mirror of
https://github.com/espressif/esp-idf.git
synced 2025-08-08 20:21:04 +00:00

Goal is that multiple faults would be required to bypass a boot-time signature check. - Also strengthens some address range checks for safe app memory addresses - Change pre-enable logic to also check the bootloader signature before enabling SBV2 on ESP32 Add some additional checks for invalid sections: - Sections only partially in DRAM or IRAM are invalid - If a section is in D/IRAM, allow the possibility only some is in D/IRAM - Only pass sections that are entirely in the same type of RTC memory region
83 lines
3.0 KiB
C
83 lines
3.0 KiB
C
// Copyright 2015-2016 Espressif Systems (Shanghai) PTE LTD
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
#include "sdkconfig.h"
|
|
|
|
#include "bootloader_flash.h"
|
|
#include "bootloader_sha.h"
|
|
#include "esp_log.h"
|
|
#include "esp_image_format.h"
|
|
#include "esp32s2/rom/secure_boot.h"
|
|
|
|
static const char* TAG = "secure_boot";
|
|
|
|
#define DIGEST_LEN 32
|
|
|
|
esp_err_t esp_secure_boot_verify_signature(uint32_t src_addr, uint32_t length)
|
|
{
|
|
ets_secure_boot_key_digests_t trusted_keys = { 0 };
|
|
uint8_t digest[DIGEST_LEN];
|
|
uint8_t verified_digest[DIGEST_LEN] = { 0 }; /* Note: this function doesn't do any anti-FI checks on this buffer */
|
|
const uint8_t *data;
|
|
|
|
ESP_LOGD(TAG, "verifying signature src_addr 0x%x length 0x%x", src_addr, length);
|
|
|
|
if ((src_addr + length) % 4096 != 0) {
|
|
ESP_LOGE(TAG, "addr 0x%x length 0x%x doesn't end on a sector boundary", src_addr, length);
|
|
return ESP_ERR_INVALID_ARG;
|
|
}
|
|
|
|
data = bootloader_mmap(src_addr, length + sizeof(struct ets_secure_boot_sig_block));
|
|
if (data == NULL) {
|
|
ESP_LOGE(TAG, "bootloader_mmap(0x%x, 0x%x) failed", src_addr, length+sizeof(ets_secure_boot_signature_t));
|
|
return ESP_FAIL;
|
|
}
|
|
|
|
// Calculate digest of main image
|
|
#ifdef BOOTLOADER_BUILD
|
|
bootloader_sha256_handle_t handle = bootloader_sha256_start();
|
|
bootloader_sha256_data(handle, data, length);
|
|
bootloader_sha256_finish(handle, digest);
|
|
#else
|
|
/* Use thread-safe esp-idf SHA function */
|
|
esp_sha(SHA2_256, data, length, digest);
|
|
#endif
|
|
|
|
int r = ets_secure_boot_read_key_digests(&trusted_keys);
|
|
|
|
if (r == ETS_OK) {
|
|
const ets_secure_boot_signature_t *sig = (const ets_secure_boot_signature_t *)(data + length);
|
|
// TODO: calling this function in IDF app context is unsafe
|
|
r = ets_secure_boot_verify_signature(sig, digest, &trusted_keys, verified_digest);
|
|
}
|
|
bootloader_munmap(data);
|
|
|
|
return (r == ETS_OK) ? ESP_OK : ESP_FAIL;
|
|
}
|
|
|
|
esp_err_t esp_secure_boot_verify_rsa_signature_block(const ets_secure_boot_signature_t *sig_block, const uint8_t *image_digest, uint8_t *verified_digest)
|
|
{
|
|
ets_secure_boot_key_digests_t trusted_keys;
|
|
|
|
int r = ets_secure_boot_read_key_digests(&trusted_keys);
|
|
if (r != 0) {
|
|
ESP_LOGE(TAG, "No trusted key digests were found in efuse!");
|
|
} else {
|
|
ESP_LOGD(TAG, "Verifying with RSA-PSS...");
|
|
// TODO: calling this function in IDF app context is unsafe
|
|
r = ets_secure_boot_verify_signature(sig_block, image_digest, &trusted_keys, verified_digest);
|
|
}
|
|
|
|
return (r == 0) ? ESP_OK : ESP_ERR_IMAGE_INVALID;
|
|
}
|