xref: /rk3399_rockchip-uboot/include/u-boot/rsa-mod-exp.h (revision 31d2b4fd90f9305aad2e79872067e6c0243267de)
1fc2f4246SRuchika Gupta /*
2fc2f4246SRuchika Gupta  * Copyright (c) 2014, Ruchika Gupta.
3fc2f4246SRuchika Gupta  *
4fc2f4246SRuchika Gupta  * SPDX-License-Identifier:    GPL-2.0+
5fc2f4246SRuchika Gupta */
6fc2f4246SRuchika Gupta 
7fc2f4246SRuchika Gupta #ifndef _RSA_MOD_EXP_H
8fc2f4246SRuchika Gupta #define _RSA_MOD_EXP_H
9fc2f4246SRuchika Gupta 
10fc2f4246SRuchika Gupta #include <errno.h>
11fc2f4246SRuchika Gupta #include <image.h>
12fc2f4246SRuchika Gupta 
13fc2f4246SRuchika Gupta /**
14fc2f4246SRuchika Gupta  * struct key_prop - holder for a public key properties
15fc2f4246SRuchika Gupta  *
16fc2f4246SRuchika Gupta  * The struct has pointers to modulus (Typically called N),
17fc2f4246SRuchika Gupta  * The inverse, R^2, exponent. These can be typecasted and
18fc2f4246SRuchika Gupta  * used as byte arrays or converted to the required format
19fc2f4246SRuchika Gupta  * as per requirement of RSA implementation.
20fc2f4246SRuchika Gupta  */
21fc2f4246SRuchika Gupta struct key_prop {
22fc2f4246SRuchika Gupta 	const void *rr;		/* R^2 can be treated as byte array */
23fc2f4246SRuchika Gupta 	const void *modulus;	/* modulus as byte array */
24fc2f4246SRuchika Gupta 	const void *public_exponent; /* public exponent as byte array */
25fc2f4246SRuchika Gupta 	uint32_t n0inv;		/* -1 / modulus[0] mod 2^32 */
26fc2f4246SRuchika Gupta 	int num_bits;		/* Key length in bits */
27fc2f4246SRuchika Gupta 	uint32_t exp_len;	/* Exponent length in number of uint8_t */
28fc2f4246SRuchika Gupta };
29fc2f4246SRuchika Gupta 
30fc2f4246SRuchika Gupta /**
31fc2f4246SRuchika Gupta  * rsa_mod_exp_sw() - Perform RSA Modular Exponentiation in sw
32fc2f4246SRuchika Gupta  *
33fc2f4246SRuchika Gupta  * Operation: out[] = sig ^ exponent % modulus
34fc2f4246SRuchika Gupta  *
35fc2f4246SRuchika Gupta  * @sig:	RSA PKCS1.5 signature
36fc2f4246SRuchika Gupta  * @sig_len:	Length of signature in number of bytes
37fc2f4246SRuchika Gupta  * @node:	Node with RSA key elements like modulus, exponent, R^2, n0inv
38*31d2b4fdSRuchika Gupta  * @out:	Result in form of byte array of len equal to sig_len
39fc2f4246SRuchika Gupta  */
40fc2f4246SRuchika Gupta int rsa_mod_exp_sw(const uint8_t *sig, uint32_t sig_len,
41fc2f4246SRuchika Gupta 		struct key_prop *node, uint8_t *out);
42fc2f4246SRuchika Gupta 
43*31d2b4fdSRuchika Gupta int rsa_mod_exp(struct udevice *dev, const uint8_t *sig, uint32_t sig_len,
44*31d2b4fdSRuchika Gupta 		struct key_prop *node, uint8_t *out);
45*31d2b4fdSRuchika Gupta 
46*31d2b4fdSRuchika Gupta /**
47*31d2b4fdSRuchika Gupta  * struct struct mod_exp_ops - Driver model for RSA Modular Exponentiation
48*31d2b4fdSRuchika Gupta  *				operations
49*31d2b4fdSRuchika Gupta  *
50*31d2b4fdSRuchika Gupta  * The uclass interface is implemented by all crypto devices which use
51*31d2b4fdSRuchika Gupta  * driver model.
52*31d2b4fdSRuchika Gupta  */
53*31d2b4fdSRuchika Gupta struct mod_exp_ops {
54*31d2b4fdSRuchika Gupta 	/**
55*31d2b4fdSRuchika Gupta 	 * Perform Modular Exponentiation
56*31d2b4fdSRuchika Gupta 	 *
57*31d2b4fdSRuchika Gupta 	 * Operation: out[] = sig ^ exponent % modulus
58*31d2b4fdSRuchika Gupta 	 *
59*31d2b4fdSRuchika Gupta 	 * @dev:	RSA Device
60*31d2b4fdSRuchika Gupta 	 * @sig:	RSA PKCS1.5 signature
61*31d2b4fdSRuchika Gupta 	 * @sig_len:	Length of signature in number of bytes
62*31d2b4fdSRuchika Gupta 	 * @node:	Node with RSA key elements like modulus, exponent,
63*31d2b4fdSRuchika Gupta 	 *		R^2, n0inv
64*31d2b4fdSRuchika Gupta 	 * @out:	Result in form of byte array of len equal to sig_len
65*31d2b4fdSRuchika Gupta 	 *
66*31d2b4fdSRuchika Gupta 	 * This function computes exponentiation over the signature.
67*31d2b4fdSRuchika Gupta 	 * Returns: 0 if exponentiation is successful, or a negative value
68*31d2b4fdSRuchika Gupta 	 * if it wasn't.
69*31d2b4fdSRuchika Gupta 	 */
70*31d2b4fdSRuchika Gupta 	int (*mod_exp)(struct udevice *dev, const uint8_t *sig,
71*31d2b4fdSRuchika Gupta 			   uint32_t sig_len, struct key_prop *node,
72*31d2b4fdSRuchika Gupta 			   uint8_t *outp);
73*31d2b4fdSRuchika Gupta };
74*31d2b4fdSRuchika Gupta 
75fc2f4246SRuchika Gupta #endif
76