-
Notifications
You must be signed in to change notification settings - Fork 218
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
[nrf noup] PSA implementation of x25519 and ed25519 verification
The commit provides implementation of image verification with ed25519 and encryption/decryption support where random key is encrypted using x25519. Issues: - sha256 used with ed25519 verification - key passed via context in raw farm instead of key id Signed-off-by: Dominik Ermel <dominik.ermel@nordicsemi.no>
- Loading branch information
Showing
5 changed files
with
644 additions
and
58 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,71 @@ | ||
/* | ||
* Copyright (c) 2020 Nordic Semiconductor ASA | ||
* | ||
* SPDX-License-Identifier: LicenseRef-Nordic-5-Clause | ||
*/ | ||
#include <assert.h> | ||
#include <string.h> | ||
#include <stdint.h> | ||
|
||
#include <mcuboot_config/mcuboot_config.h> | ||
#include "bootutil/bootutil_log.h" | ||
|
||
#include <psa/crypto.h> | ||
#include <psa/crypto_types.h> | ||
|
||
BOOT_LOG_MODULE_DECLARE(ed25519_psa); | ||
|
||
#define SHA512_DIGEST_LENGTH 64 | ||
#define EDDSA_KEY_LENGTH 32 | ||
#define EDDSA_SIGNAGURE_LENGTH 64 | ||
|
||
int ED25519_verify(const uint8_t *message, size_t message_len, | ||
const uint8_t signature[64], | ||
const uint8_t public_key[32]) | ||
{ | ||
/* Set to any error */ | ||
psa_status_t status = PSA_ERROR_BAD_STATE; | ||
psa_key_attributes_t key_attr = PSA_KEY_ATTRIBUTES_INIT; | ||
psa_key_id_t kid; | ||
int ret = 0; /* Fail by default */ | ||
|
||
/* Initialize PSA Crypto */ | ||
status = psa_crypto_init(); | ||
if (status != PSA_SUCCESS) { | ||
BOOT_LOG_ERR("PSA crypto init failed %d\n", status); | ||
return 0; | ||
} | ||
|
||
status = PSA_ERROR_BAD_STATE; | ||
|
||
psa_set_key_type(&key_attr, | ||
PSA_KEY_TYPE_ECC_PUBLIC_KEY(PSA_ECC_FAMILY_TWISTED_EDWARDS)); | ||
psa_set_key_usage_flags(&key_attr, PSA_KEY_USAGE_VERIFY_MESSAGE); | ||
psa_set_key_algorithm(&key_attr, PSA_ALG_PURE_EDDSA); | ||
|
||
status = psa_import_key(&key_attr, public_key, EDDSA_KEY_LENGTH, &kid); | ||
if (status != PSA_SUCCESS) { | ||
BOOT_LOG_ERR("ED25519 key import failed %d", status); | ||
return 0; | ||
} | ||
|
||
status = psa_verify_message(kid, PSA_ALG_PURE_EDDSA, message, message_len, | ||
signature, EDDSA_SIGNAGURE_LENGTH); | ||
if (status != PSA_SUCCESS) { | ||
BOOT_LOG_ERR("ED25519 signature verification failed %d", status); | ||
ret = 0; | ||
/* Pass through to destroy key */ | ||
} else { | ||
ret = 1; | ||
/* Pass through to destroy key */ | ||
} | ||
|
||
status = psa_destroy_key(kid); | ||
|
||
if (status != PSA_SUCCESS) { | ||
/* Just for logging */ | ||
BOOT_LOG_WRN("Failed to destroy key %d", status); | ||
} | ||
|
||
return ret; | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.