David Brown | 5153bd6 | 2017-01-06 11:16:53 -0700 | [diff] [blame] | 1 | /* |
| 2 | * Licensed to the Apache Software Foundation (ASF) under one |
| 3 | * or more contributor license agreements. See the NOTICE file |
| 4 | * distributed with this work for additional information |
| 5 | * regarding copyright ownership. The ASF licenses this file |
| 6 | * to you under the Apache License, Version 2.0 (the |
| 7 | * "License"); you may not use this file except in compliance |
| 8 | * with the License. You may obtain a copy of the License at |
| 9 | * |
| 10 | * http://www.apache.org/licenses/LICENSE-2.0 |
| 11 | * |
| 12 | * Unless required by applicable law or agreed to in writing, |
| 13 | * software distributed under the License is distributed on an |
| 14 | * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY |
| 15 | * KIND, either express or implied. See the License for the |
| 16 | * specific language governing permissions and limitations |
| 17 | * under the License. |
| 18 | */ |
| 19 | |
| 20 | #include <zephyr.h> |
David Brown | 5153bd6 | 2017-01-06 11:16:53 -0700 | [diff] [blame] | 21 | #include <string.h> |
| 22 | |
| 23 | #include "os/os_heap.h" |
| 24 | |
Marti Bolivar | a4818a5 | 2018-04-12 13:02:38 -0400 | [diff] [blame] | 25 | #ifdef CONFIG_BOOT_USE_MBEDTLS |
Fabio Utzig | 28ee5b0 | 2017-12-12 08:10:40 -0200 | [diff] [blame] | 26 | |
David Brown | 5153bd6 | 2017-01-06 11:16:53 -0700 | [diff] [blame] | 27 | #include <mbedtls/platform.h> |
David Brown | 0bae965 | 2017-10-19 16:45:09 -0600 | [diff] [blame] | 28 | #include <mbedtls/memory_buffer_alloc.h> |
David Brown | 5153bd6 | 2017-01-06 11:16:53 -0700 | [diff] [blame] | 29 | |
David Brown | 0bae965 | 2017-10-19 16:45:09 -0600 | [diff] [blame] | 30 | /* |
| 31 | * This is the heap for mbed TLS. The value needed depends on the key |
Fabio Utzig | 105b59a | 2019-05-13 15:08:12 -0700 | [diff] [blame] | 32 | * size and algorithm used. |
| 33 | * |
| 34 | * - RSA-2048 signing without encryption is known to work well with 6144 bytes; |
| 35 | * - When using RSA-2048-OAEP encryption + RSA-2048 signing, or RSA-3072 |
| 36 | * signing (no encryption) 10240 bytes seems to be enough. |
| 37 | * |
| 38 | * NOTE: RSA-3072 signing + RSA-2048-OAEP might require growing the size... |
David Brown | 0bae965 | 2017-10-19 16:45:09 -0600 | [diff] [blame] | 39 | */ |
Fabio Utzig | 105b59a | 2019-05-13 15:08:12 -0700 | [diff] [blame] | 40 | #if (CONFIG_BOOT_SIGNATURE_TYPE_RSA_LEN == 2048) && !defined(CONFIG_BOOT_ENCRYPT_RSA) |
David Brown | 0bae965 | 2017-10-19 16:45:09 -0600 | [diff] [blame] | 41 | #define CRYPTO_HEAP_SIZE 6144 |
Fabio Utzig | 4541b53 | 2018-12-17 09:17:15 -0200 | [diff] [blame] | 42 | #else |
Fabio Utzig | 6f4d8f8 | 2019-12-12 18:46:06 -0300 | [diff] [blame] | 43 | # if !defined(MBEDTLS_RSA_NO_CRT) |
| 44 | # define CRYPTO_HEAP_SIZE 10240 |
| 45 | # else |
| 46 | # define CRYPTO_HEAP_SIZE 16384 |
| 47 | # endif |
Fabio Utzig | 4541b53 | 2018-12-17 09:17:15 -0200 | [diff] [blame] | 48 | #endif |
David Brown | 5153bd6 | 2017-01-06 11:16:53 -0700 | [diff] [blame] | 49 | |
David Brown | 0bae965 | 2017-10-19 16:45:09 -0600 | [diff] [blame] | 50 | static unsigned char mempool[CRYPTO_HEAP_SIZE]; |
David Brown | 5153bd6 | 2017-01-06 11:16:53 -0700 | [diff] [blame] | 51 | |
| 52 | /* |
| 53 | * Initialize mbedtls to be able to use the local heap. |
| 54 | */ |
| 55 | void os_heap_init(void) |
| 56 | { |
David Brown | 0bae965 | 2017-10-19 16:45:09 -0600 | [diff] [blame] | 57 | mbedtls_memory_buffer_alloc_init(mempool, sizeof(mempool)); |
David Brown | 5153bd6 | 2017-01-06 11:16:53 -0700 | [diff] [blame] | 58 | } |
David Brown | e9771ef | 2017-11-14 11:38:06 -0700 | [diff] [blame] | 59 | #else |
| 60 | void os_heap_init(void) |
| 61 | { |
| 62 | } |
| 63 | #endif |