Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(305)

Unified Diff: vboot_firmware/lib/vboot_common.c

Issue 2745007: Major refactoring of structures, with unit tests. (Closed) Base URL: ssh://gitrw.chromium.org/vboot_reference.git
Patch Set: Implemented LoadFirmware2() Created 10 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: vboot_firmware/lib/vboot_common.c
diff --git a/vboot_firmware/lib/vboot_common.c b/vboot_firmware/lib/vboot_common.c
new file mode 100644
index 0000000000000000000000000000000000000000..df3068adf7f1d0d8fb618bb3526abe4ad9a79f36
--- /dev/null
+++ b/vboot_firmware/lib/vboot_common.c
@@ -0,0 +1,312 @@
+/* Copyright (c) 2010 The Chromium OS Authors. All rights reserved.
+ * Use of this source code is governed by a BSD-style license that can be
+ * found in the LICENSE file.
+ *
+ * Common functions between firmware and kernel verified boot.
+ * (Firmware portion)
+ */
+
+/* TODO: change all 'return 0', 'return 1' into meaningful return codes */
+
+#include "vboot_common.h"
+#include "utility.h"
+
+#include <stdio.h> /* TODO: FOR TESTING */
+
+char* kVbootErrors[VBOOT_ERROR_MAX] = {
+ "Success.",
+ "Invalid Image.",
+ "Kernel Key Signature Failed.",
+ "Invalid Kernel Verification Algorithm.",
+ "Preamble Signature Failed.",
+ "Kernel Signature Failed.",
+ "Wrong Kernel Magic.",
+};
+
+
+uint64_t OffsetOf(const void *base, const void *ptr) {
gauravsh 2010/06/10 14:44:13 since this function assumes 64-bit pointers, would
+ return (uint64_t)(size_t)ptr - (uint64_t)(size_t)base;
+}
+
+
+/* Helper functions to get data pointed to by a public key or signature. */
+uint8_t* GetPublicKeyData(VbPublicKey* key) {
+ return (uint8_t*)key + key->key_offset;
+}
+
+const uint8_t* GetPublicKeyDataC(const VbPublicKey* key) {
+ return (const uint8_t*)key + key->key_offset;
+}
+
+uint8_t* GetSignatureData(VbSignature* sig) {
+ return (uint8_t*)sig + sig->sig_offset;
+}
+
+const uint8_t* GetSignatureDataC(const VbSignature* sig) {
+ return (const uint8_t*)sig + sig->sig_offset;
+}
+
+
+/* Helper functions to verify the data pointed to by a subfield is inside
+ * the parent data. Returns 0 if inside, 1 if error. */
+int VerifyMemberInside(const void* parent, uint64_t parent_size,
+ const void* member, uint64_t member_size,
+ uint64_t member_data_offset,
+ uint64_t member_data_size) {
+ uint64_t end = OffsetOf(parent, member);
+
+ if (end > parent_size)
+ return 1;
+
+ if (end + member_size > parent_size)
+ return 1;
+
+ end += member_data_offset;
+ if (end > parent_size)
+ return 1;
+ if (end + member_data_size > parent_size)
+ return 1;
+
+ return 0;
+}
+
+
+int VerifyPublicKeyInside(const void* parent, uint64_t parent_size,
+ const VbPublicKey* key) {
+ return VerifyMemberInside(parent, parent_size,
+ key, sizeof(VbPublicKey),
+ key->key_offset, key->key_size);
+}
+
+
+int VerifySignatureInside(const void* parent, uint64_t parent_size,
+ const VbSignature* sig) {
+ return VerifyMemberInside(parent, parent_size,
+ sig, sizeof(VbSignature),
+ sig->sig_offset, sig->sig_size);
+}
+
+
+RSAPublicKey* PublicKeyToRSA(const VbPublicKey* key) {
+ RSAPublicKey *rsa;
+
+ if (kNumAlgorithms <= key->algorithm) {
+ debug("Invalid algorithm.\n");
+ return NULL;
+ }
+ if (RSAProcessedKeySize(key->algorithm) != key->key_size) {
+ debug("Wrong key size for algorithm\n");
+ return NULL;
+ }
+
+ rsa = RSAPublicKeyFromBuf(GetPublicKeyDataC(key), key->key_size);
+ if (!rsa)
+ return NULL;
+
+ rsa->algorithm = key->algorithm;
+ return rsa;
+}
+
+
+int VerifyData(const uint8_t* data, const VbSignature *sig,
+ const RSAPublicKey* key) {
+
+ if (sig->sig_size != siglen_map[key->algorithm]) {
+ debug("Wrong signature size for algorithm.\n");
+ return 1;
+ }
+
+ if (!RSAVerifyBinary_f(NULL, key, data, sig->data_size,
+ GetSignatureDataC(sig), key->algorithm))
+ return 1;
+
+ return 0;
+}
+
+
+int VerifyKeyBlock(const VbKeyBlockHeader* block, uint64_t size,
+ const VbPublicKey *key) {
+
+ const VbSignature* sig;
+
+ /* Sanity checks before attempting signature of data */
+ if (SafeMemcmp(block->magic, KEY_BLOCK_MAGIC, KEY_BLOCK_MAGIC_SIZE)) {
+ debug("Not a valid verified boot key block.\n");
+ return 1;
+ }
+ if (block->header_version_major != KEY_BLOCK_HEADER_VERSION_MAJOR) {
+ debug("Incompatible key block header version.\n");
+ return 1;
+ }
+ if (size < block->key_block_size) {
+ debug("Not enough data for key block.\n");
+ return 1;
+ }
+
+ /* Check signature or hash, depending on whether we have a key. */
+ if (key) {
+ /* Check signature */
+ RSAPublicKey* rsa;
+ int rv;
+
+ sig = &block->key_block_signature;
+
+ if (VerifySignatureInside(block, block->key_block_size, sig)) {
+ debug("Key block signature off end of block\n");
+ return 1;
+ }
+
+ if (!((rsa = PublicKeyToRSA(key)))) {
+ debug("Invalid public key\n");
+ return 1;
+ }
+ rv = VerifyData((const uint8_t*)block, sig, rsa);
+ RSAPublicKeyFree(rsa);
+
+ if (rv)
+ return rv;
+
+ } else {
+ /* Check hash */
+ uint8_t* header_checksum = NULL;
+ int rv;
+
+ sig = &block->key_block_checksum;
+
+ if (VerifySignatureInside(block, block->key_block_size, sig)) {
+ debug("Key block hash off end of block\n");
+ return 1;
+ }
+ if (sig->sig_size != SHA512_DIGEST_SIZE) {
+ debug("Wrong hash size for key block.\n");
+ return 1;
+ }
+
+ header_checksum = DigestBuf((const uint8_t*)block, sig->data_size,
+ SHA512_DIGEST_ALGORITHM);
+ rv = SafeMemcmp(header_checksum, GetSignatureDataC(sig),
+ SHA512_DIGEST_SIZE);
+ Free(header_checksum);
+ if (rv) {
+ debug("Invalid key block hash.\n");
+ return 1;
+ }
+ }
+
+ /* Verify we signed enough data */
+ if (sig->data_size < sizeof(VbKeyBlockHeader)) {
+ debug("Didn't sign enough data\n");
+ return 1;
+ }
+
+ /* Verify data key is inside the block and inside signed data */
+ if (VerifyPublicKeyInside(block, block->key_block_size, &block->data_key)) {
+ debug("Data key off end of key block\n");
+ return 1;
+ }
+ if (VerifyPublicKeyInside(block, sig->data_size, &block->data_key)) {
+ debug("Data key off end of signed data\n");
+ return 1;
+ }
+
+ /* Success */
+ return 0;
+}
+
+
+int VerifyFirmwarePreamble2(const VbFirmwarePreambleHeader* preamble,
+ uint64_t size, const RSAPublicKey* key) {
+
+ const VbSignature* sig = &preamble->preamble_signature;
+
+ /* TODO: caller needs to make sure key version is valid */
+
+ /* Sanity checks before attempting signature of data */
+ if (preamble->header_version_major !=
+ FIRMWARE_PREAMBLE_HEADER_VERSION_MAJOR) {
+ debug("Incompatible firmware preamble header version.\n");
+ return 1;
+ }
+ if (size < preamble->preamble_size) {
+ debug("Not enough data for preamble.\n");
+ return 1;
+ }
+
+ /* Check signature */
+ if (VerifySignatureInside(preamble, preamble->preamble_size, sig)) {
+ debug("Preamble signature off end of preamble\n");
+ return 1;
+ }
+ if (VerifyData((const uint8_t*)preamble, sig, key)) {
+ debug("Preamble signature validation failed\n");
+ return 1;
+ }
+
+ /* Verify we signed enough data */
+ if (sig->data_size < sizeof(VbFirmwarePreambleHeader)) {
+ debug("Didn't sign enough data\n");
+ return 1;
+ }
+
+ /* Verify body signature is inside the block */
+ if (VerifySignatureInside(preamble, preamble->preamble_size,
+ &preamble->body_signature)) {
+ debug("Firmware body signature off end of preamble\n");
+ return 1;
+ }
+
+ /* Verify kernel subkey is inside the block */
+ if (VerifyPublicKeyInside(preamble, preamble->preamble_size,
+ &preamble->kernel_subkey)) {
+ debug("Kernel subkey off end of preamble\n");
+ return 1;
+ }
+
+ /* Success */
+ return 0;
+}
+
+
+int VerifyKernelPreamble2(const VbKernelPreambleHeader* preamble,
+ uint64_t size, const RSAPublicKey* key) {
+
+ const VbSignature* sig = &preamble->preamble_signature;
+
+ /* TODO: caller needs to make sure key version is valid */
+
+ /* Sanity checks before attempting signature of data */
+ if (preamble->header_version_major != KERNEL_PREAMBLE_HEADER_VERSION_MAJOR) {
+ debug("Incompatible kernel preamble header version.\n");
+ return 1;
+ }
+ if (size < preamble->preamble_size) {
+ debug("Not enough data for preamble.\n");
+ return 1;
+ }
+
+ /* Check signature */
+ if (VerifySignatureInside(preamble, preamble->preamble_size, sig)) {
+ debug("Preamble signature off end of preamble\n");
+ return 1;
+ }
+ if (VerifyData((const uint8_t*)preamble, sig, key)) {
+ debug("Preamble signature validation failed\n");
+ return 1;
+ }
+
+ /* Verify we signed enough data */
+ if (sig->data_size < sizeof(VbKernelPreambleHeader)) {
+ debug("Didn't sign enough data\n");
+ return 1;
+ }
+
+ /* Verify body signature is inside the block */
+ if (VerifySignatureInside(preamble, preamble->preamble_size,
+ &preamble->body_signature)) {
+ debug("Kernel body signature off end of preamble\n");
+ return 1;
+ }
+
+ /* Success */
+ return 0;
+}

Powered by Google App Engine
This is Rietveld 408576698