OLD | NEW |
1 /* Copyright (c) 2010 The Chromium OS Authors. All rights reserved. | 1 /* Copyright (c) 2010 The Chromium OS Authors. All rights reserved. |
2 * Use of this source code is governed by a BSD-style license that can be | 2 * Use of this source code is governed by a BSD-style license that can be |
3 * found in the LICENSE file. | 3 * found in the LICENSE file. |
4 * | 4 * |
5 * Functions for generating and manipulating a verified boot kernel image. | 5 * Functions for generating and manipulating a verified boot kernel image. |
6 */ | 6 */ |
7 | 7 |
8 #include "kernel_image.h" | 8 #include "kernel_image.h" |
9 | 9 |
10 #include <fcntl.h> | 10 #include <fcntl.h> |
(...skipping 482 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
493 FIELD_LEN(kernel_key_version)); | 493 FIELD_LEN(kernel_key_version)); |
494 kernel_sign_key = RSAPublicKeyFromBuf(kernel_sign_key_ptr, | 494 kernel_sign_key = RSAPublicKeyFromBuf(kernel_sign_key_ptr, |
495 kernel_sign_key_len); | 495 kernel_sign_key_len); |
496 kernel_signature_len = siglen_map[kernel_sign_algorithm]; | 496 kernel_signature_len = siglen_map[kernel_sign_algorithm]; |
497 kernel_key_signature_len = siglen_map[firmware_sign_algorithm]; | 497 kernel_key_signature_len = siglen_map[firmware_sign_algorithm]; |
498 | 498 |
499 /* Only continue if config verification succeeds. */ | 499 /* Only continue if config verification succeeds. */ |
500 config_ptr = (header_ptr + header_len + kernel_key_signature_len); | 500 config_ptr = (header_ptr + header_len + kernel_key_signature_len); |
501 if ((error_code = VerifyKernelConfig(kernel_sign_key, config_ptr, | 501 if ((error_code = VerifyKernelConfig(kernel_sign_key, config_ptr, |
502 kernel_sign_algorithm, | 502 kernel_sign_algorithm, |
503 &kernel_len))) | 503 &kernel_len))) { |
| 504 RSAPublicKeyFree(kernel_sign_key); |
504 return error_code; /* AKA jump to recovery. */ | 505 return error_code; /* AKA jump to recovery. */ |
| 506 } |
505 /* Only continue if kernel data verification succeeds. */ | 507 /* Only continue if kernel data verification succeeds. */ |
506 kernel_ptr = (config_ptr + | 508 kernel_ptr = (config_ptr + |
507 FIELD_LEN(kernel_version) + | 509 FIELD_LEN(kernel_version) + |
508 FIELD_LEN(options.version) + | 510 FIELD_LEN(options.version) + |
509 FIELD_LEN(options.kernel_len) + | 511 FIELD_LEN(options.kernel_len) + |
510 FIELD_LEN(options.kernel_entry_addr) + | 512 FIELD_LEN(options.kernel_entry_addr) + |
511 FIELD_LEN(options.kernel_load_addr) + | 513 FIELD_LEN(options.kernel_load_addr) + |
512 kernel_signature_len); | 514 kernel_signature_len); |
513 | 515 |
514 if ((error_code = VerifyKernelData(kernel_sign_key, kernel_ptr, kernel_len, | 516 if ((error_code = VerifyKernelData(kernel_sign_key, kernel_ptr, kernel_len, |
515 kernel_sign_algorithm))) | 517 kernel_sign_algorithm))) { |
| 518 RSAPublicKeyFree(kernel_sign_key); |
516 return error_code; /* AKA jump to recovery. */ | 519 return error_code; /* AKA jump to recovery. */ |
| 520 } |
| 521 RSAPublicKeyFree(kernel_sign_key); |
517 return 0; /* Success! */ | 522 return 0; /* Success! */ |
518 } | 523 } |
519 | 524 |
520 int VerifyKernelImage(const RSAPublicKey* firmware_key, | 525 int VerifyKernelImage(const RSAPublicKey* firmware_key, |
521 const KernelImage* image, | 526 const KernelImage* image, |
522 const int dev_mode) { | 527 const int dev_mode) { |
523 RSAPublicKey* kernel_sign_key; | 528 RSAPublicKey* kernel_sign_key = NULL; |
524 uint8_t* header_digest = NULL; | 529 uint8_t* header_digest = NULL; |
525 uint8_t* config_digest = NULL; | 530 uint8_t* config_digest = NULL; |
526 uint8_t* kernel_digest = NULL; | 531 uint8_t* kernel_digest = NULL; |
527 int kernel_sign_key_size; | 532 int kernel_sign_key_size; |
528 int kernel_signature_size; | 533 int kernel_signature_size; |
529 int error_code = 0; | 534 int error_code = 0; |
530 DigestContext ctx; | 535 DigestContext ctx; |
531 | 536 |
532 if (!image) | 537 if (!image) |
533 return VERIFY_KERNEL_INVALID_IMAGE; | 538 return VERIFY_KERNEL_INVALID_IMAGE; |
(...skipping 69 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
603 image->options.kernel_len, | 608 image->options.kernel_len, |
604 image->kernel_sign_algorithm); | 609 image->kernel_sign_algorithm); |
605 if (!RSAVerify(kernel_sign_key, image->kernel_signature, | 610 if (!RSAVerify(kernel_sign_key, image->kernel_signature, |
606 kernel_signature_size, image->kernel_sign_algorithm, | 611 kernel_signature_size, image->kernel_sign_algorithm, |
607 kernel_digest)) { | 612 kernel_digest)) { |
608 error_code = VERIFY_KERNEL_SIGNATURE_FAILED; | 613 error_code = VERIFY_KERNEL_SIGNATURE_FAILED; |
609 goto verify_failure; | 614 goto verify_failure; |
610 } | 615 } |
611 | 616 |
612 verify_failure: | 617 verify_failure: |
| 618 RSAPublicKeyFree(kernel_sign_key); |
613 Free(kernel_digest); | 619 Free(kernel_digest); |
614 Free(config_digest); | 620 Free(config_digest); |
615 Free(header_digest); | 621 Free(header_digest); |
616 return error_code; | 622 return error_code; |
617 } | 623 } |
618 | 624 |
619 const char* VerifyKernelErrorString(int error) { | 625 const char* VerifyKernelErrorString(int error) { |
620 return kVerifyKernelErrors[error]; | 626 return kVerifyKernelErrors[error]; |
621 } | 627 } |
622 | 628 |
623 int AddKernelKeySignature(KernelImage* image, const char* firmware_key_file) { | 629 int AddKernelKeySignature(KernelImage* image, const char* firmware_key_file) { |
624 uint8_t* header_blob = NULL; | 630 uint8_t* header_blob = NULL; |
625 uint8_t* signature; | 631 uint8_t* signature = NULL; |
626 int signature_len = siglen_map[image->firmware_sign_algorithm]; | 632 int signature_len = siglen_map[image->firmware_sign_algorithm]; |
627 if (!image || !firmware_key_file) | 633 if (!image || !firmware_key_file) |
628 return 0; | 634 return 0; |
629 header_blob = GetKernelHeaderBlob(image); | 635 header_blob = GetKernelHeaderBlob(image); |
630 if (!header_blob) | 636 if (!header_blob) |
631 return 0; | 637 return 0; |
632 if (!(signature = SignatureBuf(header_blob, | 638 if (!(signature = SignatureBuf(header_blob, |
633 GetKernelHeaderLen(image), | 639 GetKernelHeaderLen(image), |
634 firmware_key_file, | 640 firmware_key_file, |
635 image->firmware_sign_algorithm))) { | 641 image->firmware_sign_algorithm))) { |
636 Free(header_blob); | 642 Free(header_blob); |
637 return 0; | 643 return 0; |
638 } | 644 } |
639 image->kernel_key_signature = Malloc(signature_len); | 645 image->kernel_key_signature = Malloc(signature_len); |
640 Memcpy(image->kernel_key_signature, signature, signature_len); | 646 Memcpy(image->kernel_key_signature, signature, signature_len); |
641 Free(signature); | 647 Free(signature); |
642 Free(header_blob); | 648 Free(header_blob); |
643 return 1; | 649 return 1; |
644 } | 650 } |
645 | 651 |
646 int AddKernelSignature(KernelImage* image, | 652 int AddKernelSignature(KernelImage* image, |
647 const char* kernel_signing_key_file) { | 653 const char* kernel_signing_key_file) { |
648 uint8_t* config_blob; | 654 uint8_t* config_blob = NULL; |
649 uint8_t* config_signature; | 655 uint8_t* config_signature = NULL; |
650 uint8_t* kernel_signature; | 656 uint8_t* kernel_signature = NULL; |
651 int signature_len = siglen_map[image->kernel_sign_algorithm]; | 657 int signature_len = siglen_map[image->kernel_sign_algorithm]; |
652 | 658 |
653 config_blob = GetKernelConfigBlob(image); | 659 config_blob = GetKernelConfigBlob(image); |
654 if (!(config_signature = SignatureBuf(config_blob, | 660 if (!(config_signature = SignatureBuf(config_blob, |
655 GetKernelConfigLen(image), | 661 GetKernelConfigLen(image), |
656 kernel_signing_key_file, | 662 kernel_signing_key_file, |
657 image->kernel_sign_algorithm))) { | 663 image->kernel_sign_algorithm))) { |
658 fprintf(stderr, "Could not compute signature on the kernel config.\n"); | 664 fprintf(stderr, "Could not compute signature on the kernel config.\n"); |
659 Free(config_blob); | 665 Free(config_blob); |
660 return 0; | 666 return 0; |
661 } | 667 } |
| 668 Free(config_blob); |
662 | 669 |
663 image->config_signature = (uint8_t*) Malloc(signature_len); | 670 image->config_signature = (uint8_t*) Malloc(signature_len); |
664 Memcpy(image->config_signature, config_signature, signature_len); | 671 Memcpy(image->config_signature, config_signature, signature_len); |
665 Free(config_signature); | 672 Free(config_signature); |
666 | 673 |
667 if (!(kernel_signature = SignatureBuf(image->kernel_data, | 674 if (!(kernel_signature = SignatureBuf(image->kernel_data, |
668 image->options.kernel_len, | 675 image->options.kernel_len, |
669 kernel_signing_key_file, | 676 kernel_signing_key_file, |
670 image->kernel_sign_algorithm))) { | 677 image->kernel_sign_algorithm))) { |
671 fprintf(stderr, "Could not compute signature on the kernel.\n"); | 678 fprintf(stderr, "Could not compute signature on the kernel.\n"); |
672 return 0; | 679 return 0; |
673 } | 680 } |
674 image->kernel_signature = (uint8_t*) Malloc(signature_len); | 681 image->kernel_signature = (uint8_t*) Malloc(signature_len); |
675 Memcpy(image->kernel_signature, kernel_signature, signature_len); | 682 Memcpy(image->kernel_signature, kernel_signature, signature_len); |
676 Free(kernel_signature); | 683 Free(kernel_signature); |
677 return 1; | 684 return 1; |
678 } | 685 } |
OLD | NEW |