view fluid-mnf/calplus/secure_types.h @ 354:f89a20e7adc7

fluid-mnf: helper files sought in proper install location
author Mychaela Falconia <falcon@freecalypso.org>
date Fri, 13 Mar 2020 19:56:56 +0000
parents 9cecc930d78f
children
line wrap: on
line source

/*                %Z% nom : %M% SID: %I% date : %G%                           */
/* Filename:      %M%                                                         */
/* Version:       %I%                                                         */
/******************************************************************************
 *                   WIRELESS COMMUNICATION SYSTEM DEVELOPMENT
 *
 *             (C) 2002 Texas Instruments France. All rights reserved
 *
 *                          Author : Constantin HAIDAMOUS
 *
 *
 *  Important Note
 *  --------------
 *
 *  This S/W is a preliminary version. It contains information on a product
 *  under development and is issued for evaluation purposes only. Features
 *  characteristics, data and other information are subject to change.
 *
 *  The S/W is furnished under Non Disclosure Agreement and may be used or
 *  copied only in accordance with the terms of the agreement. It is an offence
 *  to copy the software in any way except as specifically set out in the
 *  agreement. No part of this document may be reproduced or transmitted in any
 *  form or by any means, electronic or mechanical, including photocopying and
 *  recording, for any purpose without the express written permission of Texas
 *  Instruments Inc.
 *
 ******************************************************************************
 *
 *  FILE NAME: secure_types.h
 *
 *
 *  PURPOSE:
 *
 *
 *  FILE REFERENCES:
 *
 *  Name                  IO      Description
 *  -------------         --      ---------------------------------------------
 *
 *
 *
 *  EXTERNAL VARIABLES:
 *
 *  Source: none
 *
 *  Name                    Type              IO   Description
 *  -------------------     ---------------   --   ----------------------------
 *
 *
 *
 *  ABNORMAL TERMINATION CONDITIONS, ERROR AND WARNING MESSAGES:
 *
 *
 *
 *  ASSUMPTION, CONSTRAINTS, RESTRICTIONS:
 *
 *
 *
 *  NOTES:
 *
 *
 *
 *  REQUIREMENTS/FUNCTIONAL SPECIFICATION REFERENCES:
 *
 *
 *
 *
 *  DEVELOPMENT HISTORY:
 *
 *  Date        Name(s)               Version  Description
 *  ----------  --------------------  -------  ---------------------------------
 *  04/12/2002  Constantin HAIDAMOUS  V1.0.0   First release
 *  22-Apr-02   Francois AMAND        V1.0.1   Update of secure status to
 *                                             facilitate integration in final
 *                                             ROM code.
 *                                             Data alignment in struture to
 *                                             optimize memory requirement.
 *                                             Management of global secure data.
 *  28-Apr-02   Francois AMAND        V1.0.2   Update some constants to be
 *                                             compliant with certificate
 *                                             definition.
 *                                             Add CALYPSO PLUS specific
 *                                             parameters structure.
 *                                             Differentiate Manufacturer and
 *                                             Platform certificate.
 *                                             Add debug request field in Manu-
 *                                             facturer certificate.
 *                                             Optimize certificate field size.
 *                                             Change commentary wrapper to be
 *                                             ANSI compliant.
 *  29-Apr-02   Francois AMAND        V1.0.3   Remove unused constant.
 *                                             Set under compilation flag the
 *                                             secure services.
 *  14-May-02   Francois AMAND        V1.0.4   Add CONF_CSI field in T_CONF_PARAM
 *                                             structure definition.
 *                                             Change name of CS_MODE to EX_CTRL
 *                                             Change size of DCCTRL_CSx to 8
 *                                             bits to optimize size and alignment.
 *  17-May-02   Francois AMAND        V1.0.5   Modification of hashing size for
 *                                             binding/unbinding.
 *  17-May-02   Constantin HAIDAMOUS  V1.0.6   Integration of data structure for
 *                                             binding/unbinding services API .
 *  17-May-02   Francois AMAND        V1.0.7   Integration of RSA S/W and Check
 *                                             ROM in Secure Services.
 *                                             Update of Secure Services manage-
 *                                             ment.
 *  22-May-02   Constantin HAIDAMOUS  V1.0.8   Changing RSA modulus length , Max
 *                                             RSA length =2048 bits. Adding initial
 *                                             vectore for Binding structure.
 *  27-May-02   Francois AMAND        V1.0.9   Changing SAMSON to CALYPSO.
 *                                             Addition of Secure Services for
 *                                             RUN Time checker.
 *  28-May-02   Constantin HAIDAMOUS  V1.0.10  Changing C_PLAT_SIG_SIZE to 4.
 *
 *  06-June-02  Constantin HAIDAMOUS  V1.0.11  Changing Secure service API.
 *
 *  12-Jun-02   Francois AMAND        V1.0.12  Update of T_CONF_PARAM according
 *                                             to last memory interface spec.
 *  13-Jun-02   Constantin HAIDAMOUS  V1.0.13  Update of T_UNBINDCTX for segmented
 *                                             unbind operation optimization.
 *  14-Jun-02   Constantin HAIDAMOUS  V1.0.14  Update of T_BINDCTX for segmented
 *                                             bind operation .
 *  14-Jun-02   Francois AMAND        V1.0.15  Force d_temp in Secure RAM.
 *                                             Remove other definitions.
 *  25-Jun-02   Francois AMAND        V1.0.16  Addition of Platform unbinding
 *                                             during boot concept under compi-
 *                                             lation flag C_PLATFORM_UNBIND_BOOT.
 *  27-Jun-02   Constantin HAIDAMOUS  V1.0.17  Adding C_SECURE_RNG_ALARM to E_SECURE_STATUS
 *                                             C_SECURE_RNG_ALARM = C_RNG_ALARM from Safenet
 *  09-Jul-02   Constantin HAIDAMOUS  V1.0.18  Adding Application ID and Timeout for Bind function
 *  16-Jul-02   Francois AMAND        V1.0.19  Add S/W pseudo-random generator.
 *  19-Jul-02   Francois AMAND        V1.0.20  Remove S/W pseudo-random.
 *  01-Aug-02   Constantin HAIDAMOUS  V1.0.21  Removing boolean b_HashDone in Bind and Unbind Context
 *  27-Jan-03   Francois AMAND        V2.0.0   Remove of C_PLATFORM_UNBIND_BOOT flag
 *  27-Jan-03   Francois AMAND        V2.0.1   Add compliance with SW@P 2.0 (REQ03047)
 *  20-Mar-03   Francois AMAND        V2.0.2   Code cleaning
 *
 *  ALGORITHM:
 *
 *
 *******************************************************************************/


#include "standard.h"

#ifndef _SECURE_TYPES_H
  #define _SECURE_TYPES_H

  #ifndef C_SECURE_SERVICES
    #define C_SECURE_SERVICES 1
  #endif

  #ifndef C_CHIPSET
    #define C_CHIPSET_CALYPSO        4
    #define C_CHIPSET_CALYPSOPLUS   11
    #define C_CHIPSET               C_CHIPSET_CALYPSOPLUS
  #endif



  /****************************************************************************
   * Constants
   ****************************************************************************/

  #define C_WORD32LGB     4

//  #ifndef NULL  /* To avoid conflict with other compilers */
//    #define NULL (UWORD32 *) 0x00000000L
//  #endif

  /* Certificate block */

  /* Length in long word (32 bits) */

  #define C_SHA1HASHLG          5
  #define C_MD5HASHLG           4

  #define C_RSAKEYLG            64 /* Max Modulus size : 2048 bits */
  #define C_RSASIGLG            C_RSAKEYLG

  #define C_DIE_ID_SIZE         2  /* DIE ID defined on 64-bits */

  #define C_PLATFORM_DATA_SIZE  16048 /* Maximum value to have CertSize coded on 16-bits */

  #if C_SECURE_SERVICES == 1
    #define C_IVLG              2
    #define C_TDESKEYLG         4
    #define C_TDESKEYLGB        C_TDESKEYLG * C_WORD32LGB
    #define C_PLAT_SIG_SIZE     4 /* Must be a multiple of 64 bits */
  #endif

  #define C_MANUF_SIG_SIZE      C_RSASIGLG


  /* Certificate Type */

  #define C_CERTTYPE_MAN     0x00
  #define C_CERTTYPE_PLAT    0x01

  #if C_SECURE_SERVICES == 1
    /* Confidentiality request */

    #define C_CRYPTVOID      0x00
    #define C_CRYPTNOREQUEST 0x00
    #define C_CRYPTREQUEST   0x01
  #endif


  /* Debug request */

  #define C_DEBUGNOREQUEST   0x00
  #define C_DEBUGREQUEST     0x01


  /* CS image check request */

  #define C_CSIMGNOREQUEST   0x00
  #define C_CSIMGREQUEST     0x01


  /* Temporary block */

  #define C_TEMPDATALG        32
  #define C_TEMPDATALGB       C_TEMPDATALG * C_WORD32LGB

  #define C_CERT_TEMP_SWKEY   0
  #define C_CERT_TEMP_DATA    C_CERT_TEMP_SWKEY + C_TDESKEYLG


  /****************************************************************************
   * Structures
   ****************************************************************************/

  /* CALYPSO PLUS Parameters */
  typedef struct {
    /* External Memory Interface configuration */
    UWORD16 d_conf_cs5;
    UWORD16 d_exws_cs5;
    UWORD16 d_ex_ctrl;

    /* Authentication configuration */
    UWORD16 d_cs_img_req;
    UWORD32 d_flash_size;
    UWORD32 d_granularity;
  } T_CONF_PARAM;


  /* RSA Public key */

  typedef struct
  {
    UWORD32  a_Modulus[C_RSAKEYLG];  /* Public Modulus */
    UWORD32  d_ModulusLength;        /* Public Modulus length in bytes */
    UWORD32  d_Exponent;             /* Public Exponent */
  } T_RSAPUBKEY;


  /*Certificate Structure*/

  typedef struct
  {
    UWORD16       d_Certsize;                         /* Size of Certificate */
    UWORD8        d_Certtype;                         /* Type of Certificate */
    UWORD8        d_Debugrequest;                     /* Debug Request */
    UWORD32       d_Addcode;                          /* Start Address of Code */
    UWORD32       d_Codesize;                         /* Size of Code */
    UWORD32       d_CodeStartAdd;                     /* Entry Point Address */
    T_RSAPUBKEY   d_Manpubkey;                        /* Manufacturer Public Key */
    T_RSAPUBKEY   d_Origpubkey;                       /* Originator Public Key */
    UWORD32       a_Origpubkeysig[C_MANUF_SIG_SIZE];  /* Originator Public Key Signature */
    UWORD32       a_Swsig[C_MANUF_SIG_SIZE];          /* Software Signature */
    T_CONF_PARAM  d_Confparam;                        /* Configuration Parameters */
    UWORD32       a_die_id[C_DIE_ID_SIZE];            /* Die Id */
  } T_MANUFACTURER_CERTIFICATE;


  /*
   * Manufacturer Certificate structure containing dynamic Platform Data
   */
  typedef struct
  {
    T_MANUFACTURER_CERTIFICATE  d_manufacturer_certificate;
    UWORD32                     a_platform_data[C_PLATFORM_DATA_SIZE];   /* Platform Data */
    UWORD32                     a_Certsig[C_MANUF_SIG_SIZE];             /* Certificate Signature */
  } T_MANUFACTURER_CERTIFICATE_PLATFORM_DATA;


  /*
   * Manufacturer Certificate structure for the flash programmer without the dynamic Platform Data
   */
  typedef struct
  {
    UWORD16       d_Certsize;                         /* Size of Certificate */
    UWORD8        d_Certtype;                         /* Type of Certificate */
    UWORD8        d_Debugrequest;                     /* Debug Request */
    UWORD32       d_Addcode;                          /* Start Address of Code */
    UWORD32       d_Codesize;                         /* Size of Code */
    UWORD32       d_CodeStartAdd;                     /* Entry Point Address */
    T_RSAPUBKEY   d_Manpubkey;                        /* Manufacturer Public Key */
    T_RSAPUBKEY   d_Origpubkey;                       /* Originator Public Key */
    UWORD32       a_Origpubkeysig[C_MANUF_SIG_SIZE];  /* Originator Public Key Signature */
    UWORD32       a_Swsig[C_MANUF_SIG_SIZE];          /* Software Signature */
    T_CONF_PARAM  d_Confparam;                        /* Configuration Parameters */
    UWORD32       a_die_id[C_DIE_ID_SIZE];            /* Die Id */
    UWORD32       a_Certsig[C_MANUF_SIG_SIZE];        /* Certificate Signature */
  } T_MANUFACTURER_CERTIFICATE_FLASH_PROGRAMMER;


  #if C_SECURE_SERVICES == 1
    /*
     *  Define ROM secure service entry point address
     */
    #define C_ROM_SSERVICE_ENTRY_POINT_ADDR   0x00000024L

    /*
     *  Definition of function pointer to use ROM Secure Services
     */
    typedef UWORD16 (*T_ROM_SSERVICE) (UWORD16, void *, void *);


    typedef struct
    {
      UWORD16       d_Certsize;                   /* Size of Certificate */
      UWORD8        d_Certtype;                   /* Type of Certificate */
      UWORD8        d_Confrequest;                /* Confidentiality Request */
      UWORD32       d_Addcode;                    /* Start Address of Code */
      UWORD32       d_Codesize;                   /* Size of Code */
      UWORD32       d_AppID;                      /* Application Id */
      UWORD32       a_iv[C_IVLG];                 /* Initial Vector for TDES CBC */
      UWORD32       a_Encswkey[C_TDESKEYLG];      /* Encrypted S/W Key */
      UWORD32       a_Swsig[C_PLAT_SIG_SIZE];     /* Software Signature */
      UWORD32       a_Certsig[C_PLAT_SIG_SIZE];   /* Certificate Signature */
    } T_PLATFORM_CERTIFICATE;


    /* Unbind Context Structure used for segmented Unbind operation */

    typedef struct
    {
      UWORD32  d_Startpos;                    /* Start Position of Data to Process */
      UWORD32  d_Currentpos;                  /* Current Position of Data to Process */
      UWORD32  a_Currentdigest[C_MD5HASHLG];  /* Current Digest */
      UWORD32  d_Digcount;                    /* Digest Count */
      UWORD32  a_Currentiv[C_IVLG];           /* Current Initial Vector */
      UWORD32  a_Encswkey[C_TDESKEYLG];       /* Encrypted TDES Software Key */
      UWORD32  a_iv[C_IVLG];                  /* Initial Vector */
      UWORD32  d_Codesize;                    /* Code Size */
      UWORD32  d_AppID;                       /* Application Id */
      UWORD32  a_Swsig[C_PLAT_SIG_SIZE];      /* Software Signature */
      UWORD8   d_Confrequest;                 /* Confidentiality Request */
      BOOLEAN  b_UnbindDone;                  /* Set to 1 if Data Unbinding is Done */
    } T_UNBINDCTX;


   /* Bind Context Structure used for segmented Bind operation */

    typedef struct
    {
      UWORD32  d_Startpos;                    /* Start Position of Data to Process */
      UWORD32  d_Currentpos;                  /* Current Position of Data to Process */
      UWORD32  a_Currentdigest[C_MD5HASHLG];  /* Current Digest */
      UWORD32  d_Digcount;                    /* Digest Count */
      UWORD32  a_Currentiv[C_IVLG];           /* Current Initial Vector */
      UWORD32  a_Encswkey[C_TDESKEYLG];       /* Encrypted TDES Software Key */
      UWORD32  a_iv[C_IVLG];                  /* Initial Vector */
      UWORD32  d_Addcode;                     /* Store Address of Code */
      UWORD32  d_Codesize;                    /* Code Size */
      UWORD32  d_AppID;                       /* Application Id */
      UWORD8   d_Confrequest;                 /* Confidentiality Request */
      BOOLEAN  b_KeyCreateDone;               /* Set to 1 if TDES Software Key Creation is Done */
      BOOLEAN  b_BindDone;                    /* Set to 1 if Data Binding is Done */
    } T_BINDCTX;


    typedef struct
    {
      T_PLATFORM_CERTIFICATE*  p_Cert;
      UWORD32*                 p_Code;
      T_PLATFORM_CERTIFICATE*  p_CertCtx;
      T_UNBINDCTX*             p_UnbindCtx;
      UWORD32                  d_Steplength;
      BOOLEAN                  b_start;
    } T_SSERVICE_UNBIND;



    typedef struct
    {
      T_PLATFORM_CERTIFICATE*   p_Cert;
      UWORD32*                  p_Code;
      T_PLATFORM_CERTIFICATE*   p_CertCtx;
      T_BINDCTX*                p_BindCtx;
      UWORD32                   d_Steplength;
      UWORD32                   d_timeout;
      BOOLEAN                   b_start;
    } T_SSERVICE_BIND;


    /*
     *  Structure definition for RSA S/W secure services
     */
    typedef struct
    {
      UWORD32 *     p_datain;
      UWORD32 *     p_dataout;
      UWORD32       output_length;
      T_RSAPUBKEY * p_rsapubkey;
      UWORD32 *     p_rsaheap;
    } T_SSERVICE_RSA;


    /*
     *  Structure definition for Checker ROM secure services
     */
    typedef struct
    {
      UWORD16   d_checksum;
      UWORD16   d_rom_id;
    } T_SSERVICE_CHECKROM;


    /*
     *  Structure definition for Run Time Checker secure services
     */
    typedef struct
    {
      UWORD32 *                       p_rsaheap;
      T_MANUFACTURER_CERTIFICATE *    p_certificate;
    } T_SSERVICE_RUNTIMECHECKER;


    /*
     *  Structure definition for Run Time Platform Data Checker secure services
     */
    typedef struct
    {
      T_PLATFORM_CERTIFICATE*  p_Cert;
    } T_SSERVICE_RUNTIME_PLAT_CHECKER;


  #endif /*  C_SECURE_SERVICES == 1 */

  /****************************************************************************
   * Global variables
   ****************************************************************************/
  #ifndef SECURE_GLOBAL
    #define SECURE_GLOBAL extern
  #endif

  #ifdef _TMS470
    #pragma DATA_SECTION(d_temp,".secdata")
    #pragma DATA_SECTION(a_hash_certificate,".secdata")
  #endif

  SECURE_GLOBAL UWORD32 d_temp[C_TEMPDATALG];               /* Temporary data in Secure RAM */
  SECURE_GLOBAL UWORD32 a_hash_certificate[C_SHA1HASHLG];   /* SHA-1 hashing of Manufacturer Certificate */

  /****************************************************************************
   * Status
   ****************************************************************************/

  typedef enum
  {
    C_SECURE_ERROR          = 0,
    C_SECURE_SUCCESS        = 1,
    C_SECURE_INVALID_ID     = 2,
    C_SECURE_RNG_ALARM      = 3,
    C_SECURE_INVALID_DIE_ID = 4,
    C_SECURE_BLANK_DIE_ID   = 5
  } E_SECURE_STATUS;


  /****************************************************************************
   * Function prototype for secure services
   ****************************************************************************/

  #if C_SECURE_SERVICES == 1
    #define C_MAX_DEFINED_ID                                6
    #define C_SEC_SERVICE_BINDING_ID                        0x0000
    #define C_SEC_SERVICE_UNBINDING_ID                      0x0001
    #define C_SEC_SERVICE_RSA_ID                            0x0002
    #define C_SEC_SERVICE_CHECKROM_ID                       0x0003
    #define C_SEC_SERVICE_RUN_TIME_CHECKER_ID               0x0004
    #define C_SEC_SERVICE_RUN_TIME_PLATFORM_DATA_CHECKER    0x0005

    E_SECURE_STATUS ROM_Sservice_Unbind(UWORD16            reserved,
                                        T_SSERVICE_UNBIND* p_StructUnbind);

    E_SECURE_STATUS ROM_Sservice_Bind(UWORD16          reserved,
                                      T_SSERVICE_BIND* p_StructBind);

    E_SECURE_STATUS ROM_Sservice_Rsa(UWORD16           reserved,
                                     T_SSERVICE_RSA*   p_StructRsa);

    E_SECURE_STATUS ROM_Sservice_CheckRom(UWORD16              reserved,
                                          T_SSERVICE_CHECKROM* p_StructCheckRom);

    E_SECURE_STATUS ROM_Sservice_RunTimeChecker(
                                  UWORD16                      reserved,
                                  T_SSERVICE_RUNTIMECHECKER*   p_StructRunTimeChecker);

    E_SECURE_STATUS ROM_Sservice_RunTimePlatformDataChecker(
                                  UWORD16                          reserved,
                                  T_SSERVICE_RUNTIME_PLAT_CHECKER* p_StructRunTimePlatChecker);

  #endif

#endif /* _SECURE_TYPES_H */