blob: 498969d64141d5e55c593627c66835cec7d3aa66 [file] [log] [blame]
Tom Rini10e47792018-05-06 17:58:06 -04001// SPDX-License-Identifier: GPL-2.0+
Simon Glass58fe7e52013-06-13 15:10:00 -07002/*
3 * Copyright (c) 2013, Google Inc.
Simon Glass58fe7e52013-06-13 15:10:00 -07004 */
5
6#ifdef USE_HOSTCC
7#include "mkimage.h"
Simon Glass2dc9c342020-05-10 11:40:01 -06008#include <fdt_support.h>
Simon Glass58fe7e52013-06-13 15:10:00 -07009#include <time.h>
Simon Glass2dc9c342020-05-10 11:40:01 -060010#include <linux/libfdt.h>
Simon Glass58fe7e52013-06-13 15:10:00 -070011#else
12#include <common.h>
Simon Glass0f2af882020-05-10 11:40:05 -060013#include <log.h>
Simon Glassfbabc0f2013-06-13 15:10:01 -070014#include <malloc.h>
15DECLARE_GLOBAL_DATA_PTR;
Simon Glass58fe7e52013-06-13 15:10:00 -070016#endif /* !USE_HOSTCC*/
Simon Glass58fe7e52013-06-13 15:10:00 -070017#include <image.h>
Jeroen Hofsteebfe88fe2014-06-12 22:27:12 +020018#include <u-boot/rsa.h>
19#include <u-boot/rsa-checksum.h>
Simon Glass58fe7e52013-06-13 15:10:00 -070020
Simon Glass56ab8d62013-06-13 15:10:09 -070021#define IMAGE_MAX_HASHED_NODES 100
22
Heiko Schocheredaf9b12014-03-03 12:19:26 +010023struct checksum_algo checksum_algos[] = {
24 {
Masahiro Yamada79f3c592017-10-23 10:03:40 +090025 .name = "sha1",
26 .checksum_len = SHA1_SUM_LEN,
27 .der_len = SHA1_DER_LEN,
28 .der_prefix = sha1_der_prefix,
Heiko Schocheredaf9b12014-03-03 12:19:26 +010029#if IMAGE_ENABLE_SIGN
Masahiro Yamada79f3c592017-10-23 10:03:40 +090030 .calculate_sign = EVP_sha1,
Heiko Schocherd7b42322014-03-03 12:19:30 +010031#endif
Masahiro Yamada79f3c592017-10-23 10:03:40 +090032 .calculate = hash_calculate,
Heiko Schocheredaf9b12014-03-03 12:19:26 +010033 },
34 {
Masahiro Yamada79f3c592017-10-23 10:03:40 +090035 .name = "sha256",
36 .checksum_len = SHA256_SUM_LEN,
37 .der_len = SHA256_DER_LEN,
38 .der_prefix = sha256_der_prefix,
Heiko Schocheredaf9b12014-03-03 12:19:26 +010039#if IMAGE_ENABLE_SIGN
Masahiro Yamada79f3c592017-10-23 10:03:40 +090040 .calculate_sign = EVP_sha256,
Heiko Schocherd7b42322014-03-03 12:19:30 +010041#endif
Masahiro Yamada79f3c592017-10-23 10:03:40 +090042 .calculate = hash_calculate,
Andrew Duda06ca6d62016-11-08 18:53:41 +000043 }
44
45};
46
47struct crypto_algo crypto_algos[] = {
48 {
Masahiro Yamada79f3c592017-10-23 10:03:40 +090049 .name = "rsa2048",
50 .key_len = RSA2048_BYTES,
51 .sign = rsa_sign,
52 .add_verify_data = rsa_add_verify_data,
53 .verify = rsa_verify,
Heiko Schocher4b817562014-03-03 12:19:27 +010054 },
55 {
Masahiro Yamada79f3c592017-10-23 10:03:40 +090056 .name = "rsa4096",
57 .key_len = RSA4096_BYTES,
58 .sign = rsa_sign,
59 .add_verify_data = rsa_add_verify_data,
60 .verify = rsa_verify,
Heiko Schocheredaf9b12014-03-03 12:19:26 +010061 }
Heiko Schocher4b817562014-03-03 12:19:27 +010062
Heiko Schocheredaf9b12014-03-03 12:19:26 +010063};
Heiko Schocher4b817562014-03-03 12:19:27 +010064
Philippe Reynes12468352018-11-14 13:51:00 +010065struct padding_algo padding_algos[] = {
66 {
67 .name = "pkcs-1.5",
68 .verify = padding_pkcs_15_verify,
69 },
Philippe Reynes47d73f02018-11-14 13:51:01 +010070#ifdef CONFIG_FIT_ENABLE_RSASSA_PSS_SUPPORT
71 {
72 .name = "pss",
73 .verify = padding_pss_verify,
74 }
75#endif /* CONFIG_FIT_ENABLE_RSASSA_PSS_SUPPORT */
Philippe Reynes12468352018-11-14 13:51:00 +010076};
77
Andrew Duda6616c822016-11-08 18:53:41 +000078struct checksum_algo *image_get_checksum_algo(const char *full_name)
79{
80 int i;
81 const char *name;
82
T Karthik Reddy0164dc82019-03-16 15:23:03 +053083#if !defined(USE_HOSTCC) && defined(CONFIG_NEEDS_MANUAL_RELOC)
84 static bool done;
85
86 if (!done) {
87 done = true;
88 for (i = 0; i < ARRAY_SIZE(checksum_algos); i++) {
89 checksum_algos[i].name += gd->reloc_off;
90#if IMAGE_ENABLE_SIGN
91 checksum_algos[i].calculate_sign += gd->reloc_off;
92#endif
93 checksum_algos[i].calculate += gd->reloc_off;
94 }
95 }
96#endif
97
Andrew Duda6616c822016-11-08 18:53:41 +000098 for (i = 0; i < ARRAY_SIZE(checksum_algos); i++) {
99 name = checksum_algos[i].name;
100 /* Make sure names match and next char is a comma */
101 if (!strncmp(name, full_name, strlen(name)) &&
102 full_name[strlen(name)] == ',')
103 return &checksum_algos[i];
Simon Glass35191a32013-06-13 15:10:02 -0700104 }
Heiko Schocher4b817562014-03-03 12:19:27 +0100105
Andrew Duda6616c822016-11-08 18:53:41 +0000106 return NULL;
107}
Simon Glass58fe7e52013-06-13 15:10:00 -0700108
Andrew Duda6616c822016-11-08 18:53:41 +0000109struct crypto_algo *image_get_crypto_algo(const char *full_name)
Simon Glass58fe7e52013-06-13 15:10:00 -0700110{
111 int i;
Andrew Duda6616c822016-11-08 18:53:41 +0000112 const char *name;
113
T Karthik Reddy0164dc82019-03-16 15:23:03 +0530114#if !defined(USE_HOSTCC) && defined(CONFIG_NEEDS_MANUAL_RELOC)
115 static bool done;
116
117 if (!done) {
118 done = true;
119 for (i = 0; i < ARRAY_SIZE(crypto_algos); i++) {
120 crypto_algos[i].name += gd->reloc_off;
121 crypto_algos[i].sign += gd->reloc_off;
122 crypto_algos[i].add_verify_data += gd->reloc_off;
123 crypto_algos[i].verify += gd->reloc_off;
124 }
125 }
126#endif
127
Andrew Duda6616c822016-11-08 18:53:41 +0000128 /* Move name to after the comma */
129 name = strchr(full_name, ',');
130 if (!name)
131 return NULL;
132 name += 1;
Simon Glass58fe7e52013-06-13 15:10:00 -0700133
Andrew Duda6616c822016-11-08 18:53:41 +0000134 for (i = 0; i < ARRAY_SIZE(crypto_algos); i++) {
135 if (!strcmp(crypto_algos[i].name, name))
136 return &crypto_algos[i];
Simon Glass58fe7e52013-06-13 15:10:00 -0700137 }
138
139 return NULL;
140}
Simon Glassfbabc0f2013-06-13 15:10:01 -0700141
Philippe Reynes12468352018-11-14 13:51:00 +0100142struct padding_algo *image_get_padding_algo(const char *name)
143{
144 int i;
145
146 if (!name)
147 return NULL;
148
149 for (i = 0; i < ARRAY_SIZE(padding_algos); i++) {
150 if (!strcmp(padding_algos[i].name, name))
151 return &padding_algos[i];
152 }
153
154 return NULL;
155}