blob: 371c2ba1230ce495d664215c3d1adc59bba53356 [file] [log] [blame]
/* SPDX-License-Identifier: (GPL-2.0+ OR MIT) */
/*
* drivers/keymanage/km_secure_key.c
*
* Copyright (C) 2020 Amlogic, Inc. All rights reserved.
*
*/
#include "key_manage_i.h"
#include <amlogic/amlkey_if.h>
#include <u-boot/sha256.h>
int keymanage_securekey_init(const char* buf, int len)
{
int encrypt_type;
encrypt_type = unifykey_get_encrypt_type();
return amlkey_init((uint8_t*)buf, len, encrypt_type); //confirm
}
int keymanage_securekey_exit(void)
{
return 0;
}
int keymanage_secukey_write(const char *keyname, const void* keydata, unsigned int datalen)
{
int ret = 0;
uint8_t origSum[SHA256_SUM_LEN];
const int isSecure = ( KEY_M_SECURE_KEY == keymanage_dts_get_key_device(keyname) ) ? 1 : 0;
//const int isEncrypt= strlen(keymanage_dts_get_enc_type(keyname)) ? 1 : 0;
//const unsigned int keyAttr = ( isSecure << 0 ) | ( isEncrypt << 8 );
ssize_t writenLen = 0;
int isEncrypt;
unsigned int keyAttr;
const char *penc_type;
penc_type = keymanage_dts_get_enc_type(keyname);
if (!penc_type) {
//isEncrypt = strlen(penc_type) ? 1 : 0;
isEncrypt = 0;
} else {
isEncrypt = strlen(penc_type) ? 1 : 0;
//
}
keyAttr = (isSecure << 0) | (isEncrypt << 8);
if (isSecure) {
sha256_context ctx;
sha256_starts(&ctx);
sha256_update(&ctx, keydata, datalen);
sha256_finish(&ctx, origSum);
}
KM_MSG("isEncrypt=%s\n", keymanage_dts_get_enc_type(keyname));
KM_DBG("%s, keyname=%s, keydata=%p, datalen=%d, isSecure=%d\n", __func__, keyname, keydata, datalen, isSecure);
KM_MSG("keyAttr is 0x%08X\n", keyAttr);
writenLen = amlkey_write((uint8_t*)keyname, (uint8_t*)keydata, datalen, keyAttr);
if (writenLen != datalen) {
KM_ERR("Want to write %u bytes, but only %zd Bytes\n", datalen, writenLen);
return __LINE__;
}
if (isSecure)
{
uint8_t genSum[SHA256_SUM_LEN] = {0,};
ret = amlkey_hash_4_secure((uint8_t*)keyname, genSum);
if (ret) {
KM_ERR("Failed when gen hash for secure key[%s], ret=%d\n", keyname, ret);
return __LINE__;
}
ret = memcmp(origSum, genSum, SHA256_SUM_LEN);
if (ret)
{
int index = 0;
char origSum_str[SHA256_SUM_LEN * 2 + 2];
char genSum_str[SHA256_SUM_LEN * 2 + 2];
int org_n = 0, gen_n = 0;
origSum_str[0] = genSum_str[0] = '\0';
for (index = 0; index < SHA256_SUM_LEN; ++index) {
//sprintf(origSum_str, "%s%02x", origSum_str, origSum[index]); //coverity error
//sprintf(genSum_str, "%s%02x", genSum_str, genSum[index]); //coverity error
org_n += sprintf(&origSum_str[org_n], "%02x", origSum[index]);
gen_n += sprintf(&genSum_str[gen_n], "%02x", genSum[index]);
}
KM_ERR("Failed in check hash, origSum[%s] != genSum[%s]\n", origSum_str, genSum_str);
return __LINE__;
}
KM_MSG("OK in check sha1256 in burn key[%s]\n", keyname);
}
return ret;
}
ssize_t keymanage_secukey_size(const char* keyname)
{
return amlkey_size((uint8_t*)keyname); //actually size
}
int keymanage_secukey_exist(const char* keyname)
{
return amlkey_isexsit((uint8_t*)keyname); //exsit 1, non 0
}
int keymanage_secukey_can_read(const char* keyname)
{
return !amlkey_issecure((uint8_t*)keyname); //secure 1, non 0
}
int keymanage_secukey_read(const char* keyname, void* databuf, unsigned buflen)
{
int ret = 0;
ret = keymanage_secukey_can_read(keyname);
if (!ret) {
KM_ERR("key[%s] can't read, is configured secured?\n", keyname);
return __LINE__;
}
const ssize_t readLen = amlkey_read((uint8_t*)keyname, (uint8_t*)databuf, buflen);
if (readLen != buflen) {
KM_ERR("key[%s], want read %u Bytes, but %zd bytes\n", keyname, buflen, readLen);
return __LINE__;
}
return 0;
}