Initial commit
Initial commit.
This commit is contained in:
160
bootloader/mcuboot/boot/bootutil/src/image_ed25519.c
Normal file
160
bootloader/mcuboot/boot/bootutil/src/image_ed25519.c
Normal file
@@ -0,0 +1,160 @@
|
||||
/*
|
||||
* SPDX-License-Identifier: Apache-2.0
|
||||
*
|
||||
* Copyright (c) 2019 JUUL Labs
|
||||
* Copyright (c) 2021-2023 Arm Limited
|
||||
*/
|
||||
|
||||
#include <string.h>
|
||||
|
||||
#include "mcuboot_config/mcuboot_config.h"
|
||||
|
||||
#if defined(CONFIG_NRF_SECURITY)
|
||||
/* We are not really using the MBEDTLS but need the ASN.1 parsing funcitons */
|
||||
#define MBEDTLS_ASN1_PARSE_C
|
||||
#endif
|
||||
|
||||
#ifdef MCUBOOT_SIGN_ED25519
|
||||
#include "bootutil/sign_key.h"
|
||||
|
||||
#include "mbedtls/oid.h"
|
||||
#include "mbedtls/asn1.h"
|
||||
|
||||
#include "bootutil_priv.h"
|
||||
#include "bootutil/crypto/common.h"
|
||||
#include "bootutil/crypto/sha.h"
|
||||
|
||||
#define EDDSA_SIGNATURE_LENGTH 64
|
||||
#define NUM_ED25519_BYTES 32
|
||||
|
||||
extern int ED25519_verify(const uint8_t *message, size_t message_len,
|
||||
const uint8_t signature[EDDSA_SIGNATURE_LENGTH],
|
||||
const uint8_t public_key[NUM_ED25519_BYTES]);
|
||||
|
||||
#if !defined(CONFIG_BOOT_SIGNATURE_USING_KMU)
|
||||
|
||||
static const uint8_t ed25519_pubkey_oid[] = MBEDTLS_OID_ISO_IDENTIFIED_ORG "\x65\x70";
|
||||
|
||||
/*
|
||||
* Parse the public key used for signing.
|
||||
*/
|
||||
static int
|
||||
bootutil_import_key(uint8_t **cp, uint8_t *end)
|
||||
{
|
||||
size_t len;
|
||||
mbedtls_asn1_buf alg;
|
||||
mbedtls_asn1_buf param;
|
||||
|
||||
if (mbedtls_asn1_get_tag(cp, end, &len,
|
||||
MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE)) {
|
||||
return -1;
|
||||
}
|
||||
end = *cp + len;
|
||||
|
||||
if (mbedtls_asn1_get_alg(cp, end, &alg, ¶m)) {
|
||||
return -2;
|
||||
}
|
||||
|
||||
if (alg.ASN1_CONTEXT_MEMBER(len) != sizeof(ed25519_pubkey_oid) - 1 ||
|
||||
memcmp(alg.ASN1_CONTEXT_MEMBER(p), ed25519_pubkey_oid, sizeof(ed25519_pubkey_oid) - 1)) {
|
||||
return -3;
|
||||
}
|
||||
|
||||
if (mbedtls_asn1_get_bitstring_null(cp, end, &len)) {
|
||||
return -4;
|
||||
}
|
||||
if (*cp + len != end) {
|
||||
return -5;
|
||||
}
|
||||
|
||||
if (len != NUM_ED25519_BYTES) {
|
||||
return -6;
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
#endif
|
||||
|
||||
fih_ret
|
||||
bootutil_verify_sig(uint8_t *hash, uint32_t hlen, uint8_t *sig, size_t slen,
|
||||
uint8_t key_id)
|
||||
{
|
||||
int rc;
|
||||
FIH_DECLARE(fih_rc, FIH_FAILURE);
|
||||
uint8_t *pubkey = NULL;
|
||||
#if !defined(CONFIG_BOOT_SIGNATURE_USING_KMU)
|
||||
uint8_t *end;
|
||||
#endif
|
||||
|
||||
if (hlen != IMAGE_HASH_SIZE || slen != EDDSA_SIGNATURE_LENGTH) {
|
||||
FIH_SET(fih_rc, FIH_FAILURE);
|
||||
goto out;
|
||||
}
|
||||
|
||||
#if !defined(CONFIG_BOOT_SIGNATURE_USING_KMU)
|
||||
pubkey = (uint8_t *)bootutil_keys[key_id].key;
|
||||
end = pubkey + *bootutil_keys[key_id].len;
|
||||
|
||||
rc = bootutil_import_key(&pubkey, end);
|
||||
if (rc) {
|
||||
FIH_SET(fih_rc, FIH_FAILURE);
|
||||
goto out;
|
||||
}
|
||||
#endif
|
||||
|
||||
rc = ED25519_verify(hash, IMAGE_HASH_SIZE, sig, pubkey);
|
||||
|
||||
if (rc == 0) {
|
||||
/* if verify returns 0, there was an error. */
|
||||
FIH_SET(fih_rc, FIH_FAILURE);
|
||||
goto out;
|
||||
}
|
||||
|
||||
FIH_SET(fih_rc, FIH_SUCCESS);
|
||||
out:
|
||||
|
||||
FIH_RET(fih_rc);
|
||||
}
|
||||
|
||||
fih_ret
|
||||
bootutil_verify_img(const uint8_t *img, uint32_t size,
|
||||
uint8_t *sig, size_t slen, uint8_t key_id)
|
||||
{
|
||||
int rc;
|
||||
FIH_DECLARE(fih_rc, FIH_FAILURE);
|
||||
uint8_t *pubkey = NULL;
|
||||
#if !defined(CONFIG_BOOT_SIGNATURE_USING_KMU)
|
||||
uint8_t *end;
|
||||
#endif
|
||||
|
||||
if (slen != EDDSA_SIGNATURE_LENGTH) {
|
||||
FIH_SET(fih_rc, FIH_FAILURE);
|
||||
goto out;
|
||||
}
|
||||
|
||||
#if !defined(CONFIG_BOOT_SIGNATURE_USING_KMU)
|
||||
pubkey = (uint8_t *)bootutil_keys[key_id].key;
|
||||
end = pubkey + *bootutil_keys[key_id].len;
|
||||
|
||||
rc = bootutil_import_key(&pubkey, end);
|
||||
if (rc) {
|
||||
FIH_SET(fih_rc, FIH_FAILURE);
|
||||
goto out;
|
||||
}
|
||||
#endif
|
||||
|
||||
rc = ED25519_verify(img, size, sig, pubkey);
|
||||
|
||||
if (rc == 0) {
|
||||
/* if verify returns 0, there was an error. */
|
||||
FIH_SET(fih_rc, FIH_FAILURE);
|
||||
goto out;
|
||||
}
|
||||
|
||||
FIH_SET(fih_rc, FIH_SUCCESS);
|
||||
out:
|
||||
|
||||
FIH_RET(fih_rc);
|
||||
}
|
||||
|
||||
#endif /* MCUBOOT_SIGN_ED25519 */
|
||||
Reference in New Issue
Block a user