mirror of
https://github.com/AsahiLinux/u-boot
synced 2024-12-01 00:49:43 +00:00
7298e42250
This commit add the support of encrypting image with aes in mkimage. To enable the ciphering, a node cipher with a reference to a key and IV (Initialization Vector) must be added to the its file. Then mkimage add the encrypted image to the FIT and add the key and IV to the u-boot device tree. Signed-off-by: Philippe Reynes <philippe.reynes@softathome.com>
136 lines
2.9 KiB
C
136 lines
2.9 KiB
C
// SPDX-License-Identifier: GPL-2.0+
|
|
/*
|
|
* Copyright (c) 2019,Softathome
|
|
*/
|
|
#include "mkimage.h"
|
|
#include <stdio.h>
|
|
#include <string.h>
|
|
#include <image.h>
|
|
#include <time.h>
|
|
#include <openssl/bn.h>
|
|
#include <openssl/rsa.h>
|
|
#include <openssl/pem.h>
|
|
#include <openssl/err.h>
|
|
#include <openssl/ssl.h>
|
|
#include <openssl/evp.h>
|
|
#include <openssl/engine.h>
|
|
#include <uboot_aes.h>
|
|
|
|
#if OPENSSL_VERSION_NUMBER >= 0x10000000L
|
|
#define HAVE_ERR_REMOVE_THREAD_STATE
|
|
#endif
|
|
|
|
int image_aes_encrypt(struct image_cipher_info *info,
|
|
unsigned char *data, int size,
|
|
unsigned char **cipher, int *cipher_len)
|
|
{
|
|
EVP_CIPHER_CTX *ctx;
|
|
unsigned char *buf = NULL;
|
|
int buf_len, len, ret = 0;
|
|
|
|
/* create and initialise the context */
|
|
ctx = EVP_CIPHER_CTX_new();
|
|
if (!ctx) {
|
|
printf("Can't create context\n");
|
|
return -1;
|
|
}
|
|
|
|
/* allocate a buffer for the result */
|
|
buf = malloc(size + AES_BLOCK_LENGTH);
|
|
if (!buf) {
|
|
printf("Can't allocate memory to encrypt\n");
|
|
ret = -1;
|
|
goto out;
|
|
}
|
|
|
|
if (EVP_EncryptInit_ex(ctx, info->cipher->calculate_type(),
|
|
NULL, info->key, info->iv) != 1) {
|
|
printf("Can't init encryption\n");
|
|
ret = -1;
|
|
goto out;
|
|
}
|
|
|
|
if (EVP_EncryptUpdate(ctx, buf, &len, data, size) != 1) {
|
|
printf("Can't encrypt data\n");
|
|
ret = -1;
|
|
goto out;
|
|
}
|
|
|
|
buf_len = len;
|
|
|
|
if (EVP_EncryptFinal_ex(ctx, buf + len, &len) != 1) {
|
|
printf("Can't finalise the encryption\n");
|
|
ret = -1;
|
|
goto out;
|
|
}
|
|
|
|
buf_len += len;
|
|
|
|
*cipher = buf;
|
|
*cipher_len = buf_len;
|
|
|
|
out:
|
|
EVP_CIPHER_CTX_free(ctx);
|
|
return ret;
|
|
}
|
|
|
|
int image_aes_add_cipher_data(struct image_cipher_info *info, void *keydest)
|
|
{
|
|
int parent, node;
|
|
char name[128];
|
|
int ret = 0;
|
|
|
|
/* Either create or overwrite the named cipher node */
|
|
parent = fdt_subnode_offset(keydest, 0, FIT_CIPHER_NODENAME);
|
|
if (parent == -FDT_ERR_NOTFOUND) {
|
|
parent = fdt_add_subnode(keydest, 0, FIT_CIPHER_NODENAME);
|
|
if (parent < 0) {
|
|
ret = parent;
|
|
if (ret != -FDT_ERR_NOSPACE) {
|
|
fprintf(stderr,
|
|
"Couldn't create cipher node: %s\n",
|
|
fdt_strerror(parent));
|
|
}
|
|
}
|
|
}
|
|
if (ret)
|
|
goto done;
|
|
|
|
/* Either create or overwrite the named key node */
|
|
snprintf(name, sizeof(name), "key-%s-%s-%s",
|
|
info->name, info->keyname, info->ivname);
|
|
node = fdt_subnode_offset(keydest, parent, name);
|
|
if (node == -FDT_ERR_NOTFOUND) {
|
|
node = fdt_add_subnode(keydest, parent, name);
|
|
if (node < 0) {
|
|
ret = node;
|
|
if (ret != -FDT_ERR_NOSPACE) {
|
|
fprintf(stderr,
|
|
"Could not create key subnode: %s\n",
|
|
fdt_strerror(node));
|
|
}
|
|
}
|
|
} else if (node < 0) {
|
|
fprintf(stderr, "Cannot select keys parent: %s\n",
|
|
fdt_strerror(node));
|
|
ret = node;
|
|
}
|
|
|
|
if (!ret)
|
|
ret = fdt_setprop(keydest, node, "iv",
|
|
info->iv, info->cipher->iv_len);
|
|
|
|
if (!ret)
|
|
ret = fdt_setprop(keydest, node, "key",
|
|
info->key, info->cipher->key_len);
|
|
|
|
if (!ret)
|
|
ret = fdt_setprop_u32(keydest, node, "key-len",
|
|
info->cipher->key_len);
|
|
|
|
done:
|
|
if (ret)
|
|
ret = ret == -FDT_ERR_NOSPACE ? -ENOSPC : -EIO;
|
|
|
|
return ret;
|
|
}
|