diff options
author | Reuben Dowle <reubendowle0@gmail.com> | 2020-04-16 17:36:52 +1200 |
---|---|---|
committer | Tom Rini <trini@konsulko.com> | 2020-06-12 13:14:07 -0400 |
commit | d16b38f42704fe3cc94fbee1601be96045013151 (patch) | |
tree | abd95e88387701d92c5319565ed4a6aaf9c02a1b /common/image-fit.c | |
parent | f191f3a1027ede56e2501920e3e8a8acd7033e77 (diff) | |
download | u-boot-d16b38f42704fe3cc94fbee1601be96045013151.zip u-boot-d16b38f42704fe3cc94fbee1601be96045013151.tar.gz u-boot-d16b38f42704fe3cc94fbee1601be96045013151.tar.bz2 |
Add support for SHA384 and SHA512
The current recommendation for best security practice from the US government
is to use SHA384 for TOP SECRET [1].
This patch adds support for SHA384 and SHA512 in the hash command, and also
allows FIT images to be hashed with these algorithms, and signed with
sha384,rsaXXXX and sha512,rsaXXXX
The SHA implementation is adapted from the linux kernel implementation.
[1] Commercial National Security Algorithm Suite
http://www.iad.gov/iad/programs/iad-initiatives/cnsa-suite.cfm
Signed-off-by: Reuben Dowle <reuben.dowle@4rf.com>
Diffstat (limited to 'common/image-fit.c')
-rw-r--r-- | common/image-fit.c | 9 |
1 files changed, 9 insertions, 0 deletions
diff --git a/common/image-fit.c b/common/image-fit.c index 1ece100..d54eff9 100644 --- a/common/image-fit.c +++ b/common/image-fit.c @@ -32,6 +32,7 @@ DECLARE_GLOBAL_DATA_PTR; #include <u-boot/md5.h> #include <u-boot/sha1.h> #include <u-boot/sha256.h> +#include <u-boot/sha512.h> /*****************************************************************************/ /* New uImage format routines */ @@ -1206,6 +1207,14 @@ int calculate_hash(const void *data, int data_len, const char *algo, sha256_csum_wd((unsigned char *)data, data_len, (unsigned char *)value, CHUNKSZ_SHA256); *value_len = SHA256_SUM_LEN; + } else if (IMAGE_ENABLE_SHA384 && strcmp(algo, "sha384") == 0) { + sha384_csum_wd((unsigned char *)data, data_len, + (unsigned char *)value, CHUNKSZ_SHA384); + *value_len = SHA384_SUM_LEN; + } else if (IMAGE_ENABLE_SHA512 && strcmp(algo, "sha512") == 0) { + sha512_csum_wd((unsigned char *)data, data_len, + (unsigned char *)value, CHUNKSZ_SHA512); + *value_len = SHA512_SUM_LEN; } else if (IMAGE_ENABLE_MD5 && strcmp(algo, "md5") == 0) { md5_wd((unsigned char *)data, data_len, value, CHUNKSZ_MD5); *value_len = 16; |