mirror of
https://source.denx.de/u-boot/u-boot.git
synced 2025-08-06 23:36:59 +02:00
This adds new aes subcommands to use interface provided by AES UCLASS which can be used to expose HW AES engines. Signed-off-by: Ion Agorria <ion@agorria.com> Signed-off-by: Svyatoslav Ryhel <clamor95@gmail.com>
345 lines
9.4 KiB
C
345 lines
9.4 KiB
C
// SPDX-License-Identifier: GPL-2.0+
|
|
/*
|
|
* Copyright (C) 2014 Marek Vasut <marex@denx.de>
|
|
* Copyright (C) 2025 Ion Agorria <ion@agorria.com>
|
|
*
|
|
* Command for AES-[128/192/256] operations.
|
|
*/
|
|
|
|
#include <command.h>
|
|
#include <uboot_aes.h>
|
|
#include <malloc.h>
|
|
#include <asm/byteorder.h>
|
|
#include <linux/compiler.h>
|
|
#include <mapmem.h>
|
|
#include <vsprintf.h>
|
|
#include <dm/uclass.h>
|
|
#include <dm/device.h>
|
|
|
|
u32 aes_get_key_len(char *command)
|
|
{
|
|
u32 key_len = AES128_KEY_LENGTH;
|
|
|
|
if (!strcmp(command, "aes.192"))
|
|
key_len = AES192_KEY_LENGTH;
|
|
else if (!strcmp(command, "aes.256"))
|
|
key_len = AES256_KEY_LENGTH;
|
|
|
|
return key_len;
|
|
}
|
|
|
|
int aes_get_driver(struct udevice **dev)
|
|
{
|
|
int ret;
|
|
|
|
ret = uclass_get_device(UCLASS_AES, 0, dev);
|
|
if (ret) {
|
|
printf("Failed to get AES driver: %d\n", ret);
|
|
return ret;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
int cmd_aes_cbc_simple(int argc, char *const argv[], u32 key_len)
|
|
{
|
|
uint32_t key_addr, iv_addr, src_addr, dst_addr, len;
|
|
uint8_t *key_ptr, *iv_ptr, *src_ptr, *dst_ptr;
|
|
u8 key_exp[AES256_EXPAND_KEY_LENGTH];
|
|
u32 aes_blocks;
|
|
int enc;
|
|
|
|
if (argc != 7)
|
|
return CMD_RET_USAGE;
|
|
|
|
if (!strncmp(argv[1], "enc", 3))
|
|
enc = 1;
|
|
else if (!strncmp(argv[1], "dec", 3))
|
|
enc = 0;
|
|
else
|
|
return CMD_RET_USAGE;
|
|
|
|
key_addr = hextoul(argv[2], NULL);
|
|
iv_addr = hextoul(argv[3], NULL);
|
|
src_addr = hextoul(argv[4], NULL);
|
|
dst_addr = hextoul(argv[5], NULL);
|
|
len = hextoul(argv[6], NULL);
|
|
|
|
key_ptr = (uint8_t *)map_sysmem(key_addr, key_len);
|
|
iv_ptr = (uint8_t *)map_sysmem(iv_addr, 128 / 8);
|
|
src_ptr = (uint8_t *)map_sysmem(src_addr, len);
|
|
dst_ptr = (uint8_t *)map_sysmem(dst_addr, len);
|
|
|
|
/* First we expand the key. */
|
|
aes_expand_key(key_ptr, key_len, key_exp);
|
|
|
|
/* Calculate the number of AES blocks to encrypt. */
|
|
aes_blocks = DIV_ROUND_UP(len, AES_BLOCK_LENGTH);
|
|
|
|
if (enc)
|
|
aes_cbc_encrypt_blocks(key_len, key_exp, iv_ptr, src_ptr,
|
|
dst_ptr, aes_blocks);
|
|
else
|
|
aes_cbc_decrypt_blocks(key_len, key_exp, iv_ptr, src_ptr,
|
|
dst_ptr, aes_blocks);
|
|
|
|
unmap_sysmem(key_ptr);
|
|
unmap_sysmem(iv_ptr);
|
|
unmap_sysmem(src_ptr);
|
|
unmap_sysmem(dst_ptr);
|
|
|
|
return CMD_RET_SUCCESS;
|
|
}
|
|
|
|
int cmd_aes_get_slots(void)
|
|
{
|
|
struct udevice *dev;
|
|
u8 slots;
|
|
int ret;
|
|
|
|
ret = aes_get_driver(&dev);
|
|
if (ret)
|
|
return ret;
|
|
|
|
slots = dm_aes_get_available_key_slots(dev);
|
|
printf("Available slots: %d\n", slots);
|
|
|
|
return CMD_RET_SUCCESS;
|
|
}
|
|
|
|
int cmd_aes_set_key(int argc, char *const argv[], u32 key_len)
|
|
{
|
|
struct udevice *dev;
|
|
u32 key_addr, slot;
|
|
u8 *key_ptr;
|
|
int ret;
|
|
|
|
if (argc != 4)
|
|
return CMD_RET_USAGE;
|
|
|
|
ret = aes_get_driver(&dev);
|
|
if (ret)
|
|
return ret;
|
|
|
|
key_addr = hextoul(argv[2], NULL);
|
|
slot = hextoul(argv[3], NULL);
|
|
|
|
key_ptr = (uint8_t *)map_sysmem(key_addr, key_len);
|
|
|
|
ret = dm_aes_set_key_for_key_slot(dev, key_len * 8, key_ptr, slot);
|
|
unmap_sysmem(key_ptr);
|
|
if (ret) {
|
|
printf("Unable to set key at slot: %d\n", ret);
|
|
return CMD_RET_FAILURE;
|
|
}
|
|
|
|
return CMD_RET_SUCCESS;
|
|
}
|
|
|
|
int cmd_aes_select_slot(int argc, char *const argv[], u32 key_len)
|
|
{
|
|
struct udevice *dev;
|
|
u32 slot;
|
|
int ret;
|
|
|
|
if (argc != 3)
|
|
return CMD_RET_USAGE;
|
|
|
|
ret = aes_get_driver(&dev);
|
|
if (ret)
|
|
return ret;
|
|
|
|
slot = hextoul(argv[2], NULL);
|
|
|
|
ret = dm_aes_select_key_slot(dev, key_len * 8, slot);
|
|
if (ret) {
|
|
printf("Unable to select key slot: %d\n", ret);
|
|
return CMD_RET_FAILURE;
|
|
}
|
|
|
|
return CMD_RET_SUCCESS;
|
|
}
|
|
|
|
int cmd_aes_ecb(int argc, char *const argv[], u32 key_len)
|
|
{
|
|
struct udevice *dev;
|
|
u32 src_addr, dst_addr, len;
|
|
u8 *src_ptr, *dst_ptr;
|
|
u32 aes_blocks;
|
|
int enc, ret;
|
|
|
|
if (argc != 6)
|
|
return CMD_RET_USAGE;
|
|
|
|
ret = aes_get_driver(&dev);
|
|
if (ret)
|
|
return ret;
|
|
|
|
if (!strncmp(argv[1], "enc", 3))
|
|
enc = 1;
|
|
else if (!strncmp(argv[1], "dec", 3))
|
|
enc = 0;
|
|
else
|
|
return CMD_RET_USAGE;
|
|
|
|
src_addr = hextoul(argv[3], NULL);
|
|
dst_addr = hextoul(argv[4], NULL);
|
|
len = hextoul(argv[5], NULL);
|
|
|
|
src_ptr = (uint8_t *)map_sysmem(src_addr, len);
|
|
dst_ptr = (uint8_t *)map_sysmem(dst_addr, len);
|
|
|
|
/* Calculate the number of AES blocks to encrypt. */
|
|
aes_blocks = DIV_ROUND_UP(len, AES_BLOCK_LENGTH);
|
|
|
|
if (enc)
|
|
ret = dm_aes_ecb_encrypt(dev, src_ptr, dst_ptr, aes_blocks);
|
|
else
|
|
ret = dm_aes_ecb_decrypt(dev, src_ptr, dst_ptr, aes_blocks);
|
|
|
|
unmap_sysmem(src_ptr);
|
|
unmap_sysmem(dst_ptr);
|
|
|
|
if (ret) {
|
|
printf("Unable to do ecb operation: %d\n", ret);
|
|
return CMD_RET_FAILURE;
|
|
}
|
|
|
|
return CMD_RET_SUCCESS;
|
|
}
|
|
|
|
int cmd_aes_cbc(int argc, char *const argv[], u32 key_len)
|
|
{
|
|
struct udevice *dev;
|
|
u32 iv_addr, src_addr, dst_addr, len;
|
|
u8 *iv_ptr, *src_ptr, *dst_ptr;
|
|
u32 aes_blocks;
|
|
int enc, ret;
|
|
|
|
if (argc != 7)
|
|
return CMD_RET_USAGE;
|
|
|
|
ret = aes_get_driver(&dev);
|
|
if (ret)
|
|
return ret;
|
|
|
|
if (!strncmp(argv[1], "enc", 3))
|
|
enc = 1;
|
|
else if (!strncmp(argv[1], "dec", 3))
|
|
enc = 0;
|
|
else
|
|
return CMD_RET_USAGE;
|
|
|
|
iv_addr = hextoul(argv[3], NULL);
|
|
src_addr = hextoul(argv[4], NULL);
|
|
dst_addr = hextoul(argv[5], NULL);
|
|
len = hextoul(argv[6], NULL);
|
|
|
|
iv_ptr = (uint8_t *)map_sysmem(iv_addr, AES_BLOCK_LENGTH);
|
|
src_ptr = (uint8_t *)map_sysmem(src_addr, len);
|
|
dst_ptr = (uint8_t *)map_sysmem(dst_addr, len);
|
|
|
|
/* Calculate the number of AES blocks to encrypt. */
|
|
aes_blocks = DIV_ROUND_UP(len, AES_BLOCK_LENGTH);
|
|
|
|
if (enc)
|
|
ret = dm_aes_cbc_encrypt(dev, iv_ptr, src_ptr, dst_ptr, aes_blocks);
|
|
else
|
|
ret = dm_aes_cbc_decrypt(dev, iv_ptr, src_ptr, dst_ptr, aes_blocks);
|
|
|
|
unmap_sysmem(iv_ptr);
|
|
unmap_sysmem(src_ptr);
|
|
unmap_sysmem(dst_ptr);
|
|
|
|
if (ret) {
|
|
printf("Unable to do cbc operation: %d\n", ret);
|
|
return CMD_RET_FAILURE;
|
|
}
|
|
|
|
return CMD_RET_SUCCESS;
|
|
}
|
|
|
|
/**
|
|
* do_aes() - Handle the "aes" command-line command
|
|
* @cmdtp: Command data struct pointer
|
|
* @flag: Command flag
|
|
* @argc: Command-line argument count
|
|
* @argv: Array of command-line arguments
|
|
*
|
|
* Returns zero on success, CMD_RET_USAGE in case of misuse and negative
|
|
* on error.
|
|
*/
|
|
static int do_aes(struct cmd_tbl *cmdtp, int flag, int argc, char *const argv[])
|
|
{
|
|
u32 key_len;
|
|
|
|
if (argc < 2)
|
|
return CMD_RET_USAGE;
|
|
|
|
key_len = aes_get_key_len(argv[0]);
|
|
|
|
if (!strncmp(argv[1], "enc", 3) || !strncmp(argv[1], "dec", 3))
|
|
return cmd_aes_cbc_simple(argc, argv, key_len);
|
|
else if (CONFIG_IS_ENABLED(DM_AES) && !strncmp(argv[1], "get_slots", 9))
|
|
return cmd_aes_get_slots();
|
|
else if (CONFIG_IS_ENABLED(DM_AES) && !strncmp(argv[1], "set_key", 7))
|
|
return cmd_aes_set_key(argc, argv, key_len);
|
|
else if (CONFIG_IS_ENABLED(DM_AES) && !strncmp(argv[1], "select_slot", 11))
|
|
return cmd_aes_select_slot(argc, argv, key_len);
|
|
else if (CONFIG_IS_ENABLED(DM_AES) && !strncmp(argv[1], "ecb", 3))
|
|
return cmd_aes_ecb(argc, argv, key_len);
|
|
else if (CONFIG_IS_ENABLED(DM_AES) && !strncmp(argv[1], "cbc", 3))
|
|
return cmd_aes_cbc(argc, argv, key_len);
|
|
else
|
|
return CMD_RET_USAGE;
|
|
}
|
|
|
|
/***************************************************/
|
|
U_BOOT_LONGHELP(aes,
|
|
"[.128,.192,.256] enc key iv src dst len - CBC encrypt block of data $len bytes long\n"
|
|
" at address $src using a key at address\n"
|
|
" $key with initialization vector at address\n"
|
|
" $iv. Store the result at address $dst.\n"
|
|
" The $len size must be multiple of 16 bytes.\n"
|
|
" The $key and $iv must be 16 bytes long.\n"
|
|
"aes [.128,.192,.256] dec key iv src dst len - CBC decrypt block of data $len bytes long\n"
|
|
" at address $src using a key at address\n"
|
|
" $key with initialization vector at address\n"
|
|
" $iv. Store the result at address $dst.\n"
|
|
" The $len size must be multiple of 16 bytes.\n"
|
|
" The $key and $iv must be 16 bytes long."
|
|
|
|
#if CONFIG_IS_ENABLED(DM_AES)
|
|
"\n"
|
|
"aes get_slots - Gives number of available key slots\n"
|
|
"aes [.128,.192,.256] set_key key slot - Load key at address $key into the slot $slot\n"
|
|
"aes [.128,.192,.256] select_slot slot - Select current active key slot\n"
|
|
"aes [.128,.192,.256] ecb enc src dst len - ECB encrypt block of data $len bytes long\n"
|
|
" at address $src using a key at current\n"
|
|
" slot. Store the result at address $dst.\n"
|
|
" The $len size must be multiple of 16 bytes.\n"
|
|
"aes [.128,.192,.256] ecb dec src dst len - ECB decrypt block of data $len bytes long\n"
|
|
" at address $src using a key at current\n"
|
|
" slot. Store the result at address $dst.\n"
|
|
" The $len size must be multiple of 16 bytes.\n"
|
|
"aes [.128,.192,.256] cbc enc iv src dst len - CBC encrypt block of data $len bytes long\n"
|
|
" at address $src using a key at current\n"
|
|
" slot with initialization vector at address\n"
|
|
" $iv. Store the result at address $dst.\n"
|
|
" The $len size must be multiple of 16 bytes.\n"
|
|
" The $iv must be 16 bytes long.\n"
|
|
"aes [.128,.192,.256] cbc dec iv src dst len - CBC decrypt block of data $len bytes long\n"
|
|
" at address $src using a key at current\n"
|
|
" slot with initialization vector at address\n"
|
|
" $iv. Store the result at address $dst.\n"
|
|
" The $len size must be multiple of 16 bytes.\n"
|
|
" The $iv must be 16 bytes long."
|
|
#endif
|
|
);
|
|
|
|
U_BOOT_CMD(
|
|
aes, 7, 1, do_aes,
|
|
"AES 128/192/256 operations",
|
|
aes_help_text
|
|
);
|