mirror of
https://github.com/espressif/esp-idf.git
synced 2024-10-05 20:47:46 -04:00
117c79eae5
Added bootloader_common_get_sha256_of_partition() and esp_partition_get_sha256() - get or calculate SHA-256 digest for app and data partitions. Added bootloader_sha256_hex_to_str() - helps to print SHA-256 digest Added esp_partition_check_identity() - compares two partitions by SHA-256 digest Refactoring a function esp_image_load() in bootloader space to esp_image_verify() and bootloader_load_image(). Old name function esp_image_load is deprecated and will remove in V4.0 version. spi_flash/sim: Fix error test_host. Add stub for bootloader_common_get_sha256_of_partition in sim/stubs
190 lines
5.8 KiB
C
190 lines
5.8 KiB
C
// Copyright 2017 Espressif Systems (Shanghai) PTE LTD
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
#include "bootloader_sha.h"
|
|
#include <stdbool.h>
|
|
#include <string.h>
|
|
#include <assert.h>
|
|
#include <sys/param.h>
|
|
|
|
#ifndef BOOTLOADER_BUILD
|
|
// App version is a wrapper around mbedTLS SHA API
|
|
#include <mbedtls/sha256.h>
|
|
|
|
bootloader_sha256_handle_t bootloader_sha256_start()
|
|
{
|
|
mbedtls_sha256_context *ctx = (mbedtls_sha256_context *)malloc(sizeof(mbedtls_sha256_context));
|
|
if (!ctx) {
|
|
return NULL;
|
|
}
|
|
mbedtls_sha256_init(ctx);
|
|
int ret = mbedtls_sha256_starts_ret(ctx, false);
|
|
if (ret != 0) {
|
|
return NULL;
|
|
}
|
|
return ctx;
|
|
}
|
|
|
|
void bootloader_sha256_data(bootloader_sha256_handle_t handle, const void *data, size_t data_len)
|
|
{
|
|
assert(handle != NULL);
|
|
mbedtls_sha256_context *ctx = (mbedtls_sha256_context *)handle;
|
|
int ret = mbedtls_sha256_update_ret(ctx, data, data_len);
|
|
assert(ret == 0);
|
|
}
|
|
|
|
void bootloader_sha256_finish(bootloader_sha256_handle_t handle, uint8_t *digest)
|
|
{
|
|
assert(handle != NULL);
|
|
mbedtls_sha256_context *ctx = (mbedtls_sha256_context *)handle;
|
|
if (digest != NULL) {
|
|
int ret = mbedtls_sha256_finish_ret(ctx, digest);
|
|
assert(ret == 0);
|
|
}
|
|
mbedtls_sha256_free(ctx);
|
|
free(handle);
|
|
}
|
|
|
|
#else // Bootloader version
|
|
|
|
#include "rom/sha.h"
|
|
#include "soc/dport_reg.h"
|
|
#include "soc/hwcrypto_reg.h"
|
|
|
|
#include "rom/ets_sys.h" // TO REMOVE
|
|
|
|
static uint32_t words_hashed;
|
|
|
|
// Words per SHA256 block
|
|
static const size_t BLOCK_WORDS = (64/sizeof(uint32_t));
|
|
// Words in final SHA256 digest
|
|
static const size_t DIGEST_WORDS = (32/sizeof(uint32_t));
|
|
|
|
bootloader_sha256_handle_t bootloader_sha256_start()
|
|
{
|
|
// Enable SHA hardware
|
|
ets_sha_enable();
|
|
words_hashed = 0;
|
|
return (bootloader_sha256_handle_t)&words_hashed; // Meaningless non-NULL value
|
|
}
|
|
|
|
void bootloader_sha256_data(bootloader_sha256_handle_t handle, const void *data, size_t data_len)
|
|
{
|
|
assert(handle != NULL);
|
|
assert(data_len % 4 == 0);
|
|
|
|
const uint32_t *w = (const uint32_t *)data;
|
|
size_t word_len = data_len / 4;
|
|
uint32_t *sha_text_reg = (uint32_t *)(SHA_TEXT_BASE);
|
|
|
|
//ets_printf("word_len %d so far %d\n", word_len, words_hashed);
|
|
while (word_len > 0) {
|
|
size_t block_count = words_hashed % BLOCK_WORDS;
|
|
size_t copy_words = (BLOCK_WORDS - block_count);
|
|
|
|
copy_words = MIN(word_len, copy_words);
|
|
|
|
// Wait for SHA engine idle
|
|
while(REG_READ(SHA_256_BUSY_REG) != 0) { }
|
|
|
|
// Copy to memory block
|
|
//ets_printf("block_count %d copy_words %d\n", block_count, copy_words);
|
|
for (int i = 0; i < copy_words; i++) {
|
|
sha_text_reg[block_count + i] = __builtin_bswap32(w[i]);
|
|
}
|
|
asm volatile ("memw");
|
|
|
|
// Update counters
|
|
words_hashed += copy_words;
|
|
block_count += copy_words;
|
|
word_len -= copy_words;
|
|
w += copy_words;
|
|
|
|
// If we loaded a full block, run the SHA engine
|
|
if (block_count == BLOCK_WORDS) {
|
|
//ets_printf("running engine @ count %d\n", words_hashed);
|
|
if (words_hashed == BLOCK_WORDS) {
|
|
REG_WRITE(SHA_256_START_REG, 1);
|
|
} else {
|
|
REG_WRITE(SHA_256_CONTINUE_REG, 1);
|
|
}
|
|
block_count = 0;
|
|
}
|
|
}
|
|
}
|
|
|
|
void bootloader_sha256_finish(bootloader_sha256_handle_t handle, uint8_t *digest)
|
|
{
|
|
assert(handle != NULL);
|
|
|
|
if (digest == NULL) {
|
|
return; // We'd free resources here, but there are none to free
|
|
}
|
|
|
|
uint32_t data_words = words_hashed;
|
|
|
|
// Pad to a 55 byte long block loaded in the engine
|
|
// (leaving 1 byte 0x80 plus variable padding plus 8 bytes of length,
|
|
// to fill a 64 byte block.)
|
|
int block_bytes = (words_hashed % BLOCK_WORDS) * 4;
|
|
int pad_bytes = 55 - block_bytes;
|
|
if (pad_bytes < 0) {
|
|
pad_bytes += 64;
|
|
}
|
|
static const uint8_t padding[64] = { 0x80, 0, };
|
|
|
|
pad_bytes += 5; // 1 byte for 0x80 plus first 4 bytes of the 64-bit length
|
|
assert(pad_bytes % 4 == 0); // should be, as (block_bytes % 4 == 0)
|
|
|
|
bootloader_sha256_data(handle, padding, pad_bytes);
|
|
|
|
assert(words_hashed % BLOCK_WORDS == 60/4); // 32-bits left in block
|
|
|
|
// Calculate 32-bit length for final 32 bits of data
|
|
uint32_t bit_count = __builtin_bswap32( data_words * 32 );
|
|
bootloader_sha256_data(handle, &bit_count, sizeof(bit_count));
|
|
|
|
assert(words_hashed % BLOCK_WORDS == 0);
|
|
|
|
while(REG_READ(SHA_256_BUSY_REG) == 1) { }
|
|
REG_WRITE(SHA_256_LOAD_REG, 1);
|
|
while(REG_READ(SHA_256_BUSY_REG) == 1) { }
|
|
|
|
uint32_t *digest_words = (uint32_t *)digest;
|
|
uint32_t *sha_text_reg = (uint32_t *)(SHA_TEXT_BASE);
|
|
for (int i = 0; i < DIGEST_WORDS; i++) {
|
|
digest_words[i] = __builtin_bswap32(sha_text_reg[i]);
|
|
}
|
|
asm volatile ("memw");
|
|
}
|
|
|
|
#endif
|
|
|
|
esp_err_t bootloader_sha256_hex_to_str(char *out_str, const uint8_t *in_array_hex, size_t len)
|
|
{
|
|
if (out_str == NULL || in_array_hex == NULL || len == 0) {
|
|
return ESP_ERR_INVALID_ARG;
|
|
}
|
|
for (int i = 0; i < len; i++) {
|
|
for (int shift = 0; shift < 2; shift++) {
|
|
uint8_t nibble = (in_array_hex[i] >> (shift ? 0 : 4)) & 0x0F;
|
|
if (nibble < 10) {
|
|
out_str[i*2+shift] = '0' + nibble;
|
|
} else {
|
|
out_str[i*2+shift] = 'a' + nibble - 10;
|
|
}
|
|
}
|
|
}
|
|
return ESP_OK;
|
|
}
|