44
44
#include "r_fwup_if.h"
45
45
#include "r_fwup_private.h"
46
46
#include "./src/targets/rx65n/r_flash_rx65n.h"
47
+ #include "mbedtls/ecdsa.h"
48
+ #include "mbedtls/asn1.h"
49
+ #include "mbedtls/error.h"
50
+
51
+ #define MAX_LENGTH 32
52
+ #define MAX_SIG_LENGTH 64
53
+ #define HALF_SIG_LENGTH MAX_SIG_LENGTH/2
47
54
48
55
const char OTA_JsonFileSignatureKey [ OTA_FILE_SIG_KEY_STR_MAX_LENGTH ] = "sig-sha256-ecdsa" ;
49
56
static OtaImageState_t OtaImageState ;
@@ -52,6 +59,7 @@ BaseType_t s_first_block_received = pdFALSE;
52
59
uint8_t * s_first_ota_blocks [otaconfigMAX_NUM_BLOCKS_REQUEST ];
53
60
54
61
OtaFileContext_t * pOTAFileContext ;
62
+ int ExtractECDSASignature (const unsigned char * derSignature , size_t derSignatureLength , unsigned char * rawSignature );
55
63
56
64
OtaPalStatus_t otaPal_CreateFileForRx ( OtaFileContext_t * const pFileContext )
57
65
{
@@ -179,12 +187,12 @@ static OtaPalStatus_t otaPal_CheckFileSignature( OtaFileContext_t * const pFileC
179
187
{
180
188
OtaPalMainStatus_t eResult = OtaPalUninitialized ;
181
189
e_fwup_err_t eRet = FWUP_SUCCESS ;
190
+ int ret ;
182
191
183
- pOTAFileContext = pFileContext ; // store the OTA file context to be used by FWUP verify wrapper
192
+ // Buffer to hold the raw ECDSA signature
193
+ unsigned char rawSignature [MAX_SIG_LENGTH ];
184
194
185
- // extract the signature for verification by bootloader
186
- uint8_t sig [64 ];
187
- uint16_t idx ;
195
+ pOTAFileContext = pFileContext ; // store the OTA file context to be used by FWUP verify wrapper
188
196
189
197
/*
190
198
* C->pxSignature->ucData includes some ASN1 tags.
@@ -213,26 +221,16 @@ static OtaPalStatus_t otaPal_CheckFileSignature( OtaFileContext_t * const pFileC
213
221
return OTA_PAL_COMBINE_ERR ( OtaPalSignatureCheckFailed , 0 );
214
222
}
215
223
216
- // Extract signature ASN1
217
- // SIG(R)
218
- idx = 3 ;
219
- if (0x21 == pFileContext -> pSignature -> data [idx ++ ])
220
- {
221
- idx ++ ; /* Skip 0x00 */
222
- }
223
- memcpy (sig , & pFileContext -> pSignature -> data [idx ], 32 );
224
224
225
- /* SIG(S) */
226
- idx += 32 ;
227
- idx ++ ;
228
- if (0x21 == pFileContext -> pSignature -> data [idx ++ ])
229
- {
230
- idx ++ ; /* Skip 0x00 */
231
- }
232
- memcpy (sig + 32 , & pFileContext -> pSignature -> data [idx ], 32 );
225
+ if (0 != ExtractECDSASignature (pFileContext -> pSignature -> data , pFileContext -> pSignature -> size , rawSignature ))
226
+ {
227
+ eResult = OtaPalBadSignerCert ;
228
+ LogError ( ("Error ECDSASignature extraction\r\n" ) );
229
+ return OTA_PAL_COMBINE_ERR ( eResult , 0 );
230
+ }
233
231
234
232
eRet = R_FWUP_WriteImageHeader ( FWUP_AREA_BUFFER ,
235
- (uint8_t FWUP_FAR * )OTA_JsonFileSignatureKey , sig , 64 );
233
+ (uint8_t FWUP_FAR * )OTA_JsonFileSignatureKey , rawSignature , MAX_SIG_LENGTH );
236
234
237
235
if ( FWUP_SUCCESS != eRet )
238
236
{
@@ -242,6 +240,7 @@ static OtaPalStatus_t otaPal_CheckFileSignature( OtaFileContext_t * const pFileC
242
240
return OTA_PAL_COMBINE_ERR ( eResult , 0 );
243
241
}
244
242
243
+
245
244
// Verify the signature
246
245
eRet = R_FWUP_VerifyImage (FWUP_AREA_BUFFER );
247
246
@@ -252,7 +251,8 @@ static OtaPalStatus_t otaPal_CheckFileSignature( OtaFileContext_t * const pFileC
252
251
253
252
return OTA_PAL_COMBINE_ERR ( eResult , 0 );
254
253
}
255
- else {
254
+ else
255
+ {
256
256
eResult = OtaPalSuccess ;
257
257
}
258
258
@@ -419,3 +419,71 @@ OtaPalImageState_t otaPal_GetPlatformImageState( OtaFileContext_t * const pFileC
419
419
LogDebug ( ( "Function called is otaPal_GetPlatformImageState: Platform State is [%d]" , ePalState ) );
420
420
return ePalState ;
421
421
}
422
+
423
+ int ExtractECDSASignature (const unsigned char * derSignature , size_t derSignatureLength , unsigned char * rawSignature )
424
+ {
425
+ unsigned char * p = (unsigned char * ) derSignature ;
426
+ const unsigned char * end = derSignature + derSignatureLength ;
427
+ int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED ;
428
+ size_t len ;
429
+ mbedtls_mpi r , s ;
430
+
431
+ /* Start reusing the process of mbedtls_ecdsa_read_signature_restartable function */
432
+
433
+ /* Check the parameters. */
434
+ configASSERT (derSignature != NULL );
435
+ mbedtls_mpi_init (& r );
436
+ mbedtls_mpi_init (& s );
437
+
438
+ if ( (ret = mbedtls_asn1_get_tag (& p , end , & len ,
439
+ MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE )) != 0 )
440
+ {
441
+ ret += MBEDTLS_ERR_ECP_BAD_INPUT_DATA ;
442
+ goto cleanup ;
443
+ }
444
+
445
+ if (p + len != end )
446
+ {
447
+ ret = MBEDTLS_ERROR_ADD (MBEDTLS_ERR_ECP_BAD_INPUT_DATA ,
448
+ MBEDTLS_ERR_ASN1_LENGTH_MISMATCH );
449
+ goto cleanup ;
450
+ }
451
+
452
+ // Get R,S component
453
+ if ((ret = mbedtls_asn1_get_mpi (& p , end , & r )) != 0 ||
454
+ (ret = mbedtls_asn1_get_mpi (& p , end , & s )) != 0 )
455
+ {
456
+ ret += MBEDTLS_ERR_ECP_BAD_INPUT_DATA ;
457
+ goto cleanup ;
458
+ }
459
+
460
+ /* Finished reusing the process of mbedtls_ecdsa_read_signature_restartable function */
461
+
462
+ // Convert MPIs to raw byte strings
463
+ // The raw ECDSA signature in rawSignature
464
+ ret = mbedtls_mpi_write_binary (& r , & rawSignature [0 ], HALF_SIG_LENGTH );
465
+ if (0 != ret )
466
+ {
467
+ goto cleanup ;
468
+ }
469
+ ret = mbedtls_mpi_write_binary (& s , & rawSignature [HALF_SIG_LENGTH ], HALF_SIG_LENGTH );
470
+ if (0 != ret )
471
+ {
472
+ goto cleanup ;
473
+ }
474
+
475
+ /* Start reusing the process of mbedtls_ecdsa_read_signature_restartable function */
476
+
477
+ /* At this point we know that the buffer starts with a valid signature.
478
+ * Return 0 if the buffer just contains the signature, and a specific
479
+ * error code if the valid signature is followed by more data. */
480
+ if (p != end )
481
+ ret = MBEDTLS_ERR_ECP_SIG_LEN_MISMATCH ;
482
+ cleanup :
483
+ mbedtls_mpi_free (& r );
484
+ mbedtls_mpi_free (& s );
485
+
486
+ /* Finished reusing the process of mbedtls_ecdsa_read_signature_restartable function */
487
+
488
+ return ret ;
489
+ }
0 commit comments