OLD | NEW |
1 /* Copyright (c) 2010 The Chromium OS Authors. All rights reserved. | 1 /* Copyright (c) 2010 The Chromium OS Authors. All rights reserved. |
2 * Use of this source code is governed by a BSD-style license that can be | 2 * Use of this source code is governed by a BSD-style license that can be |
3 * found in the LICENSE file. | 3 * found in the LICENSE file. |
4 * | 4 * |
5 * Functions for generating and manipulating a verified boot firmware image. | 5 * Functions for generating and manipulating a verified boot firmware image. |
6 */ | 6 */ |
7 | 7 |
8 #include "firmware_image.h" | 8 #include "firmware_image.h" |
9 | 9 |
10 #include <fcntl.h> | 10 #include <fcntl.h> |
(...skipping 376 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
387 algorithm)) | 387 algorithm)) |
388 return VERIFY_FIRMWARE_SIGNATURE_FAILED; | 388 return VERIFY_FIRMWARE_SIGNATURE_FAILED; |
389 return 0; | 389 return 0; |
390 } | 390 } |
391 | 391 |
392 int VerifyFirmware(const uint8_t* root_key_blob, | 392 int VerifyFirmware(const uint8_t* root_key_blob, |
393 const uint8_t* firmware_blob, | 393 const uint8_t* firmware_blob, |
394 const int dev_mode) { | 394 const int dev_mode) { |
395 int error_code; | 395 int error_code; |
396 int algorithm; /* Signing key algorithm. */ | 396 int algorithm; /* Signing key algorithm. */ |
397 RSAPublicKey* firmware_sign_key; | 397 RSAPublicKey* firmware_sign_key = NULL; |
398 int firmware_sign_key_len, signature_len, header_len, firmware_len; | 398 int firmware_sign_key_len, signature_len, header_len, firmware_len; |
399 const uint8_t* header_ptr; /* Pointer to header. */ | 399 const uint8_t* header_ptr = NULL; /* Pointer to header. */ |
400 const uint8_t* firmware_sign_key_ptr; /* Pointer to signing key. */ | 400 const uint8_t* firmware_sign_key_ptr = NULL; /* Pointer to signing key. */ |
401 const uint8_t* preamble_ptr; /* Pointer to preamble block. */ | 401 const uint8_t* preamble_ptr = NULL; /* Pointer to preamble block. */ |
402 const uint8_t* firmware_ptr; /* Pointer to firmware signature/data. */ | 402 const uint8_t* firmware_ptr = NULL; /* Pointer to firmware signature/data. */ |
403 | 403 |
404 /* Note: All the offset calculations are based on struct FirmwareImage which | 404 /* Note: All the offset calculations are based on struct FirmwareImage which |
405 * is defined in include/firmware_image.h. */ | 405 * is defined in include/firmware_image.h. */ |
406 | 406 |
407 /* Compare magic bytes. */ | 407 /* Compare magic bytes. */ |
408 if (SafeMemcmp(firmware_blob, FIRMWARE_MAGIC, FIRMWARE_MAGIC_SIZE)) | 408 if (SafeMemcmp(firmware_blob, FIRMWARE_MAGIC, FIRMWARE_MAGIC_SIZE)) |
409 return VERIFY_FIRMWARE_WRONG_MAGIC; | 409 return VERIFY_FIRMWARE_WRONG_MAGIC; |
410 header_ptr = firmware_blob + FIRMWARE_MAGIC_SIZE; | 410 header_ptr = firmware_blob + FIRMWARE_MAGIC_SIZE; |
411 | 411 |
412 /* Only continue if header verification succeeds. */ | 412 /* Only continue if header verification succeeds. */ |
413 if ((error_code = VerifyFirmwareHeader(root_key_blob, header_ptr, dev_mode, | 413 if ((error_code = VerifyFirmwareHeader(root_key_blob, header_ptr, dev_mode, |
414 &algorithm, &header_len))) | 414 &algorithm, &header_len))) |
415 return error_code; /* AKA jump to revovery. */ | 415 return error_code; /* AKA jump to revovery. */ |
416 | 416 |
417 /* Parse signing key into RSAPublicKey structure since it is required multiple | 417 /* Parse signing key into RSAPublicKey structure since it is required multiple |
418 * times. */ | 418 * times. */ |
419 firmware_sign_key_len = RSAProcessedKeySize(algorithm); | 419 firmware_sign_key_len = RSAProcessedKeySize(algorithm); |
420 firmware_sign_key_ptr = header_ptr + (FIELD_LEN(header_len) + | 420 firmware_sign_key_ptr = header_ptr + (FIELD_LEN(header_len) + |
421 FIELD_LEN(firmware_sign_algorithm)); | 421 FIELD_LEN(firmware_sign_algorithm)); |
422 firmware_sign_key = RSAPublicKeyFromBuf(firmware_sign_key_ptr, | 422 firmware_sign_key = RSAPublicKeyFromBuf(firmware_sign_key_ptr, |
423 firmware_sign_key_len); | 423 firmware_sign_key_len); |
424 signature_len = siglen_map[algorithm]; | 424 signature_len = siglen_map[algorithm]; |
425 | 425 |
426 /* Only continue if preamble verification succeeds. */ | 426 /* Only continue if preamble verification succeeds. */ |
427 preamble_ptr = (header_ptr + header_len + | 427 preamble_ptr = (header_ptr + header_len + |
428 FIELD_LEN(firmware_key_signature)); | 428 FIELD_LEN(firmware_key_signature)); |
429 if ((error_code = VerifyFirmwarePreamble(firmware_sign_key, preamble_ptr, | 429 if ((error_code = VerifyFirmwarePreamble(firmware_sign_key, preamble_ptr, |
430 algorithm, | 430 algorithm, |
431 &firmware_len))) | 431 &firmware_len))) { |
| 432 RSAPublicKeyFree(firmware_sign_key); |
432 return error_code; /* AKA jump to recovery. */ | 433 return error_code; /* AKA jump to recovery. */ |
433 | 434 } |
434 /* Only continue if firmware data verification succeeds. */ | 435 /* Only continue if firmware data verification succeeds. */ |
435 firmware_ptr = (preamble_ptr + | 436 firmware_ptr = (preamble_ptr + |
436 FIELD_LEN(firmware_version) + | 437 FIELD_LEN(firmware_version) + |
437 FIELD_LEN(firmware_len) + | 438 FIELD_LEN(firmware_len) + |
438 FIELD_LEN(preamble) + | 439 FIELD_LEN(preamble) + |
439 signature_len); | 440 signature_len); |
440 | 441 |
441 if ((error_code = VerifyFirmwareData(firmware_sign_key, firmware_ptr, | 442 if ((error_code = VerifyFirmwareData(firmware_sign_key, firmware_ptr, |
442 firmware_len, | 443 firmware_len, |
443 algorithm))) | 444 algorithm))) { |
| 445 RSAPublicKeyFree(firmware_sign_key); |
444 return error_code; /* AKA jump to recovery. */ | 446 return error_code; /* AKA jump to recovery. */ |
| 447 } |
445 | 448 |
| 449 RSAPublicKeyFree(firmware_sign_key); |
446 return 0; /* Success! */ | 450 return 0; /* Success! */ |
447 } | 451 } |
448 | 452 |
449 int VerifyFirmwareImage(const RSAPublicKey* root_key, | 453 int VerifyFirmwareImage(const RSAPublicKey* root_key, |
450 const FirmwareImage* image, | 454 const FirmwareImage* image, |
451 const int dev_mode) { | 455 const int dev_mode) { |
452 RSAPublicKey* firmware_sign_key; | 456 RSAPublicKey* firmware_sign_key = NULL; |
453 uint8_t* header_digest = NULL; | 457 uint8_t* header_digest = NULL; |
454 uint8_t* preamble_digest = NULL; | 458 uint8_t* preamble_digest = NULL; |
455 uint8_t* firmware_digest = NULL; | 459 uint8_t* firmware_digest = NULL; |
456 int firmware_sign_key_size; | 460 int firmware_sign_key_size; |
457 int signature_size; | 461 int signature_size; |
458 int error_code = 0; | 462 int error_code = 0; |
459 DigestContext ctx; | 463 DigestContext ctx; |
460 | 464 |
461 if (!image) | 465 if (!image) |
462 return VERIFY_FIRMWARE_INVALID_IMAGE; | 466 return VERIFY_FIRMWARE_INVALID_IMAGE; |
(...skipping 57 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
520 image->firmware_len, | 524 image->firmware_len, |
521 image->firmware_sign_algorithm); | 525 image->firmware_sign_algorithm); |
522 if (!RSAVerify(firmware_sign_key, image->firmware_signature, | 526 if (!RSAVerify(firmware_sign_key, image->firmware_signature, |
523 signature_size, image->firmware_sign_algorithm, | 527 signature_size, image->firmware_sign_algorithm, |
524 firmware_digest)) { | 528 firmware_digest)) { |
525 error_code = VERIFY_FIRMWARE_SIGNATURE_FAILED; | 529 error_code = VERIFY_FIRMWARE_SIGNATURE_FAILED; |
526 goto verify_failure; | 530 goto verify_failure; |
527 } | 531 } |
528 | 532 |
529 verify_failure: | 533 verify_failure: |
| 534 RSAPublicKeyFree(firmware_sign_key); |
530 Free(firmware_digest); | 535 Free(firmware_digest); |
531 Free(preamble_digest); | 536 Free(preamble_digest); |
532 Free(header_digest); | 537 Free(header_digest); |
533 return error_code; | 538 return error_code; |
534 } | 539 } |
535 | 540 |
536 const char* VerifyFirmwareErrorString(int error) { | 541 const char* VerifyFirmwareErrorString(int error) { |
537 return kVerifyFirmwareErrors[error]; | 542 return kVerifyFirmwareErrors[error]; |
538 } | 543 } |
539 | 544 |
(...skipping 39 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
579 if (!(firmware_signature = SignatureBuf(image->firmware_data, | 584 if (!(firmware_signature = SignatureBuf(image->firmware_data, |
580 image->firmware_len, | 585 image->firmware_len, |
581 signing_key_file, | 586 signing_key_file, |
582 image->firmware_sign_algorithm))) | 587 image->firmware_sign_algorithm))) |
583 return 0; | 588 return 0; |
584 image->firmware_signature = (uint8_t*) Malloc(signature_len); | 589 image->firmware_signature = (uint8_t*) Malloc(signature_len); |
585 Memcpy(image->firmware_signature, firmware_signature, signature_len); | 590 Memcpy(image->firmware_signature, firmware_signature, signature_len); |
586 Free(firmware_signature); | 591 Free(firmware_signature); |
587 return 1; | 592 return 1; |
588 } | 593 } |
OLD | NEW |