| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223 |
- /*
- * Copyright 2018 AllWinnertech Co., Ltd
- * wangwei@allwinnertech.com
- */
- #include <stdio.h>
- #include <string.h>
- #include <sunxi_hal_efuse.h>
- #include <sunxi_hal_common.h>
- #include "platform_efuse.h"
- #include "efuse.h"
- #if (EFUSE_DBG_EN & (CONFIG_LOG_DEFAULT_LEVEL != 0))
- #define EFUSE_DBG(fmt,args...) printf(fmt ,##args)
- #define EFUSE_DUMP_LEN 16
- #define EFUSE_DBG_DUMP(key_name, key_data, key_len) efuse_dump(key_name, key_data, key_len, EFUSE_DUMP_LEN)
- #else
- #define EFUSE_DBG(fmt,args...)
- #define EFUSE_DBG_DUMP(...) do{} while(0);
- #endif
- #if EFUSE_DBG_EN
- static void efuse_dump(char *str,unsigned char *data,\
- int len, int align)
- {
- int i = 0;
- if(str)
- printf("\n%s: ",str);
- for(i = 0; i<len; i++)
- {
- if((i%align) == 0)
- {
- printf("\n");
- }
- printf("%02x ",*(data++));
- }
- printf("\n");
- }
- #endif
- int hal_efuse_write(char *key_name, unsigned char *key_data, size_t key_bit_len)
- {
- unsigned long k_src = 0;
- unsigned int niddle = 0,tmp_data = 0,k_d_lft = 0 ;
- size_t key_len = key_bit_len>>3;
- efuse_key_map_new_t *key_map;
- int ret;
- if ((strlen(key_name) == 0)|| (key_len == 0) || ((unsigned long)key_data%4 != 0))
- return EFUSE_ERR_ARG;
- key_map = efuse_search_key_by_name(key_name);
- if (((unsigned int)key_map->size >> 3) < key_len) {
- EFUSE_DBG("key name = %s\n", key_map->name);
- return EFUSE_ERR_KEY_SIZE_TOO_BIG;
- }
- if (key_map->size == 0) {
- EFUSE_DBG("%s: error: unknow key\n", __func__);
- return EFUSE_ERR_KEY_NAME_WRONG;
- }
- ret = efuse_acl_ck(key_map, 1);
- if(ret) {
- EFUSE_DBG("%s: __efuse_acl_ck check failed\n", __func__);
- return ret;
- }
- EFUSE_DBG_DUMP(key_name, key_data, key_len);
- /*rotpk need double check before burn*/
- if (strcmp(key_name, "rotpk") == 0) {
- }
- niddle = key_map->offset;
- k_d_lft = key_len;
- k_src = (unsigned long)key_data;
- while(k_d_lft >= 4) {
- tmp_data = *(unsigned int*)k_src;
- EFUSE_DBG("offset:0x%x val:0x%x\n",niddle,tmp_data);
- if(tmp_data)
- {
- if(efuse_uni_burn_key(niddle, tmp_data))
- {
- return EFUSE_ERR_BURN_TIMING;
- }
- }
- k_d_lft-=4;
- niddle += 4;
- k_src +=4;
- }
- if(k_d_lft) {
- uint mask = (1UL << (k_d_lft << 3)) - 1;
- tmp_data = *(unsigned int*)k_src;
- mask &= tmp_data;
- EFUSE_DBG("offset:0x%x val:0x%x\n",niddle,mask);
- if(mask)
- {
- if(efuse_uni_burn_key(niddle,mask))
- {
- return EFUSE_ERR_BURN_TIMING;
- }
- }
- }
- /*Already burned bit: Set this bit to indicate it is already burned.*/
- if ((key_map->burned_flg_offset >= 0) &&
- (key_map->burned_flg_offset <= EFUSE_BRUN_RD_OFFSET_MASK)) {
- efuse_set_cfg_flg(EFUSE_WRITE_PROTECT,key_map->burned_flg_offset);
- }
- /*Read forbidden bit: Set to indicate cpu can not access this key again.*/
- if ((key_map->rd_fbd_offset >= 0) &&
- (key_map->rd_fbd_offset <= EFUSE_BRUN_RD_OFFSET_MASK)) {
- efuse_set_cfg_flg(EFUSE_READ_PROTECT,key_map->rd_fbd_offset);
- }
- return 0;
- }
- /*This API assume the caller already
- *prepared enough buffer to receive data.
- *Because the lenth of key is exported as MACRO*/
- #define EFUSE_ROUND_UP(x,y) ((((x) + ((y) - 1)) / (y)) * (y))
- int hal_efuse_read(char *key_name, unsigned char *key_data, size_t key_bit_len)
- {
- efuse_key_map_new_t *key_map;
- uint tmp=0,i=0,k_u32_l=0,bit_lft = 0;
- int offset =0,tmp_sz = 0;
- int ret;
- /*if key_data not aligned ,u32_p will not be accessed*/
- unsigned int *u32_p = (unsigned int *)key_data;
- unsigned char *u8_p = (unsigned char *)key_data;
- if(!(key_name && key_data)) {
- EFUSE_DBG("[efuse] error arg: key_name is %p, key_data is %p\n",key_name, key_data);
- return EFUSE_ERR_ARG;
- }
- key_map = efuse_search_key_by_name(key_name);
- if (key_map->size == 0 || key_map->size > key_bit_len) {
- EFUSE_DBG("[efuse] error: unknow key name\n");
- return EFUSE_ERR_KEY_NAME_WRONG;
- }
- ret = efuse_acl_ck(key_map, 0);
- if(ret) {
- EFUSE_DBG("[sunxi_efuse_write] error: acl check fail\n");
- return ret;
- }
- EFUSE_DBG("key name:%s key size:%d key offset:%d\n",\
- key_map->name,key_map->size,key_map->offset);
- if (key_map->size > key_bit_len) {
- EFUSE_DBG("[efuse] error: key size\n");
- return EFUSE_ERR_ARG;
- }
- k_u32_l = key_map->size / 32;
- bit_lft = key_map->size % 32;
- offset = key_map->offset;
- for(i = 0;i<k_u32_l;i++)
- {
- tmp = efuse_sram_read_key(offset);
- if(((unsigned long)key_data & 0x3) == 0)
- {
- u32_p[i] = tmp;
- }
- else
- {
- memcpy((void*)(u8_p + i * 4),(void*)(&tmp),4);
- }
- offset += 4;
- tmp_sz += 4;
- }
- if(bit_lft)
- {
- EFUSE_DBG("bit lft is %d\n",bit_lft);
- tmp = efuse_sram_read_key(offset);
- memcpy((void*)(u8_p + k_u32_l * 4),(void*)(&tmp),
- EFUSE_ROUND_UP(bit_lft,8) / 8);
- tmp_sz += (EFUSE_ROUND_UP(bit_lft,8) / 8);
- }
- EFUSE_DBG_DUMP(key_name, key_data, key_bit_len/8);
- return tmp_sz;
- }
- int hal_efuse_set_security_mode(void)
- {
- #ifdef EFUSE_LCJS
- return efuse_uni_burn_key(EFUSE_LCJS, 0x1 << SECURE_BIT_OFFSET);
- #else
- return 0;
- #endif
- }
- int hal_efuse_get_security_mode(void)
- {
- #ifdef EFUSE_SECURE_MODE
- return hal_readl(EFUSE_SECURE_MODE) & 0x1;
- #else
- return 0;
- #endif
- }
- int hal_efuse_get_chipid(unsigned char *buffer)
- {
- return hal_efuse_read("chipid", buffer, 128);
- }
- int hal_efuse_get_thermal_cdata(unsigned char *buffer)
- {
- return hal_efuse_read("thermal_sensor", buffer, 64);
- }
|