2018-05-06 21:58:06 +00:00
|
|
|
// SPDX-License-Identifier: GPL-2.0+
|
2013-06-13 22:10:00 +00:00
|
|
|
/*
|
|
|
|
* Copyright (c) 2013, Google Inc.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifdef USE_HOSTCC
|
|
|
|
#include "mkimage.h"
|
2020-05-10 17:40:01 +00:00
|
|
|
#include <fdt_support.h>
|
2013-06-13 22:10:00 +00:00
|
|
|
#include <time.h>
|
2020-05-10 17:40:01 +00:00
|
|
|
#include <linux/libfdt.h>
|
2013-06-13 22:10:00 +00:00
|
|
|
#else
|
|
|
|
#include <common.h>
|
2020-05-10 17:40:05 +00:00
|
|
|
#include <log.h>
|
2013-06-13 22:10:01 +00:00
|
|
|
#include <malloc.h>
|
|
|
|
DECLARE_GLOBAL_DATA_PTR;
|
2013-06-13 22:10:00 +00:00
|
|
|
#endif /* !USE_HOSTCC*/
|
|
|
|
#include <image.h>
|
2014-06-12 20:27:12 +00:00
|
|
|
#include <u-boot/rsa.h>
|
|
|
|
#include <u-boot/rsa-checksum.h>
|
2013-06-13 22:10:00 +00:00
|
|
|
|
2013-06-13 22:10:09 +00:00
|
|
|
#define IMAGE_MAX_HASHED_NODES 100
|
|
|
|
|
2014-03-03 11:19:26 +00:00
|
|
|
struct checksum_algo checksum_algos[] = {
|
|
|
|
{
|
2017-10-23 01:03:40 +00:00
|
|
|
.name = "sha1",
|
|
|
|
.checksum_len = SHA1_SUM_LEN,
|
|
|
|
.der_len = SHA1_DER_LEN,
|
|
|
|
.der_prefix = sha1_der_prefix,
|
2014-03-03 11:19:26 +00:00
|
|
|
#if IMAGE_ENABLE_SIGN
|
2017-10-23 01:03:40 +00:00
|
|
|
.calculate_sign = EVP_sha1,
|
2014-03-03 11:19:30 +00:00
|
|
|
#endif
|
2017-10-23 01:03:40 +00:00
|
|
|
.calculate = hash_calculate,
|
2014-03-03 11:19:26 +00:00
|
|
|
},
|
|
|
|
{
|
2017-10-23 01:03:40 +00:00
|
|
|
.name = "sha256",
|
|
|
|
.checksum_len = SHA256_SUM_LEN,
|
|
|
|
.der_len = SHA256_DER_LEN,
|
|
|
|
.der_prefix = sha256_der_prefix,
|
2014-03-03 11:19:26 +00:00
|
|
|
#if IMAGE_ENABLE_SIGN
|
2017-10-23 01:03:40 +00:00
|
|
|
.calculate_sign = EVP_sha256,
|
2014-03-03 11:19:30 +00:00
|
|
|
#endif
|
2017-10-23 01:03:40 +00:00
|
|
|
.calculate = hash_calculate,
|
2016-11-08 18:53:41 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
};
|
|
|
|
|
|
|
|
struct crypto_algo crypto_algos[] = {
|
|
|
|
{
|
2017-10-23 01:03:40 +00:00
|
|
|
.name = "rsa2048",
|
|
|
|
.key_len = RSA2048_BYTES,
|
|
|
|
.sign = rsa_sign,
|
|
|
|
.add_verify_data = rsa_add_verify_data,
|
|
|
|
.verify = rsa_verify,
|
2014-03-03 11:19:27 +00:00
|
|
|
},
|
|
|
|
{
|
2017-10-23 01:03:40 +00:00
|
|
|
.name = "rsa4096",
|
|
|
|
.key_len = RSA4096_BYTES,
|
|
|
|
.sign = rsa_sign,
|
|
|
|
.add_verify_data = rsa_add_verify_data,
|
|
|
|
.verify = rsa_verify,
|
2014-03-03 11:19:26 +00:00
|
|
|
}
|
2014-03-03 11:19:27 +00:00
|
|
|
|
2014-03-03 11:19:26 +00:00
|
|
|
};
|
2014-03-03 11:19:27 +00:00
|
|
|
|
2018-11-14 12:51:00 +00:00
|
|
|
struct padding_algo padding_algos[] = {
|
|
|
|
{
|
|
|
|
.name = "pkcs-1.5",
|
|
|
|
.verify = padding_pkcs_15_verify,
|
|
|
|
},
|
2018-11-14 12:51:01 +00:00
|
|
|
#ifdef CONFIG_FIT_ENABLE_RSASSA_PSS_SUPPORT
|
|
|
|
{
|
|
|
|
.name = "pss",
|
|
|
|
.verify = padding_pss_verify,
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_FIT_ENABLE_RSASSA_PSS_SUPPORT */
|
2018-11-14 12:51:00 +00:00
|
|
|
};
|
|
|
|
|
2016-11-08 18:53:41 +00:00
|
|
|
struct checksum_algo *image_get_checksum_algo(const char *full_name)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
const char *name;
|
|
|
|
|
2019-03-16 09:53:03 +00:00
|
|
|
#if !defined(USE_HOSTCC) && defined(CONFIG_NEEDS_MANUAL_RELOC)
|
|
|
|
static bool done;
|
|
|
|
|
|
|
|
if (!done) {
|
|
|
|
done = true;
|
|
|
|
for (i = 0; i < ARRAY_SIZE(checksum_algos); i++) {
|
|
|
|
checksum_algos[i].name += gd->reloc_off;
|
|
|
|
#if IMAGE_ENABLE_SIGN
|
|
|
|
checksum_algos[i].calculate_sign += gd->reloc_off;
|
|
|
|
#endif
|
|
|
|
checksum_algos[i].calculate += gd->reloc_off;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2016-11-08 18:53:41 +00:00
|
|
|
for (i = 0; i < ARRAY_SIZE(checksum_algos); i++) {
|
|
|
|
name = checksum_algos[i].name;
|
|
|
|
/* Make sure names match and next char is a comma */
|
|
|
|
if (!strncmp(name, full_name, strlen(name)) &&
|
|
|
|
full_name[strlen(name)] == ',')
|
|
|
|
return &checksum_algos[i];
|
2013-06-13 22:10:02 +00:00
|
|
|
}
|
2014-03-03 11:19:27 +00:00
|
|
|
|
2016-11-08 18:53:41 +00:00
|
|
|
return NULL;
|
|
|
|
}
|
2013-06-13 22:10:00 +00:00
|
|
|
|
2016-11-08 18:53:41 +00:00
|
|
|
struct crypto_algo *image_get_crypto_algo(const char *full_name)
|
2013-06-13 22:10:00 +00:00
|
|
|
{
|
|
|
|
int i;
|
2016-11-08 18:53:41 +00:00
|
|
|
const char *name;
|
|
|
|
|
2019-03-16 09:53:03 +00:00
|
|
|
#if !defined(USE_HOSTCC) && defined(CONFIG_NEEDS_MANUAL_RELOC)
|
|
|
|
static bool done;
|
|
|
|
|
|
|
|
if (!done) {
|
|
|
|
done = true;
|
|
|
|
for (i = 0; i < ARRAY_SIZE(crypto_algos); i++) {
|
|
|
|
crypto_algos[i].name += gd->reloc_off;
|
|
|
|
crypto_algos[i].sign += gd->reloc_off;
|
|
|
|
crypto_algos[i].add_verify_data += gd->reloc_off;
|
|
|
|
crypto_algos[i].verify += gd->reloc_off;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2016-11-08 18:53:41 +00:00
|
|
|
/* Move name to after the comma */
|
|
|
|
name = strchr(full_name, ',');
|
|
|
|
if (!name)
|
|
|
|
return NULL;
|
|
|
|
name += 1;
|
2013-06-13 22:10:00 +00:00
|
|
|
|
2016-11-08 18:53:41 +00:00
|
|
|
for (i = 0; i < ARRAY_SIZE(crypto_algos); i++) {
|
|
|
|
if (!strcmp(crypto_algos[i].name, name))
|
|
|
|
return &crypto_algos[i];
|
2013-06-13 22:10:00 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
2013-06-13 22:10:01 +00:00
|
|
|
|
2018-11-14 12:51:00 +00:00
|
|
|
struct padding_algo *image_get_padding_algo(const char *name)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
|
|
|
if (!name)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
for (i = 0; i < ARRAY_SIZE(padding_algos); i++) {
|
|
|
|
if (!strcmp(padding_algos[i].name, name))
|
|
|
|
return &padding_algos[i];
|
|
|
|
}
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|