mirror of
https://github.com/AsahiLinux/u-boot
synced 2024-12-16 00:03:24 +00:00
f2cf7feb80
Re-crypt support was extended to devices without burnt SBK. In case SBK is not set, place from where it is read is filled with zeroes. This patch adds support for ebtupdate function to detect nosbk device and avoid crypto operations for it. Tested-by: Maksim Kurnosenko <asusx2@mail.ru> Signed-off-by: Svyatoslav Ryhel <clamor95@gmail.com>
89 lines
2.1 KiB
C
89 lines
2.1 KiB
C
// SPDX-License-Identifier: GPL-2.0-or-later
|
|
/*
|
|
* Copyright (c) 2022, Ramin <raminterex@yahoo.com>
|
|
* Copyright (c) 2022, Svyatoslav Ryhel <clamor95@gmail.com>
|
|
*/
|
|
|
|
#include <common.h>
|
|
#include <command.h>
|
|
#include <log.h>
|
|
#include <asm/arch-tegra/crypto.h>
|
|
#include "bct.h"
|
|
#include "uboot_aes.h"
|
|
|
|
/* Device with "sbk burned: false" will expose zero key */
|
|
const u8 nosbk[AES128_KEY_LENGTH] = { 0 };
|
|
|
|
/*
|
|
* @param bct boot config table start in RAM
|
|
* @param ect bootloader start in RAM
|
|
* @param ebt_size bootloader file size in bytes
|
|
* Return: 0, or 1 if failed
|
|
*/
|
|
static int bct_patch(u8 *bct, u8 *ebt, u32 ebt_size)
|
|
{
|
|
struct nvboot_config_table *bct_tbl = NULL;
|
|
u8 ebt_hash[AES128_KEY_LENGTH] = { 0 };
|
|
u8 sbk[AES128_KEY_LENGTH] = { 0 };
|
|
u8 *bct_hash = bct;
|
|
bool encrypted;
|
|
int ret;
|
|
|
|
bct += BCT_HASH;
|
|
|
|
ebt_size = roundup(ebt_size, EBT_ALIGNMENT);
|
|
|
|
memcpy(sbk, (u8 *)(bct + BCT_LENGTH),
|
|
NVBOOT_CMAC_AES_HASH_LENGTH * 4);
|
|
|
|
encrypted = memcmp(&sbk, &nosbk, AES128_KEY_LENGTH);
|
|
|
|
if (encrypted) {
|
|
ret = decrypt_data_block(bct, BCT_LENGTH, sbk);
|
|
if (ret)
|
|
return 1;
|
|
|
|
ret = encrypt_data_block(ebt, ebt_size, sbk);
|
|
if (ret)
|
|
return 1;
|
|
}
|
|
|
|
ret = sign_enc_data_block(ebt, ebt_size, ebt_hash, sbk);
|
|
if (ret)
|
|
return 1;
|
|
|
|
bct_tbl = (struct nvboot_config_table *)bct;
|
|
|
|
memcpy((u8 *)&bct_tbl->bootloader[0].crypto_hash,
|
|
ebt_hash, NVBOOT_CMAC_AES_HASH_LENGTH * 4);
|
|
bct_tbl->bootloader[0].entry_point = CONFIG_SPL_TEXT_BASE;
|
|
bct_tbl->bootloader[0].load_addr = CONFIG_SPL_TEXT_BASE;
|
|
bct_tbl->bootloader[0].length = ebt_size;
|
|
|
|
if (encrypted) {
|
|
ret = encrypt_data_block(bct, BCT_LENGTH, sbk);
|
|
if (ret)
|
|
return 1;
|
|
}
|
|
|
|
ret = sign_enc_data_block(bct, BCT_LENGTH, bct_hash, sbk);
|
|
if (ret)
|
|
return 1;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int do_ebtupdate(struct cmd_tbl *cmdtp, int flag, int argc,
|
|
char *const argv[])
|
|
{
|
|
u32 bct_addr = hextoul(argv[1], NULL);
|
|
u32 ebt_addr = hextoul(argv[2], NULL);
|
|
u32 ebt_size = hextoul(argv[3], NULL);
|
|
|
|
return bct_patch((u8 *)bct_addr, (u8 *)ebt_addr, ebt_size);
|
|
}
|
|
|
|
U_BOOT_CMD(ebtupdate, 4, 0, do_ebtupdate,
|
|
"update bootloader on re-crypted Tegra20 devices",
|
|
""
|
|
);
|