Skip to content

Commit 97ceea6

Browse files
Merge branch 'dev/v202210.01-lts-rx-1.1.2' into 'main'
Update the signature extraction See merge request products/common/rtos/amazon-freertos/lts/iot-reference-rx!140
2 parents bff68b7 + ff20642 commit 97ceea6

File tree

1 file changed

+90
-22
lines changed

1 file changed

+90
-22
lines changed

Common/ports/ota_pal/ota_pal.c

+90-22
Original file line numberDiff line numberDiff line change
@@ -44,6 +44,13 @@
4444
#include "r_fwup_if.h"
4545
#include "r_fwup_private.h"
4646
#include "./src/targets/rx65n/r_flash_rx65n.h"
47+
#include "mbedtls/ecdsa.h"
48+
#include "mbedtls/asn1.h"
49+
#include "mbedtls/error.h"
50+
51+
#define MAX_LENGTH 32
52+
#define MAX_SIG_LENGTH 64
53+
#define HALF_SIG_LENGTH MAX_SIG_LENGTH/2
4754

4855
const char OTA_JsonFileSignatureKey[ OTA_FILE_SIG_KEY_STR_MAX_LENGTH ] = "sig-sha256-ecdsa";
4956
static OtaImageState_t OtaImageState;
@@ -52,6 +59,7 @@ BaseType_t s_first_block_received = pdFALSE;
5259
uint8_t *s_first_ota_blocks[otaconfigMAX_NUM_BLOCKS_REQUEST];
5360

5461
OtaFileContext_t *pOTAFileContext;
62+
int ExtractECDSASignature(const unsigned char *derSignature, size_t derSignatureLength, unsigned char *rawSignature);
5563

5664
OtaPalStatus_t otaPal_CreateFileForRx( OtaFileContext_t * const pFileContext )
5765
{
@@ -179,12 +187,12 @@ static OtaPalStatus_t otaPal_CheckFileSignature( OtaFileContext_t * const pFileC
179187
{
180188
OtaPalMainStatus_t eResult = OtaPalUninitialized;
181189
e_fwup_err_t eRet = FWUP_SUCCESS;
190+
int ret;
182191

183-
pOTAFileContext = pFileContext; // store the OTA file context to be used by FWUP verify wrapper
192+
// Buffer to hold the raw ECDSA signature
193+
unsigned char rawSignature[MAX_SIG_LENGTH];
184194

185-
// extract the signature for verification by bootloader
186-
uint8_t sig[64];
187-
uint16_t idx;
195+
pOTAFileContext = pFileContext; // store the OTA file context to be used by FWUP verify wrapper
188196

189197
/*
190198
* C->pxSignature->ucData includes some ASN1 tags.
@@ -213,26 +221,16 @@ static OtaPalStatus_t otaPal_CheckFileSignature( OtaFileContext_t * const pFileC
213221
return OTA_PAL_COMBINE_ERR( OtaPalSignatureCheckFailed, 0 );
214222
}
215223

216-
// Extract signature ASN1
217-
// SIG(R)
218-
idx = 3;
219-
if (0x21 == pFileContext->pSignature->data[idx++])
220-
{
221-
idx++; /* Skip 0x00 */
222-
}
223-
memcpy(sig, &pFileContext->pSignature->data[idx], 32);
224224

225-
/* SIG(S) */
226-
idx += 32;
227-
idx++;
228-
if (0x21 == pFileContext->pSignature->data[idx++])
229-
{
230-
idx++; /* Skip 0x00 */
231-
}
232-
memcpy(sig+32, &pFileContext->pSignature->data[idx], 32);
225+
if (0 != ExtractECDSASignature(pFileContext->pSignature->data, pFileContext->pSignature->size, rawSignature))
226+
{
227+
eResult = OtaPalBadSignerCert;
228+
LogError( ("Error ECDSASignature extraction\r\n") );
229+
return OTA_PAL_COMBINE_ERR( eResult, 0 );
230+
}
233231

234232
eRet = R_FWUP_WriteImageHeader( FWUP_AREA_BUFFER,
235-
(uint8_t FWUP_FAR *)OTA_JsonFileSignatureKey, sig, 64);
233+
(uint8_t FWUP_FAR *)OTA_JsonFileSignatureKey, rawSignature, MAX_SIG_LENGTH);
236234

237235
if ( FWUP_SUCCESS != eRet )
238236
{
@@ -242,6 +240,7 @@ static OtaPalStatus_t otaPal_CheckFileSignature( OtaFileContext_t * const pFileC
242240
return OTA_PAL_COMBINE_ERR( eResult, 0 );
243241
}
244242

243+
245244
// Verify the signature
246245
eRet = R_FWUP_VerifyImage(FWUP_AREA_BUFFER);
247246

@@ -252,7 +251,8 @@ static OtaPalStatus_t otaPal_CheckFileSignature( OtaFileContext_t * const pFileC
252251

253252
return OTA_PAL_COMBINE_ERR( eResult, 0 );
254253
}
255-
else {
254+
else
255+
{
256256
eResult = OtaPalSuccess;
257257
}
258258

@@ -419,3 +419,71 @@ OtaPalImageState_t otaPal_GetPlatformImageState( OtaFileContext_t * const pFileC
419419
LogDebug( ( "Function called is otaPal_GetPlatformImageState: Platform State is [%d]", ePalState ) );
420420
return ePalState;
421421
}
422+
423+
int ExtractECDSASignature(const unsigned char *derSignature, size_t derSignatureLength, unsigned char *rawSignature)
424+
{
425+
unsigned char *p = (unsigned char*) derSignature;
426+
const unsigned char *end = derSignature + derSignatureLength;
427+
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
428+
size_t len;
429+
mbedtls_mpi r, s;
430+
431+
/* Start reusing the process of mbedtls_ecdsa_read_signature_restartable function */
432+
433+
/* Check the parameters. */
434+
configASSERT(derSignature != NULL);
435+
mbedtls_mpi_init(&r);
436+
mbedtls_mpi_init(&s);
437+
438+
if ( (ret = mbedtls_asn1_get_tag(&p, end, &len,
439+
MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE)) != 0)
440+
{
441+
ret += MBEDTLS_ERR_ECP_BAD_INPUT_DATA;
442+
goto cleanup;
443+
}
444+
445+
if (p + len != end)
446+
{
447+
ret = MBEDTLS_ERROR_ADD(MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
448+
MBEDTLS_ERR_ASN1_LENGTH_MISMATCH);
449+
goto cleanup;
450+
}
451+
452+
// Get R,S component
453+
if ((ret = mbedtls_asn1_get_mpi(&p, end, &r)) != 0 ||
454+
(ret = mbedtls_asn1_get_mpi(&p, end, &s)) != 0)
455+
{
456+
ret += MBEDTLS_ERR_ECP_BAD_INPUT_DATA;
457+
goto cleanup;
458+
}
459+
460+
/* Finished reusing the process of mbedtls_ecdsa_read_signature_restartable function */
461+
462+
// Convert MPIs to raw byte strings
463+
// The raw ECDSA signature in rawSignature
464+
ret = mbedtls_mpi_write_binary(&r, &rawSignature[0], HALF_SIG_LENGTH);
465+
if (0 != ret)
466+
{
467+
goto cleanup;
468+
}
469+
ret = mbedtls_mpi_write_binary(&s, &rawSignature[HALF_SIG_LENGTH], HALF_SIG_LENGTH);
470+
if (0 != ret)
471+
{
472+
goto cleanup;
473+
}
474+
475+
/* Start reusing the process of mbedtls_ecdsa_read_signature_restartable function */
476+
477+
/* At this point we know that the buffer starts with a valid signature.
478+
* Return 0 if the buffer just contains the signature, and a specific
479+
* error code if the valid signature is followed by more data. */
480+
if (p != end)
481+
ret = MBEDTLS_ERR_ECP_SIG_LEN_MISMATCH;
482+
cleanup:
483+
mbedtls_mpi_free(&r);
484+
mbedtls_mpi_free(&s);
485+
486+
/* Finished reusing the process of mbedtls_ecdsa_read_signature_restartable function */
487+
488+
return ret;
489+
}

0 commit comments

Comments
 (0)