bansal 	haddr = (uintptr_t)simple_strtoul(argv[1], NULL, 16);
41bc71f926SAneesh Bansal 
42b055a0fdSAneesh Bansal 	/* With esbc_validate command, Image address must be
43b055a0fdSAneesh Bansal 	 * part of header. So, the function is called
44b055a0fdSAneesh Bansal 	 * by passing this argument as 0.
45b055a0fdSAneesh Bansal 	 */
46b055a0fdSAneesh Bansal 	ret = fsl_secboot_validate(haddr, hash_str, 0);
47bc71f926SAneesh Bansal 	if (ret)
48bc71f926SAneesh Bansal 		return 1;
49bc71f926SAneesh Bansal 
50bc71f926SAneesh Bansal 	printf("esbc_validate command successful\n");
51bc71f926SAneesh Bansal 	return 0;
5247151e4bSgaurav rana }
5347151e4bSgaurav rana 
5447151e4bSgaurav rana /***************************************************/
5547151e4bSgaurav rana static char esbc_validate_help_text[] =
5647151e4bSgaurav rana 	"esbc_validate hdr_addr <hash_val> - Validates signature using\n"
5747151e4bSgaurav rana 	"                          RSA verification\n"
5847151e4bSgaurav rana 	"                          $hdr_addr Address of header of the image\n"
5947151e4bSgaurav rana 	"                          to be validated.\n"
6047151e4bSgaurav rana 	"                          $hash_val -Optional\n"
6147151e4bSgaurav rana 	"                          It provides Hash of public/srk key to be\n"
6247151e4bSgaurav rana 	"                          used to verify signature.\n";
6347151e4bSgaurav rana 
6447151e4bSgaurav rana U_BOOT_CMD(
6547151e4bSgaurav rana 	esbc_validate,	3,	0,	do_esbc_validate,
6647151e4bSgaurav rana 	"Validates signature on a given image using RSA verification",
6747151e4bSgaurav rana 	esbc_validate_help_text
6847151e4bSgaurav rana );
6998cb0efdSgaurav rana 
7098cb0efdSgaurav rana U_BOOT_CMD(
7198cb0efdSgaurav rana 	esbc_halt,	1,	0,	do_esbc_halt,
72*856b2846SAneesh Bansal 	"Put the core in spin loop (Secure Boot Only)",
7398cb0efdSgaurav rana 	""
7498cb0efdSgaurav rana );
75