blob: 06c191b970d9d440b29b9b1fbb95c6e296a77ce0 [file] [log] [blame] [edit]
// SPDX-License-Identifier: (GPL-2.0+ OR MIT)
/*
* Copyright (c) 2019 Amlogic, Inc. All rights reserved.
*/
#include <config.h>
#include <common.h>
#include <command.h>
#include <fdt_support.h>
#include <amlogic/aml_crypto.h>
#include <amlogic/aml_mkl.h>
#include <amlogic/store_wrapper.h>
#include <malloc.h>
#include <u-boot/md5.h>
#include <uboot_aes.h>
#include <amlogic/partition_encryption.h>
#include <linux/libfdt.h>
#include <asm/amlogic/arch/bl31_apis.h>
#define DEBUG (0)
#define ERROR_REPORT (1)
//Maximum number of enc partitions which kernel driver supported
#define MAX_ENC_PARTS (4)
typedef struct {
char part_name[32];
u8 wrapped[AES_KEY_SIZE_128];
u8 in_used;
} ENC_PART_ENT_T;
ENC_PART_ENT_T enc_parts[MAX_ENC_PARTS];
s32 find_free_enc_parts_ent(void)
{
s32 i = 0;
for (i = 0; i < MAX_ENC_PARTS; i++)
if (enc_parts[i].in_used == 0)
return i;
return -1;
}
#if DEBUG
void dump_bufs(const char *name, const u8 *buf, s32 len)
{
char line_buf[128] = {0x0};
char *line_buf_ptr = line_buf;
u32 i = 0;
const u8 *ptr = buf;
const s32 sz = len;
printf("\n========= Start dump %s(%d)\n", name, sz);
while (len - 16 >= 0) {
printf("%02x %02x %02x %02x %02x %02x %02x %02x",
ptr[0], ptr[i + 1], ptr[i + 2], ptr[i + 3], ptr[i + 4], ptr[i + 5],
ptr[i + 6], ptr[i + 7]);
printf("%02x %02x %02x %02x %02x %02x %02x %02x\n",
ptr[i + 8], ptr[i + 9], ptr[i + 10], ptr[i + 11], ptr[i + 12],
ptr[i + 13], ptr[i + 14], ptr[i + 15]);
ptr += 16;
len -= 16;
}
if (len * 3 <= sizeof(line_buf)) {
while (len) {
snprintf(line_buf_ptr, sizeof(line_buf), "%02x ", *ptr);
line_buf_ptr += 3; /*"xx "*/
len--;
}
if (strlen(line_buf))
printf("%s\n", line_buf);
printf("========= End dump %s(%d)\n", name, sz);
} else {
printf("remaining length exceeds linebuf length\n");
}
}
#endif
void dump_enc_parts(void)
{
s32 i, j;
for (i = 0; i < MAX_ENC_PARTS; i++) {
printf("%d: %s(%s)", i, enc_parts[i].part_name,
enc_parts[i].in_used ? "In used" : "Unused");
printf("\n wrapped: ");
for (j = 0; j < sizeof(enc_parts[i].wrapped); j++)
printf("%02x", enc_parts[i].wrapped[j]);
printf("\n");
}
}
static int hex2bin(char *hex, void *bin, size_t binlen)
{
int i, c, n1, n2, hexlen, k;
hexlen = strnlen(hex, 64);
k = 0;
n1 = -1;
n2 = -1;
for (i = 0; i < hexlen; i++) {
n2 = n1;
c = hex[i];
if (c >= '0' && c <= '9') {
n1 = c - '0';
} else if (c >= 'a' && c <= 'f') {
n1 = c - 'a' + 10;
} else if (c >= 'A' && c <= 'F') {
n1 = c - 'A' + 10;
} else if (c == ' ') {
n1 = -1;
continue;
} else {
return -1;
}
if (n1 >= 0 && n2 >= 0) {
if (k < binlen) {
// k is index and should be 0 <= k < binlen
((u8 *)bin)[k] = (n2 << 4) | n1;
n1 = -1;
k++;
} else {
#if ERROR_REPORT
printf("Output overflow(%d >= %lu)\n", k, binlen);
#endif
goto out;
}
}
}
out:
return k;
}
static int unwrap_key(u8 *in, u32 in_sz, u8 *out, u32 *out_sz)
{
int ret = 0;
#if !CONFIG_PARTITION_ENCRYPTION_LOCAL
struct amlkl_params kl_param;
/* dgpk_func_0_bs_0_tsep_0.test.vector.txt */
u8 dgpk_ek3[16] = {
0xa6, 0x20, 0x65, 0x7f, 0xa9, 0x6b, 0x19, 0x66,
0xa1, 0x03, 0x47, 0xb4, 0x23, 0xde, 0x20, 0x25
};
u8 dgpk_ek2[16] = {
0xa2, 0xe3, 0x7a, 0xe8, 0x6e, 0xce, 0x64, 0x78,
0x69, 0x18, 0x51, 0x0c, 0x57, 0xec, 0x68, 0xcf
};
u8 dgpk_ek1[16] = {
0xfa, 0x29, 0x3b, 0x43, 0x25, 0x7c, 0x96, 0xbd,
0x55, 0x2b, 0x60, 0xd5, 0x95, 0x60, 0xcf, 0xcc
};
#endif
u32 key_slot = 31; //only test slot
u8 dst[AES_KEY_SIZE_128] = {0};
if (!in || !out) {
#if ERROR_REPORT
printf("Invalid arguments.\n");
#endif
return -1;
}
if (!out_sz || *out_sz < AES_KEY_SIZE_128) {
#if ERROR_REPORT
printf("output size too small\n");
#endif
return -1;
}
#if CONFIG_PARTITION_ENCRYPTION_LOCAL
/* when mrk is ACRK, derive it in bl31 */
ret = partition_enc_kl_derive_key(key_slot);
#else
memset(&kl_param, 0, sizeof(kl_param));
kl_param.kt_handle = key_slot;
kl_param.levels = AML_KL_LEVEL_3;
kl_param.usage.crypto = AML_KT_FLAG_ENC_DEC;
kl_param.usage.algo = AML_KT_ALGO_AES;
kl_param.usage.uid = AML_KT_USER_M2M_0;
kl_param.kl_algo = AML_KL_ALGO_AES;
kl_param.kl_mode = AML_KL_MODE_AML;
/* use mrk DGPK1 */
kl_param.mrk_cfg_index = AML_KL_MRK_DGPK1;
/* function id 2 */
kl_param.func_id = AML_KL_FUNC_AES_2;
memcpy(kl_param.eks[0], dgpk_ek1, 16);
memcpy(kl_param.eks[1], dgpk_ek2, 16);
memcpy(kl_param.eks[2], dgpk_ek3, 16);
ret = aml_mkl_run(&kl_param);
#endif
if (ret != 0) {
#if ERROR_REPORT
printf("derive key error[ret:%d]\n", ret);
#endif
return -1;
}
ret = aes_ecb_dec_keytbl(AES_KEY_SIZE_128, in, dst,
NULL, AES_KEY_SIZE_128, key_slot);
#if DEBUG
printf("in:\n");
printf("%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x\n",
in[0], in[1], in[2], in[3], in[4], in[5], in[6], in[7],
in[8], in[9], in[10], in[11], in[12], in[13], in[14], in[15]);
printf("unwrap:");
printf("%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x\n",
dst[0], dst[1], dst[2], dst[3], dst[4], dst[5], dst[6], dst[7],
dst[8], dst[9], dst[10], dst[11], dst[12], dst[13], dst[14], dst[15]);
#endif
memcpy(out, dst, AES_KEY_SIZE_128);
*out_sz = AES_KEY_SIZE_128;
return ret;
}
void apply_enc_parts(void)
{
s32 i = 0, rc;
u8 unwrap[AES_KEY_SIZE_128] = {0};
u32 unwrap_sz = sizeof(unwrap);
u64 fdt_addr;
fdt_addr = env_get_ulong("dtb_mem_addr", 16, 0);
for (i = 0; i < MAX_ENC_PARTS; i++) {
if (enc_parts[i].in_used != 0) {
rc = unwrap_key(enc_parts[i].wrapped, AES_KEY_SIZE_128,
unwrap, &unwrap_sz);
if (rc < 0) {
#if ERROR_REPORT
printf("unwrap key for %s failed.(%d)\n",
enc_parts[i].part_name, rc);
#endif
continue;
}
rc = fdt_find_and_setprop((void *)fdt_addr, "/keys", enc_parts[i].part_name,
unwrap, unwrap_sz, 1 /* create */);
if (rc) {
if (rc == -FDT_ERR_NOSPACE) {
/* no space. Try to make extra space for it */
int prop_sz = 0x10;
rc = fdt_shrink_to_minimum((void *)fdt_addr, prop_sz);
if (rc < 0) {
#if ERROR_REPORT
printf("Unable to add extra size(%d) for %s\n",
prop_sz, enc_parts[i].part_name);
#endif
} else {
rc = fdt_find_and_setprop((void *)fdt_addr, "/keys",
enc_parts[i].part_name,
unwrap, unwrap_sz,
1 /* create */);
if (rc) {
#if ERROR_REPORT
printf("Failed to set partition enc for %s(%d)\n",
enc_parts[i].part_name, rc);
#endif
}
}
} else {
#if ERROR_REPORT
printf("Failed to set partition enc for %s(%d)\n",
enc_parts[i].part_name, rc);
#endif
}
}
}
}
return;
}
s32 find_enc_parts(const char *part_name)
{
s32 i = 0;
if (!part_name)
return -1;
for (i = 0; i < MAX_ENC_PARTS; i++) {
if (enc_parts[i].in_used != 0) {
if (!strcmp(part_name, enc_parts[i].part_name))
return i;
}
}
return -1;
}
int set_enc_parts(char *name, char *wrapped_hex, int wrapped_hex_sz)
{
s32 i = 0, rc;
i = find_enc_parts(name);
if (i < 0) {
i = find_free_enc_parts_ent();
if (i < 0) {
#if ERROR_REPORT
printf("Unable to find free slot for %s\n", name);
#endif
return CMD_RET_FAILURE;
}
}
rc = hex2bin(wrapped_hex, enc_parts[i].wrapped, sizeof(enc_parts[i].wrapped));
if (rc < 0) {
#if ERROR_REPORT
printf("Unable to parse data hex2bin for %s\n", wrapped_hex);
#endif
return CMD_RET_FAILURE;
}
strlcpy(enc_parts[i].part_name, name, sizeof(enc_parts[i].part_name) - 1);
enc_parts[i].in_used = 1;
return CMD_RET_SUCCESS;
}
int del_enc_parts(char *name)
{
if (name) {
int i = find_enc_parts(name);
if (i >= 0)
memset(&enc_parts[i], 0x0, sizeof(ENC_PART_ENT_T));
return CMD_RET_SUCCESS;
} else {
return CMD_RET_FAILURE;
}
}
int clear_enc_parts(void)
{
memset(enc_parts, 0x0, sizeof(enc_parts));
return CMD_RET_SUCCESS;
}
int init_enc_parts(void)
{
s32 rc = CMD_RET_SUCCESS;
#ifdef PARTITION_ENC_ARGS
char *args = NULL;
const u32 args_len = strlen(PARTITION_ENC_ARGS);
char *pair[MAX_ENC_PARTS] = {NULL, NULL, NULL, NULL};
char *tmp;
u32 i = 0;
char *part_name;
char *part_key_hex;
#if DEBUG
printf("%s:%d: args_len = %d\n", __func__, __LINE__, args_len);
#endif
if (args_len) {
args = calloc(args_len + 1, sizeof(char));// include EOS
if (!args) {
#if ERROR_REPORT
printf("failed to alloc buf for args.(%u)\n", args_len);
#endif
return -1;
}
strlcpy(args, PARTITION_ENC_ARGS, args_len);
tmp = args;
for (i = 0; i < MAX_ENC_PARTS; i++) {
pair[i] = strsep(&tmp, ";");
if (!pair[i]) {
break;
} else if (!strlen(pair[i])) {
// If delimiter appears at the end of string,
// drop it and continue the parsing
pair[i] = NULL;
i--;
continue;
}
}
if (i == MAX_ENC_PARTS && strsep(&tmp, ";")) {
#if ERROR_REPORT
printf("Too many enc parts provided by PARTITION_ENC_ARGS.\n");
#endif
rc = CMD_RET_FAILURE;
goto out;
}
/* Init enc_parts */
clear_enc_parts();
//memset(enc_parts, 0x0, sizeof(enc_parts));
i = 0;
while (i < MAX_ENC_PARTS && pair[i]) {
#if DEBUG
printf("parsing pair[%s] %d ...\n", pair[i], i);
#endif
tmp = pair[i];
part_name = strsep(&tmp, ":");
part_key_hex = tmp;
if (part_name && part_key_hex) {
rc = set_enc_parts(part_name,
part_key_hex,
strnlen(part_key_hex, 32));
} else {
#if ERROR_REPORT
printf("parsing error.\n");
#endif
rc = CMD_RET_FAILURE;
goto out;
}
i++;
}
rc = CMD_RET_SUCCESS;
}
out:
if (args)
free(args);
#else
printf("PARTITION_ENC_ARGS is not defied.\n");
rc = CMD_RET_FAILURE;
#endif
return rc;
}
static char partition_enc_help_text[] =
"\n"
"[set] <partition> {<value-hexdump-string>}\n"
"\t\t\tSet partition key to data. DATA is in continuous\n"
"\t\t\t hexdump format, e.g. aabb1122\n"
"[del] <partition>\tDelete <partition> in table of partition encryption.\n"
"[init]\t\t\tInitialize table of partition encryption.\n"
"[clear]\t\t\tClear table of partition encryption.\n"
"[dump]\t\t\tDump table of partition encryption.\n"
"[apply]\t\t\tApply table of partition encryption to DTS.\n"
"\n";
int do_partition_enc(cmd_tbl_t *cmdtp, int flag, int argc, char * const argv[])
{
int rc = CMD_RET_SUCCESS;
if (argc < 2)
return CMD_RET_USAGE;
if (argc == 2) {
if (!strcmp(argv[1], "init"))
rc = init_enc_parts();
else if (!strcmp(argv[1], "clear"))
rc = clear_enc_parts();
else if (!strcmp(argv[1], "apply"))
apply_enc_parts();
else if (!strcmp(argv[1], "dump"))
dump_enc_parts();
else
rc = CMD_RET_USAGE;
} else if (argc == 3) {
if (!strcmp(argv[1], "del"))
rc = del_enc_parts(argv[2]);
else
rc = CMD_RET_USAGE;
} else if (argc == 4) {
if (!strcmp(argv[1], "set"))
rc = set_enc_parts(argv[2], argv[3], strnlen(argv[3], 32));
else
rc = CMD_RET_USAGE;
} else {
rc = CMD_RET_USAGE;
}
#if ERROR_REPORT
if (rc != CMD_RET_SUCCESS)
printf("Invalid arguments: %s\n", argv[1]);
#endif
return rc;
}
U_BOOT_CMD(partition_enc, 4, 0, do_partition_enc,
"partition encryption command", partition_enc_help_text);
#if CONFIG_PARTITION_ENCRYPTION_LOCAL
#define LBN_SIZE (512)
#define AES_BLOCK_SIZE (16)
#define LBN_SHIFT (9)
#define IV_FACTOR_BASE_ADDR (0x800)
/* Get logical block number for encryption.
* Size of each lbn is 512 bytes. */
static inline u64 get_lbn(u64 offset)
{
return (offset >> LBN_SHIFT) + IV_FACTOR_BASE_ADDR;
}
s32 calc_aes_128_cbc(u8 *in, u32 in_sz,
u8 *key, u32 key_sz,
u8 *iv, u32 iv_sz,
u8 *out, s32 *out_sz, s32 mode)
{
s32 ret = 0;
u8 key_exp[AES256_EXPAND_KEY_LENGTH];
/* First we expand the key. */
aes_expand_key(key, key_sz, key_exp);
if (mode == DECRYPT)
aes_cbc_decrypt_blocks(AES128_KEY_LENGTH, key_exp, iv,
in, out, in_sz / AES_BLOCK_LENGTH);
else if (mode == ENCRYPT)
aes_cbc_encrypt_blocks(AES128_KEY_LENGTH, key_exp, iv,
in, out, in_sz / AES_BLOCK_LENGTH);
#if ERROR_REPORT
else
printf("Unsupported mode\n");
#endif
return ret;
}
static s32 get_iv(u64 offset, u8 *md5, u32 md5_sz, u8 *out, s32 *out_sz)
{
u64 lbn = get_lbn(offset);
u8 iv[AES_BLOCK_SIZE] = {};
u8 iv_iv[AES_BLOCK_SIZE] = {0xff};
s32 ret = 0;
if (!out || !out_sz || !*out_sz) {
#if ERROR_REPORT
printf("Invalid input.\n");
#endif
return -1;
}
iv[0] = lbn & 0xFF;
iv[1] = (lbn >> 8) & 0xFF;
iv[2] = (lbn >> 16) & 0xFF;
iv[3] = (lbn >> 24) & 0xFF;
ret = calc_aes_128_cbc(iv, sizeof(iv),
md5, md5_sz, /* key */
iv_iv, sizeof(iv_iv), /* iv */
out, out_sz, 0);
return ret;
}
u32 calc_md5(u8 *in, u32 in_sz, u8 *md5_hash, u32 *md5_hash_len)
{
md5(in, in_sz, md5_hash);
return 0;
}
int part_crypt(u8 *in, u64 in_sz,
u8 *key, u32 key_sz,
u8 *out, u64 out_sz,
u64 offset, OP_MODE_T mode)
{
s32 ret = 0;
s32 remaining, read_sz, ret_val = 0;
u8 md5[16];
u32 md5_sz = sizeof(md5);
u64 buf_off = 0;
u8 page_iv[AES_BLOCK_SIZE] = {};
s32 page_iv_sz = AES_BLOCK_SIZE;
s32 wr_sz, wr_total = 0;
u32 padding = 0;
u8 *temp = NULL;
u32 temp_sz = 0;
u32 remain_of_blk = 0;
if (!in_sz || !key || !key_sz || !out) {
#if ERROR_REPORT
printf("Invalid input.\n");
#endif
return -1;
}
if (offset & 0x1ff) {
#if ERROR_REPORT
printf("off should be multiple of 512\n");
#endif
return -1;
}
if (out_sz < in_sz) {
#if ERROR_REPORT
printf("Output size should >= input size(%#llx)\n", in_sz);
#endif
return -1;
}
if (mode != ENCRYPT && mode != DECRYPT) {
#if ERROR_REPORT
printf("Invalid mode.\n");
#endif
return -1;
}
remaining = in_sz;
/* partition key hash */
calc_md5(key, key_sz, md5, &md5_sz);
while (remaining > 0) {
/* Read in a lbn if it is possible */
read_sz = (remaining >= LBN_SIZE) ? LBN_SIZE : remaining;
remain_of_blk = read_sz & (AES_BLOCK_LENGTH - 1);
if (remain_of_blk) {
/* Since LBN_SIZE is multiple of AES_BLOCK_LENGTH, entering
* this case means it is the last read
*/
padding = AES_BLOCK_LENGTH - remain_of_blk;
#if DEBUG
printf("remain_of_blk = %d, padding = %u\n", remain_of_blk, padding);
#endif
temp_sz = read_sz + padding;
temp = (u8 *)malloc(temp_sz);
if (!temp) {
#if ERROR_REPORT
printf("failed to alloc temp buffer.(%d)\n", temp_sz);
#endif
ret = -1;
goto out;
}
/* copy input to temp buffer */
memcpy(temp, &in[buf_off], read_sz);
}
/* update iv */
page_iv_sz = AES_BLOCK_SIZE;
ret = get_iv(offset, md5, md5_sz, page_iv, &page_iv_sz);
if (ret < 0) {
#if ERROR_REPORT
printf("Error to get enc iv\n");
#endif
ret_val = -1;
goto out;
}
if (remain_of_blk) {
wr_sz = temp_sz;
ret = calc_aes_128_cbc(temp, temp_sz, /* input */
key, key_sz, /* key */
page_iv, page_iv_sz, /* iv */
temp, &wr_sz, mode); /* output */
} else {
wr_sz = read_sz;
ret = calc_aes_128_cbc(&in[buf_off], read_sz, /* input */
key, key_sz, /* key */
page_iv, page_iv_sz, /* iv */
&out[buf_off], &wr_sz, mode); /* output */
}
if (ret < 0) {
#if ERROR_REPORT
printf("Error to calc aes 128 cbc\n");
#endif
ret_val = -1;
goto out;
}
if (remain_of_blk) {
/* copy result from temp to out buffer */
memcpy(&out[buf_off], temp, read_sz);
}
offset += read_sz;
buf_off += read_sz;
wr_total += wr_sz;
remaining -= read_sz;
}
out:
if (temp)
free(temp);
return ret;
}
int part_dec(const char *name, u8 *in, u64 in_sz, u8 *out, u64 out_sz, u64 off)
{
s32 rc = env_get_yesno("local_dec");
if (rc == 1) {
int i = find_enc_parts(name);
u8 unwrap[AES_KEY_SIZE_128] = {0x0};
u32 unwrap_sz = AES_KEY_SIZE_128;
if (i < 0)
return -1;
printf("%s is an enc part\n", name);
rc = unwrap_key(enc_parts[i].wrapped, sizeof(enc_parts[i].wrapped),
unwrap, &unwrap_sz);
if (rc) {
#if ERROR_REPORT
printf("unwrap key failed.(%d)\n", rc);
#endif
return rc;
}
return part_crypt(in, in_sz, unwrap, unwrap_sz, out, out_sz, off, DECRYPT);
} else {
return -1;
}
}
#endif //CONFIG_PARTITION_ENCRYPTION_LOCAL