137 lines
		
	
	
		
			2.9 KiB
		
	
	
	
		
			C
		
	
	
	
			
		
		
	
	
			137 lines
		
	
	
		
			2.9 KiB
		
	
	
	
		
			C
		
	
	
	
| // SPDX-License-Identifier: GPL-2.0+
 | |
| /*
 | |
|  * Copyright (c) 2019,Softathome
 | |
|  */
 | |
| #include "mkimage.h"
 | |
| #include <stdio.h>
 | |
| #include <string.h>
 | |
| #include <image.h>
 | |
| #include <time.h>
 | |
| #include <openssl/bn.h>
 | |
| #include <openssl/rsa.h>
 | |
| #include <openssl/pem.h>
 | |
| #include <openssl/err.h>
 | |
| #include <openssl/ssl.h>
 | |
| #include <openssl/evp.h>
 | |
| #include <openssl/engine.h>
 | |
| #include <uboot_aes.h>
 | |
| 
 | |
| #if OPENSSL_VERSION_NUMBER >= 0x10000000L
 | |
| #define HAVE_ERR_REMOVE_THREAD_STATE
 | |
| #endif
 | |
| 
 | |
| int image_aes_encrypt(struct image_cipher_info *info,
 | |
| 		      unsigned char *data, int size,
 | |
| 		      unsigned char **cipher, int *cipher_len)
 | |
| {
 | |
| 	EVP_CIPHER_CTX *ctx;
 | |
| 	unsigned char *buf = NULL;
 | |
| 	int buf_len, len, ret = 0;
 | |
| 
 | |
| 	/* create and initialise the context */
 | |
| 	ctx = EVP_CIPHER_CTX_new();
 | |
| 	if (!ctx) {
 | |
| 		printf("Can't create context\n");
 | |
| 		return -1;
 | |
| 	}
 | |
| 
 | |
| 	/* allocate a buffer for the result */
 | |
| 	buf = malloc(size + AES_BLOCK_LENGTH);
 | |
| 	if (!buf) {
 | |
| 		printf("Can't allocate memory to encrypt\n");
 | |
| 		ret = -1;
 | |
| 		goto out;
 | |
| 	}
 | |
| 
 | |
| 	if (EVP_EncryptInit_ex(ctx, info->cipher->calculate_type(),
 | |
| 			       NULL, info->key, info->iv) != 1) {
 | |
| 		printf("Can't init encryption\n");
 | |
| 		ret = -1;
 | |
| 		goto out;
 | |
| 	}
 | |
| 
 | |
| 	if (EVP_EncryptUpdate(ctx, buf, &len, data, size) != 1) {
 | |
| 		printf("Can't encrypt data\n");
 | |
| 		ret = -1;
 | |
| 		goto out;
 | |
| 	}
 | |
| 
 | |
| 	buf_len = len;
 | |
| 
 | |
| 	if (EVP_EncryptFinal_ex(ctx, buf + len, &len) != 1) {
 | |
| 		printf("Can't finalise the encryption\n");
 | |
| 		ret = -1;
 | |
| 		goto out;
 | |
| 	}
 | |
| 
 | |
| 	buf_len += len;
 | |
| 
 | |
| 	*cipher = buf;
 | |
| 	*cipher_len = buf_len;
 | |
| 
 | |
|  out:
 | |
| 	EVP_CIPHER_CTX_free(ctx);
 | |
| 	return ret;
 | |
| }
 | |
| 
 | |
| int image_aes_add_cipher_data(struct image_cipher_info *info, void *keydest)
 | |
| {
 | |
| 	int parent, node;
 | |
| 	char name[128];
 | |
| 	int ret = 0;
 | |
| 
 | |
| 	/* Either create or overwrite the named cipher node */
 | |
| 	parent = fdt_subnode_offset(keydest, 0, FIT_CIPHER_NODENAME);
 | |
| 	if (parent == -FDT_ERR_NOTFOUND) {
 | |
| 		parent = fdt_add_subnode(keydest, 0, FIT_CIPHER_NODENAME);
 | |
| 		if (parent < 0) {
 | |
| 			ret = parent;
 | |
| 			if (ret != -FDT_ERR_NOSPACE) {
 | |
| 				fprintf(stderr,
 | |
| 					"Couldn't create cipher node: %s\n",
 | |
| 					fdt_strerror(parent));
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| 	if (ret)
 | |
| 		goto done;
 | |
| 
 | |
| 	/* Either create or overwrite the named key node */
 | |
| 	snprintf(name, sizeof(name), "key-%s-%s-%s",
 | |
| 		 info->name, info->keyname, info->ivname);
 | |
| 	node = fdt_subnode_offset(keydest, parent, name);
 | |
| 	if (node == -FDT_ERR_NOTFOUND) {
 | |
| 		node = fdt_add_subnode(keydest, parent, name);
 | |
| 		if (node < 0) {
 | |
| 			ret = node;
 | |
| 			if (ret != -FDT_ERR_NOSPACE) {
 | |
| 				fprintf(stderr,
 | |
| 					"Could not create key subnode: %s\n",
 | |
| 					fdt_strerror(node));
 | |
| 			}
 | |
| 		}
 | |
| 	} else if (node < 0) {
 | |
| 		fprintf(stderr, "Cannot select keys parent: %s\n",
 | |
| 			fdt_strerror(node));
 | |
| 		ret = node;
 | |
| 	}
 | |
| 
 | |
| 	if (!ret)
 | |
| 		ret = fdt_setprop(keydest, node, "iv",
 | |
| 				  info->iv, info->cipher->iv_len);
 | |
| 
 | |
| 	if (!ret)
 | |
| 		ret = fdt_setprop(keydest, node, "key",
 | |
| 				  info->key, info->cipher->key_len);
 | |
| 
 | |
| 	if (!ret)
 | |
| 		ret = fdt_setprop_u32(keydest, node, "key-len",
 | |
| 				      info->cipher->key_len);
 | |
| 
 | |
| done:
 | |
| 	if (ret)
 | |
| 		ret = ret == -FDT_ERR_NOSPACE ? -ENOSPC : -EIO;
 | |
| 
 | |
| 	return ret;
 | |
| }
 |