David Brown | c8d6201 | 2021-10-27 15:03:48 -0600 | [diff] [blame] | 1 | // Copyright (c) 2017-2021 Linaro LTD |
David Brown | e2acfae | 2020-01-21 16:45:01 -0700 | [diff] [blame] | 2 | // Copyright (c) 2017-2019 JUUL Labs |
Roland Mikhel | d670352 | 2023-04-27 14:24:30 +0200 | [diff] [blame] | 3 | // Copyright (c) 2019-2023 Arm Limited |
David Brown | e2acfae | 2020-01-21 16:45:01 -0700 | [diff] [blame] | 4 | // |
| 5 | // SPDX-License-Identifier: Apache-2.0 |
| 6 | |
| 7 | //! Interface wrappers to C API entering to the bootloader |
David Brown | de7729e | 2017-01-09 10:41:35 -0700 | [diff] [blame] | 8 | |
David Brown | 65de6d1 | 2019-01-02 11:38:38 -0700 | [diff] [blame] | 9 | use crate::area::AreaDesc; |
David Brown | 7610157 | 2019-02-28 11:29:03 -0700 | [diff] [blame] | 10 | use simflash::SimMultiFlash; |
David Brown | 65de6d1 | 2019-01-02 11:38:38 -0700 | [diff] [blame] | 11 | use crate::api; |
David Brown | de7729e | 2017-01-09 10:41:35 -0700 | [diff] [blame] | 12 | |
Antonio de Angelis | 65eb35c | 2022-11-22 14:11:47 +0000 | [diff] [blame^] | 13 | #[allow(unused)] |
| 14 | use std::sync::Once; |
| 15 | |
David Brown | c423ac4 | 2021-06-04 13:47:34 -0600 | [diff] [blame] | 16 | /// The result of an invocation of `boot_go`. This is intentionally opaque so that we can provide |
| 17 | /// accessors for everything we need from this. |
| 18 | #[derive(Debug)] |
David Brown | 6d47d42 | 2021-06-04 14:41:33 -0600 | [diff] [blame] | 19 | pub enum BootGoResult { |
| 20 | /// This run was stopped by the flash simulation mechanism. |
| 21 | Stopped, |
| 22 | /// The bootloader ran to completion with the following data. |
| 23 | Normal { |
| 24 | result: i32, |
| 25 | asserts: u8, |
David Brown | d82de8c | 2021-06-04 15:08:25 -0600 | [diff] [blame] | 26 | |
| 27 | resp: api::BootRsp, |
David Brown | 6d47d42 | 2021-06-04 14:41:33 -0600 | [diff] [blame] | 28 | }, |
David Brown | c423ac4 | 2021-06-04 13:47:34 -0600 | [diff] [blame] | 29 | } |
| 30 | |
| 31 | impl BootGoResult { |
| 32 | /// Was this run interrupted. |
| 33 | pub fn interrupted(&self) -> bool { |
David Brown | 6d47d42 | 2021-06-04 14:41:33 -0600 | [diff] [blame] | 34 | matches!(self, BootGoResult::Stopped) |
David Brown | c423ac4 | 2021-06-04 13:47:34 -0600 | [diff] [blame] | 35 | } |
| 36 | |
| 37 | /// Was this boot run successful (returned 0) |
| 38 | pub fn success(&self) -> bool { |
David Brown | 6d47d42 | 2021-06-04 14:41:33 -0600 | [diff] [blame] | 39 | matches!(self, BootGoResult::Normal { result: 0, .. }) |
David Brown | c423ac4 | 2021-06-04 13:47:34 -0600 | [diff] [blame] | 40 | } |
| 41 | |
| 42 | /// Success, but also no asserts. |
| 43 | pub fn success_no_asserts(&self) -> bool { |
David Brown | 6d47d42 | 2021-06-04 14:41:33 -0600 | [diff] [blame] | 44 | matches!(self, BootGoResult::Normal { |
| 45 | result: 0, |
| 46 | asserts: 0, |
David Brown | d82de8c | 2021-06-04 15:08:25 -0600 | [diff] [blame] | 47 | .. |
David Brown | 6d47d42 | 2021-06-04 14:41:33 -0600 | [diff] [blame] | 48 | }) |
David Brown | c423ac4 | 2021-06-04 13:47:34 -0600 | [diff] [blame] | 49 | } |
| 50 | |
David Brown | 6d47d42 | 2021-06-04 14:41:33 -0600 | [diff] [blame] | 51 | /// Get the asserts count. An interrupted run will be considered to have no asserts. |
David Brown | c423ac4 | 2021-06-04 13:47:34 -0600 | [diff] [blame] | 52 | pub fn asserts(&self) -> u8 { |
David Brown | 6d47d42 | 2021-06-04 14:41:33 -0600 | [diff] [blame] | 53 | match self { |
| 54 | BootGoResult::Normal { asserts, .. } => *asserts, |
| 55 | _ => 0, |
| 56 | } |
David Brown | c423ac4 | 2021-06-04 13:47:34 -0600 | [diff] [blame] | 57 | } |
David Brown | d82de8c | 2021-06-04 15:08:25 -0600 | [diff] [blame] | 58 | |
| 59 | /// Retrieve the 'resp' field that is filled in. |
| 60 | pub fn resp(&self) -> Option<&api::BootRsp> { |
| 61 | match self { |
| 62 | BootGoResult::Normal { resp, .. } => Some(resp), |
| 63 | _ => None, |
| 64 | } |
| 65 | } |
David Brown | c423ac4 | 2021-06-04 13:47:34 -0600 | [diff] [blame] | 66 | } |
| 67 | |
David Brown | de7729e | 2017-01-09 10:41:35 -0700 | [diff] [blame] | 68 | /// Invoke the bootloader on this flash device. |
David Brown | 7610157 | 2019-02-28 11:29:03 -0700 | [diff] [blame] | 69 | pub fn boot_go(multiflash: &mut SimMultiFlash, areadesc: &AreaDesc, |
Raef Coles | 3fd3ecc | 2021-10-15 11:14:12 +0100 | [diff] [blame] | 70 | counter: Option<&mut i32>, image_index: Option<i32>, |
| 71 | catch_asserts: bool) -> BootGoResult { |
Antonio de Angelis | 65eb35c | 2022-11-22 14:11:47 +0000 | [diff] [blame^] | 72 | init_crypto(); |
| 73 | |
David Brown | 7cc4526 | 2021-03-10 05:13:44 -0700 | [diff] [blame] | 74 | for (&dev_id, flash) in multiflash.iter_mut() { |
| 75 | api::set_flash(dev_id, flash); |
Fabio Utzig | 8000e32 | 2019-08-05 08:14:32 -0300 | [diff] [blame] | 76 | } |
| 77 | let mut sim_ctx = api::CSimContext { |
| 78 | flash_counter: match counter { |
David Brown | ee61c83 | 2017-11-06 11:13:25 -0700 | [diff] [blame] | 79 | None => 0, |
| 80 | Some(ref c) => **c as libc::c_int |
Fabio Utzig | 8000e32 | 2019-08-05 08:14:32 -0300 | [diff] [blame] | 81 | }, |
| 82 | jumped: 0, |
| 83 | c_asserts: 0, |
| 84 | c_catch_asserts: if catch_asserts { 1 } else { 0 }, |
| 85 | boot_jmpbuf: [0; 16], |
| 86 | }; |
David Brown | d216b20 | 2021-06-04 10:14:33 -0600 | [diff] [blame] | 87 | let mut rsp = api::BootRsp { |
| 88 | br_hdr: std::ptr::null(), |
| 89 | flash_dev_id: 0, |
| 90 | image_off: 0, |
| 91 | }; |
Raef Coles | 3fd3ecc | 2021-10-15 11:14:12 +0100 | [diff] [blame] | 92 | let result: i32 = unsafe { |
| 93 | match image_index { |
| 94 | None => raw::invoke_boot_go(&mut sim_ctx as *mut _, |
| 95 | &areadesc.get_c() as *const _, |
| 96 | &mut rsp as *mut _, -1) as i32, |
| 97 | Some(i) => raw::invoke_boot_go(&mut sim_ctx as *mut _, |
| 98 | &areadesc.get_c() as *const _, |
| 99 | &mut rsp as *mut _, |
| 100 | i as i32) as i32 |
| 101 | } |
Fabio Utzig | 8000e32 | 2019-08-05 08:14:32 -0300 | [diff] [blame] | 102 | }; |
| 103 | let asserts = sim_ctx.c_asserts; |
David Brown | 8608c53 | 2021-03-10 05:18:11 -0700 | [diff] [blame] | 104 | if let Some(c) = counter { |
| 105 | *c = sim_ctx.flash_counter; |
| 106 | } |
David Brown | 7cc4526 | 2021-03-10 05:13:44 -0700 | [diff] [blame] | 107 | for &dev_id in multiflash.keys() { |
| 108 | api::clear_flash(dev_id); |
| 109 | } |
David Brown | 6d47d42 | 2021-06-04 14:41:33 -0600 | [diff] [blame] | 110 | if result == -0x13579 { |
| 111 | BootGoResult::Stopped |
| 112 | } else { |
David Brown | d82de8c | 2021-06-04 15:08:25 -0600 | [diff] [blame] | 113 | BootGoResult::Normal { result, asserts, resp: rsp } |
David Brown | 6d47d42 | 2021-06-04 14:41:33 -0600 | [diff] [blame] | 114 | } |
David Brown | de7729e | 2017-01-09 10:41:35 -0700 | [diff] [blame] | 115 | } |
| 116 | |
Fabio Utzig | 3fbbdac | 2019-12-19 15:18:23 -0300 | [diff] [blame] | 117 | pub fn boot_trailer_sz(align: u32) -> u32 { |
Christopher Collins | 2adef70 | 2019-05-22 14:37:31 -0700 | [diff] [blame] | 118 | unsafe { raw::boot_trailer_sz(align) } |
David Brown | de7729e | 2017-01-09 10:41:35 -0700 | [diff] [blame] | 119 | } |
| 120 | |
Fabio Utzig | 3fbbdac | 2019-12-19 15:18:23 -0300 | [diff] [blame] | 121 | pub fn boot_status_sz(align: u32) -> u32 { |
| 122 | unsafe { raw::boot_status_sz(align) } |
| 123 | } |
| 124 | |
Fabio Utzig | a0bc9b5 | 2017-06-28 09:19:55 -0300 | [diff] [blame] | 125 | pub fn boot_magic_sz() -> usize { |
David Brown | 2b8a695 | 2019-10-01 16:14:53 -0600 | [diff] [blame] | 126 | unsafe { raw::boot_magic_sz() as usize } |
Fabio Utzig | a0bc9b5 | 2017-06-28 09:19:55 -0300 | [diff] [blame] | 127 | } |
| 128 | |
| 129 | pub fn boot_max_align() -> usize { |
David Brown | e0bb1f9 | 2019-10-01 15:57:01 -0600 | [diff] [blame] | 130 | unsafe { raw::boot_max_align() as usize } |
Fabio Utzig | a0bc9b5 | 2017-06-28 09:19:55 -0300 | [diff] [blame] | 131 | } |
| 132 | |
Fabio Utzig | 1e48b91 | 2018-09-18 09:04:18 -0300 | [diff] [blame] | 133 | pub fn rsa_oaep_encrypt(pubkey: &[u8], seckey: &[u8]) -> Result<[u8; 256], &'static str> { |
| 134 | unsafe { |
| 135 | let mut encbuf: [u8; 256] = [0; 256]; |
| 136 | if raw::rsa_oaep_encrypt_(pubkey.as_ptr(), pubkey.len() as u32, |
| 137 | seckey.as_ptr(), seckey.len() as u32, |
| 138 | encbuf.as_mut_ptr()) == 0 { |
| 139 | return Ok(encbuf); |
| 140 | } |
David Brown | c20bbb2 | 2021-03-10 05:19:14 -0700 | [diff] [blame] | 141 | Err("Failed to encrypt buffer") |
Fabio Utzig | 1e48b91 | 2018-09-18 09:04:18 -0300 | [diff] [blame] | 142 | } |
| 143 | } |
| 144 | |
Salome Thirot | 6fdbf55 | 2021-05-14 16:46:14 +0100 | [diff] [blame] | 145 | pub fn kw_encrypt(kek: &[u8], seckey: &[u8], keylen: u32) -> Result<Vec<u8>, &'static str> { |
Fabio Utzig | 1e48b91 | 2018-09-18 09:04:18 -0300 | [diff] [blame] | 146 | unsafe { |
Salome Thirot | 6fdbf55 | 2021-05-14 16:46:14 +0100 | [diff] [blame] | 147 | let mut encbuf = vec![0u8; 24]; |
| 148 | if keylen == 32 { |
| 149 | encbuf = vec![0u8; 40]; |
| 150 | } |
Fabio Utzig | 1e48b91 | 2018-09-18 09:04:18 -0300 | [diff] [blame] | 151 | if raw::kw_encrypt_(kek.as_ptr(), seckey.as_ptr(), encbuf.as_mut_ptr()) == 0 { |
| 152 | return Ok(encbuf); |
| 153 | } |
David Brown | c20bbb2 | 2021-03-10 05:19:14 -0700 | [diff] [blame] | 154 | Err("Failed to encrypt buffer") |
Fabio Utzig | 1e48b91 | 2018-09-18 09:04:18 -0300 | [diff] [blame] | 155 | } |
| 156 | } |
| 157 | |
Roland Mikhel | d670352 | 2023-04-27 14:24:30 +0200 | [diff] [blame] | 158 | pub fn set_security_counter(image_index: u32, security_counter_value: u32) { |
| 159 | api::sim_set_nv_counter_for_image(image_index, security_counter_value); |
| 160 | } |
| 161 | |
| 162 | pub fn get_security_counter(image_index: u32) -> u32 { |
| 163 | let mut counter_val: u32 = 0; |
| 164 | api::sim_get_nv_counter_for_image(image_index, &mut counter_val as *mut u32); |
| 165 | return counter_val; |
| 166 | } |
| 167 | |
David Brown | de7729e | 2017-01-09 10:41:35 -0700 | [diff] [blame] | 168 | mod raw { |
David Brown | 65de6d1 | 2019-01-02 11:38:38 -0700 | [diff] [blame] | 169 | use crate::area::CAreaDesc; |
David Brown | d216b20 | 2021-06-04 10:14:33 -0600 | [diff] [blame] | 170 | use crate::api::{BootRsp, CSimContext}; |
David Brown | de7729e | 2017-01-09 10:41:35 -0700 | [diff] [blame] | 171 | |
| 172 | extern "C" { |
| 173 | // This generates a warning about `CAreaDesc` not being foreign safe. There doesn't appear to |
| 174 | // be any way to get rid of this warning. See https://github.com/rust-lang/rust/issues/34798 |
| 175 | // for information and tracking. |
David Brown | d216b20 | 2021-06-04 10:14:33 -0600 | [diff] [blame] | 176 | pub fn invoke_boot_go(sim_ctx: *mut CSimContext, areadesc: *const CAreaDesc, |
Raef Coles | 3fd3ecc | 2021-10-15 11:14:12 +0100 | [diff] [blame] | 177 | rsp: *mut BootRsp, image_index: libc::c_int) -> libc::c_int; |
David Brown | de7729e | 2017-01-09 10:41:35 -0700 | [diff] [blame] | 178 | |
Fabio Utzig | 3fbbdac | 2019-12-19 15:18:23 -0300 | [diff] [blame] | 179 | pub fn boot_trailer_sz(min_write_sz: u32) -> u32; |
| 180 | pub fn boot_status_sz(min_write_sz: u32) -> u32; |
Fabio Utzig | a0bc9b5 | 2017-06-28 09:19:55 -0300 | [diff] [blame] | 181 | |
David Brown | 2b8a695 | 2019-10-01 16:14:53 -0600 | [diff] [blame] | 182 | pub fn boot_magic_sz() -> u32; |
David Brown | e0bb1f9 | 2019-10-01 15:57:01 -0600 | [diff] [blame] | 183 | pub fn boot_max_align() -> u32; |
Fabio Utzig | 92be3fb | 2017-12-05 08:52:53 -0200 | [diff] [blame] | 184 | |
Fabio Utzig | 1e48b91 | 2018-09-18 09:04:18 -0300 | [diff] [blame] | 185 | pub fn rsa_oaep_encrypt_(pubkey: *const u8, pubkey_len: libc::c_uint, |
| 186 | seckey: *const u8, seckey_len: libc::c_uint, |
| 187 | encbuf: *mut u8) -> libc::c_int; |
| 188 | |
| 189 | pub fn kw_encrypt_(kek: *const u8, seckey: *const u8, |
| 190 | encbuf: *mut u8) -> libc::c_int; |
Antonio de Angelis | 65eb35c | 2022-11-22 14:11:47 +0000 | [diff] [blame^] | 191 | |
| 192 | #[allow(unused)] |
| 193 | pub fn psa_crypto_init() -> u32; |
| 194 | |
| 195 | #[allow(unused)] |
| 196 | pub fn mbedtls_test_enable_insecure_external_rng(); |
David Brown | de7729e | 2017-01-09 10:41:35 -0700 | [diff] [blame] | 197 | } |
| 198 | } |
Antonio de Angelis | 65eb35c | 2022-11-22 14:11:47 +0000 | [diff] [blame^] | 199 | |
| 200 | #[allow(unused)] |
| 201 | static PSA_INIT_SYNC: Once = Once::new(); |
| 202 | |
| 203 | #[allow(unused)] |
| 204 | static MBEDTLS_EXTERNAL_RNG_ENABLE_SYNC: Once = Once::new(); |
| 205 | |
| 206 | #[cfg(feature = "psa-crypto-api")] |
| 207 | fn init_crypto() { |
| 208 | PSA_INIT_SYNC.call_once(|| { |
| 209 | assert_eq!(unsafe { raw::psa_crypto_init() }, 0); |
| 210 | }); |
| 211 | |
| 212 | /* The PSA APIs require properly initialisation of the entropy subsystem |
| 213 | * The configuration adds the option MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG when the |
| 214 | * psa-crypto-api feature is enabled. As a result the tests use the implementation |
| 215 | * of the test external rng that needs to be initialised before being able to use it |
| 216 | */ |
| 217 | MBEDTLS_EXTERNAL_RNG_ENABLE_SYNC.call_once(|| { |
| 218 | unsafe { raw::mbedtls_test_enable_insecure_external_rng() } |
| 219 | }); |
| 220 | } |
| 221 | |
| 222 | #[cfg(not(feature = "psa-crypto-api"))] |
| 223 | fn init_crypto() { |
| 224 | // When the feature is not enabled, the init is just empty |
| 225 | } |