1
0
mirror of https://github.com/trezor/trezor-firmware.git synced 2024-12-20 05:18:08 +00:00

fix(core): improve bhk handling on STM32U5

[no changelog]
This commit is contained in:
tychovrahe 2024-02-26 09:49:58 +01:00 committed by TychoVrahe
parent fb2868d297
commit 6e2f5ff27d
5 changed files with 105 additions and 33 deletions

View File

@ -67,7 +67,7 @@ static const uint8_t * const BOARDLOADER_KEYS[] = {
}; };
#ifdef STM32U5 #ifdef STM32U5
void check_bootloader_version(uint8_t bld_version) { uint8_t get_bootloader_min_version(void) {
const uint8_t *counter_addr = const uint8_t *counter_addr =
flash_area_get_address(&SECRET_AREA, SECRET_MONOTONIC_COUNTER_OFFSET, flash_area_get_address(&SECRET_AREA, SECRET_MONOTONIC_COUNTER_OFFSET,
SECRET_MONOTONIC_COUNTER_LEN); SECRET_MONOTONIC_COUNTER_LEN);
@ -92,10 +92,12 @@ void check_bootloader_version(uint8_t bld_version) {
} }
} }
ensure((bld_version >= counter) * sectrue, "BOOTLOADER DOWNGRADED"); return counter;
}
if (bld_version > counter) { void write_bootloader_min_version(uint8_t version) {
for (int i = 0; i < bld_version; i++) { if (version > get_bootloader_min_version()) {
for (int i = 0; i < version; i++) {
uint32_t data[4] = {0}; uint32_t data[4] = {0};
secret_write((uint8_t *)data, SECRET_MONOTONIC_COUNTER_OFFSET + i * 16, secret_write((uint8_t *)data, SECRET_MONOTONIC_COUNTER_OFFSET + i * 16,
16); 16);
@ -160,6 +162,12 @@ static uint32_t check_sdcard(void) {
return 0; return 0;
} }
#ifdef STM32U5
if (hdr->monotonic < get_bootloader_min_version()) {
return 0;
}
#endif
return hdr->codelen; return hdr->codelen;
} }
@ -255,6 +263,8 @@ int main(void) {
} }
trustzone_init_boardloader(); trustzone_init_boardloader();
secret_ensure_initialized();
#endif #endif
#ifdef STM32F4 #ifdef STM32F4
@ -280,6 +290,25 @@ int main(void) {
#if defined USE_SD_CARD #if defined USE_SD_CARD
sdcard_init(); sdcard_init();
#ifdef STM32U5
// If the bootloader is being updated from SD card, we need to preserve the
// monotonic counter from the old bootloader. This is in case that the old
// bootloader did not have the chance yet to write its monotonic counter to
// the secret area - which normally happens later in the flow.
const image_header *old_hdr = read_image_header(
(const uint8_t *)BOOTLOADER_START, BOOTLOADER_IMAGE_MAGIC,
flash_area_get_size(&BOOTLOADER_AREA));
if ((old_hdr != NULL) &&
(sectrue == check_image_header_sig(old_hdr, BOARDLOADER_KEY_M,
BOARDLOADER_KEY_N,
BOARDLOADER_KEYS)) &&
(sectrue ==
check_image_contents(old_hdr, IMAGE_HEADER_SIZE, &BOOTLOADER_AREA))) {
write_bootloader_min_version(old_hdr->monotonic);
}
#endif
if (check_sdcard()) { if (check_sdcard()) {
return copy_sdcard() == sectrue ? 0 : 3; return copy_sdcard() == sectrue ? 0 : 3;
} }
@ -300,7 +329,12 @@ int main(void) {
"invalid bootloader hash"); "invalid bootloader hash");
#ifdef STM32U5 #ifdef STM32U5
check_bootloader_version(hdr->monotonic); uint8_t bld_min_version = get_bootloader_min_version();
ensure((hdr->monotonic >= bld_min_version) * sectrue,
"BOOTLOADER DOWNGRADED");
// Write the bootloader version to the secret area.
// This includes the version of bootloader potentially updated from SD card.
write_bootloader_min_version(hdr->monotonic);
#endif #endif
ensure_compatible_settings(); ensure_compatible_settings();

View File

@ -430,6 +430,10 @@ int bootloader_main(void) {
display_reinit(); display_reinit();
#ifdef STM32U5
ensure(secret_ensure_initialized(), "secret reinitialized");
#endif
ui_screen_boot_empty(false); ui_screen_boot_empty(false);
mpu_config_bootloader(); mpu_config_bootloader();

View File

@ -21,6 +21,10 @@ secbool secret_read(uint8_t* data, uint32_t offset, uint32_t len);
secbool secret_wiped(void); secbool secret_wiped(void);
secbool secret_verify_header(void);
secbool secret_ensure_initialized(void);
void secret_erase(void); void secret_erase(void);
void secret_hide(void); void secret_hide(void);

View File

@ -7,14 +7,17 @@
static secbool bootloader_locked_set = secfalse; static secbool bootloader_locked_set = secfalse;
static secbool bootloader_locked = secfalse; static secbool bootloader_locked = secfalse;
static secbool verify_header(void) { secbool secret_verify_header(void) {
uint8_t header[SECRET_HEADER_LEN] = {0}; uint8_t header[sizeof(SECRET_HEADER_MAGIC)] = {0};
memcpy(header, flash_area_get_address(&SECRET_AREA, 0, SECRET_HEADER_LEN), memcpy(header,
SECRET_HEADER_LEN); flash_area_get_address(&SECRET_AREA, 0, sizeof(SECRET_HEADER_MAGIC)),
sizeof(SECRET_HEADER_MAGIC));
bootloader_locked = bootloader_locked =
memcmp(header, SECRET_HEADER_MAGIC, 4) == 0 ? sectrue : secfalse; memcmp(header, SECRET_HEADER_MAGIC, sizeof(SECRET_HEADER_MAGIC)) == 0
? sectrue
: secfalse;
bootloader_locked_set = sectrue; bootloader_locked_set = sectrue;
return bootloader_locked; return bootloader_locked;
} }
@ -22,7 +25,7 @@ static secbool verify_header(void) {
secbool secret_bootloader_locked(void) { secbool secret_bootloader_locked(void) {
if (bootloader_locked_set != sectrue) { if (bootloader_locked_set != sectrue) {
// Set bootloader_locked. // Set bootloader_locked.
verify_header(); secret_verify_header();
} }
return bootloader_locked; return bootloader_locked;
@ -44,7 +47,7 @@ void secret_write(uint8_t* data, uint32_t offset, uint32_t len) {
} }
secbool secret_read(uint8_t* data, uint32_t offset, uint32_t len) { secbool secret_read(uint8_t* data, uint32_t offset, uint32_t len) {
if (sectrue != verify_header()) { if (sectrue != secret_verify_header()) {
return secfalse; return secfalse;
} }

View File

@ -3,24 +3,37 @@
#include <string.h> #include <string.h>
#include "common.h" #include "common.h"
#include "flash.h" #include "flash.h"
#include "memzero.h"
#include "model.h" #include "model.h"
#include "rng.h" #include "rng.h"
static secbool bootloader_locked_set = secfalse;
static secbool bootloader_locked = secfalse; static secbool bootloader_locked = secfalse;
static secbool verify_header(void) { secbool secret_verify_header(void) {
uint8_t header[SECRET_HEADER_LEN] = {0}; uint8_t header[sizeof(SECRET_HEADER_MAGIC)] = {0};
memcpy(header, flash_area_get_address(&SECRET_AREA, 0, SECRET_HEADER_LEN), memcpy(header,
SECRET_HEADER_LEN); flash_area_get_address(&SECRET_AREA, 0, sizeof(SECRET_HEADER_MAGIC)),
sizeof(SECRET_HEADER_MAGIC));
bootloader_locked = bootloader_locked =
memcmp(header, SECRET_HEADER_MAGIC, 4) == 0 ? sectrue : secfalse; memcmp(header, SECRET_HEADER_MAGIC, sizeof(SECRET_HEADER_MAGIC)) == 0
bootloader_locked_set = sectrue; ? sectrue
: secfalse;
return bootloader_locked; return bootloader_locked;
} }
secbool secret_ensure_initialized(void) {
if (sectrue != secret_verify_header()) {
ensure(flash_area_erase_bulk(STORAGE_AREAS, STORAGE_AREAS_COUNT, NULL),
"erase storage failed");
secret_erase();
secret_write_header();
return secfalse;
}
return sectrue;
}
secbool secret_bootloader_locked(void) { secbool secret_bootloader_locked(void) {
#ifdef FIRMWARE #ifdef FIRMWARE
return TAMP->BKP8R != 0 * sectrue; return TAMP->BKP8R != 0 * sectrue;
@ -46,7 +59,7 @@ void secret_write(uint8_t *data, uint32_t offset, uint32_t len) {
} }
secbool secret_read(uint8_t *data, uint32_t offset, uint32_t len) { secbool secret_read(uint8_t *data, uint32_t offset, uint32_t len) {
if (sectrue != verify_header()) { if (sectrue != secret_verify_header()) {
return secfalse; return secfalse;
} }
@ -69,8 +82,27 @@ secbool secret_bhk_locked(void) {
sectrue; sectrue;
} }
static secbool secret_present(uint32_t offset, uint32_t len) {
uint8_t *optiga_secret =
(uint8_t *)flash_area_get_address(&SECRET_AREA, offset, len);
int optiga_secret_empty_bytes = 0;
for (int i = 0; i < len; i++) {
if (optiga_secret[i] == 0xFF) {
optiga_secret_empty_bytes++;
}
}
return sectrue * (optiga_secret_empty_bytes != len);
}
void secret_bhk_provision(void) { void secret_bhk_provision(void) {
uint32_t secret[SECRET_BHK_LEN / sizeof(uint32_t)] = {0}; uint32_t secret[SECRET_BHK_LEN / sizeof(uint32_t)] = {0};
if (sectrue != secret_present(SECRET_BHK_OFFSET, SECRET_BHK_LEN)) {
secret_bhk_regenerate();
}
secbool ok = secbool ok =
secret_read((uint8_t *)secret, SECRET_BHK_OFFSET, SECRET_BHK_LEN); secret_read((uint8_t *)secret, SECRET_BHK_OFFSET, SECRET_BHK_LEN);
@ -86,6 +118,8 @@ void secret_bhk_provision(void) {
reg1++; reg1++;
} }
} }
memzero(secret, sizeof(secret));
} }
void secret_bhk_regenerate(void) { void secret_bhk_regenerate(void) {
@ -96,24 +130,16 @@ void secret_bhk_regenerate(void) {
for (int j = 0; j < 4; j++) { for (int j = 0; j < 4; j++) {
val[j] = rng_get(); val[j] = rng_get();
} }
ensure(flash_area_write_quadword(&BHK_AREA, i * 4 * sizeof(uint32_t), val), secbool res =
"Failed regenerating BHK"); flash_area_write_quadword(&BHK_AREA, i * 4 * sizeof(uint32_t), val);
memzero(val, sizeof(val));
ensure(res, "Failed regenerating BHK");
} }
ensure(flash_lock_write(), "Failed regenerating BHK"); ensure(flash_lock_write(), "Failed regenerating BHK");
} }
secbool secret_optiga_present(void) { secbool secret_optiga_present(void) {
uint8_t *optiga_secret = (uint8_t *)flash_area_get_address( return secret_present(SECRET_OPTIGA_KEY_OFFSET, SECRET_OPTIGA_KEY_LEN);
&SECRET_AREA, SECRET_OPTIGA_KEY_OFFSET, SECRET_OPTIGA_KEY_LEN);
int optiga_secret_empty_bytes = 0;
for (int i = 0; i < SECRET_OPTIGA_KEY_LEN; i++) {
if (optiga_secret[i] == 0xFF) {
optiga_secret_empty_bytes++;
}
}
return sectrue * (optiga_secret_empty_bytes != SECRET_OPTIGA_KEY_LEN);
} }
void secret_optiga_backup(void) { void secret_optiga_backup(void) {
@ -133,6 +159,7 @@ void secret_optiga_backup(void) {
reg1++; reg1++;
} }
} }
memzero(secret, sizeof(secret));
} }
secbool secret_optiga_extract(uint8_t *dest) { secbool secret_optiga_extract(uint8_t *dest) {