* [PATCH v4 00/16] Add ECDSA support for FIT image verification
@ 2024-09-13 7:59 Sascha Hauer
2024-09-13 7:59 ` [PATCH v4 01/16] keytoc: remove ECDSA dts support Sascha Hauer
` (16 more replies)
0 siblings, 17 replies; 33+ messages in thread
From: Sascha Hauer @ 2024-09-13 7:59 UTC (permalink / raw)
To: Barebox List
This series implements ECDSA signature verification for FIT images.
The ECDSA code itself is taken from the Kernel. Currently only supported
way to specify a ECDSA key is to compile it into the binary using
CONFIG_CRYPTO_PUBLIC_KEYS, taking it from a device tree is not yet
supported.
Since v2 this series unifies the way public keys are passed to barebox.
We now have a single Kconfig option which takes a list of public keys,
which can be either RSA or ECDSA keys.
Changes since v3:
- add patch to remove unnecessary dependencies from public-keys.h
- add commit message to "crypto: Makefile: make simpler"
Changes since v2:
- fix endianess problems when ECDSA keys are built for a machine with
different endianess
- add struct public_key as a container for different key types
- make FIT image code use generic public key functions
- drop ECDSA dts snippet support (not needed, doesn't work)
- pass NULL to EVP_PKEY_get_utf8_string_param()
Sascha Hauer (16):
keytoc: remove ECDSA dts support
keytoc: fail in case gen_key() fails
keytoc: fix ECDSA endianess problems
keytoc: remove duplicate __ENV__ check
crypto: Makefile: make simpler
crypto/Makefile: Drop unnecessary dependencies
keytoc: make key name hint optional
crypto: rsa: include key name hint into CONFIG_CRYPTO_RSA_KEY
crypto: rsa: encapsulate rsa keys in public keys struct
crypto: add public_key functions
crypto: builtin_keys: Allow to specify multiple keys in
CONFIG_CRYPTO_PUBLIC_KEYS
crypto: public-keys: use array of public_keys
crypto: rsa: create static inline wrapper for rsa_verify()
Add elliptic curve cryptography (ECC) helper functions
crypto: add ECDSA support
crypto: make RSA a visible option
common/Kconfig | 1 -
common/image-fit.c | 20 +-
crypto/Kconfig | 37 +-
crypto/Makefile | 18 +-
crypto/ecc.c | 1661 +++++++++++++++++++++++++++++
crypto/ecc_curve_defs.h | 155 +++
crypto/ecdsa.c | 140 +++
crypto/public-keys.c | 107 ++
crypto/rsa.c | 95 +-
include/asm-generic/barebox.lds.h | 10 +-
include/crypto/ecc_curve.h | 62 ++
include/crypto/ecdh.h | 83 ++
include/crypto/internal/ecc.h | 278 +++++
include/crypto/public_key.h | 36 +
include/ecdsa.h | 42 +
include/rsa.h | 35 +-
scripts/Makefile.lib | 2 +-
scripts/keytoc.c | 119 ++-
18 files changed, 2716 insertions(+), 185 deletions(-)
create mode 100644 crypto/ecc.c
create mode 100644 crypto/ecc_curve_defs.h
create mode 100644 crypto/ecdsa.c
create mode 100644 crypto/public-keys.c
create mode 100644 include/crypto/ecc_curve.h
create mode 100644 include/crypto/ecdh.h
create mode 100644 include/crypto/internal/ecc.h
create mode 100644 include/crypto/public_key.h
create mode 100644 include/ecdsa.h
--
2.39.2
^ permalink raw reply [flat|nested] 33+ messages in thread
* [PATCH v4 01/16] keytoc: remove ECDSA dts support
2024-09-13 7:59 [PATCH v4 00/16] Add ECDSA support for FIT image verification Sascha Hauer
@ 2024-09-13 7:59 ` Sascha Hauer
2024-09-25 8:53 ` Ahmad Fatoum
2024-09-13 7:59 ` [PATCH v4 02/16] keytoc: fail in case gen_key() fails Sascha Hauer
` (15 subsequent siblings)
16 siblings, 1 reply; 33+ messages in thread
From: Sascha Hauer @ 2024-09-13 7:59 UTC (permalink / raw)
To: Barebox List
Generating dts snippets for ECDSA keys does not work properly,
there are various endianess problems. As we do not need this currently
for barebox drop the support for now.
Signed-off-by: Sascha Hauer <s.hauer@pengutronix.de>
---
scripts/keytoc.c | 14 +++++---------
1 file changed, 5 insertions(+), 9 deletions(-)
diff --git a/scripts/keytoc.c b/scripts/keytoc.c
index 60e177aeee..3ac42bc6d0 100644
--- a/scripts/keytoc.c
+++ b/scripts/keytoc.c
@@ -470,15 +470,8 @@ static int gen_key_ecdsa(EVP_PKEY *key, const char *key_name, const char *key_na
return -EINVAL;
if (dts) {
- fprintf(outfilep, "\t\tkey-%s {\n", key_name_c);
- fprintf(outfilep, "\t\t\tecdsa,x-point = <");
- print_bignum(key_x, bits);
- fprintf(outfilep, ">;\n");
- fprintf(outfilep, "\t\t\tecdsa,y-point = <");
- print_bignum(key_y, bits);
- fprintf(outfilep, ">;\n");
- fprintf(outfilep, "\t\t\tecdsa,curve = \"%s\";\n", group);
- fprintf(outfilep, "\t\t};\n");
+ fprintf(stderr, "ERROR: generating a dts snippet for ECDSA keys is not yet supported\n");
+ return -EOPNOTSUPP;
} else {
fprintf(outfilep, "\nstatic uint32_t %s_x[] = {", key_name_c);
print_bignum(key_x, bits);
@@ -598,6 +591,9 @@ static int gen_key(const char *keyname, const char *path)
}
ret = gen_key_ecdsa(key, keyname, key_name_c);
+ if (ret == -EOPNOTSUPP)
+ return ret;
+
if (ret)
ret = gen_key_rsa(key, keyname, key_name_c);
--
2.39.2
^ permalink raw reply [flat|nested] 33+ messages in thread
* [PATCH v4 02/16] keytoc: fail in case gen_key() fails
2024-09-13 7:59 [PATCH v4 00/16] Add ECDSA support for FIT image verification Sascha Hauer
2024-09-13 7:59 ` [PATCH v4 01/16] keytoc: remove ECDSA dts support Sascha Hauer
@ 2024-09-13 7:59 ` Sascha Hauer
2024-09-25 8:53 ` Ahmad Fatoum
2024-09-13 7:59 ` [PATCH v4 03/16] keytoc: fix ECDSA endianess problems Sascha Hauer
` (14 subsequent siblings)
16 siblings, 1 reply; 33+ messages in thread
From: Sascha Hauer @ 2024-09-13 7:59 UTC (permalink / raw)
To: Barebox List
In case of an error in gen_key() return an error code so that the keytoc
tool returns an error.
Signed-off-by: Sascha Hauer <s.hauer@pengutronix.de>
---
scripts/keytoc.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/scripts/keytoc.c b/scripts/keytoc.c
index 3ac42bc6d0..7e73c786a3 100644
--- a/scripts/keytoc.c
+++ b/scripts/keytoc.c
@@ -597,7 +597,7 @@ static int gen_key(const char *keyname, const char *path)
if (ret)
ret = gen_key_rsa(key, keyname, key_name_c);
- return 0;
+ return ret;
}
int main(int argc, char *argv[])
--
2.39.2
^ permalink raw reply [flat|nested] 33+ messages in thread
* [PATCH v4 03/16] keytoc: fix ECDSA endianess problems
2024-09-13 7:59 [PATCH v4 00/16] Add ECDSA support for FIT image verification Sascha Hauer
2024-09-13 7:59 ` [PATCH v4 01/16] keytoc: remove ECDSA dts support Sascha Hauer
2024-09-13 7:59 ` [PATCH v4 02/16] keytoc: fail in case gen_key() fails Sascha Hauer
@ 2024-09-13 7:59 ` Sascha Hauer
2024-09-27 8:11 ` Ahmad Fatoum
2024-09-13 7:59 ` [PATCH v4 04/16] keytoc: remove duplicate __ENV__ check Sascha Hauer
` (13 subsequent siblings)
16 siblings, 1 reply; 33+ messages in thread
From: Sascha Hauer @ 2024-09-13 7:59 UTC (permalink / raw)
To: Barebox List
We print the ECDSA key values out as an uint32_t C array. They are used in
barebox as a uint64_t C array, so when the endianess of the build system
differs from the system barebox runs on we end up with the 32bit words
swapped in the u64 array. Fix this by printing out the key values as
an uint64_t array.
Signed-off-by: Sascha Hauer <s.hauer@pengutronix.de>
---
scripts/keytoc.c | 42 +++++++++++++++++++++---------------------
1 file changed, 21 insertions(+), 21 deletions(-)
diff --git a/scripts/keytoc.c b/scripts/keytoc.c
index 7e73c786a3..b140160688 100644
--- a/scripts/keytoc.c
+++ b/scripts/keytoc.c
@@ -315,12 +315,12 @@ static int rsa_get_params(EVP_PKEY *key, uint64_t *exponent, uint32_t *n0_invp,
static FILE *outfilep;
-static int print_bignum(BIGNUM *num, int num_bits)
+static int print_bignum(BIGNUM *num, int num_bits, int width)
{
BIGNUM *tmp, *big2, *big32, *big2_32;
BN_CTX *ctx;
int i;
- uint32_t *arr;
+ uint64_t *arr;
tmp = BN_new();
big2 = BN_new();
@@ -345,34 +345,34 @@ static int print_bignum(BIGNUM *num, int num_bits)
return -ENOMEM;
}
BN_set_word(big2, 2L);
- BN_set_word(big32, 32L);
- BN_exp(big2_32, big2, big32, ctx); /* B = 2^32 */
+ BN_set_word(big32, width);
+ BN_exp(big2_32, big2, big32, ctx); /* B = 2^width */
- arr = malloc(num_bits / 32 * sizeof(uint32_t));
+ arr = malloc(num_bits / width * sizeof(*arr));
- for (i = 0; i < num_bits / 32; i++) {
+ for (i = 0; i < num_bits / width; i++) {
BN_mod(tmp, num, big2_32, ctx); /* n = N mod B */
arr[i] = BN_get_word(tmp);
- BN_rshift(num, num, 32); /* N = N/B */
+ BN_rshift(num, num, width); /* N = N/B */
}
if (dts) {
- for (i = 0; i < num_bits / 32; i++) {
+ for (i = 0; i < num_bits / width; i++) {
if (i % 4)
fprintf(outfilep, " ");
else
fprintf(outfilep, "\n\t\t\t\t");
- fprintf(outfilep, "0x%08x", arr[num_bits / 32 - 1 - i]);
- BN_rshift(num, num, 32); /* N = N/B */
+ fprintf(outfilep, "0x%0*jx", width / 4, arr[num_bits / width - 1 - i]);
+ BN_rshift(num, num, width); /* N = N/B */
}
} else {
- for (i = 0; i < num_bits / 32; i++) {
+ for (i = 0; i < num_bits / width; i++) {
if (i % 4)
fprintf(outfilep, " ");
else
fprintf(outfilep, "\n\t");
- fprintf(outfilep, "0x%08x,", arr[i]);
- BN_rshift(num, num, 32); /* N = N/B */
+ fprintf(outfilep, "0x%0*jx,", width / 4, arr[i]);
+ BN_rshift(num, num, width); /* N = N/B */
}
}
@@ -473,12 +473,12 @@ static int gen_key_ecdsa(EVP_PKEY *key, const char *key_name, const char *key_na
fprintf(stderr, "ERROR: generating a dts snippet for ECDSA keys is not yet supported\n");
return -EOPNOTSUPP;
} else {
- fprintf(outfilep, "\nstatic uint32_t %s_x[] = {", key_name_c);
- print_bignum(key_x, bits);
+ fprintf(outfilep, "\nstatic uint64_t %s_x[] = {", key_name_c);
+ print_bignum(key_x, bits, 64);
fprintf(outfilep, "\n};\n\n");
- fprintf(outfilep, "static uint32_t %s_y[] = {", key_name_c);
- print_bignum(key_y, bits);
+ fprintf(outfilep, "static uint64_t %s_y[] = {", key_name_c);
+ print_bignum(key_y, bits, 64);
fprintf(outfilep, "\n};\n\n");
fprintf(outfilep, "static struct ecdsa_public_key %s = {\n", key_name_c);
@@ -512,10 +512,10 @@ static int gen_key_rsa(EVP_PKEY *key, const char *key_name, const char *key_name
if (dts) {
fprintf(outfilep, "\t\tkey-%s {\n", key_name_c);
fprintf(outfilep, "\t\t\trsa,r-squared = <");
- print_bignum(r_squared, bits);
+ print_bignum(r_squared, bits, 32);
fprintf(outfilep, ">;\n");
fprintf(outfilep, "\t\t\trsa,modulus= <");
- print_bignum(modulus, bits);
+ print_bignum(modulus, bits, 32);
fprintf(outfilep, ">;\n");
fprintf(outfilep, "\t\t\trsa,exponent = <0x%0lx 0x%lx>;\n",
(exponent >> 32) & 0xffffffff,
@@ -526,11 +526,11 @@ static int gen_key_rsa(EVP_PKEY *key, const char *key_name, const char *key_name
fprintf(outfilep, "\t\t};\n");
} else {
fprintf(outfilep, "\nstatic uint32_t %s_modulus[] = {", key_name_c);
- print_bignum(modulus, bits);
+ print_bignum(modulus, bits, 32);
fprintf(outfilep, "\n};\n\n");
fprintf(outfilep, "static uint32_t %s_rr[] = {", key_name_c);
- print_bignum(r_squared, bits);
+ print_bignum(r_squared, bits, 32);
fprintf(outfilep, "\n};\n\n");
if (standalone) {
--
2.39.2
^ permalink raw reply [flat|nested] 33+ messages in thread
* [PATCH v4 04/16] keytoc: remove duplicate __ENV__ check
2024-09-13 7:59 [PATCH v4 00/16] Add ECDSA support for FIT image verification Sascha Hauer
` (2 preceding siblings ...)
2024-09-13 7:59 ` [PATCH v4 03/16] keytoc: fix ECDSA endianess problems Sascha Hauer
@ 2024-09-13 7:59 ` Sascha Hauer
2024-09-27 6:59 ` Ahmad Fatoum
2024-09-13 7:59 ` [PATCH v4 05/16] crypto: Makefile: make simpler Sascha Hauer
` (12 subsequent siblings)
16 siblings, 1 reply; 33+ messages in thread
From: Sascha Hauer @ 2024-09-13 7:59 UTC (permalink / raw)
To: Barebox List
Signed-off-by: Sascha Hauer <s.hauer@pengutronix.de>
---
scripts/keytoc.c | 11 -----------
1 file changed, 11 deletions(-)
diff --git a/scripts/keytoc.c b/scripts/keytoc.c
index b140160688..ecb33cbe47 100644
--- a/scripts/keytoc.c
+++ b/scripts/keytoc.c
@@ -664,17 +664,6 @@ int main(int argc, char *argv[])
*path = 0;
path++;
- if (!strncmp(path, "__ENV__", 7)) {
- const char *orig_path = path;
-
- path = getenv(orig_path + 7);
- if (!path) {
- fprintf(stderr, "%s doesn't contain a path\n",
- orig_path + 7);
- exit(1);
- }
- }
-
ret = gen_key(keyname, path);
if (ret)
exit(1);
--
2.39.2
^ permalink raw reply [flat|nested] 33+ messages in thread
* [PATCH v4 05/16] crypto: Makefile: make simpler
2024-09-13 7:59 [PATCH v4 00/16] Add ECDSA support for FIT image verification Sascha Hauer
` (3 preceding siblings ...)
2024-09-13 7:59 ` [PATCH v4 04/16] keytoc: remove duplicate __ENV__ check Sascha Hauer
@ 2024-09-13 7:59 ` Sascha Hauer
2024-09-27 7:01 ` Ahmad Fatoum
2024-09-13 7:59 ` [PATCH v4 06/16] crypto/Makefile: Drop unnecessary dependencies Sascha Hauer
` (11 subsequent siblings)
16 siblings, 1 reply; 33+ messages in thread
From: Sascha Hauer @ 2024-09-13 7:59 UTC (permalink / raw)
To: Barebox List
We have:
$(if $(RSA_DEP),$<,$(CONFIG_CRYPTO_RSA_KEY))
'$<' is the first dependency which is $(RSA_DEP). $(RSA_DEP) is either
empty (in which case $(CONFIG_CRYPTO_RSA_KEY) is used), or set to
$(CONFIG_CRYPTO_RSA_KEY) a few lines up.
so all this is a complicated way of using $(CONFIG_CRYPTO_RSA_KEY)
directly.
Signed-off-by: Sascha Hauer <s.hauer@pengutronix.de>
---
crypto/Makefile | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/crypto/Makefile b/crypto/Makefile
index e84360a8c7..d7a06a721d 100644
--- a/crypto/Makefile
+++ b/crypto/Makefile
@@ -34,5 +34,5 @@ RSA_DEP := $(CONFIG_CRYPTO_RSA_KEY)
endif
$(obj)/rsa-keys.h: $(RSA_DEP) FORCE
- $(call cmd,public_keys,$(CONFIG_CRYPTO_RSA_KEY_NAME_HINT):$(if $(RSA_DEP),$<,$(CONFIG_CRYPTO_RSA_KEY)))
+ $(call cmd,public_keys,$(CONFIG_CRYPTO_RSA_KEY_NAME_HINT):$(CONFIG_CRYPTO_RSA_KEY))
endif
--
2.39.2
^ permalink raw reply [flat|nested] 33+ messages in thread
* [PATCH v4 06/16] crypto/Makefile: Drop unnecessary dependencies
2024-09-13 7:59 [PATCH v4 00/16] Add ECDSA support for FIT image verification Sascha Hauer
` (4 preceding siblings ...)
2024-09-13 7:59 ` [PATCH v4 05/16] crypto: Makefile: make simpler Sascha Hauer
@ 2024-09-13 7:59 ` Sascha Hauer
2024-09-27 7:03 ` Ahmad Fatoum
2024-09-13 7:59 ` [PATCH v4 07/16] keytoc: make key name hint optional Sascha Hauer
` (10 subsequent siblings)
16 siblings, 1 reply; 33+ messages in thread
From: Sascha Hauer @ 2024-09-13 7:59 UTC (permalink / raw)
To: Barebox List
Having rsa-keys.h depend on the input key files is unnecessary. They
were introduced to avoid unnecessary rebuilds when the files didn't
change. This is unnecessary because the public_keys cmd won't produce
output when it wouldn't change the existing file.
Signed-off-by: Sascha Hauer <s.hauer@pengutronix.de>
---
crypto/Makefile | 6 +-----
1 file changed, 1 insertion(+), 5 deletions(-)
diff --git a/crypto/Makefile b/crypto/Makefile
index d7a06a721d..5a484355f3 100644
--- a/crypto/Makefile
+++ b/crypto/Makefile
@@ -29,10 +29,6 @@ $(obj)/rsa.o: $(obj)/rsa-keys.h
CONFIG_CRYPTO_RSA_KEY := $(CONFIG_CRYPTO_RSA_KEY:"%"=%)
-ifneq ($(filter-out pkcs11:% __ENV__%, $(CONFIG_CRYPTO_RSA_KEY)),)
-RSA_DEP := $(CONFIG_CRYPTO_RSA_KEY)
-endif
-
-$(obj)/rsa-keys.h: $(RSA_DEP) FORCE
+$(obj)/rsa-keys.h: FORCE
$(call cmd,public_keys,$(CONFIG_CRYPTO_RSA_KEY_NAME_HINT):$(CONFIG_CRYPTO_RSA_KEY))
endif
--
2.39.2
^ permalink raw reply [flat|nested] 33+ messages in thread
* [PATCH v4 07/16] keytoc: make key name hint optional
2024-09-13 7:59 [PATCH v4 00/16] Add ECDSA support for FIT image verification Sascha Hauer
` (5 preceding siblings ...)
2024-09-13 7:59 ` [PATCH v4 06/16] crypto/Makefile: Drop unnecessary dependencies Sascha Hauer
@ 2024-09-13 7:59 ` Sascha Hauer
2024-09-27 8:18 ` Ahmad Fatoum
2024-09-13 7:59 ` [PATCH v4 08/16] crypto: rsa: include key name hint into CONFIG_CRYPTO_RSA_KEY Sascha Hauer
` (9 subsequent siblings)
16 siblings, 1 reply; 33+ messages in thread
From: Sascha Hauer @ 2024-09-13 7:59 UTC (permalink / raw)
To: Barebox List
The key name hint is used in barebox to find a key without iterating
over all keys, but it's not required. Make the key name hint optional
to keytoc.
Signed-off-by: Sascha Hauer <s.hauer@pengutronix.de>
---
scripts/keytoc.c | 31 ++++++++++++++++++++++---------
1 file changed, 22 insertions(+), 9 deletions(-)
diff --git a/scripts/keytoc.c b/scripts/keytoc.c
index ecb33cbe47..85a7cd7319 100644
--- a/scripts/keytoc.c
+++ b/scripts/keytoc.c
@@ -9,6 +9,7 @@
*
*/
#pragma GCC diagnostic ignored "-Wdeprecated-declarations"
+#define _GNU_SOURCE
#include <stdio.h>
#include <string.h>
#include <time.h>
@@ -602,9 +603,9 @@ static int gen_key(const char *keyname, const char *path)
int main(int argc, char *argv[])
{
- char *path, *keyname;
int i, opt, ret;
char *outfile = NULL;
+ int keynum = 1;
outfilep = stdout;
@@ -652,21 +653,33 @@ int main(int argc, char *argv[])
}
for (i = optind; i < argc; i++) {
- keyname = argv[i];
+ char *keyspec = argv[i];
+ char *keyname = NULL;
+ char *path, *freep = NULL;
- path = strchr(keyname, ':');
- if (!path) {
- fprintf(stderr,
- "keys must be given as <key_name_hint>:<crt>\n");
- exit(1);
+ if (!strncmp(keyspec, "pkcs11:", 7)) {
+ path = keyspec;
+ } else {
+ path = strchr(keyspec, ':');
+ if (path) {
+ *path = 0;
+ path++;
+ keyname = keyspec;
+ } else {
+ path = keyspec;
+ }
}
- *path = 0;
- path++;
+ if (!keyname) {
+ asprintf(&freep, "key_%d", keynum++);
+ keyname = freep;
+ }
ret = gen_key(keyname, path);
if (ret)
exit(1);
+
+ free(freep);
}
if (dts) {
--
2.39.2
^ permalink raw reply [flat|nested] 33+ messages in thread
* [PATCH v4 08/16] crypto: rsa: include key name hint into CONFIG_CRYPTO_RSA_KEY
2024-09-13 7:59 [PATCH v4 00/16] Add ECDSA support for FIT image verification Sascha Hauer
` (6 preceding siblings ...)
2024-09-13 7:59 ` [PATCH v4 07/16] keytoc: make key name hint optional Sascha Hauer
@ 2024-09-13 7:59 ` Sascha Hauer
2024-09-27 7:55 ` Ahmad Fatoum
2024-09-13 7:59 ` [PATCH v4 09/16] crypto: rsa: encapsulate rsa keys in public keys struct Sascha Hauer
` (8 subsequent siblings)
16 siblings, 1 reply; 33+ messages in thread
From: Sascha Hauer @ 2024-09-13 7:59 UTC (permalink / raw)
To: Barebox List
Set the key name hint in CONFIG_CRYPTO_RSA_KEY. CONFIG_CRYPTO_RSA_KEY
now has the form:
<key_name_hint>:<filename/uri>
This is done in preparation to make CONFIG_CRYPTO_RSA_KEY a list of
keys.
Signed-off-by: Sascha Hauer <s.hauer@pengutronix.de>
---
crypto/Kconfig | 9 ++-------
crypto/Makefile | 2 +-
2 files changed, 3 insertions(+), 8 deletions(-)
diff --git a/crypto/Kconfig b/crypto/Kconfig
index 78b499f646..64a016eb2c 100644
--- a/crypto/Kconfig
+++ b/crypto/Kconfig
@@ -130,17 +130,12 @@ config CRYPTO_RSA_KEY
This option should be a filename of a PEM-formatted file containing
X.509 certificates to be included into barebox. If the string starts
with "pkcs11:" it is interpreted as a PKCS#11 URI rather than a file.
+ If the string starts with a <hint>: prefix, <hint> is used as a key
+ name hint to find a key without iterating over all keys.
This avoids the mkimage dependency of CONFIG_BOOTM_FITIMAGE_PUBKEY
at the cost of an openssl build-time dependency.
-config CRYPTO_RSA_KEY_NAME_HINT
- depends on CRYPTO_RSA
- string "FIT image key name hint"
- help
- In FIT images keys are identified by a key name hint string. Provide
- the key name hint here.
-
config CRYPTO_KEYSTORE
bool "Keystore"
help
diff --git a/crypto/Makefile b/crypto/Makefile
index 5a484355f3..b2bd7fae6a 100644
--- a/crypto/Makefile
+++ b/crypto/Makefile
@@ -30,5 +30,5 @@ $(obj)/rsa.o: $(obj)/rsa-keys.h
CONFIG_CRYPTO_RSA_KEY := $(CONFIG_CRYPTO_RSA_KEY:"%"=%)
$(obj)/rsa-keys.h: FORCE
- $(call cmd,public_keys,$(CONFIG_CRYPTO_RSA_KEY_NAME_HINT):$(CONFIG_CRYPTO_RSA_KEY))
+ $(call cmd,public_keys,$(CONFIG_CRYPTO_RSA_KEY))
endif
--
2.39.2
^ permalink raw reply [flat|nested] 33+ messages in thread
* [PATCH v4 09/16] crypto: rsa: encapsulate rsa keys in public keys struct
2024-09-13 7:59 [PATCH v4 00/16] Add ECDSA support for FIT image verification Sascha Hauer
` (7 preceding siblings ...)
2024-09-13 7:59 ` [PATCH v4 08/16] crypto: rsa: include key name hint into CONFIG_CRYPTO_RSA_KEY Sascha Hauer
@ 2024-09-13 7:59 ` Sascha Hauer
2024-09-27 8:02 ` Ahmad Fatoum
2024-09-13 7:59 ` [PATCH v4 10/16] crypto: add public_key functions Sascha Hauer
` (7 subsequent siblings)
16 siblings, 1 reply; 33+ messages in thread
From: Sascha Hauer @ 2024-09-13 7:59 UTC (permalink / raw)
To: Barebox List
This encapsulates struct rsa_public_key into a struct public_key. So far
RSA keys are the only supported key type. With adding ECDSA keys we need
a container struct so that we can add ECDSA keys using the same
mechanisms.
Also we rename CONFIG_CRYPTO_RSA_KEY to CONFIG_CRYPTO_PUBLIC_KEYS and
CONFIG_CRYPTO_RSA_BUILTIN_KEYS to CONFIG_CRYPTO_BUILTIN_KEYS as these
variables will be used for all types of keys, not only RSA keys.
Signed-off-by: Sascha Hauer <s.hauer@pengutronix.de>
---
crypto/Kconfig | 11 ++++-----
crypto/Makefile | 14 ++++++-----
crypto/public-keys.c | 39 +++++++++++++++++++++++++++++++
crypto/rsa.c | 23 ++----------------
include/asm-generic/barebox.lds.h | 10 ++++----
include/crypto/public_key.h | 20 ++++++++++++++++
include/rsa.h | 16 +++++++++++++
scripts/keytoc.c | 18 ++++++++++----
8 files changed, 109 insertions(+), 42 deletions(-)
create mode 100644 crypto/public-keys.c
create mode 100644 include/crypto/public_key.h
diff --git a/crypto/Kconfig b/crypto/Kconfig
index 64a016eb2c..612e6f33fc 100644
--- a/crypto/Kconfig
+++ b/crypto/Kconfig
@@ -118,14 +118,13 @@ config CRYPTO_PBKDF2
config CRYPTO_RSA
bool
-config CRYPTO_RSA_BUILTIN_KEYS
- bool
- default y if CRYPTO_RSA_KEY != ""
+config CRYPTO_BUILTIN_KEYS
+ bool "builtin keys"
select KEYTOC
-config CRYPTO_RSA_KEY
- depends on CRYPTO_RSA
- string "RSA key to compile in"
+config CRYPTO_PUBLIC_KEYS
+ depends on CRYPTO_BUILTIN_KEYS
+ string "public keys to compile in"
help
This option should be a filename of a PEM-formatted file containing
X.509 certificates to be included into barebox. If the string starts
diff --git a/crypto/Makefile b/crypto/Makefile
index b2bd7fae6a..d6ce50b386 100644
--- a/crypto/Makefile
+++ b/crypto/Makefile
@@ -18,17 +18,19 @@ obj-y += memneq.o
obj-$(CONFIG_CRYPTO_PBKDF2) += pbkdf2.o
obj-$(CONFIG_CRYPTO_RSA) += rsa.o
obj-$(CONFIG_CRYPTO_KEYSTORE) += keystore.o
+obj-$(CONFIG_CRYPTO_BUILTIN_KEYS) += public-keys.o
obj-$(CONFIG_JWT) += jwt.o
-extra-$(CONFIG_CRYPTO_RSA_BUILTIN_KEYS) += rsa-keys.h
+extra-$(CONFIG_CRYPTO_BUILTIN_KEYS) += public-keys.h
-ifdef CONFIG_CRYPTO_RSA_BUILTIN_KEYS
+ifdef CONFIG_CRYPTO_BUILTIN_KEYS
-$(obj)/rsa.o: $(obj)/rsa-keys.h
+$(obj)/public-keys.o: $(obj)/public-keys.h
-CONFIG_CRYPTO_RSA_KEY := $(CONFIG_CRYPTO_RSA_KEY:"%"=%)
+CONFIG_CRYPTO_PUBLIC_KEYS := $(CONFIG_CRYPTO_PUBLIC_KEYS:"%"=%)
+
+$(obj)/public-keys.h: FORCE
+ $(call cmd,public_keys,$(CONFIG_CRYPTO_PUBLIC_KEYS))
-$(obj)/rsa-keys.h: FORCE
- $(call cmd,public_keys,$(CONFIG_CRYPTO_RSA_KEY))
endif
diff --git a/crypto/public-keys.c b/crypto/public-keys.c
new file mode 100644
index 0000000000..a3ef3bafc8
--- /dev/null
+++ b/crypto/public-keys.c
@@ -0,0 +1,39 @@
+#include <common.h>
+#include <crypto/public_key.h>
+#include <rsa.h>
+
+extern const struct public_key * const __public_keys_start;
+extern const struct public_key * const __public_keys_end;
+
+static int init_public_keys(void)
+{
+ const struct public_key * const *iter;
+ int ret;
+
+ for (iter = &__public_keys_start; iter != &__public_keys_end; iter++) {
+ struct rsa_public_key *rsa_key;
+
+ switch ((*iter)->type) {
+ case PUBLIC_KEY_TYPE_RSA:
+ rsa_key = rsa_key_dup((*iter)->rsa);
+ if (!rsa_key)
+ continue;
+
+ ret = rsa_key_add(rsa_key);
+ if (ret)
+ pr_err("Cannot add rsa key: %pe\n", ERR_PTR(ret));
+ break;
+ default:
+ pr_err("Ignoring unknown key type %u\n", (*iter)->type);
+ }
+
+ }
+
+ return 0;
+}
+
+device_initcall(init_public_keys);
+
+#ifdef CONFIG_CRYPTO_BUILTIN_KEYS
+#include "public-keys.h"
+#endif
diff --git a/crypto/rsa.c b/crypto/rsa.c
index a379b77c9a..8eab07beed 100644
--- a/crypto/rsa.c
+++ b/crypto/rsa.c
@@ -469,7 +469,7 @@ const struct rsa_public_key *rsa_get_key(const char *name)
return NULL;
}
-static int rsa_key_add(struct rsa_public_key *key)
+int rsa_key_add(struct rsa_public_key *key)
{
if (rsa_get_key(key->key_name_hint))
return -EEXIST;
@@ -479,7 +479,7 @@ static int rsa_key_add(struct rsa_public_key *key)
return 0;
}
-static struct rsa_public_key *rsa_key_dup(const struct rsa_public_key *key)
+struct rsa_public_key *rsa_key_dup(const struct rsa_public_key *key)
{
struct rsa_public_key *new;
@@ -490,9 +490,6 @@ static struct rsa_public_key *rsa_key_dup(const struct rsa_public_key *key)
return new;
}
-extern const struct rsa_public_key * const __rsa_keys_start;
-extern const struct rsa_public_key * const __rsa_keys_end;
-
static void rsa_init_keys_of(void)
{
struct device_node *sigs, *sig;
@@ -523,25 +520,9 @@ static void rsa_init_keys_of(void)
static int rsa_init_keys(void)
{
- const struct rsa_public_key * const *iter;
- struct rsa_public_key *key;
- int ret;
-
- for (iter = &__rsa_keys_start; iter != &__rsa_keys_end; iter++) {
- key = rsa_key_dup(*iter);
- ret = rsa_key_add(key);
- if (ret)
- pr_err("Cannot add rsa key %s: %s\n",
- key->key_name_hint, strerror(-ret));
- }
-
rsa_init_keys_of();
return 0;
}
device_initcall(rsa_init_keys);
-
-#ifdef CONFIG_CRYPTO_RSA_BUILTIN_KEYS
-#include "rsa-keys.h"
-#endif
diff --git a/include/asm-generic/barebox.lds.h b/include/asm-generic/barebox.lds.h
index d3736ebaed..eb4c42ca5b 100644
--- a/include/asm-generic/barebox.lds.h
+++ b/include/asm-generic/barebox.lds.h
@@ -106,11 +106,11 @@
#define BAREBOX_PCI_FIXUP
#endif
-#define BAREBOX_RSA_KEYS \
+#define BAREBOX_PUBLIC_KEYS \
STRUCT_ALIGN(); \
- __rsa_keys_start = .; \
- KEEP(*(.rsa_keys.rodata.*)); \
- __rsa_keys_end = .; \
+ __public_keys_start = .; \
+ KEEP(*(.public_keys.rodata.*)); \
+ __public_keys_end = .; \
#define BAREBOX_DEEP_PROBE \
STRUCT_ALIGN(); \
@@ -140,7 +140,7 @@
BAREBOX_MAGICVARS \
BAREBOX_CLK_TABLE \
BAREBOX_DTB \
- BAREBOX_RSA_KEYS \
+ BAREBOX_PUBLIC_KEYS \
BAREBOX_PCI_FIXUP \
BAREBOX_DEEP_PROBE
diff --git a/include/crypto/public_key.h b/include/crypto/public_key.h
new file mode 100644
index 0000000000..83e8401aed
--- /dev/null
+++ b/include/crypto/public_key.h
@@ -0,0 +1,20 @@
+#ifndef __CRYPTO_PUBLIC_KEY_H
+#define __CRYPTO_PUBLIC_KEY_H
+
+struct rsa_public_key;
+struct ecdsa_public_key;
+
+enum pulic_key_type {
+ PUBLIC_KEY_TYPE_RSA,
+};
+
+struct public_key {
+ enum pulic_key_type type;
+
+ union {
+ struct rsa_public_key *rsa;
+ struct ecdsa_public_key *ecdsa;
+ };
+};
+
+#endif /* __CRYPTO_PUBLIC_KEY_H */
diff --git a/include/rsa.h b/include/rsa.h
index f1e3c1b6c3..ecb2f42957 100644
--- a/include/rsa.h
+++ b/include/rsa.h
@@ -62,4 +62,20 @@ const struct rsa_public_key *rsa_key_next(const struct rsa_public_key *prev);
#define for_each_rsa_key(key) \
for (key = rsa_key_next(NULL); key; key = rsa_key_next(key))
+
+#ifdef CONFIG_CRYPTO_RSA
+int rsa_key_add(struct rsa_public_key *key);
+struct rsa_public_key *rsa_key_dup(const struct rsa_public_key *key);
+#else
+static inline int rsa_key_add(struct rsa_public_key *key)
+{
+ return -ENOSYS;
+}
+
+static inline struct rsa_public_key *rsa_key_dup(const struct rsa_public_key *key);
+{
+ return NULL;
+}
+#endif
+
#endif
diff --git a/scripts/keytoc.c b/scripts/keytoc.c
index 85a7cd7319..e66c5989bf 100644
--- a/scripts/keytoc.c
+++ b/scripts/keytoc.c
@@ -488,9 +488,14 @@ static int gen_key_ecdsa(EVP_PKEY *key, const char *key_name, const char *key_na
fprintf(outfilep, "\t.x = %s_x,\n", key_name_c);
fprintf(outfilep, "\t.y = %s_y,\n", key_name_c);
fprintf(outfilep, "};\n");
- if (!standalone)
- fprintf(outfilep, "\nstruct ecdsa_public_key *%s_ecdsa_p __attribute__((section(\".ecdsa_keys.rodata.%s\"))) = &%s;\n",
+ if (!standalone) {
+ fprintf(outfilep, "\nstatic struct public_key %s_public_key = {\n", key_name_c);
+ fprintf(outfilep, "\t.type = PUBLIC_KEY_TYPE_ECDSA,\n");
+ fprintf(outfilep, "\t.ecdsa = &%s,\n", key_name_c);
+ fprintf(outfilep, "};");
+ fprintf(outfilep, "\nstruct public_key *%s_ecdsa_p __attribute__((section(\".public_keys.rodata.%s\"))) = &%s_public_key;\n",
key_name_c, key_name_c, key_name_c);
+ }
}
return 0;
@@ -549,9 +554,14 @@ static int gen_key_rsa(EVP_PKEY *key, const char *key_name, const char *key_name
fprintf(outfilep, "\t.key_name_hint = \"%s\",\n", key_name);
fprintf(outfilep, "};\n");
- if (!standalone)
- fprintf(outfilep, "\nstruct rsa_public_key *%sp __attribute__((section(\".rsa_keys.rodata.%s\"))) = &%s;\n",
+ if (!standalone) {
+ fprintf(outfilep, "\nstatic struct public_key %s_public_key = {\n", key_name_c);
+ fprintf(outfilep, "\t.type = PUBLIC_KEY_TYPE_RSA,\n");
+ fprintf(outfilep, "\t.rsa = &%s,\n", key_name_c);
+ fprintf(outfilep, "};");
+ fprintf(outfilep, "\nstruct public_key *%sp __attribute__((section(\".public_keys.rodata.%s\"))) = &%s_public_key;\n",
key_name_c, key_name_c, key_name_c);
+ }
}
return 0;
--
2.39.2
^ permalink raw reply [flat|nested] 33+ messages in thread
* [PATCH v4 10/16] crypto: add public_key functions
2024-09-13 7:59 [PATCH v4 00/16] Add ECDSA support for FIT image verification Sascha Hauer
` (8 preceding siblings ...)
2024-09-13 7:59 ` [PATCH v4 09/16] crypto: rsa: encapsulate rsa keys in public keys struct Sascha Hauer
@ 2024-09-13 7:59 ` Sascha Hauer
2024-09-27 8:20 ` Ahmad Fatoum
2024-09-13 7:59 ` [PATCH v4 11/16] crypto: builtin_keys: Allow to specify multiple keys in CONFIG_CRYPTO_PUBLIC_KEYS Sascha Hauer
` (6 subsequent siblings)
16 siblings, 1 reply; 33+ messages in thread
From: Sascha Hauer @ 2024-09-13 7:59 UTC (permalink / raw)
To: Barebox List
Now that we have a struct public_key as a general container for keys
create and use functions making use of it. Move the list from struct
rsa_public_key to struct public_key, add public_key_verify() and use
it instead of rsa_verify(), move key_name_hint to struct public_key.
With this we do not need to bother the FIT image code when adding
support for ECDSA keys.
Signed-off-by: Sascha Hauer <s.hauer@pengutronix.de>
---
common/image-fit.c | 20 ++++----
crypto/public-keys.c | 92 ++++++++++++++++++++++++++++++-------
crypto/rsa.c | 74 +++++++++--------------------
include/crypto/public_key.h | 15 ++++++
include/rsa.h | 16 +------
scripts/keytoc.c | 3 +-
6 files changed, 126 insertions(+), 94 deletions(-)
diff --git a/common/image-fit.c b/common/image-fit.c
index 4a69049abc..c5d2196bda 100644
--- a/common/image-fit.c
+++ b/common/image-fit.c
@@ -20,7 +20,7 @@
#include <errno.h>
#include <linux/err.h>
#include <stringlist.h>
-#include <rsa.h>
+#include <crypto/public_key.h>
#include <uncompress.h>
#include <image-fit.h>
@@ -253,10 +253,10 @@ static struct digest *fit_alloc_digest(struct device_node *sig_node,
return digest;
}
-static int fit_check_rsa_signature(struct device_node *sig_node,
- enum hash_algo algo, void *hash)
+static int fit_check_signature(struct device_node *sig_node,
+ enum hash_algo algo, void *hash)
{
- const struct rsa_public_key *key;
+ const struct public_key *key;
const char *key_name = NULL;
int sig_len;
const char *sig_value;
@@ -270,19 +270,19 @@ static int fit_check_rsa_signature(struct device_node *sig_node,
of_property_read_string(sig_node, "key-name-hint", &key_name);
if (key_name) {
- key = rsa_get_key(key_name);
+ key = public_key_get(key_name);
if (key) {
- ret = rsa_verify(key, sig_value, sig_len, hash, algo);
+ ret = public_key_verify(key, sig_value, sig_len, hash, algo);
if (!ret)
goto ok;
}
}
- for_each_rsa_key(key) {
+ for_each_public_key(key) {
if (key_name && !strcmp(key->key_name_hint, key_name))
continue;
- ret = rsa_verify(key, sig_value, sig_len, hash, algo);
+ ret = public_key_verify(key, sig_value, sig_len, hash, algo);
if (!ret)
goto ok;
}
@@ -341,7 +341,7 @@ static int fit_verify_signature(struct device_node *sig_node, const void *fit)
hash = xzalloc(digest_length(digest));
digest_final(digest, hash);
- ret = fit_check_rsa_signature(sig_node, algo, hash);
+ ret = fit_check_signature(sig_node, algo, hash);
if (ret)
goto out_free_hash;
@@ -464,7 +464,7 @@ static int fit_image_verify_signature(struct fit_handle *handle,
hash = xzalloc(digest_length(digest));
digest_final(digest, hash);
- ret = fit_check_rsa_signature(sig_node, algo, hash);
+ ret = fit_check_signature(sig_node, algo, hash);
free(hash);
diff --git a/crypto/public-keys.c b/crypto/public-keys.c
index a3ef3bafc8..36c308908d 100644
--- a/crypto/public-keys.c
+++ b/crypto/public-keys.c
@@ -2,31 +2,91 @@
#include <crypto/public_key.h>
#include <rsa.h>
+static LIST_HEAD(public_keys);
+
+const struct public_key *public_key_next(const struct public_key *prev)
+{
+ prev = list_prepare_entry(prev, &public_keys, list);
+ list_for_each_entry_continue(prev, &public_keys, list)
+ return prev;
+
+ return NULL;
+}
+
+const struct public_key *public_key_get(const char *name)
+{
+ const struct public_key *key;
+
+ list_for_each_entry(key, &public_keys, list) {
+ if (!strcmp(key->key_name_hint, name))
+ return key;
+ }
+
+ return NULL;
+}
+
+int public_key_add(struct public_key *key)
+{
+ if (public_key_get(key->key_name_hint))
+ return -EEXIST;
+
+ list_add_tail(&key->list, &public_keys);
+
+ return 0;
+}
+
+static struct public_key *public_key_dup(const struct public_key *key)
+{
+ struct public_key *k = xzalloc(sizeof(*k));
+
+ k->type = key->type;
+ if (key->key_name_hint)
+ k->key_name_hint = xstrdup(key->key_name_hint);
+
+ switch (key->type) {
+ case PUBLIC_KEY_TYPE_RSA:
+ k->rsa = rsa_key_dup(key->rsa);
+ if (!k->rsa)
+ goto err;
+ break;
+ default:
+ goto err;
+ }
+
+ return k;
+err:
+ free(k->key_name_hint);
+ free(k);
+
+ return NULL;
+}
+
+int public_key_verify(const struct public_key *key, const uint8_t *sig,
+ const uint32_t sig_len, const uint8_t *hash,
+ enum hash_algo algo)
+{
+ switch (key->type) {
+ case PUBLIC_KEY_TYPE_RSA:
+ return rsa_verify(key->rsa, sig, sig_len, hash, algo);
+ }
+
+ return -ENOKEY;
+}
+
extern const struct public_key * const __public_keys_start;
extern const struct public_key * const __public_keys_end;
static int init_public_keys(void)
{
const struct public_key * const *iter;
- int ret;
for (iter = &__public_keys_start; iter != &__public_keys_end; iter++) {
- struct rsa_public_key *rsa_key;
-
- switch ((*iter)->type) {
- case PUBLIC_KEY_TYPE_RSA:
- rsa_key = rsa_key_dup((*iter)->rsa);
- if (!rsa_key)
- continue;
-
- ret = rsa_key_add(rsa_key);
- if (ret)
- pr_err("Cannot add rsa key: %pe\n", ERR_PTR(ret));
- break;
- default:
- pr_err("Ignoring unknown key type %u\n", (*iter)->type);
- }
+ struct public_key *key = public_key_dup(*iter);
+
+ if (!key)
+ continue;
+ public_key_add(key);
}
return 0;
diff --git a/crypto/rsa.c b/crypto/rsa.c
index 8eab07beed..969dbfb32b 100644
--- a/crypto/rsa.c
+++ b/crypto/rsa.c
@@ -15,6 +15,7 @@
#include <asm/byteorder.h>
#include <errno.h>
#include <rsa.h>
+#include <crypto/public_key.h>
#include <asm/unaligned.h>
#define UINT64_MULT32(v, multby) (((uint64_t)(v)) * ((uint32_t)(multby)))
@@ -380,105 +381,74 @@ static void rsa_convert_big_endian(uint32_t *dst, const uint32_t *src, int len)
dst[i] = fdt32_to_cpu(src[len - 1 - i]);
}
-struct rsa_public_key *rsa_of_read_key(struct device_node *node)
+struct public_key *rsa_of_read_key(struct device_node *node)
{
const void *modulus, *rr;
const uint64_t *public_exponent;
int length;
- struct rsa_public_key *key;
+ struct public_key *key;
+ struct rsa_public_key *rsa;
int err;
if (strncmp(node->name, "key-", 4))
return ERR_PTR(-EINVAL);
key = xzalloc(sizeof(*key));
+ rsa = key->rsa = xzalloc(sizeof(*rsa));
key->key_name_hint = xstrdup(node->name + 4);
- of_property_read_u32(node, "rsa,num-bits", &key->len);
- of_property_read_u32(node, "rsa,n0-inverse", &key->n0inv);
+ of_property_read_u32(node, "rsa,num-bits", &rsa->len);
+ of_property_read_u32(node, "rsa,n0-inverse", &rsa->n0inv);
public_exponent = of_get_property(node, "rsa,exponent", &length);
if (!public_exponent || length < sizeof(*public_exponent))
- key->exponent = RSA_DEFAULT_PUBEXP;
+ rsa->exponent = RSA_DEFAULT_PUBEXP;
else
- key->exponent = fdt64_to_cpu(*public_exponent);
+ rsa->exponent = fdt64_to_cpu(*public_exponent);
modulus = of_get_property(node, "rsa,modulus", NULL);
rr = of_get_property(node, "rsa,r-squared", NULL);
- if (!key->len || !modulus || !rr) {
+ if (!rsa->len || !modulus || !rr) {
pr_debug("%s: Missing RSA key info", __func__);
err = -EFAULT;
goto out;
}
/* Sanity check for stack size */
- if (key->len > RSA_MAX_KEY_BITS || key->len < RSA_MIN_KEY_BITS) {
+ if (rsa->len > RSA_MAX_KEY_BITS || rsa->len < RSA_MIN_KEY_BITS) {
pr_debug("RSA key bits %u outside allowed range %d..%d\n",
- key->len, RSA_MIN_KEY_BITS, RSA_MAX_KEY_BITS);
+ rsa->len, RSA_MIN_KEY_BITS, RSA_MAX_KEY_BITS);
err = -EFAULT;
goto out;
}
- key->len /= sizeof(uint32_t) * 8;
+ rsa->len /= sizeof(uint32_t) * 8;
- key->modulus = xzalloc(RSA_MAX_KEY_BITS / 8);
- key->rr = xzalloc(RSA_MAX_KEY_BITS / 8);
+ rsa->modulus = xzalloc(RSA_MAX_KEY_BITS / 8);
+ rsa->rr = xzalloc(RSA_MAX_KEY_BITS / 8);
- rsa_convert_big_endian(key->modulus, modulus, key->len);
- rsa_convert_big_endian(key->rr, rr, key->len);
+ rsa_convert_big_endian(rsa->modulus, modulus, rsa->len);
+ rsa_convert_big_endian(rsa->rr, rr, rsa->len);
err = 0;
out:
- if (err)
+ if (err) {
free(key);
+ free(rsa);
+ }
return err ? ERR_PTR(err) : key;
}
void rsa_key_free(struct rsa_public_key *key)
{
- list_del(&key->list);
-
free(key->modulus);
free(key->rr);
free(key);
}
-static LIST_HEAD(rsa_keys);
-
-const struct rsa_public_key *rsa_key_next(const struct rsa_public_key *prev)
-{
- prev = list_prepare_entry(prev, &rsa_keys, list);
- list_for_each_entry_continue(prev, &rsa_keys, list)
- return prev;
-
- return NULL;
-}
-
-const struct rsa_public_key *rsa_get_key(const char *name)
-{
- const struct rsa_public_key *key;
-
- list_for_each_entry(key, &rsa_keys, list) {
- if (!strcmp(key->key_name_hint, name))
- return key;
- }
-
- return NULL;
-}
-
-int rsa_key_add(struct rsa_public_key *key)
-{
- if (rsa_get_key(key->key_name_hint))
- return -EEXIST;
-
- list_add_tail(&key->list, &rsa_keys);
-
- return 0;
-}
-
struct rsa_public_key *rsa_key_dup(const struct rsa_public_key *key)
{
struct rsa_public_key *new;
@@ -493,7 +463,7 @@ struct rsa_public_key *rsa_key_dup(const struct rsa_public_key *key)
static void rsa_init_keys_of(void)
{
struct device_node *sigs, *sig;
- struct rsa_public_key *key;
+ struct public_key *key;
int ret;
if (!IS_ENABLED(CONFIG_OFTREE))
@@ -511,7 +481,7 @@ static void rsa_init_keys_of(void)
continue;
}
- ret = rsa_key_add(key);
+ ret = public_key_add(key);
if (ret)
pr_err("Cannot add rsa key %s: %s\n",
key->key_name_hint, strerror(-ret));
diff --git a/include/crypto/public_key.h b/include/crypto/public_key.h
index 83e8401aed..1b91063042 100644
--- a/include/crypto/public_key.h
+++ b/include/crypto/public_key.h
@@ -1,6 +1,8 @@
#ifndef __CRYPTO_PUBLIC_KEY_H
#define __CRYPTO_PUBLIC_KEY_H
+#include <digest.h>
+
struct rsa_public_key;
struct ecdsa_public_key;
@@ -10,6 +12,8 @@ enum pulic_key_type {
struct public_key {
enum pulic_key_type type;
+ struct list_head list;
+ char *key_name_hint;
union {
struct rsa_public_key *rsa;
@@ -17,4 +21,15 @@ struct public_key {
};
};
+int public_key_add(struct public_key *key);
+const struct public_key *public_key_get(const char *name);
+const struct public_key *public_key_next(const struct public_key *prev);
+
+#define for_each_public_key(key) \
+ for (key = public_key_next(NULL); key; key = public_key_next(key))
+
+int public_key_verify(const struct public_key *key, const uint8_t *sig,
+ const uint32_t sig_len, const uint8_t *hash,
+ enum hash_algo algo);
+
#endif /* __CRYPTO_PUBLIC_KEY_H */
diff --git a/include/rsa.h b/include/rsa.h
index ecb2f42957..ef03a925b8 100644
--- a/include/rsa.h
+++ b/include/rsa.h
@@ -29,8 +29,6 @@ struct rsa_public_key {
uint32_t *modulus; /* modulus as little endian array */
uint32_t *rr; /* R^2 as little endian array */
uint64_t exponent; /* public exponent */
- char *key_name_hint;
- struct list_head list;
};
/**
@@ -54,24 +52,12 @@ int rsa_verify(const struct rsa_public_key *key, const uint8_t *sig,
struct device_node;
-struct rsa_public_key *rsa_of_read_key(struct device_node *node);
+struct public_key *rsa_of_read_key(struct device_node *node);
void rsa_key_free(struct rsa_public_key *key);
-const struct rsa_public_key *rsa_get_key(const char *name);
-
-const struct rsa_public_key *rsa_key_next(const struct rsa_public_key *prev);
-
-#define for_each_rsa_key(key) \
- for (key = rsa_key_next(NULL); key; key = rsa_key_next(key))
#ifdef CONFIG_CRYPTO_RSA
-int rsa_key_add(struct rsa_public_key *key);
struct rsa_public_key *rsa_key_dup(const struct rsa_public_key *key);
#else
-static inline int rsa_key_add(struct rsa_public_key *key)
-{
- return -ENOSYS;
-}
-
static inline struct rsa_public_key *rsa_key_dup(const struct rsa_public_key *key);
{
return NULL;
diff --git a/scripts/keytoc.c b/scripts/keytoc.c
index e66c5989bf..8b29118c95 100644
--- a/scripts/keytoc.c
+++ b/scripts/keytoc.c
@@ -491,6 +491,7 @@ static int gen_key_ecdsa(EVP_PKEY *key, const char *key_name, const char *key_na
if (!standalone) {
fprintf(outfilep, "\nstatic struct public_key %s_public_key = {\n", key_name_c);
fprintf(outfilep, "\t.type = PUBLIC_KEY_TYPE_ECDSA,\n");
+ fprintf(outfilep, "\t.key_name_hint = \"%s\",\n", key_name);
fprintf(outfilep, "\t.ecdsa = &%s,\n", key_name_c);
fprintf(outfilep, "};");
fprintf(outfilep, "\nstruct public_key *%s_ecdsa_p __attribute__((section(\".public_keys.rodata.%s\"))) = &%s_public_key;\n",
@@ -551,12 +552,12 @@ static int gen_key_rsa(EVP_PKEY *key, const char *key_name, const char *key_name
fprintf(outfilep, "\t.modulus = %s_modulus,\n", key_name_c);
fprintf(outfilep, "\t.rr = %s_rr,\n", key_name_c);
fprintf(outfilep, "\t.exponent = 0x%0lx,\n", exponent);
- fprintf(outfilep, "\t.key_name_hint = \"%s\",\n", key_name);
fprintf(outfilep, "};\n");
if (!standalone) {
fprintf(outfilep, "\nstatic struct public_key %s_public_key = {\n", key_name_c);
fprintf(outfilep, "\t.type = PUBLIC_KEY_TYPE_RSA,\n");
+ fprintf(outfilep, "\t.key_name_hint = \"%s\",\n", key_name);
fprintf(outfilep, "\t.rsa = &%s,\n", key_name_c);
fprintf(outfilep, "};");
fprintf(outfilep, "\nstruct public_key *%sp __attribute__((section(\".public_keys.rodata.%s\"))) = &%s_public_key;\n",
--
2.39.2
^ permalink raw reply [flat|nested] 33+ messages in thread
* [PATCH v4 11/16] crypto: builtin_keys: Allow to specify multiple keys in CONFIG_CRYPTO_PUBLIC_KEYS
2024-09-13 7:59 [PATCH v4 00/16] Add ECDSA support for FIT image verification Sascha Hauer
` (9 preceding siblings ...)
2024-09-13 7:59 ` [PATCH v4 10/16] crypto: add public_key functions Sascha Hauer
@ 2024-09-13 7:59 ` Sascha Hauer
2024-09-25 8:22 ` Sascha Hauer
2024-09-13 7:59 ` [PATCH v4 12/16] crypto: public-keys: use array of public_keys Sascha Hauer
` (5 subsequent siblings)
16 siblings, 1 reply; 33+ messages in thread
From: Sascha Hauer @ 2024-09-13 7:59 UTC (permalink / raw)
To: Barebox List
This adds the missing pieces to make CONFIG_CRYPTO_PUBLIC_KEYS
a list of keys rather than a single key only.
We have to remove the quotes from the key argument in cmd_keys to
pass the keys as multiple arguments to keytoc.
For removing the quotes from CONFIG_CRYPTO_PUBLIC_KEYS "%"=% no longer
matches when the string contains multiple words, so we utilize shell
to remove the quotes.
Signed-off-by: Sascha Hauer <s.hauer@pengutronix.de>
---
crypto/Kconfig | 11 ++++++-----
crypto/Makefile | 2 +-
scripts/Makefile.lib | 2 +-
3 files changed, 8 insertions(+), 7 deletions(-)
diff --git a/crypto/Kconfig b/crypto/Kconfig
index 612e6f33fc..6b2e73c503 100644
--- a/crypto/Kconfig
+++ b/crypto/Kconfig
@@ -126,11 +126,12 @@ config CRYPTO_PUBLIC_KEYS
depends on CRYPTO_BUILTIN_KEYS
string "public keys to compile in"
help
- This option should be a filename of a PEM-formatted file containing
- X.509 certificates to be included into barebox. If the string starts
- with "pkcs11:" it is interpreted as a PKCS#11 URI rather than a file.
- If the string starts with a <hint>: prefix, <hint> is used as a key
- name hint to find a key without iterating over all keys.
+ This option should be a space separated list of filenames of
+ PEM-formatted files containing X.509 certificates to be included into
+ barebox. If an entry starts with "pkcs11:" it is interpreted as a
+ PKCS#11 URI rather than a file. If an entry starts with a <hint>:
+ prefix, <hint> is used as a key name hint to find a key without
+ iterating over all keys.
This avoids the mkimage dependency of CONFIG_BOOTM_FITIMAGE_PUBKEY
at the cost of an openssl build-time dependency.
diff --git a/crypto/Makefile b/crypto/Makefile
index d6ce50b386..1c5709c90a 100644
--- a/crypto/Makefile
+++ b/crypto/Makefile
@@ -28,7 +28,7 @@ ifdef CONFIG_CRYPTO_BUILTIN_KEYS
$(obj)/public-keys.o: $(obj)/public-keys.h
-CONFIG_CRYPTO_PUBLIC_KEYS := $(CONFIG_CRYPTO_PUBLIC_KEYS:"%"=%)
+CONFIG_CRYPTO_PUBLIC_KEYS := $(shell echo $(CONFIG_CRYPTO_PUBLIC_KEYS))
$(obj)/public-keys.h: FORCE
$(call cmd,public_keys,$(CONFIG_CRYPTO_PUBLIC_KEYS))
diff --git a/scripts/Makefile.lib b/scripts/Makefile.lib
index 1881e3c139..3d0a260804 100644
--- a/scripts/Makefile.lib
+++ b/scripts/Makefile.lib
@@ -614,7 +614,7 @@ quiet_cmd_b64dec = B64DEC $@
# target file.
quiet_cmd_public_keys = KEY $@
cmd_public_keys = \
- $(objtree)/scripts/keytoc -o $@.tmp "$(2)" $(3) && \
+ $(objtree)/scripts/keytoc -o $@.tmp $(2) $(3) && \
if cmp -s $@.tmp $@; then \
rm $@.tmp; \
else \
--
2.39.2
^ permalink raw reply [flat|nested] 33+ messages in thread
* [PATCH v4 12/16] crypto: public-keys: use array of public_keys
2024-09-13 7:59 [PATCH v4 00/16] Add ECDSA support for FIT image verification Sascha Hauer
` (10 preceding siblings ...)
2024-09-13 7:59 ` [PATCH v4 11/16] crypto: builtin_keys: Allow to specify multiple keys in CONFIG_CRYPTO_PUBLIC_KEYS Sascha Hauer
@ 2024-09-13 7:59 ` Sascha Hauer
2024-09-13 7:59 ` [PATCH v4 13/16] crypto: rsa: create static inline wrapper for rsa_verify() Sascha Hauer
` (4 subsequent siblings)
16 siblings, 0 replies; 33+ messages in thread
From: Sascha Hauer @ 2024-09-13 7:59 UTC (permalink / raw)
To: Barebox List; +Cc: Ahmad Fatoum
Instead of collecting the public keys directly in a section, we used to
collect pointers to the public keys. This indirection is unnecessary,
so drop it and put the keys directly into a section.
Signed-off-by: Sascha Hauer <s.hauer@pengutronix.de>
Reviewed-by: Ahmad Fatoum <a.fatoum@pengutronix.de>
---
crypto/public-keys.c | 10 +++++-----
scripts/keytoc.c | 12 ++++--------
2 files changed, 9 insertions(+), 13 deletions(-)
diff --git a/crypto/public-keys.c b/crypto/public-keys.c
index 36c308908d..dc51ef18f8 100644
--- a/crypto/public-keys.c
+++ b/crypto/public-keys.c
@@ -73,15 +73,15 @@ int public_key_verify(const struct public_key *key, const uint8_t *sig,
return -ENOKEY;
}
-extern const struct public_key * const __public_keys_start;
-extern const struct public_key * const __public_keys_end;
+extern const struct public_key __public_keys_start[];
+extern const struct public_key __public_keys_end[];
static int init_public_keys(void)
{
- const struct public_key * const *iter;
+ const struct public_key *iter;
- for (iter = &__public_keys_start; iter != &__public_keys_end; iter++) {
- struct public_key *key = public_key_dup(*iter);
+ for (iter = __public_keys_start; iter != __public_keys_end; iter++) {
+ struct public_key *key = public_key_dup(iter);
if (!key)
continue;
diff --git a/scripts/keytoc.c b/scripts/keytoc.c
index 8b29118c95..bdda059759 100644
--- a/scripts/keytoc.c
+++ b/scripts/keytoc.c
@@ -489,13 +489,11 @@ static int gen_key_ecdsa(EVP_PKEY *key, const char *key_name, const char *key_na
fprintf(outfilep, "\t.y = %s_y,\n", key_name_c);
fprintf(outfilep, "};\n");
if (!standalone) {
- fprintf(outfilep, "\nstatic struct public_key %s_public_key = {\n", key_name_c);
+ fprintf(outfilep, "\nstruct public_key __attribute__((section(\".public_keys.rodata.%s\"))) %s_public_key = {\n", key_name_c, key_name_c);
fprintf(outfilep, "\t.type = PUBLIC_KEY_TYPE_ECDSA,\n");
fprintf(outfilep, "\t.key_name_hint = \"%s\",\n", key_name);
fprintf(outfilep, "\t.ecdsa = &%s,\n", key_name_c);
- fprintf(outfilep, "};");
- fprintf(outfilep, "\nstruct public_key *%s_ecdsa_p __attribute__((section(\".public_keys.rodata.%s\"))) = &%s_public_key;\n",
- key_name_c, key_name_c, key_name_c);
+ fprintf(outfilep, "};\n");
}
}
@@ -555,13 +553,11 @@ static int gen_key_rsa(EVP_PKEY *key, const char *key_name, const char *key_name
fprintf(outfilep, "};\n");
if (!standalone) {
- fprintf(outfilep, "\nstatic struct public_key %s_public_key = {\n", key_name_c);
+ fprintf(outfilep, "\nstruct public_key __attribute__((section(\".public_keys.rodata.%s\"))) %s_public_key = {\n", key_name_c, key_name_c);
fprintf(outfilep, "\t.type = PUBLIC_KEY_TYPE_RSA,\n");
fprintf(outfilep, "\t.key_name_hint = \"%s\",\n", key_name);
fprintf(outfilep, "\t.rsa = &%s,\n", key_name_c);
- fprintf(outfilep, "};");
- fprintf(outfilep, "\nstruct public_key *%sp __attribute__((section(\".public_keys.rodata.%s\"))) = &%s_public_key;\n",
- key_name_c, key_name_c, key_name_c);
+ fprintf(outfilep, "};\n");
}
}
--
2.39.2
^ permalink raw reply [flat|nested] 33+ messages in thread
* [PATCH v4 13/16] crypto: rsa: create static inline wrapper for rsa_verify()
2024-09-13 7:59 [PATCH v4 00/16] Add ECDSA support for FIT image verification Sascha Hauer
` (11 preceding siblings ...)
2024-09-13 7:59 ` [PATCH v4 12/16] crypto: public-keys: use array of public_keys Sascha Hauer
@ 2024-09-13 7:59 ` Sascha Hauer
2024-09-27 8:09 ` Ahmad Fatoum
2024-09-13 7:59 ` [PATCH v4 14/16] Add elliptic curve cryptography (ECC) helper functions Sascha Hauer
` (3 subsequent siblings)
16 siblings, 1 reply; 33+ messages in thread
From: Sascha Hauer @ 2024-09-13 7:59 UTC (permalink / raw)
To: Barebox List
rsa_verify() is called from generic code, so provide a static inline
no-op wrapper used when RSA support is disabled.
Signed-off-by: Sascha Hauer <s.hauer@pengutronix.de>
---
include/rsa.h | 27 +++++++++++++++++----------
1 file changed, 17 insertions(+), 10 deletions(-)
diff --git a/include/rsa.h b/include/rsa.h
index ef03a925b8..efc8fca152 100644
--- a/include/rsa.h
+++ b/include/rsa.h
@@ -31,6 +31,15 @@ struct rsa_public_key {
uint64_t exponent; /* public exponent */
};
+/* This is the maximum signature length that we support, in bits */
+#define RSA_MAX_SIG_BITS 4096
+
+struct device_node;
+
+struct public_key *rsa_of_read_key(struct device_node *node);
+void rsa_key_free(struct rsa_public_key *key);
+
+#ifdef CONFIG_CRYPTO_RSA
/**
* rsa_verify() - Verify a signature against some data
*
@@ -47,18 +56,16 @@ int rsa_verify(const struct rsa_public_key *key, const uint8_t *sig,
const uint32_t sig_len, const uint8_t *hash,
enum hash_algo algo);
-/* This is the maximum signature length that we support, in bits */
-#define RSA_MAX_SIG_BITS 4096
-
-struct device_node;
-
-struct public_key *rsa_of_read_key(struct device_node *node);
-void rsa_key_free(struct rsa_public_key *key);
-
-#ifdef CONFIG_CRYPTO_RSA
struct rsa_public_key *rsa_key_dup(const struct rsa_public_key *key);
#else
-static inline struct rsa_public_key *rsa_key_dup(const struct rsa_public_key *key);
+static inline int rsa_verify(const struct rsa_public_key *key, const uint8_t *sig,
+ const uint32_t sig_len, const uint8_t *hash,
+ enum hash_algo algo)
+{
+ return -ENOSYS;
+}
+
+static inline struct rsa_public_key *rsa_key_dup(const struct rsa_public_key *key)
{
return NULL;
}
--
2.39.2
^ permalink raw reply [flat|nested] 33+ messages in thread
* [PATCH v4 14/16] Add elliptic curve cryptography (ECC) helper functions
2024-09-13 7:59 [PATCH v4 00/16] Add ECDSA support for FIT image verification Sascha Hauer
` (12 preceding siblings ...)
2024-09-13 7:59 ` [PATCH v4 13/16] crypto: rsa: create static inline wrapper for rsa_verify() Sascha Hauer
@ 2024-09-13 7:59 ` Sascha Hauer
2024-09-13 7:59 ` [PATCH v4 15/16] crypto: add ECDSA support Sascha Hauer
` (2 subsequent siblings)
16 siblings, 0 replies; 33+ messages in thread
From: Sascha Hauer @ 2024-09-13 7:59 UTC (permalink / raw)
To: Barebox List; +Cc: Ahmad Fatoum
This ports the functions needed for supporting elliptic curve cryptography
(ECC) from the Kernel. The code is taken from Linux-6.10 and mostly
unchanged.
Signed-off-by: Sascha Hauer <s.hauer@pengutronix.de>
Acked-by: Ahmad Fatoum <a.fatoum@pengutronix.de>
---
crypto/Kconfig | 3 +
crypto/Makefile | 1 +
crypto/ecc.c | 1661 +++++++++++++++++++++++++++++++++
crypto/ecc_curve_defs.h | 155 +++
include/crypto/ecc_curve.h | 62 ++
include/crypto/ecdh.h | 83 ++
include/crypto/internal/ecc.h | 278 ++++++
7 files changed, 2243 insertions(+)
create mode 100644 crypto/ecc.c
create mode 100644 crypto/ecc_curve_defs.h
create mode 100644 include/crypto/ecc_curve.h
create mode 100644 include/crypto/ecdh.h
create mode 100644 include/crypto/internal/ecc.h
diff --git a/crypto/Kconfig b/crypto/Kconfig
index 6b2e73c503..7935af3da8 100644
--- a/crypto/Kconfig
+++ b/crypto/Kconfig
@@ -148,4 +148,7 @@ config JWT
select BASE64
select CRYPTO_RSA
+config CRYPTO_ECC
+ bool
+
endmenu
diff --git a/crypto/Makefile b/crypto/Makefile
index 1c5709c90a..570930c2cd 100644
--- a/crypto/Makefile
+++ b/crypto/Makefile
@@ -19,6 +19,7 @@ obj-$(CONFIG_CRYPTO_PBKDF2) += pbkdf2.o
obj-$(CONFIG_CRYPTO_RSA) += rsa.o
obj-$(CONFIG_CRYPTO_KEYSTORE) += keystore.o
obj-$(CONFIG_CRYPTO_BUILTIN_KEYS) += public-keys.o
+obj-$(CONFIG_CRYPTO_ECC) += ecc.o
obj-$(CONFIG_JWT) += jwt.o
diff --git a/crypto/ecc.c b/crypto/ecc.c
new file mode 100644
index 0000000000..a0ab962262
--- /dev/null
+++ b/crypto/ecc.c
@@ -0,0 +1,1661 @@
+/*
+ * Copyright (c) 2013, 2014 Kenneth MacKay. All rights reserved.
+ * Copyright (c) 2019 Vitaly Chikunov <vt@altlinux.org>
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions are
+ * met:
+ * * Redistributions of source code must retain the above copyright
+ * notice, this list of conditions and the following disclaimer.
+ * * Redistributions in binary form must reproduce the above copyright
+ * notice, this list of conditions and the following disclaimer in the
+ * documentation and/or other materials provided with the distribution.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
+ * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
+ * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
+ * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
+ * HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
+ * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
+ * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
+ * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
+ * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
+ * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
+ * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+ */
+
+#include <common.h>
+#include <stdlib.h>
+#include <crypto/ecc_curve.h>
+#include <crypto/ecdh.h>
+#include <crypto/internal/ecc.h>
+#include <asm/unaligned.h>
+
+#include "ecc_curve_defs.h"
+
+typedef struct {
+ u64 m_low;
+ u64 m_high;
+} uint128_t;
+
+/* Returns curv25519 curve param */
+const struct ecc_curve *ecc_get_curve25519(void)
+{
+ return &ecc_25519;
+}
+EXPORT_SYMBOL(ecc_get_curve25519);
+
+const struct ecc_curve *ecc_get_curve(unsigned int curve_id)
+{
+ switch (curve_id) {
+ case ECC_CURVE_NIST_P192:
+ return &nist_p192;
+ case ECC_CURVE_NIST_P256:
+ return &nist_p256;
+ case ECC_CURVE_NIST_P384:
+ return &nist_p384;
+ case ECC_CURVE_NIST_P521:
+ return &nist_p521;
+ default:
+ return NULL;
+ }
+}
+EXPORT_SYMBOL(ecc_get_curve);
+
+void ecc_digits_from_bytes(const u8 *in, unsigned int nbytes,
+ u64 *out, unsigned int ndigits)
+{
+ int diff = ndigits - DIV_ROUND_UP(nbytes, sizeof(u64));
+ unsigned int o = nbytes & 7;
+ __be64 msd = 0;
+
+ /* diff > 0: not enough input bytes: set most significant digits to 0 */
+ if (diff > 0) {
+ ndigits -= diff;
+ memset(&out[ndigits - 1], 0, diff * sizeof(u64));
+ }
+
+ if (o) {
+ memcpy((u8 *)&msd + sizeof(msd) - o, in, o);
+ out[--ndigits] = be64_to_cpu(msd);
+ in += o;
+ }
+ ecc_swap_digits(in, out, ndigits);
+}
+EXPORT_SYMBOL(ecc_digits_from_bytes);
+
+static u64 *ecc_alloc_digits_space(unsigned int ndigits)
+{
+ size_t len = ndigits * sizeof(u64);
+
+ if (!len)
+ return NULL;
+
+ return kmalloc(len, GFP_KERNEL);
+}
+
+static void ecc_free_digits_space(u64 *space)
+{
+ kfree_sensitive(space);
+}
+
+struct ecc_point *ecc_alloc_point(unsigned int ndigits)
+{
+ struct ecc_point *p = kmalloc(sizeof(*p), GFP_KERNEL);
+
+ if (!p)
+ return NULL;
+
+ p->x = ecc_alloc_digits_space(ndigits);
+ if (!p->x)
+ goto err_alloc_x;
+
+ p->y = ecc_alloc_digits_space(ndigits);
+ if (!p->y)
+ goto err_alloc_y;
+
+ p->ndigits = ndigits;
+
+ return p;
+
+err_alloc_y:
+ ecc_free_digits_space(p->x);
+err_alloc_x:
+ kfree(p);
+ return NULL;
+}
+EXPORT_SYMBOL(ecc_alloc_point);
+
+void ecc_free_point(struct ecc_point *p)
+{
+ if (!p)
+ return;
+
+ kfree_sensitive(p->x);
+ kfree_sensitive(p->y);
+ kfree_sensitive(p);
+}
+EXPORT_SYMBOL(ecc_free_point);
+
+static void vli_clear(u64 *vli, unsigned int ndigits)
+{
+ int i;
+
+ for (i = 0; i < ndigits; i++)
+ vli[i] = 0;
+}
+
+/* Returns true if vli == 0, false otherwise. */
+bool vli_is_zero(const u64 *vli, unsigned int ndigits)
+{
+ int i;
+
+ for (i = 0; i < ndigits; i++) {
+ if (vli[i])
+ return false;
+ }
+
+ return true;
+}
+EXPORT_SYMBOL(vli_is_zero);
+
+/* Returns nonzero if bit of vli is set. */
+static u64 vli_test_bit(const u64 *vli, unsigned int bit)
+{
+ return (vli[bit / 64] & ((u64)1 << (bit % 64)));
+}
+
+static bool vli_is_negative(const u64 *vli, unsigned int ndigits)
+{
+ return vli_test_bit(vli, ndigits * 64 - 1);
+}
+
+/* Counts the number of 64-bit "digits" in vli. */
+static unsigned int vli_num_digits(const u64 *vli, unsigned int ndigits)
+{
+ int i;
+
+ /* Search from the end until we find a non-zero digit.
+ * We do it in reverse because we expect that most digits will
+ * be nonzero.
+ */
+ for (i = ndigits - 1; i >= 0 && vli[i] == 0; i--);
+
+ return (i + 1);
+}
+
+/* Counts the number of bits required for vli. */
+unsigned int vli_num_bits(const u64 *vli, unsigned int ndigits)
+{
+ unsigned int i, num_digits;
+ u64 digit;
+
+ num_digits = vli_num_digits(vli, ndigits);
+ if (num_digits == 0)
+ return 0;
+
+ digit = vli[num_digits - 1];
+ for (i = 0; digit; i++)
+ digit >>= 1;
+
+ return ((num_digits - 1) * 64 + i);
+}
+EXPORT_SYMBOL(vli_num_bits);
+
+/* Set dest from unaligned bit string src. */
+void vli_from_be64(u64 *dest, const void *src, unsigned int ndigits)
+{
+ int i;
+ const u64 *from = src;
+
+ for (i = 0; i < ndigits; i++)
+ dest[i] = get_unaligned_be64(&from[ndigits - 1 - i]);
+}
+EXPORT_SYMBOL(vli_from_be64);
+
+void vli_from_le64(u64 *dest, const void *src, unsigned int ndigits)
+{
+ int i;
+ const u64 *from = src;
+
+ for (i = 0; i < ndigits; i++)
+ dest[i] = get_unaligned_le64(&from[i]);
+}
+EXPORT_SYMBOL(vli_from_le64);
+
+/* Sets dest = src. */
+static void vli_set(u64 *dest, const u64 *src, unsigned int ndigits)
+{
+ int i;
+
+ for (i = 0; i < ndigits; i++)
+ dest[i] = src[i];
+}
+
+/* Returns sign of left - right. */
+int vli_cmp(const u64 *left, const u64 *right, unsigned int ndigits)
+{
+ int i;
+
+ for (i = ndigits - 1; i >= 0; i--) {
+ if (left[i] > right[i])
+ return 1;
+ else if (left[i] < right[i])
+ return -1;
+ }
+
+ return 0;
+}
+EXPORT_SYMBOL(vli_cmp);
+
+/* Computes result = in << c, returning carry. Can modify in place
+ * (if result == in). 0 < shift < 64.
+ */
+static u64 vli_lshift(u64 *result, const u64 *in, unsigned int shift,
+ unsigned int ndigits)
+{
+ u64 carry = 0;
+ int i;
+
+ for (i = 0; i < ndigits; i++) {
+ u64 temp = in[i];
+
+ result[i] = (temp << shift) | carry;
+ carry = temp >> (64 - shift);
+ }
+
+ return carry;
+}
+
+/* Computes vli = vli >> 1. */
+static void vli_rshift1(u64 *vli, unsigned int ndigits)
+{
+ u64 *end = vli;
+ u64 carry = 0;
+
+ vli += ndigits;
+
+ while (vli-- > end) {
+ u64 temp = *vli;
+ *vli = (temp >> 1) | carry;
+ carry = temp << 63;
+ }
+}
+
+/* Computes result = left + right, returning carry. Can modify in place. */
+static u64 vli_add(u64 *result, const u64 *left, const u64 *right,
+ unsigned int ndigits)
+{
+ u64 carry = 0;
+ int i;
+
+ for (i = 0; i < ndigits; i++) {
+ u64 sum;
+
+ sum = left[i] + right[i] + carry;
+ if (sum != left[i])
+ carry = (sum < left[i]);
+
+ result[i] = sum;
+ }
+
+ return carry;
+}
+
+/* Computes result = left + right, returning carry. Can modify in place. */
+static u64 vli_uadd(u64 *result, const u64 *left, u64 right,
+ unsigned int ndigits)
+{
+ u64 carry = right;
+ int i;
+
+ for (i = 0; i < ndigits; i++) {
+ u64 sum;
+
+ sum = left[i] + carry;
+ if (sum != left[i])
+ carry = (sum < left[i]);
+ else
+ carry = !!carry;
+
+ result[i] = sum;
+ }
+
+ return carry;
+}
+
+/* Computes result = left - right, returning borrow. Can modify in place. */
+u64 vli_sub(u64 *result, const u64 *left, const u64 *right,
+ unsigned int ndigits)
+{
+ u64 borrow = 0;
+ int i;
+
+ for (i = 0; i < ndigits; i++) {
+ u64 diff;
+
+ diff = left[i] - right[i] - borrow;
+ if (diff != left[i])
+ borrow = (diff > left[i]);
+
+ result[i] = diff;
+ }
+
+ return borrow;
+}
+EXPORT_SYMBOL(vli_sub);
+
+/* Computes result = left - right, returning borrow. Can modify in place. */
+static u64 vli_usub(u64 *result, const u64 *left, u64 right,
+ unsigned int ndigits)
+{
+ u64 borrow = right;
+ int i;
+
+ for (i = 0; i < ndigits; i++) {
+ u64 diff;
+
+ diff = left[i] - borrow;
+ if (diff != left[i])
+ borrow = (diff > left[i]);
+
+ result[i] = diff;
+ }
+
+ return borrow;
+}
+
+static uint128_t mul_64_64(u64 left, u64 right)
+{
+ uint128_t result;
+#if defined(CONFIG_ARCH_SUPPORTS_INT128)
+ unsigned __int128 m = (unsigned __int128)left * right;
+
+ result.m_low = m;
+ result.m_high = m >> 64;
+#else
+ u64 a0 = left & 0xffffffffull;
+ u64 a1 = left >> 32;
+ u64 b0 = right & 0xffffffffull;
+ u64 b1 = right >> 32;
+ u64 m0 = a0 * b0;
+ u64 m1 = a0 * b1;
+ u64 m2 = a1 * b0;
+ u64 m3 = a1 * b1;
+
+ m2 += (m0 >> 32);
+ m2 += m1;
+
+ /* Overflow */
+ if (m2 < m1)
+ m3 += 0x100000000ull;
+
+ result.m_low = (m0 & 0xffffffffull) | (m2 << 32);
+ result.m_high = m3 + (m2 >> 32);
+#endif
+ return result;
+}
+
+static uint128_t add_128_128(uint128_t a, uint128_t b)
+{
+ uint128_t result;
+
+ result.m_low = a.m_low + b.m_low;
+ result.m_high = a.m_high + b.m_high + (result.m_low < a.m_low);
+
+ return result;
+}
+
+static void vli_mult(u64 *result, const u64 *left, const u64 *right,
+ unsigned int ndigits)
+{
+ uint128_t r01 = { 0, 0 };
+ u64 r2 = 0;
+ unsigned int i, k;
+
+ /* Compute each digit of result in sequence, maintaining the
+ * carries.
+ */
+ for (k = 0; k < ndigits * 2 - 1; k++) {
+ unsigned int min;
+
+ if (k < ndigits)
+ min = 0;
+ else
+ min = (k + 1) - ndigits;
+
+ for (i = min; i <= k && i < ndigits; i++) {
+ uint128_t product;
+
+ product = mul_64_64(left[i], right[k - i]);
+
+ r01 = add_128_128(r01, product);
+ r2 += (r01.m_high < product.m_high);
+ }
+
+ result[k] = r01.m_low;
+ r01.m_low = r01.m_high;
+ r01.m_high = r2;
+ r2 = 0;
+ }
+
+ result[ndigits * 2 - 1] = r01.m_low;
+}
+
+/* Compute product = left * right, for a small right value. */
+static void vli_umult(u64 *result, const u64 *left, u32 right,
+ unsigned int ndigits)
+{
+ uint128_t r01 = { 0 };
+ unsigned int k;
+
+ for (k = 0; k < ndigits; k++) {
+ uint128_t product;
+
+ product = mul_64_64(left[k], right);
+ r01 = add_128_128(r01, product);
+ /* no carry */
+ result[k] = r01.m_low;
+ r01.m_low = r01.m_high;
+ r01.m_high = 0;
+ }
+ result[k] = r01.m_low;
+ for (++k; k < ndigits * 2; k++)
+ result[k] = 0;
+}
+
+static void vli_square(u64 *result, const u64 *left, unsigned int ndigits)
+{
+ uint128_t r01 = { 0, 0 };
+ u64 r2 = 0;
+ int i, k;
+
+ for (k = 0; k < ndigits * 2 - 1; k++) {
+ unsigned int min;
+
+ if (k < ndigits)
+ min = 0;
+ else
+ min = (k + 1) - ndigits;
+
+ for (i = min; i <= k && i <= k - i; i++) {
+ uint128_t product;
+
+ product = mul_64_64(left[i], left[k - i]);
+
+ if (i < k - i) {
+ r2 += product.m_high >> 63;
+ product.m_high = (product.m_high << 1) |
+ (product.m_low >> 63);
+ product.m_low <<= 1;
+ }
+
+ r01 = add_128_128(r01, product);
+ r2 += (r01.m_high < product.m_high);
+ }
+
+ result[k] = r01.m_low;
+ r01.m_low = r01.m_high;
+ r01.m_high = r2;
+ r2 = 0;
+ }
+
+ result[ndigits * 2 - 1] = r01.m_low;
+}
+
+/* Computes result = (left + right) % mod.
+ * Assumes that left < mod and right < mod, result != mod.
+ */
+static void vli_mod_add(u64 *result, const u64 *left, const u64 *right,
+ const u64 *mod, unsigned int ndigits)
+{
+ u64 carry;
+
+ carry = vli_add(result, left, right, ndigits);
+
+ /* result > mod (result = mod + remainder), so subtract mod to
+ * get remainder.
+ */
+ if (carry || vli_cmp(result, mod, ndigits) >= 0)
+ vli_sub(result, result, mod, ndigits);
+}
+
+/* Computes result = (left - right) % mod.
+ * Assumes that left < mod and right < mod, result != mod.
+ */
+static void vli_mod_sub(u64 *result, const u64 *left, const u64 *right,
+ const u64 *mod, unsigned int ndigits)
+{
+ u64 borrow = vli_sub(result, left, right, ndigits);
+
+ /* In this case, p_result == -diff == (max int) - diff.
+ * Since -x % d == d - x, we can get the correct result from
+ * result + mod (with overflow).
+ */
+ if (borrow)
+ vli_add(result, result, mod, ndigits);
+}
+
+/*
+ * Computes result = product % mod
+ * for special form moduli: p = 2^k-c, for small c (note the minus sign)
+ *
+ * References:
+ * R. Crandall, C. Pomerance. Prime Numbers: A Computational Perspective.
+ * 9 Fast Algorithms for Large-Integer Arithmetic. 9.2.3 Moduli of special form
+ * Algorithm 9.2.13 (Fast mod operation for special-form moduli).
+ */
+static void vli_mmod_special(u64 *result, const u64 *product,
+ const u64 *mod, unsigned int ndigits)
+{
+ u64 c = -mod[0];
+ u64 t[ECC_MAX_DIGITS * 2];
+ u64 r[ECC_MAX_DIGITS * 2];
+
+ vli_set(r, product, ndigits * 2);
+ while (!vli_is_zero(r + ndigits, ndigits)) {
+ vli_umult(t, r + ndigits, c, ndigits);
+ vli_clear(r + ndigits, ndigits);
+ vli_add(r, r, t, ndigits * 2);
+ }
+ vli_set(t, mod, ndigits);
+ vli_clear(t + ndigits, ndigits);
+ while (vli_cmp(r, t, ndigits * 2) >= 0)
+ vli_sub(r, r, t, ndigits * 2);
+ vli_set(result, r, ndigits);
+}
+
+/*
+ * Computes result = product % mod
+ * for special form moduli: p = 2^{k-1}+c, for small c (note the plus sign)
+ * where k-1 does not fit into qword boundary by -1 bit (such as 255).
+
+ * References (loosely based on):
+ * A. Menezes, P. van Oorschot, S. Vanstone. Handbook of Applied Cryptography.
+ * 14.3.4 Reduction methods for moduli of special form. Algorithm 14.47.
+ * URL: http://cacr.uwaterloo.ca/hac/about/chap14.pdf
+ *
+ * H. Cohen, G. Frey, R. Avanzi, C. Doche, T. Lange, K. Nguyen, F. Vercauteren.
+ * Handbook of Elliptic and Hyperelliptic Curve Cryptography.
+ * Algorithm 10.25 Fast reduction for special form moduli
+ */
+static void vli_mmod_special2(u64 *result, const u64 *product,
+ const u64 *mod, unsigned int ndigits)
+{
+ u64 c2 = mod[0] * 2;
+ u64 q[ECC_MAX_DIGITS];
+ u64 r[ECC_MAX_DIGITS * 2];
+ u64 m[ECC_MAX_DIGITS * 2]; /* expanded mod */
+ int carry; /* last bit that doesn't fit into q */
+ int i;
+
+ vli_set(m, mod, ndigits);
+ vli_clear(m + ndigits, ndigits);
+
+ vli_set(r, product, ndigits);
+ /* q and carry are top bits */
+ vli_set(q, product + ndigits, ndigits);
+ vli_clear(r + ndigits, ndigits);
+ carry = vli_is_negative(r, ndigits);
+ if (carry)
+ r[ndigits - 1] &= (1ull << 63) - 1;
+ for (i = 1; carry || !vli_is_zero(q, ndigits); i++) {
+ u64 qc[ECC_MAX_DIGITS * 2];
+
+ vli_umult(qc, q, c2, ndigits);
+ if (carry)
+ vli_uadd(qc, qc, mod[0], ndigits * 2);
+ vli_set(q, qc + ndigits, ndigits);
+ vli_clear(qc + ndigits, ndigits);
+ carry = vli_is_negative(qc, ndigits);
+ if (carry)
+ qc[ndigits - 1] &= (1ull << 63) - 1;
+ if (i & 1)
+ vli_sub(r, r, qc, ndigits * 2);
+ else
+ vli_add(r, r, qc, ndigits * 2);
+ }
+ while (vli_is_negative(r, ndigits * 2))
+ vli_add(r, r, m, ndigits * 2);
+ while (vli_cmp(r, m, ndigits * 2) >= 0)
+ vli_sub(r, r, m, ndigits * 2);
+
+ vli_set(result, r, ndigits);
+}
+
+/*
+ * Computes result = product % mod, where product is 2N words long.
+ * Reference: Ken MacKay's micro-ecc.
+ * Currently only designed to work for curve_p or curve_n.
+ */
+static void vli_mmod_slow(u64 *result, u64 *product, const u64 *mod,
+ unsigned int ndigits)
+{
+ u64 mod_m[2 * ECC_MAX_DIGITS];
+ u64 tmp[2 * ECC_MAX_DIGITS];
+ u64 *v[2] = { tmp, product };
+ u64 carry = 0;
+ unsigned int i;
+ /* Shift mod so its highest set bit is at the maximum position. */
+ int shift = (ndigits * 2 * 64) - vli_num_bits(mod, ndigits);
+ int word_shift = shift / 64;
+ int bit_shift = shift % 64;
+
+ vli_clear(mod_m, word_shift);
+ if (bit_shift > 0) {
+ for (i = 0; i < ndigits; ++i) {
+ mod_m[word_shift + i] = (mod[i] << bit_shift) | carry;
+ carry = mod[i] >> (64 - bit_shift);
+ }
+ } else
+ vli_set(mod_m + word_shift, mod, ndigits);
+
+ for (i = 1; shift >= 0; --shift) {
+ u64 borrow = 0;
+ unsigned int j;
+
+ for (j = 0; j < ndigits * 2; ++j) {
+ u64 diff = v[i][j] - mod_m[j] - borrow;
+
+ if (diff != v[i][j])
+ borrow = (diff > v[i][j]);
+ v[1 - i][j] = diff;
+ }
+ i = !(i ^ borrow); /* Swap the index if there was no borrow */
+ vli_rshift1(mod_m, ndigits);
+ mod_m[ndigits - 1] |= mod_m[ndigits] << (64 - 1);
+ vli_rshift1(mod_m + ndigits, ndigits);
+ }
+ vli_set(result, v[i], ndigits);
+}
+
+/* Computes result = product % mod using Barrett's reduction with precomputed
+ * value mu appended to the mod after ndigits, mu = (2^{2w} / mod) and have
+ * length ndigits + 1, where mu * (2^w - 1) should not overflow ndigits
+ * boundary.
+ *
+ * Reference:
+ * R. Brent, P. Zimmermann. Modern Computer Arithmetic. 2010.
+ * 2.4.1 Barrett's algorithm. Algorithm 2.5.
+ */
+static void vli_mmod_barrett(u64 *result, u64 *product, const u64 *mod,
+ unsigned int ndigits)
+{
+ u64 q[ECC_MAX_DIGITS * 2];
+ u64 r[ECC_MAX_DIGITS * 2];
+ const u64 *mu = mod + ndigits;
+
+ vli_mult(q, product + ndigits, mu, ndigits);
+ if (mu[ndigits])
+ vli_add(q + ndigits, q + ndigits, product + ndigits, ndigits);
+ vli_mult(r, mod, q + ndigits, ndigits);
+ vli_sub(r, product, r, ndigits * 2);
+ while (!vli_is_zero(r + ndigits, ndigits) ||
+ vli_cmp(r, mod, ndigits) != -1) {
+ u64 carry;
+
+ carry = vli_sub(r, r, mod, ndigits);
+ vli_usub(r + ndigits, r + ndigits, carry, ndigits);
+ }
+ vli_set(result, r, ndigits);
+}
+
+/* Computes p_result = p_product % curve_p.
+ * See algorithm 5 and 6 from
+ * http://www.isys.uni-klu.ac.at/PDF/2001-0126-MT.pdf
+ */
+static void vli_mmod_fast_192(u64 *result, const u64 *product,
+ const u64 *curve_prime, u64 *tmp)
+{
+ const unsigned int ndigits = ECC_CURVE_NIST_P192_DIGITS;
+ int carry;
+
+ vli_set(result, product, ndigits);
+
+ vli_set(tmp, &product[3], ndigits);
+ carry = vli_add(result, result, tmp, ndigits);
+
+ tmp[0] = 0;
+ tmp[1] = product[3];
+ tmp[2] = product[4];
+ carry += vli_add(result, result, tmp, ndigits);
+
+ tmp[0] = tmp[1] = product[5];
+ tmp[2] = 0;
+ carry += vli_add(result, result, tmp, ndigits);
+
+ while (carry || vli_cmp(curve_prime, result, ndigits) != 1)
+ carry -= vli_sub(result, result, curve_prime, ndigits);
+}
+
+/* Computes result = product % curve_prime
+ * from http://www.nsa.gov/ia/_files/nist-routines.pdf
+ */
+static void vli_mmod_fast_256(u64 *result, const u64 *product,
+ const u64 *curve_prime, u64 *tmp)
+{
+ int carry;
+ const unsigned int ndigits = ECC_CURVE_NIST_P256_DIGITS;
+
+ /* t */
+ vli_set(result, product, ndigits);
+
+ /* s1 */
+ tmp[0] = 0;
+ tmp[1] = product[5] & 0xffffffff00000000ull;
+ tmp[2] = product[6];
+ tmp[3] = product[7];
+ carry = vli_lshift(tmp, tmp, 1, ndigits);
+ carry += vli_add(result, result, tmp, ndigits);
+
+ /* s2 */
+ tmp[1] = product[6] << 32;
+ tmp[2] = (product[6] >> 32) | (product[7] << 32);
+ tmp[3] = product[7] >> 32;
+ carry += vli_lshift(tmp, tmp, 1, ndigits);
+ carry += vli_add(result, result, tmp, ndigits);
+
+ /* s3 */
+ tmp[0] = product[4];
+ tmp[1] = product[5] & 0xffffffff;
+ tmp[2] = 0;
+ tmp[3] = product[7];
+ carry += vli_add(result, result, tmp, ndigits);
+
+ /* s4 */
+ tmp[0] = (product[4] >> 32) | (product[5] << 32);
+ tmp[1] = (product[5] >> 32) | (product[6] & 0xffffffff00000000ull);
+ tmp[2] = product[7];
+ tmp[3] = (product[6] >> 32) | (product[4] << 32);
+ carry += vli_add(result, result, tmp, ndigits);
+
+ /* d1 */
+ tmp[0] = (product[5] >> 32) | (product[6] << 32);
+ tmp[1] = (product[6] >> 32);
+ tmp[2] = 0;
+ tmp[3] = (product[4] & 0xffffffff) | (product[5] << 32);
+ carry -= vli_sub(result, result, tmp, ndigits);
+
+ /* d2 */
+ tmp[0] = product[6];
+ tmp[1] = product[7];
+ tmp[2] = 0;
+ tmp[3] = (product[4] >> 32) | (product[5] & 0xffffffff00000000ull);
+ carry -= vli_sub(result, result, tmp, ndigits);
+
+ /* d3 */
+ tmp[0] = (product[6] >> 32) | (product[7] << 32);
+ tmp[1] = (product[7] >> 32) | (product[4] << 32);
+ tmp[2] = (product[4] >> 32) | (product[5] << 32);
+ tmp[3] = (product[6] << 32);
+ carry -= vli_sub(result, result, tmp, ndigits);
+
+ /* d4 */
+ tmp[0] = product[7];
+ tmp[1] = product[4] & 0xffffffff00000000ull;
+ tmp[2] = product[5];
+ tmp[3] = product[6] & 0xffffffff00000000ull;
+ carry -= vli_sub(result, result, tmp, ndigits);
+
+ if (carry < 0) {
+ do {
+ carry += vli_add(result, result, curve_prime, ndigits);
+ } while (carry < 0);
+ } else {
+ while (carry || vli_cmp(curve_prime, result, ndigits) != 1)
+ carry -= vli_sub(result, result, curve_prime, ndigits);
+ }
+}
+
+#define SL32OR32(x32, y32) (((u64)x32 << 32) | y32)
+#define AND64H(x64) (x64 & 0xffFFffFF00000000ull)
+#define AND64L(x64) (x64 & 0x00000000ffFFffFFull)
+
+/* Computes result = product % curve_prime
+ * from "Mathematical routines for the NIST prime elliptic curves"
+ */
+static void vli_mmod_fast_384(u64 *result, const u64 *product,
+ const u64 *curve_prime, u64 *tmp)
+{
+ int carry;
+ const unsigned int ndigits = ECC_CURVE_NIST_P384_DIGITS;
+
+ /* t */
+ vli_set(result, product, ndigits);
+
+ /* s1 */
+ tmp[0] = 0; // 0 || 0
+ tmp[1] = 0; // 0 || 0
+ tmp[2] = SL32OR32(product[11], (product[10]>>32)); //a22||a21
+ tmp[3] = product[11]>>32; // 0 ||a23
+ tmp[4] = 0; // 0 || 0
+ tmp[5] = 0; // 0 || 0
+ carry = vli_lshift(tmp, tmp, 1, ndigits);
+ carry += vli_add(result, result, tmp, ndigits);
+
+ /* s2 */
+ tmp[0] = product[6]; //a13||a12
+ tmp[1] = product[7]; //a15||a14
+ tmp[2] = product[8]; //a17||a16
+ tmp[3] = product[9]; //a19||a18
+ tmp[4] = product[10]; //a21||a20
+ tmp[5] = product[11]; //a23||a22
+ carry += vli_add(result, result, tmp, ndigits);
+
+ /* s3 */
+ tmp[0] = SL32OR32(product[11], (product[10]>>32)); //a22||a21
+ tmp[1] = SL32OR32(product[6], (product[11]>>32)); //a12||a23
+ tmp[2] = SL32OR32(product[7], (product[6])>>32); //a14||a13
+ tmp[3] = SL32OR32(product[8], (product[7]>>32)); //a16||a15
+ tmp[4] = SL32OR32(product[9], (product[8]>>32)); //a18||a17
+ tmp[5] = SL32OR32(product[10], (product[9]>>32)); //a20||a19
+ carry += vli_add(result, result, tmp, ndigits);
+
+ /* s4 */
+ tmp[0] = AND64H(product[11]); //a23|| 0
+ tmp[1] = (product[10]<<32); //a20|| 0
+ tmp[2] = product[6]; //a13||a12
+ tmp[3] = product[7]; //a15||a14
+ tmp[4] = product[8]; //a17||a16
+ tmp[5] = product[9]; //a19||a18
+ carry += vli_add(result, result, tmp, ndigits);
+
+ /* s5 */
+ tmp[0] = 0; // 0|| 0
+ tmp[1] = 0; // 0|| 0
+ tmp[2] = product[10]; //a21||a20
+ tmp[3] = product[11]; //a23||a22
+ tmp[4] = 0; // 0|| 0
+ tmp[5] = 0; // 0|| 0
+ carry += vli_add(result, result, tmp, ndigits);
+
+ /* s6 */
+ tmp[0] = AND64L(product[10]); // 0 ||a20
+ tmp[1] = AND64H(product[10]); //a21|| 0
+ tmp[2] = product[11]; //a23||a22
+ tmp[3] = 0; // 0 || 0
+ tmp[4] = 0; // 0 || 0
+ tmp[5] = 0; // 0 || 0
+ carry += vli_add(result, result, tmp, ndigits);
+
+ /* d1 */
+ tmp[0] = SL32OR32(product[6], (product[11]>>32)); //a12||a23
+ tmp[1] = SL32OR32(product[7], (product[6]>>32)); //a14||a13
+ tmp[2] = SL32OR32(product[8], (product[7]>>32)); //a16||a15
+ tmp[3] = SL32OR32(product[9], (product[8]>>32)); //a18||a17
+ tmp[4] = SL32OR32(product[10], (product[9]>>32)); //a20||a19
+ tmp[5] = SL32OR32(product[11], (product[10]>>32)); //a22||a21
+ carry -= vli_sub(result, result, tmp, ndigits);
+
+ /* d2 */
+ tmp[0] = (product[10]<<32); //a20|| 0
+ tmp[1] = SL32OR32(product[11], (product[10]>>32)); //a22||a21
+ tmp[2] = (product[11]>>32); // 0 ||a23
+ tmp[3] = 0; // 0 || 0
+ tmp[4] = 0; // 0 || 0
+ tmp[5] = 0; // 0 || 0
+ carry -= vli_sub(result, result, tmp, ndigits);
+
+ /* d3 */
+ tmp[0] = 0; // 0 || 0
+ tmp[1] = AND64H(product[11]); //a23|| 0
+ tmp[2] = product[11]>>32; // 0 ||a23
+ tmp[3] = 0; // 0 || 0
+ tmp[4] = 0; // 0 || 0
+ tmp[5] = 0; // 0 || 0
+ carry -= vli_sub(result, result, tmp, ndigits);
+
+ if (carry < 0) {
+ do {
+ carry += vli_add(result, result, curve_prime, ndigits);
+ } while (carry < 0);
+ } else {
+ while (carry || vli_cmp(curve_prime, result, ndigits) != 1)
+ carry -= vli_sub(result, result, curve_prime, ndigits);
+ }
+
+}
+
+#undef SL32OR32
+#undef AND64H
+#undef AND64L
+
+/*
+ * Computes result = product % curve_prime
+ * from "Recommendations for Discrete Logarithm-Based Cryptography:
+ * Elliptic Curve Domain Parameters" section G.1.4
+ */
+static void vli_mmod_fast_521(u64 *result, const u64 *product,
+ const u64 *curve_prime, u64 *tmp)
+{
+ const unsigned int ndigits = ECC_CURVE_NIST_P521_DIGITS;
+ size_t i;
+
+ /* Initialize result with lowest 521 bits from product */
+ vli_set(result, product, ndigits);
+ result[8] &= 0x1ff;
+
+ for (i = 0; i < ndigits; i++)
+ tmp[i] = (product[8 + i] >> 9) | (product[9 + i] << 55);
+ tmp[8] &= 0x1ff;
+
+ vli_mod_add(result, result, tmp, curve_prime, ndigits);
+}
+
+/* Computes result = product % curve_prime for different curve_primes.
+ *
+ * Note that curve_primes are distinguished just by heuristic check and
+ * not by complete conformance check.
+ */
+static bool vli_mmod_fast(u64 *result, u64 *product,
+ const struct ecc_curve *curve)
+{
+ u64 tmp[2 * ECC_MAX_DIGITS];
+ const u64 *curve_prime = curve->p;
+ const unsigned int ndigits = curve->g.ndigits;
+
+ /* All NIST curves have name prefix 'nist_' */
+ if (strncmp(curve->name, "nist_", 5) != 0) {
+ /* Try to handle Pseudo-Marsenne primes. */
+ if (curve_prime[ndigits - 1] == -1ull) {
+ vli_mmod_special(result, product, curve_prime,
+ ndigits);
+ return true;
+ } else if (curve_prime[ndigits - 1] == 1ull << 63 &&
+ curve_prime[ndigits - 2] == 0) {
+ vli_mmod_special2(result, product, curve_prime,
+ ndigits);
+ return true;
+ }
+ vli_mmod_barrett(result, product, curve_prime, ndigits);
+ return true;
+ }
+
+ switch (ndigits) {
+ case ECC_CURVE_NIST_P192_DIGITS:
+ vli_mmod_fast_192(result, product, curve_prime, tmp);
+ break;
+ case ECC_CURVE_NIST_P256_DIGITS:
+ vli_mmod_fast_256(result, product, curve_prime, tmp);
+ break;
+ case ECC_CURVE_NIST_P384_DIGITS:
+ vli_mmod_fast_384(result, product, curve_prime, tmp);
+ break;
+ case ECC_CURVE_NIST_P521_DIGITS:
+ vli_mmod_fast_521(result, product, curve_prime, tmp);
+ break;
+ default:
+ pr_err("ecc: unsupported digits size!\n");
+ return false;
+ }
+
+ return true;
+}
+
+/* Computes result = (left * right) % mod.
+ * Assumes that mod is big enough curve order.
+ */
+void vli_mod_mult_slow(u64 *result, const u64 *left, const u64 *right,
+ const u64 *mod, unsigned int ndigits)
+{
+ u64 product[ECC_MAX_DIGITS * 2];
+
+ vli_mult(product, left, right, ndigits);
+ vli_mmod_slow(result, product, mod, ndigits);
+}
+EXPORT_SYMBOL(vli_mod_mult_slow);
+
+/* Computes result = (left * right) % curve_prime. */
+static void vli_mod_mult_fast(u64 *result, const u64 *left, const u64 *right,
+ const struct ecc_curve *curve)
+{
+ u64 product[2 * ECC_MAX_DIGITS];
+
+ vli_mult(product, left, right, curve->g.ndigits);
+ vli_mmod_fast(result, product, curve);
+}
+
+/* Computes result = left^2 % curve_prime. */
+static void vli_mod_square_fast(u64 *result, const u64 *left,
+ const struct ecc_curve *curve)
+{
+ u64 product[2 * ECC_MAX_DIGITS];
+
+ vli_square(product, left, curve->g.ndigits);
+ vli_mmod_fast(result, product, curve);
+}
+
+#define EVEN(vli) (!(vli[0] & 1))
+/* Computes result = (1 / p_input) % mod. All VLIs are the same size.
+ * See "From Euclid's GCD to Montgomery Multiplication to the Great Divide"
+ * https://labs.oracle.com/techrep/2001/smli_tr-2001-95.pdf
+ */
+void vli_mod_inv(u64 *result, const u64 *input, const u64 *mod,
+ unsigned int ndigits)
+{
+ u64 a[ECC_MAX_DIGITS], b[ECC_MAX_DIGITS];
+ u64 u[ECC_MAX_DIGITS], v[ECC_MAX_DIGITS];
+ u64 carry;
+ int cmp_result;
+
+ if (vli_is_zero(input, ndigits)) {
+ vli_clear(result, ndigits);
+ return;
+ }
+
+ vli_set(a, input, ndigits);
+ vli_set(b, mod, ndigits);
+ vli_clear(u, ndigits);
+ u[0] = 1;
+ vli_clear(v, ndigits);
+
+ while ((cmp_result = vli_cmp(a, b, ndigits)) != 0) {
+ carry = 0;
+
+ if (EVEN(a)) {
+ vli_rshift1(a, ndigits);
+
+ if (!EVEN(u))
+ carry = vli_add(u, u, mod, ndigits);
+
+ vli_rshift1(u, ndigits);
+ if (carry)
+ u[ndigits - 1] |= 0x8000000000000000ull;
+ } else if (EVEN(b)) {
+ vli_rshift1(b, ndigits);
+
+ if (!EVEN(v))
+ carry = vli_add(v, v, mod, ndigits);
+
+ vli_rshift1(v, ndigits);
+ if (carry)
+ v[ndigits - 1] |= 0x8000000000000000ull;
+ } else if (cmp_result > 0) {
+ vli_sub(a, a, b, ndigits);
+ vli_rshift1(a, ndigits);
+
+ if (vli_cmp(u, v, ndigits) < 0)
+ vli_add(u, u, mod, ndigits);
+
+ vli_sub(u, u, v, ndigits);
+ if (!EVEN(u))
+ carry = vli_add(u, u, mod, ndigits);
+
+ vli_rshift1(u, ndigits);
+ if (carry)
+ u[ndigits - 1] |= 0x8000000000000000ull;
+ } else {
+ vli_sub(b, b, a, ndigits);
+ vli_rshift1(b, ndigits);
+
+ if (vli_cmp(v, u, ndigits) < 0)
+ vli_add(v, v, mod, ndigits);
+
+ vli_sub(v, v, u, ndigits);
+ if (!EVEN(v))
+ carry = vli_add(v, v, mod, ndigits);
+
+ vli_rshift1(v, ndigits);
+ if (carry)
+ v[ndigits - 1] |= 0x8000000000000000ull;
+ }
+ }
+
+ vli_set(result, u, ndigits);
+}
+EXPORT_SYMBOL(vli_mod_inv);
+
+/* ------ Point operations ------ */
+
+/* Returns true if p_point is the point at infinity, false otherwise. */
+bool ecc_point_is_zero(const struct ecc_point *point)
+{
+ return (vli_is_zero(point->x, point->ndigits) &&
+ vli_is_zero(point->y, point->ndigits));
+}
+EXPORT_SYMBOL(ecc_point_is_zero);
+
+/* Point multiplication algorithm using Montgomery's ladder with co-Z
+ * coordinates. From https://eprint.iacr.org/2011/338.pdf
+ */
+
+/* Double in place */
+static void ecc_point_double_jacobian(u64 *x1, u64 *y1, u64 *z1,
+ const struct ecc_curve *curve)
+{
+ /* t1 = x, t2 = y, t3 = z */
+ u64 t4[ECC_MAX_DIGITS];
+ u64 t5[ECC_MAX_DIGITS];
+ const u64 *curve_prime = curve->p;
+ const unsigned int ndigits = curve->g.ndigits;
+
+ if (vli_is_zero(z1, ndigits))
+ return;
+
+ /* t4 = y1^2 */
+ vli_mod_square_fast(t4, y1, curve);
+ /* t5 = x1*y1^2 = A */
+ vli_mod_mult_fast(t5, x1, t4, curve);
+ /* t4 = y1^4 */
+ vli_mod_square_fast(t4, t4, curve);
+ /* t2 = y1*z1 = z3 */
+ vli_mod_mult_fast(y1, y1, z1, curve);
+ /* t3 = z1^2 */
+ vli_mod_square_fast(z1, z1, curve);
+
+ /* t1 = x1 + z1^2 */
+ vli_mod_add(x1, x1, z1, curve_prime, ndigits);
+ /* t3 = 2*z1^2 */
+ vli_mod_add(z1, z1, z1, curve_prime, ndigits);
+ /* t3 = x1 - z1^2 */
+ vli_mod_sub(z1, x1, z1, curve_prime, ndigits);
+ /* t1 = x1^2 - z1^4 */
+ vli_mod_mult_fast(x1, x1, z1, curve);
+
+ /* t3 = 2*(x1^2 - z1^4) */
+ vli_mod_add(z1, x1, x1, curve_prime, ndigits);
+ /* t1 = 3*(x1^2 - z1^4) */
+ vli_mod_add(x1, x1, z1, curve_prime, ndigits);
+ if (vli_test_bit(x1, 0)) {
+ u64 carry = vli_add(x1, x1, curve_prime, ndigits);
+
+ vli_rshift1(x1, ndigits);
+ x1[ndigits - 1] |= carry << 63;
+ } else {
+ vli_rshift1(x1, ndigits);
+ }
+ /* t1 = 3/2*(x1^2 - z1^4) = B */
+
+ /* t3 = B^2 */
+ vli_mod_square_fast(z1, x1, curve);
+ /* t3 = B^2 - A */
+ vli_mod_sub(z1, z1, t5, curve_prime, ndigits);
+ /* t3 = B^2 - 2A = x3 */
+ vli_mod_sub(z1, z1, t5, curve_prime, ndigits);
+ /* t5 = A - x3 */
+ vli_mod_sub(t5, t5, z1, curve_prime, ndigits);
+ /* t1 = B * (A - x3) */
+ vli_mod_mult_fast(x1, x1, t5, curve);
+ /* t4 = B * (A - x3) - y1^4 = y3 */
+ vli_mod_sub(t4, x1, t4, curve_prime, ndigits);
+
+ vli_set(x1, z1, ndigits);
+ vli_set(z1, y1, ndigits);
+ vli_set(y1, t4, ndigits);
+}
+
+/* Modify (x1, y1) => (x1 * z^2, y1 * z^3) */
+static void apply_z(u64 *x1, u64 *y1, u64 *z, const struct ecc_curve *curve)
+{
+ u64 t1[ECC_MAX_DIGITS];
+
+ vli_mod_square_fast(t1, z, curve); /* z^2 */
+ vli_mod_mult_fast(x1, x1, t1, curve); /* x1 * z^2 */
+ vli_mod_mult_fast(t1, t1, z, curve); /* z^3 */
+ vli_mod_mult_fast(y1, y1, t1, curve); /* y1 * z^3 */
+}
+
+/* P = (x1, y1) => 2P, (x2, y2) => P' */
+static void xycz_initial_double(u64 *x1, u64 *y1, u64 *x2, u64 *y2,
+ u64 *p_initial_z, const struct ecc_curve *curve)
+{
+ u64 z[ECC_MAX_DIGITS];
+ const unsigned int ndigits = curve->g.ndigits;
+
+ vli_set(x2, x1, ndigits);
+ vli_set(y2, y1, ndigits);
+
+ vli_clear(z, ndigits);
+ z[0] = 1;
+
+ if (p_initial_z)
+ vli_set(z, p_initial_z, ndigits);
+
+ apply_z(x1, y1, z, curve);
+
+ ecc_point_double_jacobian(x1, y1, z, curve);
+
+ apply_z(x2, y2, z, curve);
+}
+
+/* Input P = (x1, y1, Z), Q = (x2, y2, Z)
+ * Output P' = (x1', y1', Z3), P + Q = (x3, y3, Z3)
+ * or P => P', Q => P + Q
+ */
+static void xycz_add(u64 *x1, u64 *y1, u64 *x2, u64 *y2,
+ const struct ecc_curve *curve)
+{
+ /* t1 = X1, t2 = Y1, t3 = X2, t4 = Y2 */
+ u64 t5[ECC_MAX_DIGITS];
+ const u64 *curve_prime = curve->p;
+ const unsigned int ndigits = curve->g.ndigits;
+
+ /* t5 = x2 - x1 */
+ vli_mod_sub(t5, x2, x1, curve_prime, ndigits);
+ /* t5 = (x2 - x1)^2 = A */
+ vli_mod_square_fast(t5, t5, curve);
+ /* t1 = x1*A = B */
+ vli_mod_mult_fast(x1, x1, t5, curve);
+ /* t3 = x2*A = C */
+ vli_mod_mult_fast(x2, x2, t5, curve);
+ /* t4 = y2 - y1 */
+ vli_mod_sub(y2, y2, y1, curve_prime, ndigits);
+ /* t5 = (y2 - y1)^2 = D */
+ vli_mod_square_fast(t5, y2, curve);
+
+ /* t5 = D - B */
+ vli_mod_sub(t5, t5, x1, curve_prime, ndigits);
+ /* t5 = D - B - C = x3 */
+ vli_mod_sub(t5, t5, x2, curve_prime, ndigits);
+ /* t3 = C - B */
+ vli_mod_sub(x2, x2, x1, curve_prime, ndigits);
+ /* t2 = y1*(C - B) */
+ vli_mod_mult_fast(y1, y1, x2, curve);
+ /* t3 = B - x3 */
+ vli_mod_sub(x2, x1, t5, curve_prime, ndigits);
+ /* t4 = (y2 - y1)*(B - x3) */
+ vli_mod_mult_fast(y2, y2, x2, curve);
+ /* t4 = y3 */
+ vli_mod_sub(y2, y2, y1, curve_prime, ndigits);
+
+ vli_set(x2, t5, ndigits);
+}
+
+/* Input P = (x1, y1, Z), Q = (x2, y2, Z)
+ * Output P + Q = (x3, y3, Z3), P - Q = (x3', y3', Z3)
+ * or P => P - Q, Q => P + Q
+ */
+static void xycz_add_c(u64 *x1, u64 *y1, u64 *x2, u64 *y2,
+ const struct ecc_curve *curve)
+{
+ /* t1 = X1, t2 = Y1, t3 = X2, t4 = Y2 */
+ u64 t5[ECC_MAX_DIGITS];
+ u64 t6[ECC_MAX_DIGITS];
+ u64 t7[ECC_MAX_DIGITS];
+ const u64 *curve_prime = curve->p;
+ const unsigned int ndigits = curve->g.ndigits;
+
+ /* t5 = x2 - x1 */
+ vli_mod_sub(t5, x2, x1, curve_prime, ndigits);
+ /* t5 = (x2 - x1)^2 = A */
+ vli_mod_square_fast(t5, t5, curve);
+ /* t1 = x1*A = B */
+ vli_mod_mult_fast(x1, x1, t5, curve);
+ /* t3 = x2*A = C */
+ vli_mod_mult_fast(x2, x2, t5, curve);
+ /* t4 = y2 + y1 */
+ vli_mod_add(t5, y2, y1, curve_prime, ndigits);
+ /* t4 = y2 - y1 */
+ vli_mod_sub(y2, y2, y1, curve_prime, ndigits);
+
+ /* t6 = C - B */
+ vli_mod_sub(t6, x2, x1, curve_prime, ndigits);
+ /* t2 = y1 * (C - B) */
+ vli_mod_mult_fast(y1, y1, t6, curve);
+ /* t6 = B + C */
+ vli_mod_add(t6, x1, x2, curve_prime, ndigits);
+ /* t3 = (y2 - y1)^2 */
+ vli_mod_square_fast(x2, y2, curve);
+ /* t3 = x3 */
+ vli_mod_sub(x2, x2, t6, curve_prime, ndigits);
+
+ /* t7 = B - x3 */
+ vli_mod_sub(t7, x1, x2, curve_prime, ndigits);
+ /* t4 = (y2 - y1)*(B - x3) */
+ vli_mod_mult_fast(y2, y2, t7, curve);
+ /* t4 = y3 */
+ vli_mod_sub(y2, y2, y1, curve_prime, ndigits);
+
+ /* t7 = (y2 + y1)^2 = F */
+ vli_mod_square_fast(t7, t5, curve);
+ /* t7 = x3' */
+ vli_mod_sub(t7, t7, t6, curve_prime, ndigits);
+ /* t6 = x3' - B */
+ vli_mod_sub(t6, t7, x1, curve_prime, ndigits);
+ /* t6 = (y2 + y1)*(x3' - B) */
+ vli_mod_mult_fast(t6, t6, t5, curve);
+ /* t2 = y3' */
+ vli_mod_sub(y1, t6, y1, curve_prime, ndigits);
+
+ vli_set(x1, t7, ndigits);
+}
+
+static void ecc_point_mult(struct ecc_point *result,
+ const struct ecc_point *point, const u64 *scalar,
+ u64 *initial_z, const struct ecc_curve *curve,
+ unsigned int ndigits)
+{
+ /* R0 and R1 */
+ u64 rx[2][ECC_MAX_DIGITS];
+ u64 ry[2][ECC_MAX_DIGITS];
+ u64 z[ECC_MAX_DIGITS];
+ u64 sk[2][ECC_MAX_DIGITS];
+ u64 *curve_prime = curve->p;
+ int i, nb;
+ int num_bits;
+ int carry;
+
+ carry = vli_add(sk[0], scalar, curve->n, ndigits);
+ vli_add(sk[1], sk[0], curve->n, ndigits);
+ scalar = sk[!carry];
+ if (curve->nbits == 521) /* NIST P521 */
+ num_bits = curve->nbits + 2;
+ else
+ num_bits = sizeof(u64) * ndigits * 8 + 1;
+
+ vli_set(rx[1], point->x, ndigits);
+ vli_set(ry[1], point->y, ndigits);
+
+ xycz_initial_double(rx[1], ry[1], rx[0], ry[0], initial_z, curve);
+
+ for (i = num_bits - 2; i > 0; i--) {
+ nb = !vli_test_bit(scalar, i);
+ xycz_add_c(rx[1 - nb], ry[1 - nb], rx[nb], ry[nb], curve);
+ xycz_add(rx[nb], ry[nb], rx[1 - nb], ry[1 - nb], curve);
+ }
+
+ nb = !vli_test_bit(scalar, 0);
+ xycz_add_c(rx[1 - nb], ry[1 - nb], rx[nb], ry[nb], curve);
+
+ /* Find final 1/Z value. */
+ /* X1 - X0 */
+ vli_mod_sub(z, rx[1], rx[0], curve_prime, ndigits);
+ /* Yb * (X1 - X0) */
+ vli_mod_mult_fast(z, z, ry[1 - nb], curve);
+ /* xP * Yb * (X1 - X0) */
+ vli_mod_mult_fast(z, z, point->x, curve);
+
+ /* 1 / (xP * Yb * (X1 - X0)) */
+ vli_mod_inv(z, z, curve_prime, point->ndigits);
+
+ /* yP / (xP * Yb * (X1 - X0)) */
+ vli_mod_mult_fast(z, z, point->y, curve);
+ /* Xb * yP / (xP * Yb * (X1 - X0)) */
+ vli_mod_mult_fast(z, z, rx[1 - nb], curve);
+ /* End 1/Z calculation */
+
+ xycz_add(rx[nb], ry[nb], rx[1 - nb], ry[1 - nb], curve);
+
+ apply_z(rx[0], ry[0], z, curve);
+
+ vli_set(result->x, rx[0], ndigits);
+ vli_set(result->y, ry[0], ndigits);
+}
+
+/* Computes R = P + Q mod p */
+static void ecc_point_add(const struct ecc_point *result,
+ const struct ecc_point *p, const struct ecc_point *q,
+ const struct ecc_curve *curve)
+{
+ u64 z[ECC_MAX_DIGITS];
+ u64 px[ECC_MAX_DIGITS];
+ u64 py[ECC_MAX_DIGITS];
+ unsigned int ndigits = curve->g.ndigits;
+
+ vli_set(result->x, q->x, ndigits);
+ vli_set(result->y, q->y, ndigits);
+ vli_mod_sub(z, result->x, p->x, curve->p, ndigits);
+ vli_set(px, p->x, ndigits);
+ vli_set(py, p->y, ndigits);
+ xycz_add(px, py, result->x, result->y, curve);
+ vli_mod_inv(z, z, curve->p, ndigits);
+ apply_z(result->x, result->y, z, curve);
+}
+
+/* Computes R = u1P + u2Q mod p using Shamir's trick.
+ * Based on: Kenneth MacKay's micro-ecc (2014).
+ */
+void ecc_point_mult_shamir(const struct ecc_point *result,
+ const u64 *u1, const struct ecc_point *p,
+ const u64 *u2, const struct ecc_point *q,
+ const struct ecc_curve *curve)
+{
+ u64 z[ECC_MAX_DIGITS];
+ u64 sump[2][ECC_MAX_DIGITS];
+ u64 *rx = result->x;
+ u64 *ry = result->y;
+ unsigned int ndigits = curve->g.ndigits;
+ unsigned int num_bits;
+ struct ecc_point sum = ECC_POINT_INIT(sump[0], sump[1], ndigits);
+ const struct ecc_point *points[4];
+ const struct ecc_point *point;
+ unsigned int idx;
+ int i;
+
+ ecc_point_add(&sum, p, q, curve);
+ points[0] = NULL;
+ points[1] = p;
+ points[2] = q;
+ points[3] = ∑
+
+ num_bits = max(vli_num_bits(u1, ndigits), vli_num_bits(u2, ndigits));
+ i = num_bits - 1;
+ idx = !!vli_test_bit(u1, i);
+ idx |= (!!vli_test_bit(u2, i)) << 1;
+ point = points[idx];
+
+ vli_set(rx, point->x, ndigits);
+ vli_set(ry, point->y, ndigits);
+ vli_clear(z + 1, ndigits - 1);
+ z[0] = 1;
+
+ for (--i; i >= 0; i--) {
+ ecc_point_double_jacobian(rx, ry, z, curve);
+ idx = !!vli_test_bit(u1, i);
+ idx |= (!!vli_test_bit(u2, i)) << 1;
+ point = points[idx];
+ if (point) {
+ u64 tx[ECC_MAX_DIGITS];
+ u64 ty[ECC_MAX_DIGITS];
+ u64 tz[ECC_MAX_DIGITS];
+
+ vli_set(tx, point->x, ndigits);
+ vli_set(ty, point->y, ndigits);
+ apply_z(tx, ty, z, curve);
+ vli_mod_sub(tz, rx, tx, curve->p, ndigits);
+ xycz_add(tx, ty, rx, ry, curve);
+ vli_mod_mult_fast(z, z, tz, curve);
+ }
+ }
+ vli_mod_inv(z, z, curve->p, ndigits);
+ apply_z(rx, ry, z, curve);
+}
+EXPORT_SYMBOL(ecc_point_mult_shamir);
+
+/*
+ * This function performs checks equivalent to Appendix A.4.2 of FIPS 186-5.
+ * Whereas A.4.2 results in an integer in the interval [1, n-1], this function
+ * ensures that the integer is in the range of [2, n-3]. We are slightly
+ * stricter because of the currently used scalar multiplication algorithm.
+ */
+static int __ecc_is_key_valid(const struct ecc_curve *curve,
+ const u64 *private_key, unsigned int ndigits)
+{
+ u64 one[ECC_MAX_DIGITS] = { 1, };
+ u64 res[ECC_MAX_DIGITS];
+
+ if (!private_key)
+ return -EINVAL;
+
+ if (curve->g.ndigits != ndigits)
+ return -EINVAL;
+
+ /* Make sure the private key is in the range [2, n-3]. */
+ if (vli_cmp(one, private_key, ndigits) != -1)
+ return -EINVAL;
+ vli_sub(res, curve->n, one, ndigits);
+ vli_sub(res, res, one, ndigits);
+ if (vli_cmp(res, private_key, ndigits) != 1)
+ return -EINVAL;
+
+ return 0;
+}
+
+int ecc_is_key_valid(unsigned int curve_id, unsigned int ndigits,
+ const u64 *private_key, unsigned int private_key_len)
+{
+ int nbytes;
+ const struct ecc_curve *curve = ecc_get_curve(curve_id);
+
+ nbytes = ndigits << ECC_DIGITS_TO_BYTES_SHIFT;
+
+ if (private_key_len != nbytes)
+ return -EINVAL;
+
+ return __ecc_is_key_valid(curve, private_key, ndigits);
+}
+EXPORT_SYMBOL(ecc_is_key_valid);
+
+int ecc_make_pub_key(unsigned int curve_id, unsigned int ndigits,
+ const u64 *private_key, u64 *public_key)
+{
+ int ret = 0;
+ struct ecc_point *pk;
+ const struct ecc_curve *curve = ecc_get_curve(curve_id);
+
+ if (!private_key) {
+ ret = -EINVAL;
+ goto out;
+ }
+
+ pk = ecc_alloc_point(ndigits);
+ if (!pk) {
+ ret = -ENOMEM;
+ goto out;
+ }
+
+ ecc_point_mult(pk, &curve->g, private_key, NULL, curve, ndigits);
+
+ /* SP800-56A rev 3 5.6.2.1.3 key check */
+ if (ecc_is_pubkey_valid_full(curve, pk)) {
+ ret = -EAGAIN;
+ goto err_free_point;
+ }
+
+ ecc_swap_digits(pk->x, public_key, ndigits);
+ ecc_swap_digits(pk->y, &public_key[ndigits], ndigits);
+
+err_free_point:
+ ecc_free_point(pk);
+out:
+ return ret;
+}
+EXPORT_SYMBOL(ecc_make_pub_key);
+
+/* SP800-56A section 5.6.2.3.4 partial verification: ephemeral keys only */
+int ecc_is_pubkey_valid_partial(const struct ecc_curve *curve,
+ struct ecc_point *pk)
+{
+ u64 yy[ECC_MAX_DIGITS], xxx[ECC_MAX_DIGITS], w[ECC_MAX_DIGITS];
+
+ if (WARN_ON(pk->ndigits != curve->g.ndigits))
+ return -EINVAL;
+
+ /* Check 1: Verify key is not the zero point. */
+ if (ecc_point_is_zero(pk))
+ return -EINVAL;
+
+ /* Check 2: Verify key is in the range [1, p-1]. */
+ if (vli_cmp(curve->p, pk->x, pk->ndigits) != 1)
+ return -EINVAL;
+ if (vli_cmp(curve->p, pk->y, pk->ndigits) != 1)
+ return -EINVAL;
+
+ /* Check 3: Verify that y^2 == (x^3 + a·x + b) mod p */
+ vli_mod_square_fast(yy, pk->y, curve); /* y^2 */
+ vli_mod_square_fast(xxx, pk->x, curve); /* x^2 */
+ vli_mod_mult_fast(xxx, xxx, pk->x, curve); /* x^3 */
+ vli_mod_mult_fast(w, curve->a, pk->x, curve); /* a·x */
+ vli_mod_add(w, w, curve->b, curve->p, pk->ndigits); /* a·x + b */
+ vli_mod_add(w, w, xxx, curve->p, pk->ndigits); /* x^3 + a·x + b */
+ if (vli_cmp(yy, w, pk->ndigits) != 0) /* Equation */
+ return -EINVAL;
+
+ return 0;
+}
+EXPORT_SYMBOL(ecc_is_pubkey_valid_partial);
+
+/* SP800-56A section 5.6.2.3.3 full verification */
+int ecc_is_pubkey_valid_full(const struct ecc_curve *curve,
+ struct ecc_point *pk)
+{
+ struct ecc_point *nQ;
+
+ /* Checks 1 through 3 */
+ int ret = ecc_is_pubkey_valid_partial(curve, pk);
+
+ if (ret)
+ return ret;
+
+ /* Check 4: Verify that nQ is the zero point. */
+ nQ = ecc_alloc_point(pk->ndigits);
+ if (!nQ)
+ return -ENOMEM;
+
+ ecc_point_mult(nQ, pk, curve->n, NULL, curve, pk->ndigits);
+ if (!ecc_point_is_zero(nQ))
+ ret = -EINVAL;
+
+ ecc_free_point(nQ);
+
+ return ret;
+}
+EXPORT_SYMBOL(ecc_is_pubkey_valid_full);
+
+int crypto_ecdh_shared_secret(unsigned int curve_id, unsigned int ndigits,
+ const u64 *private_key, const u64 *public_key,
+ u64 *secret)
+{
+ int ret = 0;
+ struct ecc_point *product, *pk;
+ u64 rand_z[ECC_MAX_DIGITS];
+ unsigned int nbytes;
+ const struct ecc_curve *curve = ecc_get_curve(curve_id);
+
+ if (!private_key || !public_key || ndigits > ARRAY_SIZE(rand_z)) {
+ ret = -EINVAL;
+ goto out;
+ }
+
+ nbytes = ndigits << ECC_DIGITS_TO_BYTES_SHIFT;
+
+ get_random_bytes(rand_z, nbytes);
+
+ pk = ecc_alloc_point(ndigits);
+ if (!pk) {
+ ret = -ENOMEM;
+ goto out;
+ }
+
+ ecc_swap_digits(public_key, pk->x, ndigits);
+ ecc_swap_digits(&public_key[ndigits], pk->y, ndigits);
+ ret = ecc_is_pubkey_valid_partial(curve, pk);
+ if (ret)
+ goto err_alloc_product;
+
+ product = ecc_alloc_point(ndigits);
+ if (!product) {
+ ret = -ENOMEM;
+ goto err_alloc_product;
+ }
+
+ ecc_point_mult(product, pk, private_key, rand_z, curve, ndigits);
+
+ if (ecc_point_is_zero(product)) {
+ ret = -EFAULT;
+ goto err_validity;
+ }
+
+ ecc_swap_digits(product->x, secret, ndigits);
+
+err_validity:
+ memzero_explicit(rand_z, sizeof(rand_z));
+ ecc_free_point(product);
+err_alloc_product:
+ ecc_free_point(pk);
+out:
+ return ret;
+}
+EXPORT_SYMBOL(crypto_ecdh_shared_secret);
+
+MODULE_LICENSE("Dual BSD/GPL");
diff --git a/crypto/ecc_curve_defs.h b/crypto/ecc_curve_defs.h
new file mode 100644
index 0000000000..0ecade7d02
--- /dev/null
+++ b/crypto/ecc_curve_defs.h
@@ -0,0 +1,155 @@
+/* SPDX-License-Identifier: GPL-2.0 */
+#ifndef _CRYTO_ECC_CURVE_DEFS_H
+#define _CRYTO_ECC_CURVE_DEFS_H
+
+/* NIST P-192: a = p - 3 */
+static u64 nist_p192_g_x[] = { 0xF4FF0AFD82FF1012ull, 0x7CBF20EB43A18800ull,
+ 0x188DA80EB03090F6ull };
+static u64 nist_p192_g_y[] = { 0x73F977A11E794811ull, 0x631011ED6B24CDD5ull,
+ 0x07192B95FFC8DA78ull };
+static u64 nist_p192_p[] = { 0xFFFFFFFFFFFFFFFFull, 0xFFFFFFFFFFFFFFFEull,
+ 0xFFFFFFFFFFFFFFFFull };
+static u64 nist_p192_n[] = { 0x146BC9B1B4D22831ull, 0xFFFFFFFF99DEF836ull,
+ 0xFFFFFFFFFFFFFFFFull };
+static u64 nist_p192_a[] = { 0xFFFFFFFFFFFFFFFCull, 0xFFFFFFFFFFFFFFFEull,
+ 0xFFFFFFFFFFFFFFFFull };
+static u64 nist_p192_b[] = { 0xFEB8DEECC146B9B1ull, 0x0FA7E9AB72243049ull,
+ 0x64210519E59C80E7ull };
+static struct ecc_curve nist_p192 = {
+ .name = "nist_192",
+ .nbits = 192,
+ .g = {
+ .x = nist_p192_g_x,
+ .y = nist_p192_g_y,
+ .ndigits = 3,
+ },
+ .p = nist_p192_p,
+ .n = nist_p192_n,
+ .a = nist_p192_a,
+ .b = nist_p192_b
+};
+
+/* NIST P-256: a = p - 3 */
+static u64 nist_p256_g_x[] = { 0xF4A13945D898C296ull, 0x77037D812DEB33A0ull,
+ 0xF8BCE6E563A440F2ull, 0x6B17D1F2E12C4247ull };
+static u64 nist_p256_g_y[] = { 0xCBB6406837BF51F5ull, 0x2BCE33576B315ECEull,
+ 0x8EE7EB4A7C0F9E16ull, 0x4FE342E2FE1A7F9Bull };
+static u64 nist_p256_p[] = { 0xFFFFFFFFFFFFFFFFull, 0x00000000FFFFFFFFull,
+ 0x0000000000000000ull, 0xFFFFFFFF00000001ull };
+static u64 nist_p256_n[] = { 0xF3B9CAC2FC632551ull, 0xBCE6FAADA7179E84ull,
+ 0xFFFFFFFFFFFFFFFFull, 0xFFFFFFFF00000000ull };
+static u64 nist_p256_a[] = { 0xFFFFFFFFFFFFFFFCull, 0x00000000FFFFFFFFull,
+ 0x0000000000000000ull, 0xFFFFFFFF00000001ull };
+static u64 nist_p256_b[] = { 0x3BCE3C3E27D2604Bull, 0x651D06B0CC53B0F6ull,
+ 0xB3EBBD55769886BCull, 0x5AC635D8AA3A93E7ull };
+static struct ecc_curve nist_p256 = {
+ .name = "nist_256",
+ .nbits = 256,
+ .g = {
+ .x = nist_p256_g_x,
+ .y = nist_p256_g_y,
+ .ndigits = 4,
+ },
+ .p = nist_p256_p,
+ .n = nist_p256_n,
+ .a = nist_p256_a,
+ .b = nist_p256_b
+};
+
+/* NIST P-384 */
+static u64 nist_p384_g_x[] = { 0x3A545E3872760AB7ull, 0x5502F25DBF55296Cull,
+ 0x59F741E082542A38ull, 0x6E1D3B628BA79B98ull,
+ 0x8Eb1C71EF320AD74ull, 0xAA87CA22BE8B0537ull };
+static u64 nist_p384_g_y[] = { 0x7A431D7C90EA0E5Full, 0x0A60B1CE1D7E819Dull,
+ 0xE9DA3113B5F0B8C0ull, 0xF8F41DBD289A147Cull,
+ 0x5D9E98BF9292DC29ull, 0x3617DE4A96262C6Full };
+static u64 nist_p384_p[] = { 0x00000000FFFFFFFFull, 0xFFFFFFFF00000000ull,
+ 0xFFFFFFFFFFFFFFFEull, 0xFFFFFFFFFFFFFFFFull,
+ 0xFFFFFFFFFFFFFFFFull, 0xFFFFFFFFFFFFFFFFull };
+static u64 nist_p384_n[] = { 0xECEC196ACCC52973ull, 0x581A0DB248B0A77Aull,
+ 0xC7634D81F4372DDFull, 0xFFFFFFFFFFFFFFFFull,
+ 0xFFFFFFFFFFFFFFFFull, 0xFFFFFFFFFFFFFFFFull };
+static u64 nist_p384_a[] = { 0x00000000FFFFFFFCull, 0xFFFFFFFF00000000ull,
+ 0xFFFFFFFFFFFFFFFEull, 0xFFFFFFFFFFFFFFFFull,
+ 0xFFFFFFFFFFFFFFFFull, 0xFFFFFFFFFFFFFFFFull };
+static u64 nist_p384_b[] = { 0x2a85c8edd3ec2aefull, 0xc656398d8a2ed19dull,
+ 0x0314088f5013875aull, 0x181d9c6efe814112ull,
+ 0x988e056be3f82d19ull, 0xb3312fa7e23ee7e4ull };
+static struct ecc_curve nist_p384 = {
+ .name = "nist_384",
+ .nbits = 384,
+ .g = {
+ .x = nist_p384_g_x,
+ .y = nist_p384_g_y,
+ .ndigits = 6,
+ },
+ .p = nist_p384_p,
+ .n = nist_p384_n,
+ .a = nist_p384_a,
+ .b = nist_p384_b
+};
+
+/* NIST P-521 */
+static u64 nist_p521_g_x[] = { 0xf97e7e31c2e5bd66ull, 0x3348b3c1856a429bull,
+ 0xfe1dc127a2ffa8deull, 0xa14b5e77efe75928ull,
+ 0xf828af606b4d3dbaull, 0x9c648139053fb521ull,
+ 0x9e3ecb662395b442ull, 0x858e06b70404e9cdull,
+ 0xc6ull };
+static u64 nist_p521_g_y[] = { 0x88be94769fd16650ull, 0x353c7086a272c240ull,
+ 0xc550b9013fad0761ull, 0x97ee72995ef42640ull,
+ 0x17afbd17273e662cull, 0x98f54449579b4468ull,
+ 0x5c8a5fb42c7d1bd9ull, 0x39296a789a3bc004ull,
+ 0x118ull };
+static u64 nist_p521_p[] = { 0xffffffffffffffffull, 0xffffffffffffffffull,
+ 0xffffffffffffffffull, 0xffffffffffffffffull,
+ 0xffffffffffffffffull, 0xffffffffffffffffull,
+ 0xffffffffffffffffull, 0xffffffffffffffffull,
+ 0x1ffull };
+static u64 nist_p521_n[] = { 0xbb6fb71e91386409ull, 0x3bb5c9b8899c47aeull,
+ 0x7fcc0148f709a5d0ull, 0x51868783bf2f966bull,
+ 0xfffffffffffffffaull, 0xffffffffffffffffull,
+ 0xffffffffffffffffull, 0xffffffffffffffffull,
+ 0x1ffull };
+static u64 nist_p521_a[] = { 0xfffffffffffffffcull, 0xffffffffffffffffull,
+ 0xffffffffffffffffull, 0xffffffffffffffffull,
+ 0xffffffffffffffffull, 0xffffffffffffffffull,
+ 0xffffffffffffffffull, 0xffffffffffffffffull,
+ 0x1ffull };
+static u64 nist_p521_b[] = { 0xef451fd46b503f00ull, 0x3573df883d2c34f1ull,
+ 0x1652c0bd3bb1bf07ull, 0x56193951ec7e937bull,
+ 0xb8b489918ef109e1ull, 0xa2da725b99b315f3ull,
+ 0x929a21a0b68540eeull, 0x953eb9618e1c9a1full,
+ 0x051ull };
+static struct ecc_curve nist_p521 = {
+ .name = "nist_521",
+ .nbits = 521,
+ .g = {
+ .x = nist_p521_g_x,
+ .y = nist_p521_g_y,
+ .ndigits = 9,
+ },
+ .p = nist_p521_p,
+ .n = nist_p521_n,
+ .a = nist_p521_a,
+ .b = nist_p521_b
+};
+
+/* curve25519 */
+static u64 curve25519_g_x[] = { 0x0000000000000009, 0x0000000000000000,
+ 0x0000000000000000, 0x0000000000000000 };
+static u64 curve25519_p[] = { 0xffffffffffffffed, 0xffffffffffffffff,
+ 0xffffffffffffffff, 0x7fffffffffffffff };
+static u64 curve25519_a[] = { 0x000000000001DB41, 0x0000000000000000,
+ 0x0000000000000000, 0x0000000000000000 };
+static const struct ecc_curve ecc_25519 = {
+ .name = "curve25519",
+ .nbits = 255,
+ .g = {
+ .x = curve25519_g_x,
+ .ndigits = 4,
+ },
+ .p = curve25519_p,
+ .a = curve25519_a,
+};
+
+#endif
diff --git a/include/crypto/ecc_curve.h b/include/crypto/ecc_curve.h
new file mode 100644
index 0000000000..7d90c5e822
--- /dev/null
+++ b/include/crypto/ecc_curve.h
@@ -0,0 +1,62 @@
+/* SPDX-License-Identifier: GPL-2.0 */
+/* Copyright (c) 2021 HiSilicon */
+
+#ifndef _CRYTO_ECC_CURVE_H
+#define _CRYTO_ECC_CURVE_H
+
+#include <linux/types.h>
+
+/**
+ * struct ecc_point - elliptic curve point in affine coordinates
+ *
+ * @x: X coordinate in vli form.
+ * @y: Y coordinate in vli form.
+ * @ndigits: Length of vlis in u64 qwords.
+ */
+struct ecc_point {
+ u64 *x;
+ u64 *y;
+ u8 ndigits;
+};
+
+/**
+ * struct ecc_curve - definition of elliptic curve
+ *
+ * @name: Short name of the curve.
+ * @nbits: The number of bits of a curve.
+ * @g: Generator point of the curve.
+ * @p: Prime number, if Barrett's reduction is used for this curve
+ * pre-calculated value 'mu' is appended to the @p after ndigits.
+ * Use of Barrett's reduction is heuristically determined in
+ * vli_mmod_fast().
+ * @n: Order of the curve group.
+ * @a: Curve parameter a.
+ * @b: Curve parameter b.
+ */
+struct ecc_curve {
+ char *name;
+ u32 nbits;
+ struct ecc_point g;
+ u64 *p;
+ u64 *n;
+ u64 *a;
+ u64 *b;
+};
+
+/**
+ * ecc_get_curve() - get elliptic curve;
+ * @curve_id: Curves IDs:
+ * defined in 'include/crypto/ecdh.h';
+ *
+ * Returns curve if get curve succssful, NULL otherwise
+ */
+const struct ecc_curve *ecc_get_curve(unsigned int curve_id);
+
+/**
+ * ecc_get_curve25519() - get curve25519 curve;
+ *
+ * Returns curve25519
+ */
+const struct ecc_curve *ecc_get_curve25519(void);
+
+#endif
diff --git a/include/crypto/ecdh.h b/include/crypto/ecdh.h
new file mode 100644
index 0000000000..9784ecdd2f
--- /dev/null
+++ b/include/crypto/ecdh.h
@@ -0,0 +1,83 @@
+/* SPDX-License-Identifier: GPL-2.0-or-later */
+/*
+ * ECDH params to be used with kpp API
+ *
+ * Copyright (c) 2016, Intel Corporation
+ * Authors: Salvatore Benedetto <salvatore.benedetto@intel.com>
+ */
+#ifndef _CRYPTO_ECDH_
+#define _CRYPTO_ECDH_
+
+/**
+ * DOC: ECDH Helper Functions
+ *
+ * To use ECDH with the KPP cipher API, the following data structure and
+ * functions should be used.
+ *
+ * The ECC curves known to the ECDH implementation are specified in this
+ * header file.
+ *
+ * To use ECDH with KPP, the following functions should be used to operate on
+ * an ECDH private key. The packet private key that can be set with
+ * the KPP API function call of crypto_kpp_set_secret.
+ */
+
+/* Curves IDs */
+#define ECC_CURVE_NIST_P192 0x0001
+#define ECC_CURVE_NIST_P256 0x0002
+#define ECC_CURVE_NIST_P384 0x0003
+#define ECC_CURVE_NIST_P521 0x0004
+
+/**
+ * struct ecdh - define an ECDH private key
+ *
+ * @key: Private ECDH key
+ * @key_size: Size of the private ECDH key
+ */
+struct ecdh {
+ char *key;
+ unsigned short key_size;
+};
+
+/**
+ * crypto_ecdh_key_len() - Obtain the size of the private ECDH key
+ * @params: private ECDH key
+ *
+ * This function returns the packet ECDH key size. A caller can use that
+ * with the provided ECDH private key reference to obtain the required
+ * memory size to hold a packet key.
+ *
+ * Return: size of the key in bytes
+ */
+unsigned int crypto_ecdh_key_len(const struct ecdh *params);
+
+/**
+ * crypto_ecdh_encode_key() - encode the private key
+ * @buf: Buffer allocated by the caller to hold the packet ECDH
+ * private key. The buffer should be at least crypto_ecdh_key_len
+ * bytes in size.
+ * @len: Length of the packet private key buffer
+ * @p: Buffer with the caller-specified private key
+ *
+ * The ECDH implementations operate on a packet representation of the private
+ * key.
+ *
+ * Return: -EINVAL if buffer has insufficient size, 0 on success
+ */
+int crypto_ecdh_encode_key(char *buf, unsigned int len, const struct ecdh *p);
+
+/**
+ * crypto_ecdh_decode_key() - decode a private key
+ * @buf: Buffer holding a packet key that should be decoded
+ * @len: Length of the packet private key buffer
+ * @p: Buffer allocated by the caller that is filled with the
+ * unpacked ECDH private key.
+ *
+ * The unpacking obtains the private key by pointing @p to the correct location
+ * in @buf. Thus, both pointers refer to the same memory.
+ *
+ * Return: -EINVAL if buffer has insufficient size, 0 on success
+ */
+int crypto_ecdh_decode_key(const char *buf, unsigned int len, struct ecdh *p);
+
+#endif
diff --git a/include/crypto/internal/ecc.h b/include/crypto/internal/ecc.h
new file mode 100644
index 0000000000..f191491cc0
--- /dev/null
+++ b/include/crypto/internal/ecc.h
@@ -0,0 +1,278 @@
+/*
+ * Copyright (c) 2013, Kenneth MacKay
+ * All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions are
+ * met:
+ * * Redistributions of source code must retain the above copyright
+ * notice, this list of conditions and the following disclaimer.
+ * * Redistributions in binary form must reproduce the above copyright
+ * notice, this list of conditions and the following disclaimer in the
+ * documentation and/or other materials provided with the distribution.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
+ * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
+ * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
+ * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
+ * HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
+ * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
+ * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
+ * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
+ * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
+ * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
+ * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+ */
+#ifndef _CRYPTO_ECC_H
+#define _CRYPTO_ECC_H
+
+#include <crypto/ecc_curve.h>
+#include <asm/unaligned.h>
+
+/* One digit is u64 qword. */
+#define ECC_CURVE_NIST_P192_DIGITS 3
+#define ECC_CURVE_NIST_P256_DIGITS 4
+#define ECC_CURVE_NIST_P384_DIGITS 6
+#define ECC_CURVE_NIST_P521_DIGITS 9
+#define ECC_MAX_DIGITS DIV_ROUND_UP(521, 64) /* NIST P521 */
+
+#define ECC_DIGITS_TO_BYTES_SHIFT 3
+
+#define ECC_MAX_BYTES (ECC_MAX_DIGITS << ECC_DIGITS_TO_BYTES_SHIFT)
+
+#define ECC_POINT_INIT(x, y, ndigits) (struct ecc_point) { x, y, ndigits }
+
+/**
+ * ecc_swap_digits() - Copy ndigits from big endian array to native array
+ * @in: Input array
+ * @out: Output array
+ * @ndigits: Number of digits to copy
+ */
+static inline void ecc_swap_digits(const void *in, u64 *out, unsigned int ndigits)
+{
+ const __be64 *src = (__force __be64 *)in;
+ int i;
+
+ for (i = 0; i < ndigits; i++)
+ out[i] = get_unaligned_be64(&src[ndigits - 1 - i]);
+}
+
+/**
+ * ecc_digits_from_bytes() - Create ndigits-sized digits array from byte array
+ * @in: Input byte array
+ * @nbytes Size of input byte array
+ * @out Output digits array
+ * @ndigits: Number of digits to create from byte array
+ */
+void ecc_digits_from_bytes(const u8 *in, unsigned int nbytes,
+ u64 *out, unsigned int ndigits);
+
+/**
+ * ecc_is_key_valid() - Validate a given ECDH private key
+ *
+ * @curve_id: id representing the curve to use
+ * @ndigits: curve's number of digits
+ * @private_key: private key to be used for the given curve
+ * @private_key_len: private key length
+ *
+ * Returns 0 if the key is acceptable, a negative value otherwise
+ */
+int ecc_is_key_valid(unsigned int curve_id, unsigned int ndigits,
+ const u64 *private_key, unsigned int private_key_len);
+
+/**
+ * ecc_make_pub_key() - Compute an ECC public key
+ *
+ * @curve_id: id representing the curve to use
+ * @ndigits: curve's number of digits
+ * @private_key: pregenerated private key for the given curve
+ * @public_key: buffer for storing the generated public key
+ *
+ * Returns 0 if the public key was generated successfully, a negative value
+ * if an error occurred.
+ */
+int ecc_make_pub_key(const unsigned int curve_id, unsigned int ndigits,
+ const u64 *private_key, u64 *public_key);
+
+/**
+ * crypto_ecdh_shared_secret() - Compute a shared secret
+ *
+ * @curve_id: id representing the curve to use
+ * @ndigits: curve's number of digits
+ * @private_key: private key of part A
+ * @public_key: public key of counterpart B
+ * @secret: buffer for storing the calculated shared secret
+ *
+ * Note: It is recommended that you hash the result of crypto_ecdh_shared_secret
+ * before using it for symmetric encryption or HMAC.
+ *
+ * Returns 0 if the shared secret was generated successfully, a negative value
+ * if an error occurred.
+ */
+int crypto_ecdh_shared_secret(unsigned int curve_id, unsigned int ndigits,
+ const u64 *private_key, const u64 *public_key,
+ u64 *secret);
+
+/**
+ * ecc_is_pubkey_valid_partial() - Partial public key validation
+ *
+ * @curve: elliptic curve domain parameters
+ * @pk: public key as a point
+ *
+ * Valdiate public key according to SP800-56A section 5.6.2.3.4 ECC Partial
+ * Public-Key Validation Routine.
+ *
+ * Note: There is no check that the public key is in the correct elliptic curve
+ * subgroup.
+ *
+ * Return: 0 if validation is successful, -EINVAL if validation is failed.
+ */
+int ecc_is_pubkey_valid_partial(const struct ecc_curve *curve,
+ struct ecc_point *pk);
+
+/**
+ * ecc_is_pubkey_valid_full() - Full public key validation
+ *
+ * @curve: elliptic curve domain parameters
+ * @pk: public key as a point
+ *
+ * Valdiate public key according to SP800-56A section 5.6.2.3.3 ECC Full
+ * Public-Key Validation Routine.
+ *
+ * Return: 0 if validation is successful, -EINVAL if validation is failed.
+ */
+int ecc_is_pubkey_valid_full(const struct ecc_curve *curve,
+ struct ecc_point *pk);
+
+/**
+ * vli_is_zero() - Determine is vli is zero
+ *
+ * @vli: vli to check.
+ * @ndigits: length of the @vli
+ */
+bool vli_is_zero(const u64 *vli, unsigned int ndigits);
+
+/**
+ * vli_cmp() - compare left and right vlis
+ *
+ * @left: vli
+ * @right: vli
+ * @ndigits: length of both vlis
+ *
+ * Returns sign of @left - @right, i.e. -1 if @left < @right,
+ * 0 if @left == @right, 1 if @left > @right.
+ */
+int vli_cmp(const u64 *left, const u64 *right, unsigned int ndigits);
+
+/**
+ * vli_sub() - Subtracts right from left
+ *
+ * @result: where to write result
+ * @left: vli
+ * @right vli
+ * @ndigits: length of all vlis
+ *
+ * Note: can modify in-place.
+ *
+ * Return: carry bit.
+ */
+u64 vli_sub(u64 *result, const u64 *left, const u64 *right,
+ unsigned int ndigits);
+
+/**
+ * vli_from_be64() - Load vli from big-endian u64 array
+ *
+ * @dest: destination vli
+ * @src: source array of u64 BE values
+ * @ndigits: length of both vli and array
+ */
+void vli_from_be64(u64 *dest, const void *src, unsigned int ndigits);
+
+/**
+ * vli_from_le64() - Load vli from little-endian u64 array
+ *
+ * @dest: destination vli
+ * @src: source array of u64 LE values
+ * @ndigits: length of both vli and array
+ */
+void vli_from_le64(u64 *dest, const void *src, unsigned int ndigits);
+
+/**
+ * vli_mod_inv() - Modular inversion
+ *
+ * @result: where to write vli number
+ * @input: vli value to operate on
+ * @mod: modulus
+ * @ndigits: length of all vlis
+ */
+void vli_mod_inv(u64 *result, const u64 *input, const u64 *mod,
+ unsigned int ndigits);
+
+/**
+ * vli_mod_mult_slow() - Modular multiplication
+ *
+ * @result: where to write result value
+ * @left: vli number to multiply with @right
+ * @right: vli number to multiply with @left
+ * @mod: modulus
+ * @ndigits: length of all vlis
+ *
+ * Note: Assumes that mod is big enough curve order.
+ */
+void vli_mod_mult_slow(u64 *result, const u64 *left, const u64 *right,
+ const u64 *mod, unsigned int ndigits);
+
+/**
+ * vli_num_bits() - Counts the number of bits required for vli.
+ *
+ * @vli: vli to check.
+ * @ndigits: Length of the @vli
+ *
+ * Return: The number of bits required to represent @vli.
+ */
+unsigned int vli_num_bits(const u64 *vli, unsigned int ndigits);
+
+/**
+ * ecc_aloc_point() - Allocate ECC point.
+ *
+ * @ndigits: Length of vlis in u64 qwords.
+ *
+ * Return: Pointer to the allocated point or NULL if allocation failed.
+ */
+struct ecc_point *ecc_alloc_point(unsigned int ndigits);
+
+/**
+ * ecc_free_point() - Free ECC point.
+ *
+ * @p: The point to free.
+ */
+void ecc_free_point(struct ecc_point *p);
+
+/**
+ * ecc_point_is_zero() - Check if point is zero.
+ *
+ * @p: Point to check for zero.
+ *
+ * Return: true if point is the point at infinity, false otherwise.
+ */
+bool ecc_point_is_zero(const struct ecc_point *point);
+
+/**
+ * ecc_point_mult_shamir() - Add two points multiplied by scalars
+ *
+ * @result: resulting point
+ * @x: scalar to multiply with @p
+ * @p: point to multiply with @x
+ * @y: scalar to multiply with @q
+ * @q: point to multiply with @y
+ * @curve: curve
+ *
+ * Returns result = x * p + x * q over the curve.
+ * This works faster than two multiplications and addition.
+ */
+void ecc_point_mult_shamir(const struct ecc_point *result,
+ const u64 *x, const struct ecc_point *p,
+ const u64 *y, const struct ecc_point *q,
+ const struct ecc_curve *curve);
+
+#endif
--
2.39.2
^ permalink raw reply [flat|nested] 33+ messages in thread
* [PATCH v4 15/16] crypto: add ECDSA support
2024-09-13 7:59 [PATCH v4 00/16] Add ECDSA support for FIT image verification Sascha Hauer
` (13 preceding siblings ...)
2024-09-13 7:59 ` [PATCH v4 14/16] Add elliptic curve cryptography (ECC) helper functions Sascha Hauer
@ 2024-09-13 7:59 ` Sascha Hauer
2024-09-27 8:07 ` Ahmad Fatoum
2024-09-13 7:59 ` [PATCH v4 16/16] crypto: make RSA a visible option Sascha Hauer
2024-09-27 11:23 ` [PATCH v4 00/16] Add ECDSA support for FIT image verification Sascha Hauer
16 siblings, 1 reply; 33+ messages in thread
From: Sascha Hauer @ 2024-09-13 7:59 UTC (permalink / raw)
To: Barebox List
This adds ECDSA signature verification support. The code is based on the
Linux code as of Linux-6.10. The Linux code expects the key to be in
ASN.1 encoded format. We don't need this in barebox as directly compile
the x and y key values into the binary, so this is left out.
Signed-off-by: Sascha Hauer <s.hauer@pengutronix.de>
---
crypto/Kconfig | 4 ++
crypto/Makefile | 1 +
crypto/ecdsa.c | 140 ++++++++++++++++++++++++++++++++++++
crypto/public-keys.c | 8 +++
include/crypto/public_key.h | 1 +
include/ecdsa.h | 42 +++++++++++
6 files changed, 196 insertions(+)
create mode 100644 crypto/ecdsa.c
create mode 100644 include/ecdsa.h
diff --git a/crypto/Kconfig b/crypto/Kconfig
index 7935af3da8..a90e3e1005 100644
--- a/crypto/Kconfig
+++ b/crypto/Kconfig
@@ -151,4 +151,8 @@ config JWT
config CRYPTO_ECC
bool
+config CRYPTO_ECDSA
+ bool "ECDSA support"
+ select CRYPTO_ECC
+
endmenu
diff --git a/crypto/Makefile b/crypto/Makefile
index 570930c2cd..da96dd2c21 100644
--- a/crypto/Makefile
+++ b/crypto/Makefile
@@ -20,6 +20,7 @@ obj-$(CONFIG_CRYPTO_RSA) += rsa.o
obj-$(CONFIG_CRYPTO_KEYSTORE) += keystore.o
obj-$(CONFIG_CRYPTO_BUILTIN_KEYS) += public-keys.o
obj-$(CONFIG_CRYPTO_ECC) += ecc.o
+obj-$(CONFIG_CRYPTO_ECDSA) += ecdsa.o
obj-$(CONFIG_JWT) += jwt.o
diff --git a/crypto/ecdsa.c b/crypto/ecdsa.c
new file mode 100644
index 0000000000..3025410df3
--- /dev/null
+++ b/crypto/ecdsa.c
@@ -0,0 +1,140 @@
+// SPDX-License-Identifier: GPL-2.0+
+/*
+ * Copyright (c) 2021 IBM Corporation
+ */
+
+#include <common.h>
+
+#include <crypto/internal/ecc.h>
+#include <crypto/public_key.h>
+#include <crypto/ecdh.h>
+#include <ecdsa.h>
+
+struct ecc_ctx {
+ unsigned int curve_id;
+ const struct ecc_curve *curve;
+
+ bool pub_key_set;
+ u64 x[ECC_MAX_DIGITS]; /* pub key x and y coordinates */
+ u64 y[ECC_MAX_DIGITS];
+ struct ecc_point pub_key;
+};
+
+static int _ecdsa_verify(struct ecc_ctx *ctx, const u64 *hash, const u64 *r, const u64 *s)
+{
+ const struct ecc_curve *curve = ctx->curve;
+ unsigned int ndigits = curve->g.ndigits;
+ u64 s1[ECC_MAX_DIGITS];
+ u64 u1[ECC_MAX_DIGITS];
+ u64 u2[ECC_MAX_DIGITS];
+ u64 x1[ECC_MAX_DIGITS];
+ u64 y1[ECC_MAX_DIGITS];
+ struct ecc_point res = ECC_POINT_INIT(x1, y1, ndigits);
+
+ /* 0 < r < n and 0 < s < n */
+ if (vli_is_zero(r, ndigits) || vli_cmp(r, curve->n, ndigits) >= 0 ||
+ vli_is_zero(s, ndigits) || vli_cmp(s, curve->n, ndigits) >= 0)
+ return -EBADMSG;
+
+ /* hash is given */
+ pr_debug("hash : %016llx %016llx ... %016llx\n",
+ hash[ndigits - 1], hash[ndigits - 2], hash[0]);
+
+ /* s1 = (s^-1) mod n */
+ vli_mod_inv(s1, s, curve->n, ndigits);
+ /* u1 = (hash * s1) mod n */
+ vli_mod_mult_slow(u1, hash, s1, curve->n, ndigits);
+ /* u2 = (r * s1) mod n */
+ vli_mod_mult_slow(u2, r, s1, curve->n, ndigits);
+ /* res = u1*G + u2 * pub_key */
+ ecc_point_mult_shamir(&res, u1, &curve->g, u2, &ctx->pub_key, curve);
+
+ /* res.x = res.x mod n (if res.x > order) */
+ if (unlikely(vli_cmp(res.x, curve->n, ndigits) == 1))
+ /* faster alternative for NIST p521, p384, p256 & p192 */
+ vli_sub(res.x, res.x, curve->n, ndigits);
+
+ if (!vli_cmp(res.x, r, ndigits))
+ return 0;
+
+ return -EKEYREJECTED;
+}
+
+static int ecdsa_key_size(const char *curve_name)
+{
+ if (!strcmp(curve_name, "prime256v1"))
+ return 256;
+ else
+ return 0;
+}
+
+int ecdsa_verify(const struct ecdsa_public_key *key, const uint8_t *sig,
+ const uint32_t sig_len, const uint8_t *hash)
+{
+ struct ecc_ctx _ctx = {};
+ struct ecc_ctx *ctx = &_ctx;
+ unsigned int curve_id = ECC_CURVE_NIST_P256;
+ int ret;
+ const void *r, *s;
+ u64 rh[4], sh[4];
+ u64 mhash[ECC_MAX_DIGITS];
+ int key_size_bytes = key->size_bits / 8;
+
+ ctx->curve_id = curve_id;
+ ctx->curve = ecc_get_curve(curve_id);
+ if (!ctx->curve)
+ return -EINVAL;
+
+ ctx->pub_key = ECC_POINT_INIT(ctx->x, ctx->y, ctx->curve->g.ndigits);
+ memcpy(ctx->pub_key.x, key->x, key_size_bytes);
+ memcpy(ctx->pub_key.y, key->y, key_size_bytes);
+
+ ret = ecc_is_pubkey_valid_full(ctx->curve, &ctx->pub_key);
+ if (ret)
+ return ret;
+
+ r = sig;
+ s = sig + key_size_bytes;
+
+ ecc_swap_digits((u64 *)r, rh, ctx->curve->g.ndigits);
+ ecc_swap_digits((u64 *)s, sh, ctx->curve->g.ndigits);
+
+ ecc_swap_digits((u64 *)hash, mhash, ctx->curve->g.ndigits);
+
+ return _ecdsa_verify(ctx, (void *)mhash, rh, sh);
+}
+
+static LIST_HEAD(ecdsa_keys);
+
+int ecdsa_key_add(struct ecdsa_public_key *key)
+{
+ list_add_tail(&key->list, &ecdsa_keys);
+
+ return 0;
+}
+
+struct ecdsa_public_key *ecdsa_key_dup(const struct ecdsa_public_key *key)
+{
+ struct ecdsa_public_key *new;
+ int key_size_bits;
+
+ key_size_bits = ecdsa_key_size(key->curve_name);
+ if (!key_size_bits)
+ return NULL;
+
+ new = xmemdup(key, sizeof(*key));
+ new->x = xmemdup(key->x, key_size_bits / 8);
+ new->y = xmemdup(key->y, key_size_bits / 8);
+ new->size_bits = key_size_bits;
+
+ return new;
+}
+
+const struct ecdsa_public_key *ecdsa_key_next(const struct ecdsa_public_key *prev)
+{
+ prev = list_prepare_entry(prev, &ecdsa_keys, list);
+ list_for_each_entry_continue(prev, &ecdsa_keys, list)
+ return prev;
+
+ return NULL;
+}
diff --git a/crypto/public-keys.c b/crypto/public-keys.c
index dc51ef18f8..bab608be17 100644
--- a/crypto/public-keys.c
+++ b/crypto/public-keys.c
@@ -1,6 +1,7 @@
#include <common.h>
#include <crypto/public_key.h>
#include <rsa.h>
+#include <ecdsa.h>
static LIST_HEAD(public_keys);
@@ -49,6 +50,11 @@ static struct public_key *public_key_dup(const struct public_key *key)
if (!k->rsa)
goto err;
break;
+ case PUBLIC_KEY_TYPE_ECDSA:
+ k->ecdsa = ecdsa_key_dup(key->ecdsa);
+ if (!k->ecdsa)
+ goto err;
+ break;
default:
goto err;
}
@@ -68,6 +74,8 @@ int public_key_verify(const struct public_key *key, const uint8_t *sig,
switch (key->type) {
case PUBLIC_KEY_TYPE_RSA:
return rsa_verify(key->rsa, sig, sig_len, hash, algo);
+ case PUBLIC_KEY_TYPE_ECDSA:
+ return ecdsa_verify(key->ecdsa, sig, sig_len, hash);
}
return -ENOKEY;
diff --git a/include/crypto/public_key.h b/include/crypto/public_key.h
index 1b91063042..ed7c74859f 100644
--- a/include/crypto/public_key.h
+++ b/include/crypto/public_key.h
@@ -8,6 +8,7 @@ struct ecdsa_public_key;
enum pulic_key_type {
PUBLIC_KEY_TYPE_RSA,
+ PUBLIC_KEY_TYPE_ECDSA,
};
struct public_key {
diff --git a/include/ecdsa.h b/include/ecdsa.h
new file mode 100644
index 0000000000..1d6340c645
--- /dev/null
+++ b/include/ecdsa.h
@@ -0,0 +1,42 @@
+// SPDX-License-Identifier: GPL-2.0-only
+#ifndef _ECDSA_H
+#define _ECDSA_H
+
+struct ecdsa_public_key {
+ const char *curve_name; /* Name of curve, e.g. "prime256v1" */
+ const uint64_t *x; /* x coordinate of public key */
+ const uint64_t *y; /* y coordinate of public key */
+ unsigned int size_bits; /* key size in bits, derived from curve name */
+ struct list_head list;
+};
+
+const struct ecdsa_public_key *ecdsa_key_next(const struct ecdsa_public_key *prev);
+
+#define for_each_ecdsa_key(key) \
+ for (key = ecdsa_key_next(NULL); key; key = ecdsa_key_next(key))
+
+#ifdef CONFIG_CRYPTO_ECDSA
+int ecdsa_verify(const struct ecdsa_public_key *key, const uint8_t *sig,
+ const uint32_t sig_len, const uint8_t *hash);
+int ecdsa_key_add(struct ecdsa_public_key *key);
+struct ecdsa_public_key *ecdsa_key_dup(const struct ecdsa_public_key *key);
+#else
+static inline int ecdsa_verify(const struct ecdsa_public_key *key, const uint8_t *sig,
+ const uint32_t sig_len, const uint8_t *hash)
+{
+ return -ENOSYS;
+}
+
+static inline int ecdsa_key_add(struct ecdsa_public_key *key)
+{
+ return -ENOSYS;
+}
+
+static inline struct ecdsa_public_key *ecdsa_key_dup(const struct ecdsa_public_key *key)
+{
+ return NULL;
+}
+
+#endif
+
+#endif /* _ECDSA_H */
--
2.39.2
^ permalink raw reply [flat|nested] 33+ messages in thread
* [PATCH v4 16/16] crypto: make RSA a visible option
2024-09-13 7:59 [PATCH v4 00/16] Add ECDSA support for FIT image verification Sascha Hauer
` (14 preceding siblings ...)
2024-09-13 7:59 ` [PATCH v4 15/16] crypto: add ECDSA support Sascha Hauer
@ 2024-09-13 7:59 ` Sascha Hauer
2024-09-27 11:23 ` [PATCH v4 00/16] Add ECDSA support for FIT image verification Sascha Hauer
16 siblings, 0 replies; 33+ messages in thread
From: Sascha Hauer @ 2024-09-13 7:59 UTC (permalink / raw)
To: Barebox List; +Cc: Ahmad Fatoum
With ECDSA support RSA is no longer the only option for FIT image
verification. Make CONFIG_CRYPTO_RSA visible so that the user can
choose. CONFIG_CRYPTO_RSA defaults to yes when FITIMAGE_SIGNATURE is
selected so that existing configs continue to work.
Reviewed-by: Ahmad Fatoum <a.fatoum@pengutronix.de>
Signed-off-by: Sascha Hauer <s.hauer@pengutronix.de>
---
common/Kconfig | 1 -
crypto/Kconfig | 3 ++-
2 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/common/Kconfig b/common/Kconfig
index 4500feb66c..c925b1bd99 100644
--- a/common/Kconfig
+++ b/common/Kconfig
@@ -62,7 +62,6 @@ config FITIMAGE
select DIGEST
config FITIMAGE_SIGNATURE
- select CRYPTO_RSA
bool
config LOGBUF
diff --git a/crypto/Kconfig b/crypto/Kconfig
index a90e3e1005..45011802e3 100644
--- a/crypto/Kconfig
+++ b/crypto/Kconfig
@@ -116,7 +116,8 @@ config CRYPTO_PBKDF2
bool
config CRYPTO_RSA
- bool
+ bool "RSA support"
+ default y if FITIMAGE_SIGNATURE
config CRYPTO_BUILTIN_KEYS
bool "builtin keys"
--
2.39.2
^ permalink raw reply [flat|nested] 33+ messages in thread
* Re: [PATCH v4 11/16] crypto: builtin_keys: Allow to specify multiple keys in CONFIG_CRYPTO_PUBLIC_KEYS
2024-09-13 7:59 ` [PATCH v4 11/16] crypto: builtin_keys: Allow to specify multiple keys in CONFIG_CRYPTO_PUBLIC_KEYS Sascha Hauer
@ 2024-09-25 8:22 ` Sascha Hauer
0 siblings, 0 replies; 33+ messages in thread
From: Sascha Hauer @ 2024-09-25 8:22 UTC (permalink / raw)
To: Barebox List
On Fri, Sep 13, 2024 at 09:59:19AM +0200, Sascha Hauer wrote:
> This adds the missing pieces to make CONFIG_CRYPTO_PUBLIC_KEYS
> a list of keys rather than a single key only.
>
> We have to remove the quotes from the key argument in cmd_keys to
> pass the keys as multiple arguments to keytoc.
>
> For removing the quotes from CONFIG_CRYPTO_PUBLIC_KEYS "%"=% no longer
> matches when the string contains multiple words, so we utilize shell
> to remove the quotes.
>
> Signed-off-by: Sascha Hauer <s.hauer@pengutronix.de>
> ---
> crypto/Kconfig | 11 ++++++-----
> crypto/Makefile | 2 +-
> scripts/Makefile.lib | 2 +-
> 3 files changed, 8 insertions(+), 7 deletions(-)
>
> diff --git a/crypto/Kconfig b/crypto/Kconfig
> index 612e6f33fc..6b2e73c503 100644
> --- a/crypto/Kconfig
> +++ b/crypto/Kconfig
> @@ -126,11 +126,12 @@ config CRYPTO_PUBLIC_KEYS
> depends on CRYPTO_BUILTIN_KEYS
> string "public keys to compile in"
> help
> - This option should be a filename of a PEM-formatted file containing
> - X.509 certificates to be included into barebox. If the string starts
> - with "pkcs11:" it is interpreted as a PKCS#11 URI rather than a file.
> - If the string starts with a <hint>: prefix, <hint> is used as a key
> - name hint to find a key without iterating over all keys.
> + This option should be a space separated list of filenames of
> + PEM-formatted files containing X.509 certificates to be included into
> + barebox. If an entry starts with "pkcs11:" it is interpreted as a
> + PKCS#11 URI rather than a file. If an entry starts with a <hint>:
> + prefix, <hint> is used as a key name hint to find a key without
> + iterating over all keys.
>
> This avoids the mkimage dependency of CONFIG_BOOTM_FITIMAGE_PUBKEY
> at the cost of an openssl build-time dependency.
> diff --git a/crypto/Makefile b/crypto/Makefile
> index d6ce50b386..1c5709c90a 100644
> --- a/crypto/Makefile
> +++ b/crypto/Makefile
> @@ -28,7 +28,7 @@ ifdef CONFIG_CRYPTO_BUILTIN_KEYS
>
> $(obj)/public-keys.o: $(obj)/public-keys.h
>
> -CONFIG_CRYPTO_PUBLIC_KEYS := $(CONFIG_CRYPTO_PUBLIC_KEYS:"%"=%)
> +CONFIG_CRYPTO_PUBLIC_KEYS := $(shell echo $(CONFIG_CRYPTO_PUBLIC_KEYS))
>
> $(obj)/public-keys.h: FORCE
> $(call cmd,public_keys,$(CONFIG_CRYPTO_PUBLIC_KEYS))
> diff --git a/scripts/Makefile.lib b/scripts/Makefile.lib
> index 1881e3c139..3d0a260804 100644
> --- a/scripts/Makefile.lib
> +++ b/scripts/Makefile.lib
> @@ -614,7 +614,7 @@ quiet_cmd_b64dec = B64DEC $@
> # target file.
> quiet_cmd_public_keys = KEY $@
> cmd_public_keys = \
> - $(objtree)/scripts/keytoc -o $@.tmp "$(2)" $(3) && \
> + $(objtree)/scripts/keytoc -o $@.tmp $(2) $(3) && \
This doesn't work with pkcs11: uris. These may contain semicolons which
must be quoted from the shell. We must quote the the words in
CONFIG_CRYPTO_PUBLIC_KEYS though, not the whole string. So what we can
do is:
CONFIG_CRYPTO_PUBLIC_KEYS := $(foreach d,$(CONFIG_CRYPTO_PUBLIC_KEYS),"$(d)")
Sascha
--
Pengutronix e.K. | |
Steuerwalder Str. 21 | http://www.pengutronix.de/ |
31137 Hildesheim, Germany | Phone: +49-5121-206917-0 |
Amtsgericht Hildesheim, HRA 2686 | Fax: +49-5121-206917-5555 |
^ permalink raw reply [flat|nested] 33+ messages in thread
* Re: [PATCH v4 01/16] keytoc: remove ECDSA dts support
2024-09-13 7:59 ` [PATCH v4 01/16] keytoc: remove ECDSA dts support Sascha Hauer
@ 2024-09-25 8:53 ` Ahmad Fatoum
0 siblings, 0 replies; 33+ messages in thread
From: Ahmad Fatoum @ 2024-09-25 8:53 UTC (permalink / raw)
To: Sascha Hauer, Barebox List
On 13.09.24 09:59, Sascha Hauer wrote:
> Generating dts snippets for ECDSA keys does not work properly,
> there are various endianess problems. As we do not need this currently
> for barebox drop the support for now.
>
> Signed-off-by: Sascha Hauer <s.hauer@pengutronix.de>
Acked-by: Ahmad Fatoum <a.fatoum@pengutronix.de>
> ---
> scripts/keytoc.c | 14 +++++---------
> 1 file changed, 5 insertions(+), 9 deletions(-)
>
> diff --git a/scripts/keytoc.c b/scripts/keytoc.c
> index 60e177aeee..3ac42bc6d0 100644
> --- a/scripts/keytoc.c
> +++ b/scripts/keytoc.c
> @@ -470,15 +470,8 @@ static int gen_key_ecdsa(EVP_PKEY *key, const char *key_name, const char *key_na
> return -EINVAL;
>
> if (dts) {
> - fprintf(outfilep, "\t\tkey-%s {\n", key_name_c);
> - fprintf(outfilep, "\t\t\tecdsa,x-point = <");
> - print_bignum(key_x, bits);
> - fprintf(outfilep, ">;\n");
> - fprintf(outfilep, "\t\t\tecdsa,y-point = <");
> - print_bignum(key_y, bits);
> - fprintf(outfilep, ">;\n");
> - fprintf(outfilep, "\t\t\tecdsa,curve = \"%s\";\n", group);
> - fprintf(outfilep, "\t\t};\n");
> + fprintf(stderr, "ERROR: generating a dts snippet for ECDSA keys is not yet supported\n");
> + return -EOPNOTSUPP;
> } else {
> fprintf(outfilep, "\nstatic uint32_t %s_x[] = {", key_name_c);
> print_bignum(key_x, bits);
> @@ -598,6 +591,9 @@ static int gen_key(const char *keyname, const char *path)
> }
>
> ret = gen_key_ecdsa(key, keyname, key_name_c);
> + if (ret == -EOPNOTSUPP)
> + return ret;
> +
> if (ret)
> ret = gen_key_rsa(key, keyname, key_name_c);
>
--
Pengutronix e.K. | |
Steuerwalder Str. 21 | http://www.pengutronix.de/ |
31137 Hildesheim, Germany | Phone: +49-5121-206917-0 |
Amtsgericht Hildesheim, HRA 2686 | Fax: +49-5121-206917-5555 |
^ permalink raw reply [flat|nested] 33+ messages in thread
* Re: [PATCH v4 02/16] keytoc: fail in case gen_key() fails
2024-09-13 7:59 ` [PATCH v4 02/16] keytoc: fail in case gen_key() fails Sascha Hauer
@ 2024-09-25 8:53 ` Ahmad Fatoum
0 siblings, 0 replies; 33+ messages in thread
From: Ahmad Fatoum @ 2024-09-25 8:53 UTC (permalink / raw)
To: Sascha Hauer, Barebox List
On 13.09.24 09:59, Sascha Hauer wrote:
> In case of an error in gen_key() return an error code so that the keytoc
> tool returns an error.
>
> Signed-off-by: Sascha Hauer <s.hauer@pengutronix.de>
Reviewed-by: Ahmad Fatoum <a.fatoum@pengutronix.de>
> ---
> scripts/keytoc.c | 2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
>
> diff --git a/scripts/keytoc.c b/scripts/keytoc.c
> index 3ac42bc6d0..7e73c786a3 100644
> --- a/scripts/keytoc.c
> +++ b/scripts/keytoc.c
> @@ -597,7 +597,7 @@ static int gen_key(const char *keyname, const char *path)
> if (ret)
> ret = gen_key_rsa(key, keyname, key_name_c);
>
> - return 0;
> + return ret;
> }
>
> int main(int argc, char *argv[])
--
Pengutronix e.K. | |
Steuerwalder Str. 21 | http://www.pengutronix.de/ |
31137 Hildesheim, Germany | Phone: +49-5121-206917-0 |
Amtsgericht Hildesheim, HRA 2686 | Fax: +49-5121-206917-5555 |
^ permalink raw reply [flat|nested] 33+ messages in thread
* Re: [PATCH v4 04/16] keytoc: remove duplicate __ENV__ check
2024-09-13 7:59 ` [PATCH v4 04/16] keytoc: remove duplicate __ENV__ check Sascha Hauer
@ 2024-09-27 6:59 ` Ahmad Fatoum
0 siblings, 0 replies; 33+ messages in thread
From: Ahmad Fatoum @ 2024-09-27 6:59 UTC (permalink / raw)
To: Sascha Hauer, Barebox List
On 13.09.24 09:59, Sascha Hauer wrote:
> Signed-off-by: Sascha Hauer <s.hauer@pengutronix.de>
Reviewed-by: Ahmad Fatoum <a.fatoum@pengutronix.de>
> ---
> scripts/keytoc.c | 11 -----------
> 1 file changed, 11 deletions(-)
>
> diff --git a/scripts/keytoc.c b/scripts/keytoc.c
> index b140160688..ecb33cbe47 100644
> --- a/scripts/keytoc.c
> +++ b/scripts/keytoc.c
> @@ -664,17 +664,6 @@ int main(int argc, char *argv[])
> *path = 0;
> path++;
>
> - if (!strncmp(path, "__ENV__", 7)) {
> - const char *orig_path = path;
> -
> - path = getenv(orig_path + 7);
> - if (!path) {
> - fprintf(stderr, "%s doesn't contain a path\n",
> - orig_path + 7);
> - exit(1);
> - }
> - }
> -
> ret = gen_key(keyname, path);
> if (ret)
> exit(1);
--
Pengutronix e.K. | |
Steuerwalder Str. 21 | http://www.pengutronix.de/ |
31137 Hildesheim, Germany | Phone: +49-5121-206917-0 |
Amtsgericht Hildesheim, HRA 2686 | Fax: +49-5121-206917-5555 |
^ permalink raw reply [flat|nested] 33+ messages in thread
* Re: [PATCH v4 05/16] crypto: Makefile: make simpler
2024-09-13 7:59 ` [PATCH v4 05/16] crypto: Makefile: make simpler Sascha Hauer
@ 2024-09-27 7:01 ` Ahmad Fatoum
0 siblings, 0 replies; 33+ messages in thread
From: Ahmad Fatoum @ 2024-09-27 7:01 UTC (permalink / raw)
To: Sascha Hauer, Barebox List
On 13.09.24 09:59, Sascha Hauer wrote:
> We have:
>
> $(if $(RSA_DEP),$<,$(CONFIG_CRYPTO_RSA_KEY))
>
> '$<' is the first dependency which is $(RSA_DEP). $(RSA_DEP) is either
> empty (in which case $(CONFIG_CRYPTO_RSA_KEY) is used), or set to
> $(CONFIG_CRYPTO_RSA_KEY) a few lines up.
> so all this is a complicated way of using $(CONFIG_CRYPTO_RSA_KEY)
> directly.
>
> Signed-off-by: Sascha Hauer <s.hauer@pengutronix.de>
Reviewed-by: Ahmad Fatoum <a.fatoum@pengutronix.de>
> ---
> crypto/Makefile | 2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
>
> diff --git a/crypto/Makefile b/crypto/Makefile
> index e84360a8c7..d7a06a721d 100644
> --- a/crypto/Makefile
> +++ b/crypto/Makefile
> @@ -34,5 +34,5 @@ RSA_DEP := $(CONFIG_CRYPTO_RSA_KEY)
> endif
>
> $(obj)/rsa-keys.h: $(RSA_DEP) FORCE
> - $(call cmd,public_keys,$(CONFIG_CRYPTO_RSA_KEY_NAME_HINT):$(if $(RSA_DEP),$<,$(CONFIG_CRYPTO_RSA_KEY)))
> + $(call cmd,public_keys,$(CONFIG_CRYPTO_RSA_KEY_NAME_HINT):$(CONFIG_CRYPTO_RSA_KEY))
> endif
--
Pengutronix e.K. | |
Steuerwalder Str. 21 | http://www.pengutronix.de/ |
31137 Hildesheim, Germany | Phone: +49-5121-206917-0 |
Amtsgericht Hildesheim, HRA 2686 | Fax: +49-5121-206917-5555 |
^ permalink raw reply [flat|nested] 33+ messages in thread
* Re: [PATCH v4 06/16] crypto/Makefile: Drop unnecessary dependencies
2024-09-13 7:59 ` [PATCH v4 06/16] crypto/Makefile: Drop unnecessary dependencies Sascha Hauer
@ 2024-09-27 7:03 ` Ahmad Fatoum
0 siblings, 0 replies; 33+ messages in thread
From: Ahmad Fatoum @ 2024-09-27 7:03 UTC (permalink / raw)
To: Sascha Hauer, Barebox List
On 13.09.24 09:59, Sascha Hauer wrote:
> Having rsa-keys.h depend on the input key files is unnecessary. They
> were introduced to avoid unnecessary rebuilds when the files didn't
> change. This is unnecessary because the public_keys cmd won't produce
> output when it wouldn't change the existing file.
>
> Signed-off-by: Sascha Hauer <s.hauer@pengutronix.de>
Reviewed-by: Ahmad Fatoum <a.fatoum@pengutronix.de>
> ---
> crypto/Makefile | 6 +-----
> 1 file changed, 1 insertion(+), 5 deletions(-)
>
> diff --git a/crypto/Makefile b/crypto/Makefile
> index d7a06a721d..5a484355f3 100644
> --- a/crypto/Makefile
> +++ b/crypto/Makefile
> @@ -29,10 +29,6 @@ $(obj)/rsa.o: $(obj)/rsa-keys.h
>
> CONFIG_CRYPTO_RSA_KEY := $(CONFIG_CRYPTO_RSA_KEY:"%"=%)
>
> -ifneq ($(filter-out pkcs11:% __ENV__%, $(CONFIG_CRYPTO_RSA_KEY)),)
> -RSA_DEP := $(CONFIG_CRYPTO_RSA_KEY)
> -endif
> -
> -$(obj)/rsa-keys.h: $(RSA_DEP) FORCE
> +$(obj)/rsa-keys.h: FORCE
> $(call cmd,public_keys,$(CONFIG_CRYPTO_RSA_KEY_NAME_HINT):$(CONFIG_CRYPTO_RSA_KEY))
> endif
--
Pengutronix e.K. | |
Steuerwalder Str. 21 | http://www.pengutronix.de/ |
31137 Hildesheim, Germany | Phone: +49-5121-206917-0 |
Amtsgericht Hildesheim, HRA 2686 | Fax: +49-5121-206917-5555 |
^ permalink raw reply [flat|nested] 33+ messages in thread
* Re: [PATCH v4 08/16] crypto: rsa: include key name hint into CONFIG_CRYPTO_RSA_KEY
2024-09-13 7:59 ` [PATCH v4 08/16] crypto: rsa: include key name hint into CONFIG_CRYPTO_RSA_KEY Sascha Hauer
@ 2024-09-27 7:55 ` Ahmad Fatoum
0 siblings, 0 replies; 33+ messages in thread
From: Ahmad Fatoum @ 2024-09-27 7:55 UTC (permalink / raw)
To: Sascha Hauer, Barebox List
On 13.09.24 09:59, Sascha Hauer wrote:
> Set the key name hint in CONFIG_CRYPTO_RSA_KEY. CONFIG_CRYPTO_RSA_KEY
> now has the form:
>
> <key_name_hint>:<filename/uri>
>
> This is done in preparation to make CONFIG_CRYPTO_RSA_KEY a list of
> keys.
>
> Signed-off-by: Sascha Hauer <s.hauer@pengutronix.de>
Reviewed-by: Ahmad Fatoum <a.fatoum@pengutronix.de>
> ---
> crypto/Kconfig | 9 ++-------
> crypto/Makefile | 2 +-
> 2 files changed, 3 insertions(+), 8 deletions(-)
>
> diff --git a/crypto/Kconfig b/crypto/Kconfig
> index 78b499f646..64a016eb2c 100644
> --- a/crypto/Kconfig
> +++ b/crypto/Kconfig
> @@ -130,17 +130,12 @@ config CRYPTO_RSA_KEY
> This option should be a filename of a PEM-formatted file containing
> X.509 certificates to be included into barebox. If the string starts
> with "pkcs11:" it is interpreted as a PKCS#11 URI rather than a file.
> + If the string starts with a <hint>: prefix, <hint> is used as a key
> + name hint to find a key without iterating over all keys.
>
> This avoids the mkimage dependency of CONFIG_BOOTM_FITIMAGE_PUBKEY
> at the cost of an openssl build-time dependency.
>
> -config CRYPTO_RSA_KEY_NAME_HINT
> - depends on CRYPTO_RSA
> - string "FIT image key name hint"
> - help
> - In FIT images keys are identified by a key name hint string. Provide
> - the key name hint here.
> -
> config CRYPTO_KEYSTORE
> bool "Keystore"
> help
> diff --git a/crypto/Makefile b/crypto/Makefile
> index 5a484355f3..b2bd7fae6a 100644
> --- a/crypto/Makefile
> +++ b/crypto/Makefile
> @@ -30,5 +30,5 @@ $(obj)/rsa.o: $(obj)/rsa-keys.h
> CONFIG_CRYPTO_RSA_KEY := $(CONFIG_CRYPTO_RSA_KEY:"%"=%)
>
> $(obj)/rsa-keys.h: FORCE
> - $(call cmd,public_keys,$(CONFIG_CRYPTO_RSA_KEY_NAME_HINT):$(CONFIG_CRYPTO_RSA_KEY))
> + $(call cmd,public_keys,$(CONFIG_CRYPTO_RSA_KEY))
> endif
--
Pengutronix e.K. | |
Steuerwalder Str. 21 | http://www.pengutronix.de/ |
31137 Hildesheim, Germany | Phone: +49-5121-206917-0 |
Amtsgericht Hildesheim, HRA 2686 | Fax: +49-5121-206917-5555 |
^ permalink raw reply [flat|nested] 33+ messages in thread
* Re: [PATCH v4 09/16] crypto: rsa: encapsulate rsa keys in public keys struct
2024-09-13 7:59 ` [PATCH v4 09/16] crypto: rsa: encapsulate rsa keys in public keys struct Sascha Hauer
@ 2024-09-27 8:02 ` Ahmad Fatoum
2024-09-27 11:11 ` Sascha Hauer
0 siblings, 1 reply; 33+ messages in thread
From: Ahmad Fatoum @ 2024-09-27 8:02 UTC (permalink / raw)
To: Sascha Hauer, Barebox List
On 13.09.24 09:59, Sascha Hauer wrote:
> This encapsulates struct rsa_public_key into a struct public_key. So far
> RSA keys are the only supported key type. With adding ECDSA keys we need
> a container struct so that we can add ECDSA keys using the same
> mechanisms.
>
> Also we rename CONFIG_CRYPTO_RSA_KEY to CONFIG_CRYPTO_PUBLIC_KEYS and
> CONFIG_CRYPTO_RSA_BUILTIN_KEYS to CONFIG_CRYPTO_BUILTIN_KEYS as these
> variables will be used for all types of keys, not only RSA keys.
>
> Signed-off-by: Sascha Hauer <s.hauer@pengutronix.de>
Reviewed-by: Ahmad Fatoum <a.fatoum@pengutronix.de>
But two comments below.
> diff --git a/crypto/public-keys.c b/crypto/public-keys.c
> new file mode 100644
> index 0000000000..a3ef3bafc8
> --- /dev/null
> +++ b/crypto/public-keys.c
> @@ -0,0 +1,39 @@
add a pr_fmt?
> +#include <common.h>
> +#include <crypto/public_key.h>
> +#include <rsa.h>
> +
> +extern const struct public_key * const __public_keys_start;
> +extern const struct public_key * const __public_keys_end;
> +
> +static int init_public_keys(void)
> +{
> + const struct public_key * const *iter;
> + int ret;
> +
> + for (iter = &__public_keys_start; iter != &__public_keys_end; iter++) {
> + struct rsa_public_key *rsa_key;
> +
> + switch ((*iter)->type) {
> + case PUBLIC_KEY_TYPE_RSA:
> + rsa_key = rsa_key_dup((*iter)->rsa);
> + if (!rsa_key)
> + continue;
> +
> + ret = rsa_key_add(rsa_key);
> + if (ret)
> + pr_err("Cannot add rsa key: %pe\n", ERR_PTR(ret));
> + break;
> + default:
> + pr_err("Ignoring unknown key type %u\n", (*iter)->type);
> + }
> +
> + }
> +
> + return 0;
> +}
> +
> +device_initcall(init_public_keys);
> +
> -extern const struct rsa_public_key * const __rsa_keys_start;
> -extern const struct rsa_public_key * const __rsa_keys_end;
I know you are just moving these around, but defining
these with [] is way less confusing IMO.
Thanks,
Ahmad
--
Pengutronix e.K. | |
Steuerwalder Str. 21 | http://www.pengutronix.de/ |
31137 Hildesheim, Germany | Phone: +49-5121-206917-0 |
Amtsgericht Hildesheim, HRA 2686 | Fax: +49-5121-206917-5555 |
^ permalink raw reply [flat|nested] 33+ messages in thread
* Re: [PATCH v4 15/16] crypto: add ECDSA support
2024-09-13 7:59 ` [PATCH v4 15/16] crypto: add ECDSA support Sascha Hauer
@ 2024-09-27 8:07 ` Ahmad Fatoum
0 siblings, 0 replies; 33+ messages in thread
From: Ahmad Fatoum @ 2024-09-27 8:07 UTC (permalink / raw)
To: Sascha Hauer, Barebox List
On 13.09.24 09:59, Sascha Hauer wrote:
> This adds ECDSA signature verification support. The code is based on the
> Linux code as of Linux-6.10. The Linux code expects the key to be in
> ASN.1 encoded format. We don't need this in barebox as directly compile
> the x and y key values into the binary, so this is left out.
>
> Signed-off-by: Sascha Hauer <s.hauer@pengutronix.de>
Acked-by: Ahmad Fatoum <a.fatoum@pengutronix.de>
Some minor comments below.
> diff --git a/crypto/public-keys.c b/crypto/public-keys.c
> index dc51ef18f8..bab608be17 100644
> --- a/crypto/public-keys.c
> +++ b/crypto/public-keys.c
> @@ -1,6 +1,7 @@
> #include <common.h>
> #include <crypto/public_key.h>
> #include <rsa.h>
> +#include <ecdsa.h>
We should perhaps move these two into crypto/ as well.
> diff --git a/include/crypto/public_key.h b/include/crypto/public_key.h
> index 1b91063042..ed7c74859f 100644
> --- a/include/crypto/public_key.h
> +++ b/include/crypto/public_key.h
> @@ -8,6 +8,7 @@ struct ecdsa_public_key;
>
> enum pulic_key_type {
s/pulic/public/
> PUBLIC_KEY_TYPE_RSA,
> + PUBLIC_KEY_TYPE_ECDSA,
> };
>
> struct public_key {
> diff --git a/include/ecdsa.h b/include/ecdsa.h
> new file mode 100644
> index 0000000000..1d6340c645
> --- /dev/null
> +++ b/include/ecdsa.h
> @@ -0,0 +1,42 @@
> +// SPDX-License-Identifier: GPL-2.0-only
> +#ifndef _ECDSA_H
> +#define _ECDSA_H
#include <linux/list.h>
#include <linux/types.h>
> +
> +struct ecdsa_public_key {
> + const char *curve_name; /* Name of curve, e.g. "prime256v1" */
> + const uint64_t *x; /* x coordinate of public key */
> + const uint64_t *y; /* y coordinate of public key */
> + unsigned int size_bits; /* key size in bits, derived from curve name */
> + struct list_head list;
> +};
Cheers,
Ahmad
--
Pengutronix e.K. | |
Steuerwalder Str. 21 | http://www.pengutronix.de/ |
31137 Hildesheim, Germany | Phone: +49-5121-206917-0 |
Amtsgericht Hildesheim, HRA 2686 | Fax: +49-5121-206917-5555 |
^ permalink raw reply [flat|nested] 33+ messages in thread
* Re: [PATCH v4 13/16] crypto: rsa: create static inline wrapper for rsa_verify()
2024-09-13 7:59 ` [PATCH v4 13/16] crypto: rsa: create static inline wrapper for rsa_verify() Sascha Hauer
@ 2024-09-27 8:09 ` Ahmad Fatoum
0 siblings, 0 replies; 33+ messages in thread
From: Ahmad Fatoum @ 2024-09-27 8:09 UTC (permalink / raw)
To: Sascha Hauer, Barebox List
On 13.09.24 09:59, Sascha Hauer wrote:
> rsa_verify() is called from generic code, so provide a static inline
> no-op wrapper used when RSA support is disabled.
>
> Signed-off-by: Sascha Hauer <s.hauer@pengutronix.de>
Reviewed-by: Ahmad Fatoum <a.fatoum@pengutronix.de>
--
Pengutronix e.K. | |
Steuerwalder Str. 21 | http://www.pengutronix.de/ |
31137 Hildesheim, Germany | Phone: +49-5121-206917-0 |
Amtsgericht Hildesheim, HRA 2686 | Fax: +49-5121-206917-5555 |
^ permalink raw reply [flat|nested] 33+ messages in thread
* Re: [PATCH v4 03/16] keytoc: fix ECDSA endianess problems
2024-09-13 7:59 ` [PATCH v4 03/16] keytoc: fix ECDSA endianess problems Sascha Hauer
@ 2024-09-27 8:11 ` Ahmad Fatoum
0 siblings, 0 replies; 33+ messages in thread
From: Ahmad Fatoum @ 2024-09-27 8:11 UTC (permalink / raw)
To: Sascha Hauer, Barebox List
On 13.09.24 09:59, Sascha Hauer wrote:
> We print the ECDSA key values out as an uint32_t C array. They are used in
> barebox as a uint64_t C array, so when the endianess of the build system
> differs from the system barebox runs on we end up with the 32bit words
> swapped in the u64 array. Fix this by printing out the key values as
> an uint64_t array.
>
> Signed-off-by: Sascha Hauer <s.hauer@pengutronix.de>
Acked-by: Ahmad Fatoum <a.fatoum@pengutronix.de>
Cool, thanks. Now we just need a tes and see it work on big-endian MIPS :-)
Cheers,
Ahmad
> ---
> scripts/keytoc.c | 42 +++++++++++++++++++++---------------------
> 1 file changed, 21 insertions(+), 21 deletions(-)
>
> diff --git a/scripts/keytoc.c b/scripts/keytoc.c
> index 7e73c786a3..b140160688 100644
> --- a/scripts/keytoc.c
> +++ b/scripts/keytoc.c
> @@ -315,12 +315,12 @@ static int rsa_get_params(EVP_PKEY *key, uint64_t *exponent, uint32_t *n0_invp,
>
> static FILE *outfilep;
>
> -static int print_bignum(BIGNUM *num, int num_bits)
> +static int print_bignum(BIGNUM *num, int num_bits, int width)
> {
> BIGNUM *tmp, *big2, *big32, *big2_32;
> BN_CTX *ctx;
> int i;
> - uint32_t *arr;
> + uint64_t *arr;
>
> tmp = BN_new();
> big2 = BN_new();
> @@ -345,34 +345,34 @@ static int print_bignum(BIGNUM *num, int num_bits)
> return -ENOMEM;
> }
> BN_set_word(big2, 2L);
> - BN_set_word(big32, 32L);
> - BN_exp(big2_32, big2, big32, ctx); /* B = 2^32 */
> + BN_set_word(big32, width);
> + BN_exp(big2_32, big2, big32, ctx); /* B = 2^width */
>
> - arr = malloc(num_bits / 32 * sizeof(uint32_t));
> + arr = malloc(num_bits / width * sizeof(*arr));
>
> - for (i = 0; i < num_bits / 32; i++) {
> + for (i = 0; i < num_bits / width; i++) {
> BN_mod(tmp, num, big2_32, ctx); /* n = N mod B */
> arr[i] = BN_get_word(tmp);
> - BN_rshift(num, num, 32); /* N = N/B */
> + BN_rshift(num, num, width); /* N = N/B */
> }
>
> if (dts) {
> - for (i = 0; i < num_bits / 32; i++) {
> + for (i = 0; i < num_bits / width; i++) {
> if (i % 4)
> fprintf(outfilep, " ");
> else
> fprintf(outfilep, "\n\t\t\t\t");
> - fprintf(outfilep, "0x%08x", arr[num_bits / 32 - 1 - i]);
> - BN_rshift(num, num, 32); /* N = N/B */
> + fprintf(outfilep, "0x%0*jx", width / 4, arr[num_bits / width - 1 - i]);
> + BN_rshift(num, num, width); /* N = N/B */
> }
> } else {
> - for (i = 0; i < num_bits / 32; i++) {
> + for (i = 0; i < num_bits / width; i++) {
> if (i % 4)
> fprintf(outfilep, " ");
> else
> fprintf(outfilep, "\n\t");
> - fprintf(outfilep, "0x%08x,", arr[i]);
> - BN_rshift(num, num, 32); /* N = N/B */
> + fprintf(outfilep, "0x%0*jx,", width / 4, arr[i]);
> + BN_rshift(num, num, width); /* N = N/B */
> }
> }
>
> @@ -473,12 +473,12 @@ static int gen_key_ecdsa(EVP_PKEY *key, const char *key_name, const char *key_na
> fprintf(stderr, "ERROR: generating a dts snippet for ECDSA keys is not yet supported\n");
> return -EOPNOTSUPP;
> } else {
> - fprintf(outfilep, "\nstatic uint32_t %s_x[] = {", key_name_c);
> - print_bignum(key_x, bits);
> + fprintf(outfilep, "\nstatic uint64_t %s_x[] = {", key_name_c);
> + print_bignum(key_x, bits, 64);
> fprintf(outfilep, "\n};\n\n");
>
> - fprintf(outfilep, "static uint32_t %s_y[] = {", key_name_c);
> - print_bignum(key_y, bits);
> + fprintf(outfilep, "static uint64_t %s_y[] = {", key_name_c);
> + print_bignum(key_y, bits, 64);
> fprintf(outfilep, "\n};\n\n");
>
> fprintf(outfilep, "static struct ecdsa_public_key %s = {\n", key_name_c);
> @@ -512,10 +512,10 @@ static int gen_key_rsa(EVP_PKEY *key, const char *key_name, const char *key_name
> if (dts) {
> fprintf(outfilep, "\t\tkey-%s {\n", key_name_c);
> fprintf(outfilep, "\t\t\trsa,r-squared = <");
> - print_bignum(r_squared, bits);
> + print_bignum(r_squared, bits, 32);
> fprintf(outfilep, ">;\n");
> fprintf(outfilep, "\t\t\trsa,modulus= <");
> - print_bignum(modulus, bits);
> + print_bignum(modulus, bits, 32);
> fprintf(outfilep, ">;\n");
> fprintf(outfilep, "\t\t\trsa,exponent = <0x%0lx 0x%lx>;\n",
> (exponent >> 32) & 0xffffffff,
> @@ -526,11 +526,11 @@ static int gen_key_rsa(EVP_PKEY *key, const char *key_name, const char *key_name
> fprintf(outfilep, "\t\t};\n");
> } else {
> fprintf(outfilep, "\nstatic uint32_t %s_modulus[] = {", key_name_c);
> - print_bignum(modulus, bits);
> + print_bignum(modulus, bits, 32);
> fprintf(outfilep, "\n};\n\n");
>
> fprintf(outfilep, "static uint32_t %s_rr[] = {", key_name_c);
> - print_bignum(r_squared, bits);
> + print_bignum(r_squared, bits, 32);
> fprintf(outfilep, "\n};\n\n");
>
> if (standalone) {
--
Pengutronix e.K. | |
Steuerwalder Str. 21 | http://www.pengutronix.de/ |
31137 Hildesheim, Germany | Phone: +49-5121-206917-0 |
Amtsgericht Hildesheim, HRA 2686 | Fax: +49-5121-206917-5555 |
^ permalink raw reply [flat|nested] 33+ messages in thread
* Re: [PATCH v4 07/16] keytoc: make key name hint optional
2024-09-13 7:59 ` [PATCH v4 07/16] keytoc: make key name hint optional Sascha Hauer
@ 2024-09-27 8:18 ` Ahmad Fatoum
0 siblings, 0 replies; 33+ messages in thread
From: Ahmad Fatoum @ 2024-09-27 8:18 UTC (permalink / raw)
To: Sascha Hauer, Barebox List
On 13.09.24 09:59, Sascha Hauer wrote:
> The key name hint is used in barebox to find a key without iterating
> over all keys, but it's not required. Make the key name hint optional
> to keytoc.
>
> Signed-off-by: Sascha Hauer <s.hauer@pengutronix.de>
Reviewed-by: Ahmad Fatoum <a.fatoum@pengutronix.de>
> ---
> scripts/keytoc.c | 31 ++++++++++++++++++++++---------
> 1 file changed, 22 insertions(+), 9 deletions(-)
>
> diff --git a/scripts/keytoc.c b/scripts/keytoc.c
> index ecb33cbe47..85a7cd7319 100644
> --- a/scripts/keytoc.c
> +++ b/scripts/keytoc.c
> @@ -9,6 +9,7 @@
> *
> */
> #pragma GCC diagnostic ignored "-Wdeprecated-declarations"
> +#define _GNU_SOURCE
> #include <stdio.h>
> #include <string.h>
> #include <time.h>
> @@ -602,9 +603,9 @@ static int gen_key(const char *keyname, const char *path)
>
> int main(int argc, char *argv[])
> {
> - char *path, *keyname;
> int i, opt, ret;
> char *outfile = NULL;
> + int keynum = 1;
>
> outfilep = stdout;
>
> @@ -652,21 +653,33 @@ int main(int argc, char *argv[])
> }
>
> for (i = optind; i < argc; i++) {
> - keyname = argv[i];
> + char *keyspec = argv[i];
> + char *keyname = NULL;
> + char *path, *freep = NULL;
>
> - path = strchr(keyname, ':');
> - if (!path) {
> - fprintf(stderr,
> - "keys must be given as <key_name_hint>:<crt>\n");
> - exit(1);
> + if (!strncmp(keyspec, "pkcs11:", 7)) {
> + path = keyspec;
> + } else {
> + path = strchr(keyspec, ':');
> + if (path) {
> + *path = 0;
> + path++;
> + keyname = keyspec;
> + } else {
> + path = keyspec;
> + }
> }
>
> - *path = 0;
> - path++;
> + if (!keyname) {
> + asprintf(&freep, "key_%d", keynum++);
> + keyname = freep;
> + }
>
> ret = gen_key(keyname, path);
> if (ret)
> exit(1);
> +
> + free(freep);
> }
>
> if (dts) {
--
Pengutronix e.K. | |
Steuerwalder Str. 21 | http://www.pengutronix.de/ |
31137 Hildesheim, Germany | Phone: +49-5121-206917-0 |
Amtsgericht Hildesheim, HRA 2686 | Fax: +49-5121-206917-5555 |
^ permalink raw reply [flat|nested] 33+ messages in thread
* Re: [PATCH v4 10/16] crypto: add public_key functions
2024-09-13 7:59 ` [PATCH v4 10/16] crypto: add public_key functions Sascha Hauer
@ 2024-09-27 8:20 ` Ahmad Fatoum
0 siblings, 0 replies; 33+ messages in thread
From: Ahmad Fatoum @ 2024-09-27 8:20 UTC (permalink / raw)
To: Sascha Hauer, Barebox List
On 13.09.24 09:59, Sascha Hauer wrote:
> Now that we have a struct public_key as a general container for keys
> create and use functions making use of it. Move the list from struct
> rsa_public_key to struct public_key, add public_key_verify() and use
> it instead of rsa_verify(), move key_name_hint to struct public_key.
>
> With this we do not need to bother the FIT image code when adding
> support for ECDSA keys.
>
> Signed-off-by: Sascha Hauer <s.hauer@pengutronix.de>
Reviewed-by: Ahmad Fatoum <a.fatoum@pengutronix.de>
> ---
> common/image-fit.c | 20 ++++----
> crypto/public-keys.c | 92 ++++++++++++++++++++++++++++++-------
> crypto/rsa.c | 74 +++++++++--------------------
> include/crypto/public_key.h | 15 ++++++
> include/rsa.h | 16 +------
> scripts/keytoc.c | 3 +-
> 6 files changed, 126 insertions(+), 94 deletions(-)
>
> diff --git a/common/image-fit.c b/common/image-fit.c
> index 4a69049abc..c5d2196bda 100644
> --- a/common/image-fit.c
> +++ b/common/image-fit.c
> @@ -20,7 +20,7 @@
> #include <errno.h>
> #include <linux/err.h>
> #include <stringlist.h>
> -#include <rsa.h>
> +#include <crypto/public_key.h>
> #include <uncompress.h>
> #include <image-fit.h>
>
> @@ -253,10 +253,10 @@ static struct digest *fit_alloc_digest(struct device_node *sig_node,
> return digest;
> }
>
> -static int fit_check_rsa_signature(struct device_node *sig_node,
> - enum hash_algo algo, void *hash)
> +static int fit_check_signature(struct device_node *sig_node,
> + enum hash_algo algo, void *hash)
> {
> - const struct rsa_public_key *key;
> + const struct public_key *key;
> const char *key_name = NULL;
> int sig_len;
> const char *sig_value;
> @@ -270,19 +270,19 @@ static int fit_check_rsa_signature(struct device_node *sig_node,
>
> of_property_read_string(sig_node, "key-name-hint", &key_name);
> if (key_name) {
> - key = rsa_get_key(key_name);
> + key = public_key_get(key_name);
> if (key) {
> - ret = rsa_verify(key, sig_value, sig_len, hash, algo);
> + ret = public_key_verify(key, sig_value, sig_len, hash, algo);
> if (!ret)
> goto ok;
> }
> }
>
> - for_each_rsa_key(key) {
> + for_each_public_key(key) {
> if (key_name && !strcmp(key->key_name_hint, key_name))
> continue;
>
> - ret = rsa_verify(key, sig_value, sig_len, hash, algo);
> + ret = public_key_verify(key, sig_value, sig_len, hash, algo);
> if (!ret)
> goto ok;
> }
> @@ -341,7 +341,7 @@ static int fit_verify_signature(struct device_node *sig_node, const void *fit)
> hash = xzalloc(digest_length(digest));
> digest_final(digest, hash);
>
> - ret = fit_check_rsa_signature(sig_node, algo, hash);
> + ret = fit_check_signature(sig_node, algo, hash);
> if (ret)
> goto out_free_hash;
>
> @@ -464,7 +464,7 @@ static int fit_image_verify_signature(struct fit_handle *handle,
> hash = xzalloc(digest_length(digest));
> digest_final(digest, hash);
>
> - ret = fit_check_rsa_signature(sig_node, algo, hash);
> + ret = fit_check_signature(sig_node, algo, hash);
>
> free(hash);
>
> diff --git a/crypto/public-keys.c b/crypto/public-keys.c
> index a3ef3bafc8..36c308908d 100644
> --- a/crypto/public-keys.c
> +++ b/crypto/public-keys.c
> @@ -2,31 +2,91 @@
> #include <crypto/public_key.h>
> #include <rsa.h>
>
> +static LIST_HEAD(public_keys);
> +
> +const struct public_key *public_key_next(const struct public_key *prev)
> +{
> + prev = list_prepare_entry(prev, &public_keys, list);
> + list_for_each_entry_continue(prev, &public_keys, list)
> + return prev;
> +
> + return NULL;
> +}
> +
> +const struct public_key *public_key_get(const char *name)
> +{
> + const struct public_key *key;
> +
> + list_for_each_entry(key, &public_keys, list) {
> + if (!strcmp(key->key_name_hint, name))
> + return key;
> + }
> +
> + return NULL;
> +}
> +
> +int public_key_add(struct public_key *key)
> +{
> + if (public_key_get(key->key_name_hint))
> + return -EEXIST;
> +
> + list_add_tail(&key->list, &public_keys);
> +
> + return 0;
> +}
> +
> +static struct public_key *public_key_dup(const struct public_key *key)
> +{
> + struct public_key *k = xzalloc(sizeof(*k));
> +
> + k->type = key->type;
> + if (key->key_name_hint)
> + k->key_name_hint = xstrdup(key->key_name_hint);
> +
> + switch (key->type) {
> + case PUBLIC_KEY_TYPE_RSA:
> + k->rsa = rsa_key_dup(key->rsa);
> + if (!k->rsa)
> + goto err;
> + break;
> + default:
> + goto err;
> + }
> +
> + return k;
> +err:
> + free(k->key_name_hint);
> + free(k);
> +
> + return NULL;
> +}
> +
> +int public_key_verify(const struct public_key *key, const uint8_t *sig,
> + const uint32_t sig_len, const uint8_t *hash,
> + enum hash_algo algo)
> +{
> + switch (key->type) {
> + case PUBLIC_KEY_TYPE_RSA:
> + return rsa_verify(key->rsa, sig, sig_len, hash, algo);
> + }
> +
> + return -ENOKEY;
> +}
> +
> extern const struct public_key * const __public_keys_start;
> extern const struct public_key * const __public_keys_end;
>
> static int init_public_keys(void)
> {
> const struct public_key * const *iter;
> - int ret;
>
> for (iter = &__public_keys_start; iter != &__public_keys_end; iter++) {
> - struct rsa_public_key *rsa_key;
> -
> - switch ((*iter)->type) {
> - case PUBLIC_KEY_TYPE_RSA:
> - rsa_key = rsa_key_dup((*iter)->rsa);
> - if (!rsa_key)
> - continue;
> -
> - ret = rsa_key_add(rsa_key);
> - if (ret)
> - pr_err("Cannot add rsa key: %pe\n", ERR_PTR(ret));
> - break;
> - default:
> - pr_err("Ignoring unknown key type %u\n", (*iter)->type);
> - }
> + struct public_key *key = public_key_dup(*iter);
> +
> + if (!key)
> + continue;
>
> + public_key_add(key);
> }
>
> return 0;
> diff --git a/crypto/rsa.c b/crypto/rsa.c
> index 8eab07beed..969dbfb32b 100644
> --- a/crypto/rsa.c
> +++ b/crypto/rsa.c
> @@ -15,6 +15,7 @@
> #include <asm/byteorder.h>
> #include <errno.h>
> #include <rsa.h>
> +#include <crypto/public_key.h>
> #include <asm/unaligned.h>
>
> #define UINT64_MULT32(v, multby) (((uint64_t)(v)) * ((uint32_t)(multby)))
> @@ -380,105 +381,74 @@ static void rsa_convert_big_endian(uint32_t *dst, const uint32_t *src, int len)
> dst[i] = fdt32_to_cpu(src[len - 1 - i]);
> }
>
> -struct rsa_public_key *rsa_of_read_key(struct device_node *node)
> +struct public_key *rsa_of_read_key(struct device_node *node)
> {
> const void *modulus, *rr;
> const uint64_t *public_exponent;
> int length;
> - struct rsa_public_key *key;
> + struct public_key *key;
> + struct rsa_public_key *rsa;
> int err;
>
> if (strncmp(node->name, "key-", 4))
> return ERR_PTR(-EINVAL);
>
> key = xzalloc(sizeof(*key));
> + rsa = key->rsa = xzalloc(sizeof(*rsa));
>
> key->key_name_hint = xstrdup(node->name + 4);
>
> - of_property_read_u32(node, "rsa,num-bits", &key->len);
> - of_property_read_u32(node, "rsa,n0-inverse", &key->n0inv);
> + of_property_read_u32(node, "rsa,num-bits", &rsa->len);
> + of_property_read_u32(node, "rsa,n0-inverse", &rsa->n0inv);
>
> public_exponent = of_get_property(node, "rsa,exponent", &length);
> if (!public_exponent || length < sizeof(*public_exponent))
> - key->exponent = RSA_DEFAULT_PUBEXP;
> + rsa->exponent = RSA_DEFAULT_PUBEXP;
> else
> - key->exponent = fdt64_to_cpu(*public_exponent);
> + rsa->exponent = fdt64_to_cpu(*public_exponent);
>
> modulus = of_get_property(node, "rsa,modulus", NULL);
> rr = of_get_property(node, "rsa,r-squared", NULL);
>
> - if (!key->len || !modulus || !rr) {
> + if (!rsa->len || !modulus || !rr) {
> pr_debug("%s: Missing RSA key info", __func__);
> err = -EFAULT;
> goto out;
> }
>
> /* Sanity check for stack size */
> - if (key->len > RSA_MAX_KEY_BITS || key->len < RSA_MIN_KEY_BITS) {
> + if (rsa->len > RSA_MAX_KEY_BITS || rsa->len < RSA_MIN_KEY_BITS) {
> pr_debug("RSA key bits %u outside allowed range %d..%d\n",
> - key->len, RSA_MIN_KEY_BITS, RSA_MAX_KEY_BITS);
> + rsa->len, RSA_MIN_KEY_BITS, RSA_MAX_KEY_BITS);
> err = -EFAULT;
> goto out;
> }
>
> - key->len /= sizeof(uint32_t) * 8;
> + rsa->len /= sizeof(uint32_t) * 8;
>
> - key->modulus = xzalloc(RSA_MAX_KEY_BITS / 8);
> - key->rr = xzalloc(RSA_MAX_KEY_BITS / 8);
> + rsa->modulus = xzalloc(RSA_MAX_KEY_BITS / 8);
> + rsa->rr = xzalloc(RSA_MAX_KEY_BITS / 8);
>
> - rsa_convert_big_endian(key->modulus, modulus, key->len);
> - rsa_convert_big_endian(key->rr, rr, key->len);
> + rsa_convert_big_endian(rsa->modulus, modulus, rsa->len);
> + rsa_convert_big_endian(rsa->rr, rr, rsa->len);
>
> err = 0;
> out:
> - if (err)
> + if (err) {
> free(key);
> + free(rsa);
> + }
>
> return err ? ERR_PTR(err) : key;
> }
>
> void rsa_key_free(struct rsa_public_key *key)
> {
> - list_del(&key->list);
> -
> free(key->modulus);
> free(key->rr);
> free(key);
> }
>
> -static LIST_HEAD(rsa_keys);
> -
> -const struct rsa_public_key *rsa_key_next(const struct rsa_public_key *prev)
> -{
> - prev = list_prepare_entry(prev, &rsa_keys, list);
> - list_for_each_entry_continue(prev, &rsa_keys, list)
> - return prev;
> -
> - return NULL;
> -}
> -
> -const struct rsa_public_key *rsa_get_key(const char *name)
> -{
> - const struct rsa_public_key *key;
> -
> - list_for_each_entry(key, &rsa_keys, list) {
> - if (!strcmp(key->key_name_hint, name))
> - return key;
> - }
> -
> - return NULL;
> -}
> -
> -int rsa_key_add(struct rsa_public_key *key)
> -{
> - if (rsa_get_key(key->key_name_hint))
> - return -EEXIST;
> -
> - list_add_tail(&key->list, &rsa_keys);
> -
> - return 0;
> -}
> -
> struct rsa_public_key *rsa_key_dup(const struct rsa_public_key *key)
> {
> struct rsa_public_key *new;
> @@ -493,7 +463,7 @@ struct rsa_public_key *rsa_key_dup(const struct rsa_public_key *key)
> static void rsa_init_keys_of(void)
> {
> struct device_node *sigs, *sig;
> - struct rsa_public_key *key;
> + struct public_key *key;
> int ret;
>
> if (!IS_ENABLED(CONFIG_OFTREE))
> @@ -511,7 +481,7 @@ static void rsa_init_keys_of(void)
> continue;
> }
>
> - ret = rsa_key_add(key);
> + ret = public_key_add(key);
> if (ret)
> pr_err("Cannot add rsa key %s: %s\n",
> key->key_name_hint, strerror(-ret));
> diff --git a/include/crypto/public_key.h b/include/crypto/public_key.h
> index 83e8401aed..1b91063042 100644
> --- a/include/crypto/public_key.h
> +++ b/include/crypto/public_key.h
> @@ -1,6 +1,8 @@
> #ifndef __CRYPTO_PUBLIC_KEY_H
> #define __CRYPTO_PUBLIC_KEY_H
>
> +#include <digest.h>
> +
> struct rsa_public_key;
> struct ecdsa_public_key;
>
> @@ -10,6 +12,8 @@ enum pulic_key_type {
>
> struct public_key {
> enum pulic_key_type type;
> + struct list_head list;
> + char *key_name_hint;
>
> union {
> struct rsa_public_key *rsa;
> @@ -17,4 +21,15 @@ struct public_key {
> };
> };
>
> +int public_key_add(struct public_key *key);
> +const struct public_key *public_key_get(const char *name);
> +const struct public_key *public_key_next(const struct public_key *prev);
> +
> +#define for_each_public_key(key) \
> + for (key = public_key_next(NULL); key; key = public_key_next(key))
> +
> +int public_key_verify(const struct public_key *key, const uint8_t *sig,
> + const uint32_t sig_len, const uint8_t *hash,
> + enum hash_algo algo);
> +
> #endif /* __CRYPTO_PUBLIC_KEY_H */
> diff --git a/include/rsa.h b/include/rsa.h
> index ecb2f42957..ef03a925b8 100644
> --- a/include/rsa.h
> +++ b/include/rsa.h
> @@ -29,8 +29,6 @@ struct rsa_public_key {
> uint32_t *modulus; /* modulus as little endian array */
> uint32_t *rr; /* R^2 as little endian array */
> uint64_t exponent; /* public exponent */
> - char *key_name_hint;
> - struct list_head list;
> };
>
> /**
> @@ -54,24 +52,12 @@ int rsa_verify(const struct rsa_public_key *key, const uint8_t *sig,
>
> struct device_node;
>
> -struct rsa_public_key *rsa_of_read_key(struct device_node *node);
> +struct public_key *rsa_of_read_key(struct device_node *node);
> void rsa_key_free(struct rsa_public_key *key);
> -const struct rsa_public_key *rsa_get_key(const char *name);
> -
> -const struct rsa_public_key *rsa_key_next(const struct rsa_public_key *prev);
> -
> -#define for_each_rsa_key(key) \
> - for (key = rsa_key_next(NULL); key; key = rsa_key_next(key))
>
> #ifdef CONFIG_CRYPTO_RSA
> -int rsa_key_add(struct rsa_public_key *key);
> struct rsa_public_key *rsa_key_dup(const struct rsa_public_key *key);
> #else
> -static inline int rsa_key_add(struct rsa_public_key *key)
> -{
> - return -ENOSYS;
> -}
> -
> static inline struct rsa_public_key *rsa_key_dup(const struct rsa_public_key *key);
> {
> return NULL;
> diff --git a/scripts/keytoc.c b/scripts/keytoc.c
> index e66c5989bf..8b29118c95 100644
> --- a/scripts/keytoc.c
> +++ b/scripts/keytoc.c
> @@ -491,6 +491,7 @@ static int gen_key_ecdsa(EVP_PKEY *key, const char *key_name, const char *key_na
> if (!standalone) {
> fprintf(outfilep, "\nstatic struct public_key %s_public_key = {\n", key_name_c);
> fprintf(outfilep, "\t.type = PUBLIC_KEY_TYPE_ECDSA,\n");
> + fprintf(outfilep, "\t.key_name_hint = \"%s\",\n", key_name);
> fprintf(outfilep, "\t.ecdsa = &%s,\n", key_name_c);
> fprintf(outfilep, "};");
> fprintf(outfilep, "\nstruct public_key *%s_ecdsa_p __attribute__((section(\".public_keys.rodata.%s\"))) = &%s_public_key;\n",
> @@ -551,12 +552,12 @@ static int gen_key_rsa(EVP_PKEY *key, const char *key_name, const char *key_name
> fprintf(outfilep, "\t.modulus = %s_modulus,\n", key_name_c);
> fprintf(outfilep, "\t.rr = %s_rr,\n", key_name_c);
> fprintf(outfilep, "\t.exponent = 0x%0lx,\n", exponent);
> - fprintf(outfilep, "\t.key_name_hint = \"%s\",\n", key_name);
> fprintf(outfilep, "};\n");
>
> if (!standalone) {
> fprintf(outfilep, "\nstatic struct public_key %s_public_key = {\n", key_name_c);
> fprintf(outfilep, "\t.type = PUBLIC_KEY_TYPE_RSA,\n");
> + fprintf(outfilep, "\t.key_name_hint = \"%s\",\n", key_name);
> fprintf(outfilep, "\t.rsa = &%s,\n", key_name_c);
> fprintf(outfilep, "};");
> fprintf(outfilep, "\nstruct public_key *%sp __attribute__((section(\".public_keys.rodata.%s\"))) = &%s_public_key;\n",
--
Pengutronix e.K. | |
Steuerwalder Str. 21 | http://www.pengutronix.de/ |
31137 Hildesheim, Germany | Phone: +49-5121-206917-0 |
Amtsgericht Hildesheim, HRA 2686 | Fax: +49-5121-206917-5555 |
^ permalink raw reply [flat|nested] 33+ messages in thread
* Re: [PATCH v4 09/16] crypto: rsa: encapsulate rsa keys in public keys struct
2024-09-27 8:02 ` Ahmad Fatoum
@ 2024-09-27 11:11 ` Sascha Hauer
0 siblings, 0 replies; 33+ messages in thread
From: Sascha Hauer @ 2024-09-27 11:11 UTC (permalink / raw)
To: Ahmad Fatoum; +Cc: Barebox List
On Fri, Sep 27, 2024 at 10:02:08AM +0200, Ahmad Fatoum wrote:
> On 13.09.24 09:59, Sascha Hauer wrote:
> > This encapsulates struct rsa_public_key into a struct public_key. So far
> > RSA keys are the only supported key type. With adding ECDSA keys we need
> > a container struct so that we can add ECDSA keys using the same
> > mechanisms.
> >
> > Also we rename CONFIG_CRYPTO_RSA_KEY to CONFIG_CRYPTO_PUBLIC_KEYS and
> > CONFIG_CRYPTO_RSA_BUILTIN_KEYS to CONFIG_CRYPTO_BUILTIN_KEYS as these
> > variables will be used for all types of keys, not only RSA keys.
> >
> > Signed-off-by: Sascha Hauer <s.hauer@pengutronix.de>
>
> Reviewed-by: Ahmad Fatoum <a.fatoum@pengutronix.de>
>
> But two comments below.
>
> > diff --git a/crypto/public-keys.c b/crypto/public-keys.c
> > new file mode 100644
> > index 0000000000..a3ef3bafc8
> > --- /dev/null
> > +++ b/crypto/public-keys.c
> > @@ -0,0 +1,39 @@
>
> add a pr_fmt?
>
> > +#include <common.h>
> > +#include <crypto/public_key.h>
> > +#include <rsa.h>
> > +
> > +extern const struct public_key * const __public_keys_start;
> > +extern const struct public_key * const __public_keys_end;
> > +
> > +static int init_public_keys(void)
> > +{
> > + const struct public_key * const *iter;
> > + int ret;
> > +
> > + for (iter = &__public_keys_start; iter != &__public_keys_end; iter++) {
> > + struct rsa_public_key *rsa_key;
> > +
> > + switch ((*iter)->type) {
> > + case PUBLIC_KEY_TYPE_RSA:
> > + rsa_key = rsa_key_dup((*iter)->rsa);
> > + if (!rsa_key)
> > + continue;
> > +
> > + ret = rsa_key_add(rsa_key);
> > + if (ret)
> > + pr_err("Cannot add rsa key: %pe\n", ERR_PTR(ret));
> > + break;
> > + default:
> > + pr_err("Ignoring unknown key type %u\n", (*iter)->type);
> > + }
> > +
> > + }
> > +
> > + return 0;
> > +}
> > +
> > +device_initcall(init_public_keys);
> > +
>
> > -extern const struct rsa_public_key * const __rsa_keys_start;
> > -extern const struct rsa_public_key * const __rsa_keys_end;
>
> I know you are just moving these around, but defining
> these with [] is way less confusing IMO.
This is changed in 12/16.
Sascha
--
Pengutronix e.K. | |
Steuerwalder Str. 21 | http://www.pengutronix.de/ |
31137 Hildesheim, Germany | Phone: +49-5121-206917-0 |
Amtsgericht Hildesheim, HRA 2686 | Fax: +49-5121-206917-5555 |
^ permalink raw reply [flat|nested] 33+ messages in thread
* Re: [PATCH v4 00/16] Add ECDSA support for FIT image verification
2024-09-13 7:59 [PATCH v4 00/16] Add ECDSA support for FIT image verification Sascha Hauer
` (15 preceding siblings ...)
2024-09-13 7:59 ` [PATCH v4 16/16] crypto: make RSA a visible option Sascha Hauer
@ 2024-09-27 11:23 ` Sascha Hauer
2024-09-27 11:23 ` Sascha Hauer
16 siblings, 1 reply; 33+ messages in thread
From: Sascha Hauer @ 2024-09-27 11:23 UTC (permalink / raw)
To: Barebox List, Sascha Hauer
On Fri, 13 Sep 2024 09:59:08 +0200, Sascha Hauer wrote:
> This series implements ECDSA signature verification for FIT images.
> The ECDSA code itself is taken from the Kernel. Currently only supported
> way to specify a ECDSA key is to compile it into the binary using
> CONFIG_CRYPTO_PUBLIC_KEYS, taking it from a device tree is not yet
> supported.
> Since v2 this series unifies the way public keys are passed to barebox.
> We now have a single Kconfig option which takes a list of public keys,
> which can be either RSA or ECDSA keys.
>
> [...]
Applied, thanks!
[01/16] keytoc: remove ECDSA dts support
https://git.pengutronix.de/cgit/barebox/commit/?id=ea8da7c9f2bc (link may not be stable)
[02/16] keytoc: fail in case gen_key() fails
https://git.pengutronix.de/cgit/barebox/commit/?id=dcd40860f529 (link may not be stable)
[03/16] keytoc: fix ECDSA endianess problems
https://git.pengutronix.de/cgit/barebox/commit/?id=9932d1817b84 (link may not be stable)
[04/16] keytoc: remove duplicate __ENV__ check
https://git.pengutronix.de/cgit/barebox/commit/?id=7a0ced8632b5 (link may not be stable)
[05/16] crypto: Makefile: make simpler
https://git.pengutronix.de/cgit/barebox/commit/?id=099f1aed5c67 (link may not be stable)
[06/16] crypto/Makefile: Drop unnecessary dependencies
https://git.pengutronix.de/cgit/barebox/commit/?id=d0aa7e8fb1e2 (link may not be stable)
[07/16] keytoc: make key name hint optional
https://git.pengutronix.de/cgit/barebox/commit/?id=ed553b7d070c (link may not be stable)
[08/16] crypto: rsa: include key name hint into CONFIG_CRYPTO_RSA_KEY
https://git.pengutronix.de/cgit/barebox/commit/?id=93ccf51a40ff (link may not be stable)
[09/16] crypto: rsa: encapsulate rsa keys in public keys struct
https://git.pengutronix.de/cgit/barebox/commit/?id=b26a8b0a025c (link may not be stable)
[10/16] crypto: add public_key functions
https://git.pengutronix.de/cgit/barebox/commit/?id=724f48590768 (link may not be stable)
[11/16] crypto: builtin_keys: Allow to specify multiple keys in CONFIG_CRYPTO_PUBLIC_KEYS
https://git.pengutronix.de/cgit/barebox/commit/?id=13db5fdf2d54 (link may not be stable)
[12/16] crypto: public-keys: use array of public_keys
https://git.pengutronix.de/cgit/barebox/commit/?id=1eb1f1d2b885 (link may not be stable)
[13/16] crypto: rsa: create static inline wrapper for rsa_verify()
https://git.pengutronix.de/cgit/barebox/commit/?id=5ace4df43844 (link may not be stable)
[14/16] Add elliptic curve cryptography (ECC) helper functions
https://git.pengutronix.de/cgit/barebox/commit/?id=cdc6830e3121 (link may not be stable)
[15/16] crypto: add ECDSA support
https://git.pengutronix.de/cgit/barebox/commit/?id=1a3214bd3eb3 (link may not be stable)
[16/16] crypto: make RSA a visible option
https://git.pengutronix.de/cgit/barebox/commit/?id=8e1de73767fd (link may not be stable)
Best regards,
--
Sascha Hauer <s.hauer@pengutronix.de>
^ permalink raw reply [flat|nested] 33+ messages in thread
* Re: [PATCH v4 00/16] Add ECDSA support for FIT image verification
2024-09-27 11:23 ` [PATCH v4 00/16] Add ECDSA support for FIT image verification Sascha Hauer
@ 2024-09-27 11:23 ` Sascha Hauer
0 siblings, 0 replies; 33+ messages in thread
From: Sascha Hauer @ 2024-09-27 11:23 UTC (permalink / raw)
To: Barebox List
On Fri, Sep 27, 2024 at 01:23:00PM +0200, Sascha Hauer wrote:
>
> On Fri, 13 Sep 2024 09:59:08 +0200, Sascha Hauer wrote:
> > This series implements ECDSA signature verification for FIT images.
> > The ECDSA code itself is taken from the Kernel. Currently only supported
> > way to specify a ECDSA key is to compile it into the binary using
> > CONFIG_CRYPTO_PUBLIC_KEYS, taking it from a device tree is not yet
> > supported.
> > Since v2 this series unifies the way public keys are passed to barebox.
> > We now have a single Kconfig option which takes a list of public keys,
> > which can be either RSA or ECDSA keys.
> >
> > [...]
>
> Applied, thanks!
With afas comments integrated of course.
Sascha
--
Pengutronix e.K. | |
Steuerwalder Str. 21 | http://www.pengutronix.de/ |
31137 Hildesheim, Germany | Phone: +49-5121-206917-0 |
Amtsgericht Hildesheim, HRA 2686 | Fax: +49-5121-206917-5555 |
^ permalink raw reply [flat|nested] 33+ messages in thread
end of thread, other threads:[~2024-09-27 11:28 UTC | newest]
Thread overview: 33+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2024-09-13 7:59 [PATCH v4 00/16] Add ECDSA support for FIT image verification Sascha Hauer
2024-09-13 7:59 ` [PATCH v4 01/16] keytoc: remove ECDSA dts support Sascha Hauer
2024-09-25 8:53 ` Ahmad Fatoum
2024-09-13 7:59 ` [PATCH v4 02/16] keytoc: fail in case gen_key() fails Sascha Hauer
2024-09-25 8:53 ` Ahmad Fatoum
2024-09-13 7:59 ` [PATCH v4 03/16] keytoc: fix ECDSA endianess problems Sascha Hauer
2024-09-27 8:11 ` Ahmad Fatoum
2024-09-13 7:59 ` [PATCH v4 04/16] keytoc: remove duplicate __ENV__ check Sascha Hauer
2024-09-27 6:59 ` Ahmad Fatoum
2024-09-13 7:59 ` [PATCH v4 05/16] crypto: Makefile: make simpler Sascha Hauer
2024-09-27 7:01 ` Ahmad Fatoum
2024-09-13 7:59 ` [PATCH v4 06/16] crypto/Makefile: Drop unnecessary dependencies Sascha Hauer
2024-09-27 7:03 ` Ahmad Fatoum
2024-09-13 7:59 ` [PATCH v4 07/16] keytoc: make key name hint optional Sascha Hauer
2024-09-27 8:18 ` Ahmad Fatoum
2024-09-13 7:59 ` [PATCH v4 08/16] crypto: rsa: include key name hint into CONFIG_CRYPTO_RSA_KEY Sascha Hauer
2024-09-27 7:55 ` Ahmad Fatoum
2024-09-13 7:59 ` [PATCH v4 09/16] crypto: rsa: encapsulate rsa keys in public keys struct Sascha Hauer
2024-09-27 8:02 ` Ahmad Fatoum
2024-09-27 11:11 ` Sascha Hauer
2024-09-13 7:59 ` [PATCH v4 10/16] crypto: add public_key functions Sascha Hauer
2024-09-27 8:20 ` Ahmad Fatoum
2024-09-13 7:59 ` [PATCH v4 11/16] crypto: builtin_keys: Allow to specify multiple keys in CONFIG_CRYPTO_PUBLIC_KEYS Sascha Hauer
2024-09-25 8:22 ` Sascha Hauer
2024-09-13 7:59 ` [PATCH v4 12/16] crypto: public-keys: use array of public_keys Sascha Hauer
2024-09-13 7:59 ` [PATCH v4 13/16] crypto: rsa: create static inline wrapper for rsa_verify() Sascha Hauer
2024-09-27 8:09 ` Ahmad Fatoum
2024-09-13 7:59 ` [PATCH v4 14/16] Add elliptic curve cryptography (ECC) helper functions Sascha Hauer
2024-09-13 7:59 ` [PATCH v4 15/16] crypto: add ECDSA support Sascha Hauer
2024-09-27 8:07 ` Ahmad Fatoum
2024-09-13 7:59 ` [PATCH v4 16/16] crypto: make RSA a visible option Sascha Hauer
2024-09-27 11:23 ` [PATCH v4 00/16] Add ECDSA support for FIT image verification Sascha Hauer
2024-09-27 11:23 ` Sascha Hauer
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox