blob: 84b2c0439cf8965a6a7e55cd0a2ec316f4c475ed [file] [log] [blame]
Tom Rini10e47792018-05-06 17:58:06 -04001// SPDX-License-Identifier: GPL-2.0+
Simon Glass58fe7e52013-06-13 15:10:00 -07002/*
3 * Copyright (c) 2013, Google Inc.
Simon Glass58fe7e52013-06-13 15:10:00 -07004 */
5
6#ifdef USE_HOSTCC
7#include "mkimage.h"
8#include <time.h>
9#else
10#include <common.h>
Simon Glassfbabc0f2013-06-13 15:10:01 -070011#include <malloc.h>
12DECLARE_GLOBAL_DATA_PTR;
Simon Glass58fe7e52013-06-13 15:10:00 -070013#endif /* !USE_HOSTCC*/
Simon Glass58fe7e52013-06-13 15:10:00 -070014#include <image.h>
Jeroen Hofsteebfe88fe2014-06-12 22:27:12 +020015#include <u-boot/rsa.h>
16#include <u-boot/rsa-checksum.h>
Simon Glass58fe7e52013-06-13 15:10:00 -070017
Simon Glass56ab8d62013-06-13 15:10:09 -070018#define IMAGE_MAX_HASHED_NODES 100
19
Heiko Schocheredaf9b12014-03-03 12:19:26 +010020struct checksum_algo checksum_algos[] = {
21 {
Masahiro Yamada79f3c592017-10-23 10:03:40 +090022 .name = "sha1",
23 .checksum_len = SHA1_SUM_LEN,
24 .der_len = SHA1_DER_LEN,
25 .der_prefix = sha1_der_prefix,
Heiko Schocheredaf9b12014-03-03 12:19:26 +010026#if IMAGE_ENABLE_SIGN
Masahiro Yamada79f3c592017-10-23 10:03:40 +090027 .calculate_sign = EVP_sha1,
Heiko Schocherd7b42322014-03-03 12:19:30 +010028#endif
Masahiro Yamada79f3c592017-10-23 10:03:40 +090029 .calculate = hash_calculate,
Heiko Schocheredaf9b12014-03-03 12:19:26 +010030 },
31 {
Masahiro Yamada79f3c592017-10-23 10:03:40 +090032 .name = "sha256",
33 .checksum_len = SHA256_SUM_LEN,
34 .der_len = SHA256_DER_LEN,
35 .der_prefix = sha256_der_prefix,
Heiko Schocheredaf9b12014-03-03 12:19:26 +010036#if IMAGE_ENABLE_SIGN
Masahiro Yamada79f3c592017-10-23 10:03:40 +090037 .calculate_sign = EVP_sha256,
Heiko Schocherd7b42322014-03-03 12:19:30 +010038#endif
Masahiro Yamada79f3c592017-10-23 10:03:40 +090039 .calculate = hash_calculate,
Andrew Duda06ca6d62016-11-08 18:53:41 +000040 }
41
42};
43
44struct crypto_algo crypto_algos[] = {
45 {
Masahiro Yamada79f3c592017-10-23 10:03:40 +090046 .name = "rsa2048",
47 .key_len = RSA2048_BYTES,
48 .sign = rsa_sign,
49 .add_verify_data = rsa_add_verify_data,
50 .verify = rsa_verify,
Heiko Schocher4b817562014-03-03 12:19:27 +010051 },
52 {
Masahiro Yamada79f3c592017-10-23 10:03:40 +090053 .name = "rsa4096",
54 .key_len = RSA4096_BYTES,
55 .sign = rsa_sign,
56 .add_verify_data = rsa_add_verify_data,
57 .verify = rsa_verify,
Heiko Schocheredaf9b12014-03-03 12:19:26 +010058 }
Heiko Schocher4b817562014-03-03 12:19:27 +010059
Heiko Schocheredaf9b12014-03-03 12:19:26 +010060};
Heiko Schocher4b817562014-03-03 12:19:27 +010061
Philippe Reynes12468352018-11-14 13:51:00 +010062struct padding_algo padding_algos[] = {
63 {
64 .name = "pkcs-1.5",
65 .verify = padding_pkcs_15_verify,
66 },
Philippe Reynes47d73f02018-11-14 13:51:01 +010067#ifdef CONFIG_FIT_ENABLE_RSASSA_PSS_SUPPORT
68 {
69 .name = "pss",
70 .verify = padding_pss_verify,
71 }
72#endif /* CONFIG_FIT_ENABLE_RSASSA_PSS_SUPPORT */
Philippe Reynes12468352018-11-14 13:51:00 +010073};
74
Andrew Duda6616c822016-11-08 18:53:41 +000075struct checksum_algo *image_get_checksum_algo(const char *full_name)
76{
77 int i;
78 const char *name;
79
T Karthik Reddy0164dc82019-03-16 15:23:03 +053080#if !defined(USE_HOSTCC) && defined(CONFIG_NEEDS_MANUAL_RELOC)
81 static bool done;
82
83 if (!done) {
84 done = true;
85 for (i = 0; i < ARRAY_SIZE(checksum_algos); i++) {
86 checksum_algos[i].name += gd->reloc_off;
87#if IMAGE_ENABLE_SIGN
88 checksum_algos[i].calculate_sign += gd->reloc_off;
89#endif
90 checksum_algos[i].calculate += gd->reloc_off;
91 }
92 }
93#endif
94
Andrew Duda6616c822016-11-08 18:53:41 +000095 for (i = 0; i < ARRAY_SIZE(checksum_algos); i++) {
96 name = checksum_algos[i].name;
97 /* Make sure names match and next char is a comma */
98 if (!strncmp(name, full_name, strlen(name)) &&
99 full_name[strlen(name)] == ',')
100 return &checksum_algos[i];
Simon Glass35191a32013-06-13 15:10:02 -0700101 }
Heiko Schocher4b817562014-03-03 12:19:27 +0100102
Andrew Duda6616c822016-11-08 18:53:41 +0000103 return NULL;
104}
Simon Glass58fe7e52013-06-13 15:10:00 -0700105
Andrew Duda6616c822016-11-08 18:53:41 +0000106struct crypto_algo *image_get_crypto_algo(const char *full_name)
Simon Glass58fe7e52013-06-13 15:10:00 -0700107{
108 int i;
Andrew Duda6616c822016-11-08 18:53:41 +0000109 const char *name;
110
T Karthik Reddy0164dc82019-03-16 15:23:03 +0530111#if !defined(USE_HOSTCC) && defined(CONFIG_NEEDS_MANUAL_RELOC)
112 static bool done;
113
114 if (!done) {
115 done = true;
116 for (i = 0; i < ARRAY_SIZE(crypto_algos); i++) {
117 crypto_algos[i].name += gd->reloc_off;
118 crypto_algos[i].sign += gd->reloc_off;
119 crypto_algos[i].add_verify_data += gd->reloc_off;
120 crypto_algos[i].verify += gd->reloc_off;
121 }
122 }
123#endif
124
Andrew Duda6616c822016-11-08 18:53:41 +0000125 /* Move name to after the comma */
126 name = strchr(full_name, ',');
127 if (!name)
128 return NULL;
129 name += 1;
Simon Glass58fe7e52013-06-13 15:10:00 -0700130
Andrew Duda6616c822016-11-08 18:53:41 +0000131 for (i = 0; i < ARRAY_SIZE(crypto_algos); i++) {
132 if (!strcmp(crypto_algos[i].name, name))
133 return &crypto_algos[i];
Simon Glass58fe7e52013-06-13 15:10:00 -0700134 }
135
136 return NULL;
137}
Simon Glassfbabc0f2013-06-13 15:10:01 -0700138
Philippe Reynes12468352018-11-14 13:51:00 +0100139struct padding_algo *image_get_padding_algo(const char *name)
140{
141 int i;
142
143 if (!name)
144 return NULL;
145
146 for (i = 0; i < ARRAY_SIZE(padding_algos); i++) {
147 if (!strcmp(padding_algos[i].name, name))
148 return &padding_algos[i];
149 }
150
151 return NULL;
152}