Tom Rini | 10e4779 | 2018-05-06 17:58:06 -0400 | [diff] [blame] | 1 | /* SPDX-License-Identifier: GPL-2.0+ */ |
Simon Glass | 35191a3 | 2013-06-13 15:10:02 -0700 | [diff] [blame] | 2 | /* |
| 3 | * Copyright (c) 2013, Google Inc. |
| 4 | * |
| 5 | * (C) Copyright 2008 Semihalf |
| 6 | * |
| 7 | * (C) Copyright 2000-2006 |
| 8 | * Wolfgang Denk, DENX Software Engineering, wd@denx.de. |
Simon Glass | 35191a3 | 2013-06-13 15:10:02 -0700 | [diff] [blame] | 9 | */ |
| 10 | |
| 11 | #ifndef _RSA_H |
| 12 | #define _RSA_H |
| 13 | |
| 14 | #include <errno.h> |
| 15 | #include <image.h> |
| 16 | |
Heiko Schocher | edaf9b1 | 2014-03-03 12:19:26 +0100 | [diff] [blame] | 17 | /** |
| 18 | * struct rsa_public_key - holder for a public key |
| 19 | * |
| 20 | * An RSA public key consists of a modulus (typically called N), the inverse |
| 21 | * and R^2, where R is 2^(# key bits). |
| 22 | */ |
| 23 | |
| 24 | struct rsa_public_key { |
| 25 | uint len; /* len of modulus[] in number of uint32_t */ |
| 26 | uint32_t n0inv; /* -1 / modulus[0] mod 2^32 */ |
| 27 | uint32_t *modulus; /* modulus as little endian array */ |
| 28 | uint32_t *rr; /* R^2 as little endian array */ |
Michael van der Westhuizen | 89f4ed1 | 2014-07-02 10:17:26 +0200 | [diff] [blame] | 29 | uint64_t exponent; /* public exponent */ |
Heiko Schocher | edaf9b1 | 2014-03-03 12:19:26 +0100 | [diff] [blame] | 30 | }; |
| 31 | |
Simon Glass | e3ee2fb | 2016-02-22 22:55:43 -0700 | [diff] [blame] | 32 | struct image_sign_info; |
| 33 | |
Simon Glass | 35191a3 | 2013-06-13 15:10:02 -0700 | [diff] [blame] | 34 | /** |
| 35 | * sign() - calculate and return signature for given input data |
| 36 | * |
| 37 | * @info: Specifies key and FIT information |
| 38 | * @data: Pointer to the input data |
| 39 | * @data_len: Data length |
| 40 | * @sigp: Set to an allocated buffer holding the signature |
| 41 | * @sig_len: Set to length of the calculated hash |
| 42 | * |
| 43 | * This computes input data signature according to selected algorithm. |
| 44 | * Resulting signature value is placed in an allocated buffer, the |
| 45 | * pointer is returned as *sigp. The length of the calculated |
| 46 | * signature is returned via the sig_len pointer argument. The caller |
| 47 | * should free *sigp. |
| 48 | * |
| 49 | * @return: 0, on success, -ve on error |
| 50 | */ |
| 51 | int rsa_sign(struct image_sign_info *info, |
| 52 | const struct image_region region[], |
| 53 | int region_count, uint8_t **sigp, uint *sig_len); |
| 54 | |
| 55 | /** |
| 56 | * add_verify_data() - Add verification information to FDT |
| 57 | * |
| 58 | * Add public key information to the FDT node, suitable for |
| 59 | * verification at run-time. The information added depends on the |
| 60 | * algorithm being used. |
| 61 | * |
| 62 | * @info: Specifies key and FIT information |
| 63 | * @keydest: Destination FDT blob for public key data |
Simon Glass | af2f9d5 | 2014-06-02 22:04:51 -0600 | [diff] [blame] | 64 | * @return: 0, on success, -ENOSPC if the keydest FDT blob ran out of space, |
| 65 | other -ve value on error |
Simon Glass | 35191a3 | 2013-06-13 15:10:02 -0700 | [diff] [blame] | 66 | */ |
| 67 | int rsa_add_verify_data(struct image_sign_info *info, void *keydest); |
Simon Glass | 35191a3 | 2013-06-13 15:10:02 -0700 | [diff] [blame] | 68 | |
Simon Glass | 35191a3 | 2013-06-13 15:10:02 -0700 | [diff] [blame] | 69 | /** |
Heiko Stuebner | b404409 | 2020-05-22 16:20:33 +0200 | [diff] [blame] | 70 | * rsa_verify_hash() - Verify a signature against a hash |
| 71 | * |
| 72 | * Verify a RSA PKCS1.5 signature against an expected hash. |
| 73 | * |
| 74 | * @info: Specifies key and FIT information |
| 75 | * @hash: Hash according to algorithm specified in @info |
| 76 | * @sig: Signature |
| 77 | * @sig_len: Number of bytes in signature |
| 78 | * @return 0 if verified, -ve on error |
| 79 | */ |
| 80 | int rsa_verify_hash(struct image_sign_info *info, |
| 81 | const uint8_t *hash, uint8_t *sig, uint sig_len); |
| 82 | |
| 83 | /** |
Simon Glass | 35191a3 | 2013-06-13 15:10:02 -0700 | [diff] [blame] | 84 | * rsa_verify() - Verify a signature against some data |
| 85 | * |
| 86 | * Verify a RSA PKCS1.5 signature against an expected hash. |
| 87 | * |
| 88 | * @info: Specifies key and FIT information |
| 89 | * @data: Pointer to the input data |
| 90 | * @data_len: Data length |
| 91 | * @sig: Signature |
| 92 | * @sig_len: Number of bytes in signature |
| 93 | * @return 0 if verified, -ve on error |
| 94 | */ |
| 95 | int rsa_verify(struct image_sign_info *info, |
| 96 | const struct image_region region[], int region_count, |
| 97 | uint8_t *sig, uint sig_len); |
Philippe Reynes | 1246835 | 2018-11-14 13:51:00 +0100 | [diff] [blame] | 98 | |
AKASHI Takahiro | 30962bf | 2020-06-16 14:26:48 +0900 | [diff] [blame] | 99 | int rsa_verify_with_pkey(struct image_sign_info *info, |
| 100 | const void *hash, uint8_t *sig, uint sig_len); |
| 101 | |
Philippe Reynes | 1246835 | 2018-11-14 13:51:00 +0100 | [diff] [blame] | 102 | int padding_pkcs_15_verify(struct image_sign_info *info, |
| 103 | uint8_t *msg, int msg_len, |
| 104 | const uint8_t *hash, int hash_len); |
Philippe Reynes | 47d73f0 | 2018-11-14 13:51:01 +0100 | [diff] [blame] | 105 | |
Simon Glass | 66b00c8 | 2021-07-14 17:05:31 -0500 | [diff] [blame] | 106 | #ifdef CONFIG_FIT_RSASSA_PSS |
Philippe Reynes | 47d73f0 | 2018-11-14 13:51:01 +0100 | [diff] [blame] | 107 | int padding_pss_verify(struct image_sign_info *info, |
| 108 | uint8_t *msg, int msg_len, |
| 109 | const uint8_t *hash, int hash_len); |
Simon Glass | 66b00c8 | 2021-07-14 17:05:31 -0500 | [diff] [blame] | 110 | #endif /* CONFIG_FIT_RSASSA_PSS */ |
Simon Glass | 35191a3 | 2013-06-13 15:10:02 -0700 | [diff] [blame] | 111 | |
Philippe Reynes | 1246835 | 2018-11-14 13:51:00 +0100 | [diff] [blame] | 112 | #define RSA_DEFAULT_PADDING_NAME "pkcs-1.5" |
| 113 | |
Heiko Schocher | 4b81756 | 2014-03-03 12:19:27 +0100 | [diff] [blame] | 114 | #define RSA2048_BYTES (2048 / 8) |
| 115 | #define RSA4096_BYTES (4096 / 8) |
| 116 | |
| 117 | /* This is the minimum/maximum key size we support, in bits */ |
| 118 | #define RSA_MIN_KEY_BITS 2048 |
| 119 | #define RSA_MAX_KEY_BITS 4096 |
| 120 | |
| 121 | /* This is the maximum signature length that we support, in bits */ |
| 122 | #define RSA_MAX_SIG_BITS 4096 |
| 123 | |
Simon Glass | 35191a3 | 2013-06-13 15:10:02 -0700 | [diff] [blame] | 124 | #endif |