/* * SPDX-FileCopyrightText: 2016-2024 Espressif Systems (Shanghai) CO LTD * * SPDX-License-Identifier: Unlicense OR CC0-1.0 */ #include #include #include #include #include #include #include #include #include "esp_flash_encrypt.h" #include "esp_log.h" #include "esp_partition.h" #include "esp_system.h" #include "spi_flash_mmap.h" #include "nvs.h" #include "nvs_flash.h" #include "nvs_sec_provider.h" #include "unity.h" #include "memory_checks.h" #include "esp_heap_caps.h" #include "esp_random.h" #ifdef CONFIG_NVS_ENCRYPTION #include "mbedtls/aes.h" #endif #ifdef CONFIG_SOC_HMAC_SUPPORTED #include "esp_hmac.h" #endif extern void record_heap_free_sizes(void); extern int32_t get_heap_free_difference(const bool nvs_active_pool); static const char* TAG = "test_nvs"; TEST_CASE("Kconfig option controls heap capability allocator for NVS", "[nvs_ram]") { // number of keys used for test const size_t max_key = 400; char key_name[sizeof("keyXXXXX ")]; int32_t out_val = 0; nvs_handle_t handle; esp_err_t err = nvs_flash_init(); if (err == ESP_ERR_NVS_NO_FREE_PAGES || err == ESP_ERR_NVS_NEW_VERSION_FOUND) { ESP_LOGW(TAG, "nvs_flash_init failed (0x%x), erasing partition and retrying", err); ESP_ERROR_CHECK(nvs_flash_erase()); err = nvs_flash_init(); } ESP_ERROR_CHECK( err ); TEST_ESP_OK(nvs_open("test_namespace1", NVS_READWRITE, &handle)); TEST_ESP_OK(nvs_erase_all(handle)); record_heap_free_sizes(); for(size_t i=0; isize)); TEST_ESP_ERR(ESP_ERR_NVS_KEYS_NOT_INITIALIZED, nvs_flash_read_security_cfg(key_part, &cfg)); TEST_ESP_OK(nvs_flash_generate_keys(key_part, &cfg)); TEST_ESP_OK(nvs_flash_read_security_cfg(key_part, &cfg2)); #elif CONFIG_NVS_SEC_KEY_PROTECT_USING_HMAC nvs_sec_scheme_t *scheme_cfg = nvs_flash_get_default_security_scheme(); assert(scheme_cfg != NULL); TEST_ESP_OK(nvs_flash_generate_keys_v2(scheme_cfg, &cfg)); TEST_ESP_OK(nvs_flash_read_security_cfg_v2(scheme_cfg, &cfg2)); #endif TEST_ASSERT_TRUE(!memcmp(&cfg, &cfg2, sizeof(nvs_sec_cfg_t))); } TEST_CASE("test nvs apis with encryption enabled", "[nvs]") { #if CONFIG_NVS_SEC_KEY_PROTECT_USING_FLASH_ENC if (!esp_flash_encryption_enabled()) { TEST_IGNORE_MESSAGE("flash encryption disabled, skipping nvs_api tests with encryption enabled"); } const esp_partition_t* key_part = esp_partition_find_first( ESP_PARTITION_TYPE_DATA, ESP_PARTITION_SUBTYPE_DATA_NVS_KEYS, NULL); assert(key_part && "partition table must have an NVS Key partition"); ESP_ERROR_CHECK(esp_partition_erase_range(key_part, 0, key_part->size)); #endif const esp_partition_t* nvs_partition = esp_partition_find_first( ESP_PARTITION_TYPE_DATA, ESP_PARTITION_SUBTYPE_DATA_NVS, NULL); assert(nvs_partition && "partition table must have an NVS partition"); bool done = false; do { nvs_sec_cfg_t cfg; esp_err_t err = ESP_FAIL; #if CONFIG_NVS_SEC_KEY_PROTECT_USING_FLASH_ENC ESP_ERROR_CHECK(esp_partition_erase_range(nvs_partition, 0, nvs_partition->size)); err = nvs_flash_read_security_cfg(key_part, &cfg); if(err == ESP_ERR_NVS_KEYS_NOT_INITIALIZED) { uint8_t value[4096] = {[0 ... 4095] = 0xff}; TEST_ESP_OK(esp_partition_write(key_part, 0, value, sizeof(value))); TEST_ESP_ERR(ESP_ERR_NVS_KEYS_NOT_INITIALIZED, nvs_flash_read_security_cfg(key_part, &cfg)); TEST_ESP_OK(nvs_flash_generate_keys(key_part, &cfg)); } else { /* Second time key_partition exists already*/ ESP_ERROR_CHECK(err); done = true; } #elif CONFIG_NVS_SEC_KEY_PROTECT_USING_HMAC nvs_sec_scheme_t *scheme_cfg = nvs_flash_get_default_security_scheme(); assert(scheme_cfg != NULL); err = nvs_flash_read_security_cfg_v2(scheme_cfg, &cfg); if (err != ESP_OK) { if (err == ESP_ERR_NVS_SEC_HMAC_KEY_NOT_FOUND) { TEST_ESP_OK(nvs_flash_generate_keys_v2(scheme_cfg, &cfg)); } else { ESP_ERROR_CHECK(err); } } else { ESP_ERROR_CHECK(err); done = true; } #endif TEST_ESP_OK(nvs_flash_secure_init(&cfg)); nvs_handle_t handle_1; TEST_ESP_ERR(ESP_ERR_NVS_NOT_FOUND, nvs_open("namespace1", NVS_READONLY, &handle_1)); TEST_ESP_OK(nvs_open("namespace1", NVS_READWRITE, &handle_1)); TEST_ESP_OK(nvs_set_i32(handle_1, "foo", 0x12345678)); TEST_ESP_OK(nvs_set_i32(handle_1, "foo", 0x23456789)); nvs_handle_t handle_2; TEST_ESP_OK(nvs_open("namespace2", NVS_READWRITE, &handle_2)); TEST_ESP_OK(nvs_set_i32(handle_2, "foo", 0x3456789a)); const char* str = "value 0123456789abcdef0123456789abcdef"; TEST_ESP_OK(nvs_set_str(handle_2, "key", str)); int32_t v1; TEST_ESP_OK(nvs_get_i32(handle_1, "foo", &v1)); TEST_ASSERT_TRUE(0x23456789 == v1); int32_t v2; TEST_ESP_OK(nvs_get_i32(handle_2, "foo", &v2)); TEST_ASSERT_TRUE(0x3456789a == v2); char buf[strlen(str) + 1]; size_t buf_len = sizeof(buf); size_t buf_len_needed; TEST_ESP_OK(nvs_get_str(handle_2, "key", NULL, &buf_len_needed)); TEST_ASSERT_TRUE(buf_len_needed == buf_len); size_t buf_len_short = buf_len - 1; TEST_ESP_ERR(ESP_ERR_NVS_INVALID_LENGTH, nvs_get_str(handle_2, "key", buf, &buf_len_short)); TEST_ASSERT_TRUE(buf_len_short == buf_len); size_t buf_len_long = buf_len + 1; TEST_ESP_OK(nvs_get_str(handle_2, "key", buf, &buf_len_long)); TEST_ASSERT_TRUE(buf_len_long == buf_len); TEST_ESP_OK(nvs_get_str(handle_2, "key", buf, &buf_len)); TEST_ASSERT_TRUE(0 == strcmp(buf, str)); nvs_close(handle_1); nvs_close(handle_2); TEST_ESP_OK(nvs_flash_deinit()); } while(!done); } TEST_CASE("test nvs apis for nvs partition generator utility with encryption enabled", "[nvs_part_gen]") { nvs_handle_t handle; nvs_sec_cfg_t xts_cfg; esp_err_t err = ESP_FAIL; const esp_partition_t* nvs_part = esp_partition_find_first( ESP_PARTITION_TYPE_DATA, ESP_PARTITION_SUBTYPE_DATA_NVS, NULL); assert(nvs_part && "partition table must have an NVS partition"); printf("\n nvs_part size:%" PRId32 "\n", nvs_part->size); ESP_ERROR_CHECK(esp_partition_erase_range(nvs_part, 0, nvs_part->size)); extern const char sample_bin_start[] asm("_binary_sample_bin_start"); #if CONFIG_NVS_SEC_KEY_PROTECT_USING_FLASH_ENC if (!esp_flash_encryption_enabled()) { TEST_IGNORE_MESSAGE("flash encryption disabled, skipping nvs_api tests with encryption enabled"); } extern const char nvs_key_start[] asm("_binary_encryption_keys_bin_start"); extern const char nvs_key_end[] asm("_binary_encryption_keys_bin_end"); extern const char nvs_data_sch0_start[] asm("_binary_partition_encrypted_bin_start"); extern const char nvs_data_sch0_end[] asm("_binary_partition_encrypted_bin_end"); const esp_partition_t* key_part = esp_partition_find_first( ESP_PARTITION_TYPE_DATA, ESP_PARTITION_SUBTYPE_DATA_NVS_KEYS, NULL); assert(key_part && "partition table must have a KEY partition"); TEST_ASSERT_TRUE((nvs_key_end - nvs_key_start - 1) == SPI_FLASH_SEC_SIZE); ESP_ERROR_CHECK(esp_partition_erase_range(key_part, 0, key_part->size)); for (int i = 0; i < key_part->size; i+= SPI_FLASH_SEC_SIZE) { ESP_ERROR_CHECK( esp_partition_write(key_part, i, nvs_key_start + i, SPI_FLASH_SEC_SIZE) ); } const int content_size = nvs_data_sch0_end - nvs_data_sch0_start - 1; TEST_ASSERT_TRUE((content_size % SPI_FLASH_SEC_SIZE) == 0); const int size_to_write = MIN(content_size, nvs_part->size); for (int i = 0; i < size_to_write; i+= SPI_FLASH_SEC_SIZE) { ESP_ERROR_CHECK( esp_partition_write(nvs_part, i, nvs_data_sch0_start + i, SPI_FLASH_SEC_SIZE) ); } err = nvs_flash_read_security_cfg(key_part, &xts_cfg); #elif CONFIG_NVS_SEC_KEY_PROTECT_USING_HMAC extern const char nvs_data_sch1_start[] asm("_binary_partition_encrypted_hmac_bin_start"); extern const char nvs_data_sch1_end[] asm("_binary_partition_encrypted_hmac_bin_end"); const int content_size = nvs_data_sch1_end - nvs_data_sch1_start - 1; TEST_ASSERT_TRUE((content_size % SPI_FLASH_SEC_SIZE) == 0); const int size_to_write = MIN(content_size, nvs_part->size); for (int i = 0; i < size_to_write; i+= SPI_FLASH_SEC_SIZE) { ESP_ERROR_CHECK( esp_partition_write(nvs_part, i, nvs_data_sch1_start + i, SPI_FLASH_SEC_SIZE) ); } nvs_sec_scheme_t *scheme_cfg = nvs_flash_get_default_security_scheme(); assert(scheme_cfg != NULL); err = nvs_flash_read_security_cfg_v2(scheme_cfg, &xts_cfg); #endif ESP_ERROR_CHECK(err); TEST_ESP_OK(nvs_flash_secure_init(&xts_cfg)); TEST_ESP_OK(nvs_open("dummyNamespace", NVS_READONLY, &handle)); uint8_t u8v; TEST_ESP_OK( nvs_get_u8(handle, "dummyU8Key", &u8v)); TEST_ASSERT_TRUE(u8v == 127); int8_t i8v; TEST_ESP_OK( nvs_get_i8(handle, "dummyI8Key", &i8v)); TEST_ASSERT_TRUE(i8v == -128); uint16_t u16v; TEST_ESP_OK( nvs_get_u16(handle, "dummyU16Key", &u16v)); TEST_ASSERT_TRUE(u16v == 32768); uint32_t u32v; TEST_ESP_OK( nvs_get_u32(handle, "dummyU32Key", &u32v)); TEST_ASSERT_TRUE(u32v == 4294967295); int32_t i32v; TEST_ESP_OK( nvs_get_i32(handle, "dummyI32Key", &i32v)); TEST_ASSERT_TRUE(i32v == -2147483648); char buf[64] = {0}; size_t buflen = 64; TEST_ESP_OK( nvs_get_str(handle, "dummyStringKey", buf, &buflen)); TEST_ASSERT_TRUE(strncmp(buf, "0A:0B:0C:0D:0E:0F", buflen) == 0); uint8_t hexdata[] = {0x01, 0x02, 0x03, 0xab, 0xcd, 0xef}; buflen = 64; TEST_ESP_OK( nvs_get_blob(handle, "dummyHex2BinKey", buf, &buflen)); TEST_ASSERT_TRUE(memcmp(buf, hexdata, buflen) == 0); uint8_t base64data[] = {'1', '2', '3', 'a', 'b', 'c'}; buflen = 64; TEST_ESP_OK( nvs_get_blob(handle, "dummyBase64Key", buf, &buflen)); TEST_ASSERT_TRUE(memcmp(buf, base64data, buflen) == 0); uint8_t hexfiledata[] = {0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef}; buflen = 64; TEST_ESP_OK( nvs_get_blob(handle, "hexFileKey", buf, &buflen)); TEST_ASSERT_TRUE(memcmp(buf, hexfiledata, buflen) == 0); uint8_t base64filedata[] = {0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0xab, 0xcd, 0xef}; buflen = 64; TEST_ESP_OK( nvs_get_blob(handle, "base64FileKey", buf, &buflen)); TEST_ASSERT_TRUE(memcmp(buf, base64filedata, buflen) == 0); uint8_t strfiledata[64] = "abcdefghijklmnopqrstuvwxyz\0"; buflen = 64; TEST_ESP_OK( nvs_get_str(handle, "stringFileKey", buf, &buflen)); TEST_ASSERT_TRUE(memcmp(buf, strfiledata, buflen) == 0); char bin_data[5120]; size_t bin_len = sizeof(bin_data); TEST_ESP_OK( nvs_get_blob(handle, "binFileKey", bin_data, &bin_len)); TEST_ASSERT_TRUE(memcmp(bin_data, sample_bin_start, bin_len) == 0); nvs_close(handle); TEST_ESP_OK(nvs_flash_deinit()); } #if CONFIG_NVS_SEC_KEY_PROTECT_USING_FLASH_ENC TEST_CASE("test nvs encryption with Flash Encryption-based scheme with v2 apis", "[nvs]") { nvs_handle_t handle; nvs_sec_cfg_t cfg = {}; nvs_sec_scheme_t *sec_scheme_handle = NULL; nvs_sec_config_flash_enc_t sec_scheme_cfg = NVS_SEC_PROVIDER_CFG_FLASH_ENC_DEFAULT(); TEST_ESP_OK(nvs_sec_provider_register_flash_enc(&sec_scheme_cfg, &sec_scheme_handle)); esp_err_t err = nvs_flash_read_security_cfg_v2(sec_scheme_handle, &cfg); if (err != ESP_OK) { if (err == ESP_ERR_NVS_KEYS_NOT_INITIALIZED) { TEST_ESP_OK(nvs_flash_generate_keys_v2(sec_scheme_handle, &cfg)); } TEST_ESP_OK(err); } TEST_ESP_OK(nvs_flash_secure_init(&cfg)); memset(&cfg, 0x00, sizeof(nvs_sec_cfg_t)); int32_t foo = 0; TEST_ESP_OK(nvs_open("uninit_ns", NVS_READWRITE, &handle)); TEST_ESP_OK(nvs_set_i32(handle, "foo", 0x12345678)); nvs_close(handle); TEST_ESP_OK(nvs_open("uninit_ns", NVS_READWRITE, &handle)); TEST_ESP_OK(nvs_get_i32(handle, "foo", &foo)); nvs_close(handle); TEST_ASSERT_EQUAL_INT32(foo, 0x12345678); TEST_ESP_OK(nvs_sec_provider_deregister(sec_scheme_handle)); TEST_ESP_OK(nvs_flash_deinit()); TEST_ESP_OK(nvs_flash_erase()); } #endif #endif