blob: fb0035524e0e3014058b4277489ed05734b7c86a [file] [log] [blame]
Tom Rini83d290c2018-05-06 17:58:06 -04001// SPDX-License-Identifier: GPL-2.0+
Simon Glass3e569a62013-06-13 15:10:00 -07002/*
3 * Copyright (c) 2013, Google Inc.
Simon Glass3e569a62013-06-13 15:10:00 -07004 */
5
Simon Glass3e569a62013-06-13 15:10:00 -07006#include <common.h>
Simon Glassf7ae49f2020-05-10 11:40:05 -06007#include <log.h>
Simon Glass56518e72013-06-13 15:10:01 -07008#include <malloc.h>
Simon Glass401d1c42020-10-30 21:38:53 -06009#include <asm/global_data.h>
Simon Glass56518e72013-06-13 15:10:01 -070010DECLARE_GLOBAL_DATA_PTR;
Simon Glass3e569a62013-06-13 15:10:00 -070011#include <image.h>
Alexandru Gagniuced6c9e02021-02-19 12:45:12 -060012#include <u-boot/ecdsa.h>
Jeroen Hofstee2b9912e2014-06-12 22:27:12 +020013#include <u-boot/rsa.h>
Alexandru Gagniuc0bcb28d2021-02-19 12:45:10 -060014#include <u-boot/hash-checksum.h>
Simon Glass3e569a62013-06-13 15:10:00 -070015
Simon Glass4d098522013-06-13 15:10:09 -070016#define IMAGE_MAX_HASHED_NODES 100
17
Heiko Schocher646257d2014-03-03 12:19:26 +010018struct checksum_algo checksum_algos[] = {
19 {
Masahiro Yamada8ec87df2017-10-23 10:03:40 +090020 .name = "sha1",
21 .checksum_len = SHA1_SUM_LEN,
22 .der_len = SHA1_DER_LEN,
23 .der_prefix = sha1_der_prefix,
Masahiro Yamada8ec87df2017-10-23 10:03:40 +090024 .calculate = hash_calculate,
Heiko Schocher646257d2014-03-03 12:19:26 +010025 },
26 {
Masahiro Yamada8ec87df2017-10-23 10:03:40 +090027 .name = "sha256",
28 .checksum_len = SHA256_SUM_LEN,
29 .der_len = SHA256_DER_LEN,
30 .der_prefix = sha256_der_prefix,
Masahiro Yamada8ec87df2017-10-23 10:03:40 +090031 .calculate = hash_calculate,
Reuben Dowled16b38f2020-04-16 17:36:52 +120032 },
33#ifdef CONFIG_SHA384
34 {
35 .name = "sha384",
36 .checksum_len = SHA384_SUM_LEN,
37 .der_len = SHA384_DER_LEN,
38 .der_prefix = sha384_der_prefix,
Reuben Dowled16b38f2020-04-16 17:36:52 +120039 .calculate = hash_calculate,
40 },
41#endif
42#ifdef CONFIG_SHA512
43 {
44 .name = "sha512",
45 .checksum_len = SHA512_SUM_LEN,
46 .der_len = SHA512_DER_LEN,
47 .der_prefix = sha512_der_prefix,
Reuben Dowled16b38f2020-04-16 17:36:52 +120048 .calculate = hash_calculate,
49 },
50#endif
Heiko Schocherdb1b5f32014-03-03 12:19:27 +010051
Heiko Schocher646257d2014-03-03 12:19:26 +010052};
Heiko Schocherdb1b5f32014-03-03 12:19:27 +010053
Philippe Reynes20031562018-11-14 13:51:00 +010054struct padding_algo padding_algos[] = {
55 {
56 .name = "pkcs-1.5",
57 .verify = padding_pkcs_15_verify,
58 },
Simon Glassad74aed2021-07-14 17:05:31 -050059#ifdef CONFIG_FIT_RSASSA_PSS
Philippe Reynes061daa02018-11-14 13:51:01 +010060 {
61 .name = "pss",
62 .verify = padding_pss_verify,
63 }
Simon Glassad74aed2021-07-14 17:05:31 -050064#endif /* CONFIG_FIT_RSASSA_PSS */
Philippe Reynes20031562018-11-14 13:51:00 +010065};
66
Andrew Duda83dd98e2016-11-08 18:53:41 +000067struct checksum_algo *image_get_checksum_algo(const char *full_name)
Simon Glass3e569a62013-06-13 15:10:00 -070068{
69 int i;
Andrew Duda83dd98e2016-11-08 18:53:41 +000070 const char *name;
Simon Glass3e569a62013-06-13 15:10:00 -070071
Alexandru Gagniuccab22c82021-07-14 17:05:38 -050072#if defined(CONFIG_NEEDS_MANUAL_RELOC)
T Karthik Reddy1ed8c132019-03-16 15:23:03 +053073 static bool done;
74
75 if (!done) {
76 done = true;
77 for (i = 0; i < ARRAY_SIZE(checksum_algos); i++) {
78 checksum_algos[i].name += gd->reloc_off;
T Karthik Reddy1ed8c132019-03-16 15:23:03 +053079 checksum_algos[i].calculate += gd->reloc_off;
80 }
81 }
82#endif
83
Andrew Duda83dd98e2016-11-08 18:53:41 +000084 for (i = 0; i < ARRAY_SIZE(checksum_algos); i++) {
85 name = checksum_algos[i].name;
86 /* Make sure names match and next char is a comma */
87 if (!strncmp(name, full_name, strlen(name)) &&
88 full_name[strlen(name)] == ',')
89 return &checksum_algos[i];
90 }
91
92 return NULL;
93}
94
95struct crypto_algo *image_get_crypto_algo(const char *full_name)
96{
Alexandru Gagniuc09801642021-07-14 17:05:39 -050097 struct crypto_algo *crypto, *end;
Andrew Duda83dd98e2016-11-08 18:53:41 +000098 const char *name;
99
Alexandru Gagniucb9826bf2021-07-14 17:05:46 -0500100#if defined(CONFIG_NEEDS_MANUAL_RELOC)
101 static bool done;
102
103 if (!done) {
104 crypto = ll_entry_start(struct crypto_algo, cryptos);
105 end = ll_entry_end(struct crypto_algo, cryptos);
106 for (; crypto < end; crypto++) {
107 crypto->name += gd->reloc_off;
108 crypto->verify += gd->reloc_off;
109 }
110 }
111#endif
112
Andrew Duda83dd98e2016-11-08 18:53:41 +0000113 /* Move name to after the comma */
114 name = strchr(full_name, ',');
115 if (!name)
116 return NULL;
117 name += 1;
118
Alexandru Gagniuc09801642021-07-14 17:05:39 -0500119 crypto = ll_entry_start(struct crypto_algo, cryptos);
120 end = ll_entry_end(struct crypto_algo, cryptos);
121 for (; crypto < end; crypto++) {
122 if (!strcmp(crypto->name, name))
123 return crypto;
124 }
125
126 /* Not found */
Simon Glass3e569a62013-06-13 15:10:00 -0700127 return NULL;
128}
Simon Glass56518e72013-06-13 15:10:01 -0700129
Philippe Reynes20031562018-11-14 13:51:00 +0100130struct padding_algo *image_get_padding_algo(const char *name)
131{
132 int i;
133
134 if (!name)
135 return NULL;
136
137 for (i = 0; i < ARRAY_SIZE(padding_algos); i++) {
138 if (!strcmp(padding_algos[i].name, name))
139 return &padding_algos[i];
140 }
141
142 return NULL;
143}