2017-04-01 00:32:05 +00:00
|
|
|
#include <string.h>
|
|
|
|
|
|
|
|
#include "blake2s.h"
|
|
|
|
#include "ed25519-donna/ed25519.h"
|
|
|
|
|
|
|
|
#include "common.h"
|
2017-04-01 10:57:14 +00:00
|
|
|
#include "image.h"
|
2017-04-01 00:32:05 +00:00
|
|
|
|
2017-09-29 15:31:59 +00:00
|
|
|
static bool compute_pubkey(uint8_t sig_m, uint8_t sig_n, const uint8_t * const *pub, uint8_t sigmask, ed25519_public_key res)
|
2017-04-01 00:32:05 +00:00
|
|
|
{
|
2017-09-29 15:31:59 +00:00
|
|
|
if (!sig_m || !sig_n) return false;
|
|
|
|
if (sig_m > sig_n) return false;
|
2017-04-01 20:30:10 +00:00
|
|
|
|
2017-09-29 15:31:59 +00:00
|
|
|
// discard bits higher than sig_n
|
|
|
|
sigmask &= ((1 << sig_n) - 1);
|
2017-04-01 20:30:10 +00:00
|
|
|
|
2017-09-29 15:31:59 +00:00
|
|
|
// remove if number of set bits in sigmask is not equal to sig_m
|
|
|
|
if (__builtin_popcount(sigmask) != sig_m) return false;
|
2017-04-02 00:25:55 +00:00
|
|
|
|
2017-09-29 15:31:59 +00:00
|
|
|
ed25519_public_key keys[sig_m];
|
2017-04-02 00:25:55 +00:00
|
|
|
int j = 0;
|
2017-09-29 15:31:59 +00:00
|
|
|
for (int i = 0; i < sig_n; i++) {
|
2017-04-02 00:25:55 +00:00
|
|
|
if ((1 << i) & sigmask) {
|
2017-09-29 15:31:59 +00:00
|
|
|
memcpy(keys[j], pub[i], 32);
|
2017-04-02 00:25:55 +00:00
|
|
|
j++;
|
|
|
|
}
|
|
|
|
}
|
2017-04-01 20:30:10 +00:00
|
|
|
|
2017-09-29 15:31:59 +00:00
|
|
|
return 0 == ed25519_cosi_combine_publickeys(res, keys, sig_m);
|
2017-04-01 00:32:05 +00:00
|
|
|
}
|
|
|
|
|
2017-10-19 16:45:57 +00:00
|
|
|
bool image_parse_header(const uint8_t * const data, const uint32_t magic, const uint32_t maxsize, image_header * const hdr)
|
2017-04-01 00:32:05 +00:00
|
|
|
{
|
2017-04-05 13:10:33 +00:00
|
|
|
memcpy(&hdr->magic, data, 4);
|
2017-04-05 15:41:10 +00:00
|
|
|
if (hdr->magic != magic) return false;
|
2017-04-05 13:10:33 +00:00
|
|
|
|
|
|
|
memcpy(&hdr->hdrlen, data + 4, 4);
|
|
|
|
if (hdr->hdrlen != HEADER_SIZE) return false;
|
|
|
|
|
|
|
|
memcpy(&hdr->expiry, data + 8, 4);
|
2017-10-19 16:45:57 +00:00
|
|
|
// TODO: expiry mechanism needs to be ironed out before production or those
|
|
|
|
// devices won't accept expiring bootloaders (due to boardloader write protection).
|
2017-04-05 13:10:33 +00:00
|
|
|
if (hdr->expiry != 0) return false;
|
|
|
|
|
|
|
|
memcpy(&hdr->codelen, data + 12, 4);
|
2017-10-19 16:45:57 +00:00
|
|
|
if (hdr->codelen > (maxsize - hdr->hdrlen)) return false;
|
|
|
|
if ((hdr->hdrlen + hdr->codelen) < 4 * 1024) return false;
|
2017-04-05 13:10:33 +00:00
|
|
|
if ((hdr->hdrlen + hdr->codelen) % 512 != 0) return false;
|
|
|
|
|
|
|
|
memcpy(&hdr->version, data + 16, 4);
|
|
|
|
|
|
|
|
// uint8_t reserved[427];
|
|
|
|
|
|
|
|
memcpy(&hdr->sigmask, data + 0x01BF, 1);
|
|
|
|
|
|
|
|
memcpy(hdr->sig, data + 0x01C0, 64);
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2017-09-29 15:31:59 +00:00
|
|
|
bool image_check_signature(const uint8_t *data, const image_header *hdr, uint8_t key_m, uint8_t key_n, const uint8_t * const *keys)
|
2017-04-05 13:10:33 +00:00
|
|
|
{
|
2017-04-01 00:32:05 +00:00
|
|
|
uint8_t hash[BLAKE2S_DIGEST_LENGTH];
|
|
|
|
BLAKE2S_CTX ctx;
|
|
|
|
blake2s_Init(&ctx, BLAKE2S_DIGEST_LENGTH);
|
2017-04-01 10:57:14 +00:00
|
|
|
blake2s_Update(&ctx, data, HEADER_SIZE - 65);
|
2017-04-01 00:32:05 +00:00
|
|
|
for (int i = 0; i < 65; i++) {
|
|
|
|
blake2s_Update(&ctx, (const uint8_t *)"\x00", 1);
|
|
|
|
}
|
2017-04-05 13:10:33 +00:00
|
|
|
blake2s_Update(&ctx, data + HEADER_SIZE, hdr->codelen);
|
2017-04-01 00:32:05 +00:00
|
|
|
blake2s_Final(&ctx, hash, BLAKE2S_DIGEST_LENGTH);
|
|
|
|
|
2017-04-02 00:25:55 +00:00
|
|
|
ed25519_public_key pub;
|
2017-09-29 15:31:59 +00:00
|
|
|
if (!compute_pubkey(key_m, key_n, keys, hdr->sigmask, pub)) return false;
|
2017-04-01 00:32:05 +00:00
|
|
|
|
2017-04-05 13:10:33 +00:00
|
|
|
return 0 == ed25519_sign_open(hash, BLAKE2S_DIGEST_LENGTH, pub, *(const ed25519_signature *)hdr->sig);
|
2017-04-01 00:32:05 +00:00
|
|
|
}
|
2017-04-01 17:24:41 +00:00
|
|
|
|
2017-10-19 16:45:57 +00:00
|
|
|
bool vendor_parse_header(const uint8_t * const data, vendor_header * const vhdr)
|
2017-04-01 17:24:41 +00:00
|
|
|
{
|
2017-04-05 13:10:33 +00:00
|
|
|
memcpy(&vhdr->magic, data, 4);
|
|
|
|
if (vhdr->magic != 0x565A5254) return false; // TRZV
|
2017-04-01 17:24:41 +00:00
|
|
|
|
2017-04-05 13:10:33 +00:00
|
|
|
memcpy(&vhdr->hdrlen, data + 4, 4);
|
2017-10-19 16:45:57 +00:00
|
|
|
// TODO: sanity check hdr->hdrlen as it is used as a src to memcpy below
|
2017-04-01 17:24:41 +00:00
|
|
|
|
2017-04-05 13:10:33 +00:00
|
|
|
memcpy(&vhdr->expiry, data + 8, 4);
|
|
|
|
if (vhdr->expiry != 0) return false;
|
2017-04-01 17:24:41 +00:00
|
|
|
|
2017-04-05 13:10:33 +00:00
|
|
|
memcpy(&vhdr->version, data + 12, 2);
|
2017-04-01 17:24:41 +00:00
|
|
|
|
2017-04-05 13:10:33 +00:00
|
|
|
memcpy(&vhdr->vsig_m, data + 14, 1);
|
|
|
|
memcpy(&vhdr->vsig_n, data + 15, 1);
|
2017-10-05 15:31:05 +00:00
|
|
|
memcpy(&vhdr->vtrust, data + 16, 1);
|
2017-04-01 17:24:41 +00:00
|
|
|
|
2017-04-05 15:41:10 +00:00
|
|
|
if (vhdr->vsig_n > MAX_VENDOR_PUBLIC_KEYS) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2017-04-05 13:10:33 +00:00
|
|
|
for (int i = 0; i < vhdr->vsig_n; i++) {
|
2017-10-05 15:31:05 +00:00
|
|
|
vhdr->vpub[i] = data + 32 + i * 32;
|
2017-04-01 17:24:41 +00:00
|
|
|
}
|
2017-04-05 15:41:10 +00:00
|
|
|
for (int i = vhdr->vsig_n; i < MAX_VENDOR_PUBLIC_KEYS; i++) {
|
2017-04-05 13:10:33 +00:00
|
|
|
vhdr->vpub[i] = 0;
|
2017-04-01 17:24:41 +00:00
|
|
|
}
|
|
|
|
|
2017-10-05 15:31:05 +00:00
|
|
|
memcpy(&vhdr->vstr_len, data + 32 + vhdr->vsig_n * 32, 1);
|
2017-04-01 17:24:41 +00:00
|
|
|
|
2017-10-05 15:31:05 +00:00
|
|
|
vhdr->vstr = data + 32 + vhdr->vsig_n * 32 + 1;
|
2017-04-01 17:24:41 +00:00
|
|
|
|
2017-10-05 15:31:05 +00:00
|
|
|
vhdr->vimg = data + 32 + vhdr->vsig_n * 32 + 1 + vhdr->vstr_len;
|
2017-04-01 17:24:41 +00:00
|
|
|
// align to 4 bytes
|
2017-04-05 13:10:33 +00:00
|
|
|
vhdr->vimg += (-(uintptr_t)vhdr->vimg) & 3;
|
2017-04-01 17:24:41 +00:00
|
|
|
|
|
|
|
// uint8_t reserved[427];
|
|
|
|
|
2017-04-05 13:10:33 +00:00
|
|
|
memcpy(&vhdr->sigmask, data + vhdr->hdrlen - 65, 1);
|
2017-04-01 17:24:41 +00:00
|
|
|
|
2017-04-05 13:10:33 +00:00
|
|
|
memcpy(vhdr->sig, data + vhdr->hdrlen - 64, 64);
|
2017-04-01 17:24:41 +00:00
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2017-09-29 15:31:59 +00:00
|
|
|
bool vendor_check_signature(const uint8_t *data, const vendor_header *vhdr, uint8_t key_m, uint8_t key_n, const uint8_t * const *keys)
|
2017-04-01 17:24:41 +00:00
|
|
|
{
|
|
|
|
uint8_t hash[BLAKE2S_DIGEST_LENGTH];
|
|
|
|
BLAKE2S_CTX ctx;
|
|
|
|
blake2s_Init(&ctx, BLAKE2S_DIGEST_LENGTH);
|
2017-04-05 13:10:33 +00:00
|
|
|
blake2s_Update(&ctx, data, vhdr->hdrlen - 65);
|
2017-04-01 17:24:41 +00:00
|
|
|
for (int i = 0; i < 65; i++) {
|
|
|
|
blake2s_Update(&ctx, (const uint8_t *)"\x00", 1);
|
|
|
|
}
|
|
|
|
blake2s_Final(&ctx, hash, BLAKE2S_DIGEST_LENGTH);
|
|
|
|
|
2017-04-02 00:25:55 +00:00
|
|
|
ed25519_public_key pub;
|
2017-09-29 15:31:59 +00:00
|
|
|
if (!compute_pubkey(key_m, key_n, keys, vhdr->sigmask, pub)) return false;
|
2017-04-01 17:24:41 +00:00
|
|
|
|
2017-04-05 13:10:33 +00:00
|
|
|
return 0 == ed25519_sign_open(hash, BLAKE2S_DIGEST_LENGTH, pub, *(const ed25519_signature *)vhdr->sig);
|
2017-04-01 17:24:41 +00:00
|
|
|
}
|