aboutsummaryrefslogtreecommitdiff
path: root/hal_io_i2c.c
blob: 8596174c1621e310343af52d23f920950ac5663f (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
/*
 * hal_io_i2c.c
 * ------------
 * This module contains common code to talk to the FPGA over the I2C bus.
 *
 * Author: Paul Selkirk
 * Copyright (c) 2014-2015, NORDUnet A/S All rights reserved.
 *
 * Redistribution and use in source and binary forms, with or without
 * modification, are permitted provided that the following conditions are
 * met:
 * - Redistributions of source code must retain the above copyright notice,
 *   this list of conditions and the following disclaimer.
 *
 * - Redistributions in binary form must reproduce the above copyright
 *   notice, this list of conditions and the following disclaimer in the
 *   documentation and/or other materials provided with the distribution.
 *
 * - Neither the name of the NORDUnet nor the names of its contributors may
 *   be used to endorse or promote products derived from this software
 *   without specific prior written permission.
 *
 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS
 * IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
 * PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
 * HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
 * TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
 * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
 * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
 * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
 */

#include <stdio.h>
#include <stdlib.h>
#include <fcntl.h>
#include <unistd.h>
#include <sys/ioctl.h>
#include <stdint.h>

#include "hal.h"
#include "hal_internal.h"

#define I2C_dev                 "/dev/i2c-2"
#define I2C_addr                0x0f
#define I2C_SLAVE               0x0703

static int debug = 0;
static int i2cfd = -1;


void hal_io_set_debug(int onoff)
{
  debug = onoff;
}

static void dump(char *label, const uint8_t *buf, size_t len)
{
  if (debug) {
    int i;
    printf("%s [", label);
    for (i = 0; i < len; ++i)
      printf(" %02x", buf[i]);
    printf(" ]\n");
  }
}

static void i2c_close(void)
{
  (void) close(i2cfd);
}

static hal_error_t i2c_open(void)
{
  int fd = -1;

  if (i2cfd >= 0)
    return HAL_OK;

  /* It's dead, Jim, you can stop kicking it now */
  if (i2cfd < -1)
    return HAL_ERROR_IO_SETUP_FAILED;

  fd = open(I2C_dev, O_RDWR);
  if (fd < 0) {
    if (debug)
      perror("Unable to open %s: " I2C_dev);
    goto fail;
  }

  if (ioctl(fd, I2C_SLAVE, I2C_addr) < 0) {
    if (debug)
      perror("Unable to set I2C slave device");
    goto fail;
  }

  if (atexit(i2c_close) < 0) {
    if (debug)
      perror("Unable to set I2C atexit handler");
    goto fail;
  }

  i2cfd = fd;
  return HAL_OK;

 fail:
  if (fd >= 0)
    close(fd);
  i2cfd = -2;
  return HAL_ERROR_IO_SETUP_FAILED;
}

static hal_error_t i2c_write(const uint8_t *buf, size_t len)
{
  hal_error_t err;

  if ((err = i2c_open()) != HAL_OK)
    return err;

  dump("write ", buf, len);

  if (write(i2cfd, buf, len) != len) {
    if (debug)
      perror("i2c write failed");
    return HAL_ERROR_IO_OS_ERROR;
  }

  return HAL_OK;
}

static hal_error_t i2c_read(uint8_t *b)
{
  hal_error_t err;

  if ((err = i2c_open()) != HAL_OK)
    return err;

  /*
   * read() on the i2c device only returns one byte at a time,
   * and hal_io_get_resp() needs to parse the response one byte at a time
   */
  if (read(i2cfd, b, 1) != 1) {
    if (debug)
      perror("i2c read failed");
    return HAL_ERROR_IO_OS_ERROR;
  }

  return 0;
}


/* coretest command codes */
#define SOC       0x55
#define EOC       0xaa
#define READ_CMD  0x10
#define WRITE_CMD 0x11
#define RESET_CMD 0x01

/* coretest response codes */
#define SOR       0xaa
#define EOR       0x55
#define READ_OK   0x7f
#define WRITE_OK  0x7e
#define RESET_OK  0x7d
#define UNKNOWN   0xfe
#define ERROR     0xfd

static hal_error_t hal_io_send_write_cmd(hal_addr_t offset, const uint8_t *data)
{
  uint8_t buf[9] = { SOC, WRITE_CMD, (offset >> 8) & 0xff, offset & 0xff,
                     data[0], data[1], data[2], data[3], EOC };
  return i2c_write(buf, sizeof(buf));
}

static hal_error_t hal_io_send_read_cmd(hal_addr_t offset)
{
  uint8_t buf[5] = { SOC, READ_CMD, (offset >> 8) & 0xff, offset & 0xff, EOC };
  return i2c_write(buf, sizeof(buf));
}

static hal_error_t hal_io_get_resp(uint8_t *buf, size_t len)
{
  hal_error_t err;
  int i;

  for (i = 0; i < len; ++i) {

    if ((err = i2c_read(&buf[i])) != HAL_OK)
      return err;

    if ((i == 0) && (buf[i] != SOR))
      /* We've gotten out of sync, and there's probably nothing we can do */
      return HAL_ERROR_IO_UNEXPECTED;

    if (i == 1) {      /* response code */
      switch (buf[i]) {
      case READ_OK:
        len = 9;
        break;
      case WRITE_OK:
        len = 5;
        break;
      case RESET_OK:
        len = 3;
        break;
      case ERROR:
      case UNKNOWN:
        len = 4;
        break;
      default:
        /* we've gotten out of sync, and there's probably nothing we can do */
        return HAL_ERROR_IO_UNEXPECTED;
      }
    }
  }

  dump("read  ", buf, len);

  return HAL_OK;
}

static hal_error_t hal_io_compare(uint8_t *buf, const uint8_t *expected, size_t len)
{
  size_t i;

  /* start at byte 1 because SOR has already been tested */
  for (i = 1; i < len; ++i) {
    if (buf[i] != expected[i])
      return HAL_ERROR_IO_UNEXPECTED;
  }

  return HAL_OK;
}

static hal_error_t hal_io_get_write_resp(hal_addr_t offset)
{
  uint8_t buf[5];
  uint8_t expected[5] = { SOR, WRITE_OK, (offset >> 8) & 0xff, offset & 0xff, EOR };
  hal_error_t err;

  if ((err = hal_io_get_resp(buf, sizeof(buf))) != HAL_OK)
    return err;

  return hal_io_compare(buf, expected, sizeof(expected));
}

static hal_error_t hal_io_get_read_resp(hal_addr_t offset, uint8_t *data)
{
  uint8_t buf[9];
  uint8_t expected[4] = { SOR, READ_OK, (offset >> 8) & 0xff, offset & 0xff };
  hal_error_t err;

  if ((err = hal_io_get_resp(buf, sizeof(buf))) != HAL_OK ||
      (err = hal_io_compare(buf, expected, 4))  != HAL_OK)
    return err;

  if (buf[8] != EOR)
    return HAL_ERROR_IO_UNEXPECTED;

  data[0] = buf[4];
  data[1] = buf[5];
  data[2] = buf[6];
  data[3] = buf[7];

  return HAL_OK;
}

hal_error_t hal_io_write(const hal_core_t *core, hal_addr_t offset, const uint8_t *buf, size_t len)
{
  hal_error_t err;

  if (core == NULL)
    return HAL_ERROR_CORE_NOT_FOUND;

  offset += hal_core_base(core);

  for (; len > 0; offset++, buf += 4, len -= 4)
    if ((err = hal_io_send_write_cmd(offset, buf)) != HAL_OK ||
        (err = hal_io_get_write_resp(offset))      != HAL_OK)
      return err;

  return HAL_OK;
}

hal_error_t hal_io_read(const hal_core_t *core, hal_addr_t offset, uint8_t *buf, size_t len)
{
  hal_error_t err;

  if (core == NULL)
    return HAL_ERROR_CORE_NOT_FOUND;

  offset += hal_core_base(core);

  for (; len > 0; offset++, buf += 4, len -= 4)
    if ((err = hal_io_send_read_cmd(offset))      != HAL_OK ||
        (err = hal_io_get_read_resp(offset, buf)) != HAL_OK)
      return err;

  return HAL_OK;
}

/*
 * Local variables:
 * indent-tabs-mode: nil
 * End:
 */
"> * Writing to the header isn't a problem, because C does guarantee * that enum is compatible with *some* integer type, it just doesn't * specify which one. */ typedef enum { HAL_KS_BLOCK_TYPE_ERASED = 0xFF, /* Pristine erased block (candidate for reuse) */ HAL_KS_BLOCK_TYPE_ZEROED = 0x00, /* Zeroed block (recently used) */ HAL_KS_BLOCK_TYPE_KEY = 0x55, /* Block contains key material */ HAL_KS_BLOCK_TYPE_PIN = 0xAA, /* Block contains PINs */ HAL_KS_BLOCK_TYPE_UNKNOWN = -1, /* Internal code for "I have no clue what this is" */ } hal_ks_block_type_t; /* * Block status. */ typedef enum { HAL_KS_BLOCK_STATUS_LIVE = 0x66, /* This is a live block */ HAL_KS_BLOCK_STATUS_TOMBSTONE = 0x44, /* This is a tombstone left behind during an update */ HAL_KS_BLOCK_STATUS_UNKNOWN = -1, /* Internal code for "I have no clue what this is" */ } hal_ks_block_status_t; /* * Common header for all keystore block types. A few of these fields * are deliberately omitted from the CRC. * * The legacy_1 and legacy_2 fields were used in the more complex * "chunked" layout used in an earlier iteration of this keystore * design, which proved more complex than it was worth. At the * moment, the only thing we do with these fields is include them in * the CRC and check them for allowed values, to avoid gratuitously * breaking backwards compatability with the earlier design. */ typedef struct { uint8_t block_type; uint8_t block_status; uint8_t legacy_1; uint8_t legacy_2; hal_crc32_t crc; } hal_ks_block_header_t; /* * Key block. Tail end of "der" field (after der_len) used for attributes. */ typedef struct { hal_ks_block_header_t header; hal_uuid_t name; hal_key_type_t type; hal_curve_name_t curve; hal_key_flags_t flags; size_t der_len; unsigned attributes_len; uint8_t der[]; /* Must be last field -- C99 "flexible array member" */ } hal_ks_key_block_t; #define SIZEOF_KS_KEY_BLOCK_DER \ (HAL_KS_BLOCK_SIZE - offsetof(hal_ks_key_block_t, der)) /* * PIN block. Also includes space for backing up the KEK when * HAL_MKM_FLASH_BACKUP_KLUDGE is enabled. */ typedef struct { hal_ks_block_header_t header; hal_ks_pin_t wheel_pin; hal_ks_pin_t so_pin; hal_ks_pin_t user_pin; #if HAL_MKM_FLASH_BACKUP_KLUDGE uint32_t kek_set; uint8_t kek[KEK_LENGTH]; #endif } hal_ks_pin_block_t; #define FLASH_KEK_SET 0x33333333 /* * One keystore block. */ typedef union { uint8_t bytes[HAL_KS_BLOCK_SIZE]; hal_ks_block_header_t header; hal_ks_key_block_t key; hal_ks_pin_block_t pin; } hal_ks_block_t; /* * In-memory cache. */ typedef struct { unsigned blockno; unsigned lru; hal_ks_block_t block; } hal_ks_cache_block_t; /* * Keystore object. hal_internal.h typedefs this to hal_ks_t. * * We expect this to be a static variable, but we expect the arrays in * it to be allocated at runtime using hal_allocate_static_memory() * because they can get kind of large. * * Driver-specific stuff is handled by a form of subclassing: the * driver embeds the hal_ks_t structure at the head of whatever else * it needs, and performs (controlled, type-safe) casts as needed. * * Core of this is the keystore index. This is intended to be usable * by both memory-based and flash-based keystores. Some of the * features aren't necessary for memory-based keystores, but should be * harmless, and let us keep the drivers simple. * * General approach is multiple arrays, all but one of which are * indexed by "block" numbers, where a block number might be a slot in * yet another static array, the number of a flash sub-sector, or * whatever is the appropriate unit for holding one keystore record. * * The index array only contains block numbers. This is a small data * structure so that moving data within it is relatively cheap. * * The index array is divided into two portions: the index proper, and * the free queue. The index proper is ordered according to the names * (UUIDs) of the corresponding blocks; the free queue is a FIFO, to * support a simplistic form of wear leveling in flash-based keystores. * * Key names are kept in a separate array, indexed by block number. * * The all-zeros UUID, which (by definition) cannot be a valid key * UUID, is reserved for the (non-key) block used to stash PINs and * other small data which aren't really part of the keystore proper * but are kept with it because the keystore is the flash we have. * * Note that this API deliberately says nothing about how the keys * themselves are stored, that's up to the keystore driver. */ typedef struct hal_ks_driver hal_ks_driver_t; struct hal_ks { const hal_ks_driver_t *driver;/* Must be first */ unsigned size; /* Blocks in keystore */ unsigned used; /* How many blocks are in use */ uint16_t *index; /* Index/freelist array */ hal_uuid_t *names; /* Keyname array */ unsigned cache_lru; /* Cache LRU counter */ unsigned cache_size; /* Size (how many blocks) in cache */ hal_ks_cache_block_t *cache; /* Cache */ }; /* * Keystore driver. */ struct hal_ks_driver { hal_error_t (*init) (hal_ks_t *ks, const int alloc); hal_error_t (*read) (hal_ks_t *ks, const unsigned blockno, hal_ks_block_t *block); hal_error_t (*write) (hal_ks_t *ks, const unsigned blockno, hal_ks_block_t *block); hal_error_t (*deprecate) (hal_ks_t *ks, const unsigned blockno); hal_error_t (*zero) (hal_ks_t *ks, const unsigned blockno); hal_error_t (*erase) (hal_ks_t *ks, const unsigned blockno); hal_error_t (*erase_maybe) (hal_ks_t *ks, const unsigned blockno); hal_error_t (*set_owner) (hal_ks_t *ks, const unsigned blockno, const hal_client_handle_t client, const hal_session_handle_t session); hal_error_t (*test_owner) (hal_ks_t *ks, const unsigned blockno, const hal_client_handle_t client, const hal_session_handle_t session); hal_error_t (*copy_owner) (hal_ks_t *ks, const unsigned source, const unsigned target); hal_error_t (*logout) (hal_ks_t *ks, const hal_client_handle_t client); }; /* * Wrappers around keystore driver methods. * * hal_ks_init() and hal_ks_logout() are missing here because we * expose them to the rest of libhal. */ static inline hal_error_t hal_ks_block_read(hal_ks_t *ks, const unsigned blockno, hal_ks_block_t *block) { return ks == NULL || ks->driver == NULL ? HAL_ERROR_BAD_ARGUMENTS : ks->driver->read == NULL ? HAL_ERROR_NOT_IMPLEMENTED : ks->driver->read(ks, blockno, block); } static inline hal_error_t hal_ks_block_write(hal_ks_t *ks, const unsigned blockno, hal_ks_block_t *block) { return ks == NULL || ks->driver == NULL ? HAL_ERROR_BAD_ARGUMENTS : ks->driver->write == NULL ? HAL_ERROR_NOT_IMPLEMENTED : ks->driver->write(ks, blockno, block); } static inline hal_error_t hal_ks_block_deprecate(hal_ks_t *ks, const unsigned blockno) { return ks == NULL || ks->driver == NULL ? HAL_ERROR_BAD_ARGUMENTS : ks->driver->deprecate == NULL ? HAL_ERROR_NOT_IMPLEMENTED : ks->driver->deprecate(ks, blockno); } static inline hal_error_t hal_ks_block_zero(hal_ks_t *ks, const unsigned blockno) { return ks == NULL || ks->driver == NULL ? HAL_ERROR_BAD_ARGUMENTS : ks->driver->zero == NULL ? HAL_ERROR_NOT_IMPLEMENTED : ks->driver->zero(ks, blockno); } static inline hal_error_t hal_ks_block_erase(hal_ks_t *ks, const unsigned blockno) { return ks == NULL || ks->driver == NULL ? HAL_ERROR_BAD_ARGUMENTS : ks->driver->erase == NULL ? HAL_ERROR_NOT_IMPLEMENTED : ks->driver->erase(ks, blockno); } static inline hal_error_t hal_ks_block_erase_maybe(hal_ks_t *ks, const unsigned blockno) { return ks == NULL || ks->driver == NULL ? HAL_ERROR_BAD_ARGUMENTS : ks->driver->erase_maybe == NULL ? HAL_ERROR_NOT_IMPLEMENTED : ks->driver->erase_maybe(ks, blockno); } static inline hal_error_t hal_ks_block_set_owner(hal_ks_t *ks, const unsigned blockno, const hal_client_handle_t client, const hal_session_handle_t session) { return ks == NULL || ks->driver == NULL ? HAL_ERROR_BAD_ARGUMENTS : ks->driver->set_owner == NULL ? HAL_ERROR_NOT_IMPLEMENTED : ks->driver->set_owner(ks, blockno, client, session); } static inline hal_error_t hal_ks_block_test_owner(hal_ks_t *ks, const unsigned blockno, const hal_client_handle_t client, const hal_session_handle_t session) { return ks == NULL || ks->driver == NULL ? HAL_ERROR_BAD_ARGUMENTS : ks->driver->test_owner == NULL ? HAL_ERROR_NOT_IMPLEMENTED : ks->driver->test_owner(ks, blockno, client, session); } static inline hal_error_t hal_ks_block_copy_owner(hal_ks_t *ks, const unsigned source, const unsigned target) { return ks == NULL || ks->driver == NULL ? HAL_ERROR_BAD_ARGUMENTS : ks->driver->copy_owner == NULL ? HAL_ERROR_NOT_IMPLEMENTED : ks->driver->copy_owner(ks, source, target); } /* * Type safe casts. */ static inline hal_ks_block_type_t hal_ks_block_get_type(const hal_ks_block_t * const block) { return block == NULL ? HAL_KS_BLOCK_TYPE_UNKNOWN : (hal_ks_block_type_t) block->header.block_type; } static inline hal_ks_block_status_t hal_ks_block_get_status(const hal_ks_block_t * const block) { return block == NULL ? HAL_KS_BLOCK_STATUS_UNKNOWN : (hal_ks_block_status_t) block->header.block_status; } /* * Keystore utilities. Some or all of these may end up static within ks.c. */ extern hal_error_t hal_ks_alloc_common(hal_ks_t *ks, const unsigned ks_blocks, const unsigned cache_blocks, void **extra, const size_t extra_len); extern hal_error_t hal_ks_init_common(hal_ks_t *ks); extern hal_crc32_t hal_ks_block_calculate_crc(const hal_ks_block_t * const block); extern hal_error_t hal_ks_index_heapsort(hal_ks_t *ks); extern hal_error_t hal_ks_index_find(hal_ks_t *ks, const hal_uuid_t * const name, unsigned *blockno, int *hint); extern hal_error_t hal_ks_index_add(hal_ks_t *ks, const hal_uuid_t * const name, unsigned *blockno, int *hint); extern hal_error_t hal_ks_index_delete(hal_ks_t *ks, const hal_uuid_t * const name, unsigned *blockno, int *hint); extern hal_error_t hal_ks_index_replace(hal_ks_t *ks, const hal_uuid_t * const name, unsigned *blockno, int *hint); extern hal_error_t hal_ks_index_fsck(hal_ks_t *ks); extern const size_t hal_ks_attribute_header_size; extern hal_error_t hal_ks_attribute_scan(const uint8_t * const bytes, const size_t bytes_len, hal_pkey_attribute_t *attributes, const unsigned attributes_len, size_t *total_len); extern hal_error_t hal_ks_attribute_delete(uint8_t *bytes, const size_t bytes_len, hal_pkey_attribute_t *attributes, unsigned *attributes_len, size_t *total_len, const uint32_t type); extern hal_error_t hal_ks_attribute_insert(uint8_t *bytes, const size_t bytes_len, hal_pkey_attribute_t *attributes, unsigned *attributes_len, size_t *total_len, const uint32_t type, const uint8_t * const value, const size_t value_len); extern hal_ks_block_t *hal_ks_cache_pick_lru(hal_ks_t *ks); extern hal_ks_block_t *hal_ks_cache_find_block(const hal_ks_t * const ks, const unsigned blockno); extern void hal_ks_cache_mark_used(hal_ks_t *ks, const hal_ks_block_t * const block, const unsigned blockno); extern void hal_ks_cache_release(hal_ks_t *ks, const hal_ks_block_t * const block); extern hal_error_t hal_ks_block_read_cached(hal_ks_t *ks, const unsigned blockno, hal_ks_block_t **block); extern hal_error_t hal_ks_block_update(hal_ks_t *ks, const unsigned b1, hal_ks_block_t *block, const hal_uuid_t * const uuid, int *hint); #endif /* _KS_H_ */ /* * Local variables: * indent-tabs-mode: nil * End: */