blob: f3c209ae8b72a8564a4ca610af138689b712205e [file] [log] [blame]
Tom Rini83d290c2018-05-06 17:58:06 -04001// SPDX-License-Identifier: GPL-2.0+
Simon Glass3e569a62013-06-13 15:10:00 -07002/*
3 * Copyright (c) 2013, Google Inc.
Simon Glass3e569a62013-06-13 15:10:00 -07004 */
5
6#ifdef USE_HOSTCC
7#include "mkimage.h"
Simon Glass4d72caa2020-05-10 11:40:01 -06008#include <fdt_support.h>
Simon Glass3e569a62013-06-13 15:10:00 -07009#include <time.h>
Simon Glass4d72caa2020-05-10 11:40:01 -060010#include <linux/libfdt.h>
Simon Glass3e569a62013-06-13 15:10:00 -070011#else
12#include <common.h>
Simon Glassf7ae49f2020-05-10 11:40:05 -060013#include <log.h>
Simon Glass56518e72013-06-13 15:10:01 -070014#include <malloc.h>
15DECLARE_GLOBAL_DATA_PTR;
Simon Glass3e569a62013-06-13 15:10:00 -070016#endif /* !USE_HOSTCC*/
Simon Glass3e569a62013-06-13 15:10:00 -070017#include <image.h>
Jeroen Hofstee2b9912e2014-06-12 22:27:12 +020018#include <u-boot/rsa.h>
19#include <u-boot/rsa-checksum.h>
Simon Glass3e569a62013-06-13 15:10:00 -070020
Simon Glass4d098522013-06-13 15:10:09 -070021#define IMAGE_MAX_HASHED_NODES 100
22
Heiko Schocher646257d2014-03-03 12:19:26 +010023struct checksum_algo checksum_algos[] = {
24 {
Masahiro Yamada8ec87df2017-10-23 10:03:40 +090025 .name = "sha1",
26 .checksum_len = SHA1_SUM_LEN,
27 .der_len = SHA1_DER_LEN,
28 .der_prefix = sha1_der_prefix,
Heiko Schocher646257d2014-03-03 12:19:26 +010029#if IMAGE_ENABLE_SIGN
Masahiro Yamada8ec87df2017-10-23 10:03:40 +090030 .calculate_sign = EVP_sha1,
Heiko Schocher29a23f92014-03-03 12:19:30 +010031#endif
Masahiro Yamada8ec87df2017-10-23 10:03:40 +090032 .calculate = hash_calculate,
Heiko Schocher646257d2014-03-03 12:19:26 +010033 },
34 {
Masahiro Yamada8ec87df2017-10-23 10:03:40 +090035 .name = "sha256",
36 .checksum_len = SHA256_SUM_LEN,
37 .der_len = SHA256_DER_LEN,
38 .der_prefix = sha256_der_prefix,
Heiko Schocherdb1b5f32014-03-03 12:19:27 +010039#if IMAGE_ENABLE_SIGN
Masahiro Yamada8ec87df2017-10-23 10:03:40 +090040 .calculate_sign = EVP_sha256,
Heiko Schocher29a23f92014-03-03 12:19:30 +010041#endif
Masahiro Yamada8ec87df2017-10-23 10:03:40 +090042 .calculate = hash_calculate,
Reuben Dowled16b38f2020-04-16 17:36:52 +120043 },
44#ifdef CONFIG_SHA384
45 {
46 .name = "sha384",
47 .checksum_len = SHA384_SUM_LEN,
48 .der_len = SHA384_DER_LEN,
49 .der_prefix = sha384_der_prefix,
50#if IMAGE_ENABLE_SIGN
51 .calculate_sign = EVP_sha384,
52#endif
53 .calculate = hash_calculate,
54 },
55#endif
56#ifdef CONFIG_SHA512
57 {
58 .name = "sha512",
59 .checksum_len = SHA512_SUM_LEN,
60 .der_len = SHA512_DER_LEN,
61 .der_prefix = sha512_der_prefix,
62#if IMAGE_ENABLE_SIGN
63 .calculate_sign = EVP_sha512,
64#endif
65 .calculate = hash_calculate,
66 },
67#endif
Heiko Schocherdb1b5f32014-03-03 12:19:27 +010068
Heiko Schocher646257d2014-03-03 12:19:26 +010069};
Heiko Schocherdb1b5f32014-03-03 12:19:27 +010070
Andrew Duda0c1d74f2016-11-08 18:53:41 +000071struct crypto_algo crypto_algos[] = {
Simon Glass19c402a2013-06-13 15:10:02 -070072 {
Masahiro Yamada8ec87df2017-10-23 10:03:40 +090073 .name = "rsa2048",
74 .key_len = RSA2048_BYTES,
75 .sign = rsa_sign,
76 .add_verify_data = rsa_add_verify_data,
77 .verify = rsa_verify,
Andrew Duda0c1d74f2016-11-08 18:53:41 +000078 },
79 {
Masahiro Yamada8ec87df2017-10-23 10:03:40 +090080 .name = "rsa4096",
81 .key_len = RSA4096_BYTES,
82 .sign = rsa_sign,
83 .add_verify_data = rsa_add_verify_data,
84 .verify = rsa_verify,
Andrew Duda0c1d74f2016-11-08 18:53:41 +000085 }
86
87};
88
Philippe Reynes20031562018-11-14 13:51:00 +010089struct padding_algo padding_algos[] = {
90 {
91 .name = "pkcs-1.5",
92 .verify = padding_pkcs_15_verify,
93 },
Philippe Reynes061daa02018-11-14 13:51:01 +010094#ifdef CONFIG_FIT_ENABLE_RSASSA_PSS_SUPPORT
95 {
96 .name = "pss",
97 .verify = padding_pss_verify,
98 }
99#endif /* CONFIG_FIT_ENABLE_RSASSA_PSS_SUPPORT */
Philippe Reynes20031562018-11-14 13:51:00 +0100100};
101
Andrew Duda83dd98e2016-11-08 18:53:41 +0000102struct checksum_algo *image_get_checksum_algo(const char *full_name)
Simon Glass3e569a62013-06-13 15:10:00 -0700103{
104 int i;
Andrew Duda83dd98e2016-11-08 18:53:41 +0000105 const char *name;
Simon Glass3e569a62013-06-13 15:10:00 -0700106
T Karthik Reddy1ed8c132019-03-16 15:23:03 +0530107#if !defined(USE_HOSTCC) && defined(CONFIG_NEEDS_MANUAL_RELOC)
108 static bool done;
109
110 if (!done) {
111 done = true;
112 for (i = 0; i < ARRAY_SIZE(checksum_algos); i++) {
113 checksum_algos[i].name += gd->reloc_off;
114#if IMAGE_ENABLE_SIGN
115 checksum_algos[i].calculate_sign += gd->reloc_off;
116#endif
117 checksum_algos[i].calculate += gd->reloc_off;
118 }
119 }
120#endif
121
Andrew Duda83dd98e2016-11-08 18:53:41 +0000122 for (i = 0; i < ARRAY_SIZE(checksum_algos); i++) {
123 name = checksum_algos[i].name;
124 /* Make sure names match and next char is a comma */
125 if (!strncmp(name, full_name, strlen(name)) &&
126 full_name[strlen(name)] == ',')
127 return &checksum_algos[i];
128 }
129
130 return NULL;
131}
132
133struct crypto_algo *image_get_crypto_algo(const char *full_name)
134{
135 int i;
136 const char *name;
137
T Karthik Reddy1ed8c132019-03-16 15:23:03 +0530138#if !defined(USE_HOSTCC) && defined(CONFIG_NEEDS_MANUAL_RELOC)
139 static bool done;
140
141 if (!done) {
142 done = true;
143 for (i = 0; i < ARRAY_SIZE(crypto_algos); i++) {
144 crypto_algos[i].name += gd->reloc_off;
145 crypto_algos[i].sign += gd->reloc_off;
146 crypto_algos[i].add_verify_data += gd->reloc_off;
147 crypto_algos[i].verify += gd->reloc_off;
148 }
149 }
150#endif
151
Andrew Duda83dd98e2016-11-08 18:53:41 +0000152 /* Move name to after the comma */
153 name = strchr(full_name, ',');
154 if (!name)
155 return NULL;
156 name += 1;
157
158 for (i = 0; i < ARRAY_SIZE(crypto_algos); i++) {
159 if (!strcmp(crypto_algos[i].name, name))
160 return &crypto_algos[i];
Simon Glass3e569a62013-06-13 15:10:00 -0700161 }
162
163 return NULL;
164}
Simon Glass56518e72013-06-13 15:10:01 -0700165
Philippe Reynes20031562018-11-14 13:51:00 +0100166struct padding_algo *image_get_padding_algo(const char *name)
167{
168 int i;
169
170 if (!name)
171 return NULL;
172
173 for (i = 0; i < ARRAY_SIZE(padding_algos); i++) {
174 if (!strcmp(padding_algos[i].name, name))
175 return &padding_algos[i];
176 }
177
178 return NULL;
179}