blob: 5c4732b53c98e5a189795f31522e6cd73f45002f [file] [log] [blame]
Carles Cufi37d052f2018-01-30 16:40:10 +01001# Copyright 2018 Nordic Semiconductor ASA
David Vinczeb2a1a482020-09-18 11:54:30 +02002# Copyright 2017-2020 Linaro Limited
Rustam Ismayilov36f8bf32023-11-27 21:44:54 +01003# Copyright 2019-2024 Arm Limited
David Brown1314bf32017-12-20 11:10:55 -07004#
David Brown79c4fcf2021-01-26 15:04:05 -07005# SPDX-License-Identifier: Apache-2.0
6#
David Brown1314bf32017-12-20 11:10:55 -07007# Licensed under the Apache License, Version 2.0 (the "License");
8# you may not use this file except in compliance with the License.
9# You may obtain a copy of the License at
10#
11# http://www.apache.org/licenses/LICENSE-2.0
12#
13# Unless required by applicable law or agreed to in writing, software
14# distributed under the License is distributed on an "AS IS" BASIS,
15# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16# See the License for the specific language governing permissions and
17# limitations under the License.
18
David Brown23f91ad2017-05-16 11:38:17 -060019"""
20Image signing and management.
21"""
22
David Brown23f91ad2017-05-16 11:38:17 -060023import hashlib
Carles Cufi37d052f2018-01-30 16:40:10 +010024import os.path
Rustam Ismayilov36f8bf32023-11-27 21:44:54 +010025import struct
26from enum import Enum
27
28import click
29from cryptography.exceptions import InvalidSignature
30from cryptography.hazmat.backends import default_backend
31from cryptography.hazmat.primitives import hashes, hmac
Fabio Utzig7a3b2602019-10-22 09:56:44 -030032from cryptography.hazmat.primitives.asymmetric import ec, padding
Fabio Utzig960b4c52020-04-02 13:07:12 -030033from cryptography.hazmat.primitives.asymmetric.x25519 import X25519PrivateKey
Fabio Utzig06b77b82018-08-23 16:01:16 -030034from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes
Fabio Utzig7a3b2602019-10-22 09:56:44 -030035from cryptography.hazmat.primitives.kdf.hkdf import HKDF
36from cryptography.hazmat.primitives.serialization import Encoding, PublicFormat
Rustam Ismayilov36f8bf32023-11-27 21:44:54 +010037from intelhex import IntelHex
38
39from . import version as versmod, keys
40from .boot_record import create_sw_component_data
41from .keys import rsa, ecdsa, x25519
David Brown23f91ad2017-05-16 11:38:17 -060042
David Brown72e7a512017-09-01 11:08:23 -060043IMAGE_MAGIC = 0x96f3b83d
David Brown23f91ad2017-05-16 11:38:17 -060044IMAGE_HEADER_SIZE = 32
Carles Cufi37d052f2018-01-30 16:40:10 +010045BIN_EXT = "bin"
46INTEL_HEX_EXT = "hex"
Fabio Utzig519285f2018-06-04 11:11:53 -030047DEFAULT_MAX_SECTORS = 128
Kristine Jassmann73c38c62021-02-03 16:56:14 +000048DEFAULT_MAX_ALIGN = 8
David Vinczeda8c9192019-03-26 17:17:41 +010049DEP_IMAGES_KEY = "images"
50DEP_VERSIONS_KEY = "versions"
David Vincze71b8f982020-03-17 19:08:12 +010051MAX_SW_TYPE_LENGTH = 12 # Bytes
David Brown23f91ad2017-05-16 11:38:17 -060052
53# Image header flags.
54IMAGE_F = {
55 'PIC': 0x0000001,
Salome Thirot0f641972021-05-14 11:19:55 +010056 'ENCRYPTED_AES128': 0x0000004,
57 'ENCRYPTED_AES256': 0x0000008,
Fabio Utzig06b77b82018-08-23 16:01:16 -030058 'NON_BOOTABLE': 0x0000010,
David Vincze1e0c5442020-04-07 14:12:33 +020059 'RAM_LOAD': 0x0000020,
Dominik Ermel50820b12020-12-14 13:16:46 +000060 'ROM_FIXED': 0x0000100,
Fabio Utzig06b77b82018-08-23 16:01:16 -030061}
David Brown23f91ad2017-05-16 11:38:17 -060062
63TLV_VALUES = {
David Brown43cda332017-09-01 09:53:23 -060064 'KEYHASH': 0x01,
David Vinczedde178d2020-03-26 20:06:01 +010065 'PUBKEY': 0x02,
David Brown27648b82017-08-31 10:40:29 -060066 'SHA256': 0x10,
Roland Mikhel57041742023-02-03 14:43:13 +010067 'SHA384': 0x11,
David Brown27648b82017-08-31 10:40:29 -060068 'RSA2048': 0x20,
David Vincze4395b802023-04-27 16:11:49 +020069 'ECDSASIG': 0x22,
Fabio Utzig19fd79a2019-05-08 18:20:39 -030070 'RSA3072': 0x23,
Fabio Utzig8101d1f2019-05-09 15:03:22 -030071 'ED25519': 0x24,
Fabio Utzig06b77b82018-08-23 16:01:16 -030072 'ENCRSA2048': 0x30,
Salome Thirot0f641972021-05-14 11:19:55 +010073 'ENCKW': 0x31,
Fabio Utzig7a3b2602019-10-22 09:56:44 -030074 'ENCEC256': 0x32,
Fabio Utzig960b4c52020-04-02 13:07:12 -030075 'ENCX25519': 0x33,
David Vincze1a7a6902020-02-18 15:05:16 +010076 'DEPENDENCY': 0x40,
77 'SEC_CNT': 0x50,
David Vincze71b8f982020-03-17 19:08:12 +010078 'BOOT_RECORD': 0x60,
Fabio Utzig06b77b82018-08-23 16:01:16 -030079}
David Brown23f91ad2017-05-16 11:38:17 -060080
Fabio Utzig4a5477a2019-05-27 15:45:08 -030081TLV_SIZE = 4
David Brownf5b33d82017-09-01 10:58:27 -060082TLV_INFO_SIZE = 4
83TLV_INFO_MAGIC = 0x6907
Fabio Utzig510fddb2019-09-12 12:15:36 -030084TLV_PROT_INFO_MAGIC = 0x6908
David Brown23f91ad2017-05-16 11:38:17 -060085
Piotr Dymacze026c362023-02-24 12:09:33 +010086TLV_VENDOR_RES_MIN = 0x00a0
87TLV_VENDOR_RES_MAX = 0xfffe
88
Mark Schultea66c6872018-09-26 17:24:40 -070089STRUCT_ENDIAN_DICT = {
90 'little': '<',
91 'big': '>'
92}
93
Fabio Utzig4a5477a2019-05-27 15:45:08 -030094VerifyResult = Enum('VerifyResult',
Rustam Ismayilov36f8bf32023-11-27 21:44:54 +010095 ['OK', 'INVALID_MAGIC', 'INVALID_TLV_INFO_MAGIC', 'INVALID_HASH', 'INVALID_SIGNATURE',
96 'KEY_MISMATCH'])
Fabio Utzig4a5477a2019-05-27 15:45:08 -030097
Roland Mikhel57041742023-02-03 14:43:13 +010098
Gustavo Henrique Niheicf120ba2021-11-22 18:44:11 -030099def align_up(num, align):
100 assert (align & (align - 1) == 0) and align != 0
101 return (num + (align - 1)) & ~(align - 1)
Fabio Utzig4a5477a2019-05-27 15:45:08 -0300102
Roland Mikhel57041742023-02-03 14:43:13 +0100103
David Brown23f91ad2017-05-16 11:38:17 -0600104class TLV():
Fabio Utzig510fddb2019-09-12 12:15:36 -0300105 def __init__(self, endian, magic=TLV_INFO_MAGIC):
106 self.magic = magic
David Brown23f91ad2017-05-16 11:38:17 -0600107 self.buf = bytearray()
Mark Schultea66c6872018-09-26 17:24:40 -0700108 self.endian = endian
David Brown23f91ad2017-05-16 11:38:17 -0600109
Fabio Utzig510fddb2019-09-12 12:15:36 -0300110 def __len__(self):
111 return TLV_INFO_SIZE + len(self.buf)
112
David Brown23f91ad2017-05-16 11:38:17 -0600113 def add(self, kind, payload):
Fabio Utzig510fddb2019-09-12 12:15:36 -0300114 """
115 Add a TLV record. Kind should be a string found in TLV_VALUES above.
116 """
Mark Schultea66c6872018-09-26 17:24:40 -0700117 e = STRUCT_ENDIAN_DICT[self.endian]
Ihor Slabkyy24d93732020-03-10 15:33:57 +0200118 if isinstance(kind, int):
Piotr Dymacze026c362023-02-24 12:09:33 +0100119 if not TLV_VENDOR_RES_MIN <= kind <= TLV_VENDOR_RES_MAX:
120 msg = "Invalid custom TLV type value '0x{:04x}', allowed " \
121 "value should be between 0x{:04x} and 0x{:04x}".format(
Roland Mikhel57041742023-02-03 14:43:13 +0100122 kind, TLV_VENDOR_RES_MIN, TLV_VENDOR_RES_MAX)
Piotr Dymacze026c362023-02-24 12:09:33 +0100123 raise click.UsageError(msg)
124 buf = struct.pack(e + 'HH', kind, len(payload))
Ihor Slabkyy24d93732020-03-10 15:33:57 +0200125 else:
126 buf = struct.pack(e + 'BBH', TLV_VALUES[kind], 0, len(payload))
David Brown23f91ad2017-05-16 11:38:17 -0600127 self.buf += buf
128 self.buf += payload
129
130 def get(self):
Fabio Utzig510fddb2019-09-12 12:15:36 -0300131 if len(self.buf) == 0:
132 return bytes()
Mark Schultea66c6872018-09-26 17:24:40 -0700133 e = STRUCT_ENDIAN_DICT[self.endian]
Fabio Utzig510fddb2019-09-12 12:15:36 -0300134 header = struct.pack(e + 'HH', self.magic, len(self))
David Brownf5b33d82017-09-01 10:58:27 -0600135 return header + bytes(self.buf)
David Brown23f91ad2017-05-16 11:38:17 -0600136
Fabio Utzig7c00acd2019-01-07 09:54:20 -0200137
Rustam Ismayilov36f8bf32023-11-27 21:44:54 +0100138def get_digest(tlv_type, hash_region):
139 if tlv_type == TLV_VALUES["SHA384"]:
140 sha = hashlib.sha384()
141 elif tlv_type == TLV_VALUES["SHA256"]:
142 sha = hashlib.sha256()
143
144 sha.update(hash_region)
145 return sha.digest()
146
147
148def tlv_matches_key_type(tlv_type, key):
149 """Check if provided key matches to TLV record in the image"""
150 return (key is None or
151 type(key) == keys.ECDSA384P1 and tlv_type == TLV_VALUES["SHA384"] or
152 type(key) != keys.ECDSA384P1 and tlv_type == TLV_VALUES["SHA256"])
153
154
155class Image:
Carles Cufi37d052f2018-01-30 16:40:10 +0100156
Fabio Utzig7c00acd2019-01-07 09:54:20 -0200157 def __init__(self, version=None, header_size=IMAGE_HEADER_SIZE,
Henrik Brix Andersen0ce958e2020-03-11 14:04:11 +0100158 pad_header=False, pad=False, confirm=False, align=1,
159 slot_size=0, max_sectors=DEFAULT_MAX_SECTORS,
160 overwrite_only=False, endian="little", load_addr=0,
Dominik Ermel50820b12020-12-14 13:16:46 +0000161 rom_fixed=None, erased_val=None, save_enctlv=False,
Mateusz Wielgosdc030552024-02-26 15:02:45 -0600162 security_counter=None, max_align=None,
163 non_bootable=False):
Dominik Ermel50820b12020-12-14 13:16:46 +0000164
165 if load_addr and rom_fixed:
166 raise click.UsageError("Can not set rom_fixed and load_addr at the same time")
167
David Brown23f91ad2017-05-16 11:38:17 -0600168 self.version = version or versmod.decode_version("0")
Fabio Utzig7c00acd2019-01-07 09:54:20 -0200169 self.header_size = header_size
170 self.pad_header = pad_header
David Brown23f91ad2017-05-16 11:38:17 -0600171 self.pad = pad
Henrik Brix Andersen0ce958e2020-03-11 14:04:11 +0100172 self.confirm = confirm
Fabio Utzig263d4392018-06-05 10:37:35 -0300173 self.align = align
174 self.slot_size = slot_size
175 self.max_sectors = max_sectors
Fabio Utzigdcf0c9b2018-06-11 12:27:49 -0700176 self.overwrite_only = overwrite_only
Mark Schultea66c6872018-09-26 17:24:40 -0700177 self.endian = endian
Fabio Utzig7c00acd2019-01-07 09:54:20 -0200178 self.base_addr = None
Håkon Øye Amundsendf8c8912019-08-26 12:15:28 +0000179 self.load_addr = 0 if load_addr is None else load_addr
Dominik Ermel50820b12020-12-14 13:16:46 +0000180 self.rom_fixed = rom_fixed
Fabio Utzigcb080732020-02-07 12:01:39 -0300181 self.erased_val = 0xff if erased_val is None else int(erased_val, 0)
Fabio Utzig7c00acd2019-01-07 09:54:20 -0200182 self.payload = []
Fabio Utzig649d80f2019-09-12 10:26:23 -0300183 self.enckey = None
Fabio Utzig9a492d52020-01-15 11:31:52 -0300184 self.save_enctlv = save_enctlv
185 self.enctlv_len = 0
Piotr Mienkowskib6d5cf32022-01-31 01:01:11 +0100186 self.max_align = max(DEFAULT_MAX_ALIGN, align) if max_align is None else int(max_align)
Mateusz Wielgosdc030552024-02-26 15:02:45 -0600187 self.non_bootable = non_bootable
David Brown23f91ad2017-05-16 11:38:17 -0600188
Gustavo Henrique Niheicf120ba2021-11-22 18:44:11 -0300189 if self.max_align == DEFAULT_MAX_ALIGN:
190 self.boot_magic = bytes([
191 0x77, 0xc2, 0x95, 0xf3,
192 0x60, 0xd2, 0xef, 0x7f,
193 0x35, 0x52, 0x50, 0x0f,
194 0x2c, 0xb6, 0x79, 0x80, ])
195 else:
Raphael Dupont16f3de52023-03-16 09:02:11 +0100196 lsb = self.max_align & 0x00ff
197 msb = (self.max_align & 0xff00) >> 8
198 align = bytes([msb, lsb]) if self.endian == "big" else bytes([lsb, msb])
199 self.boot_magic = align + bytes([0x2d, 0xe1,
Rustam Ismayilov36f8bf32023-11-27 21:44:54 +0100200 0x5d, 0x29, 0x41, 0x0b,
201 0x8d, 0x77, 0x67, 0x9c,
202 0x11, 0x0f, 0x1f, 0x8a, ])
Gustavo Henrique Niheicf120ba2021-11-22 18:44:11 -0300203
David Vincze1a7a6902020-02-18 15:05:16 +0100204 if security_counter == 'auto':
205 # Security counter has not been explicitly provided,
206 # generate it from the version number
207 self.security_counter = ((self.version.major << 24)
208 + (self.version.minor << 16)
209 + self.version.revision)
210 else:
211 self.security_counter = security_counter
212
David Brown23f91ad2017-05-16 11:38:17 -0600213 def __repr__(self):
David Vincze1a7a6902020-02-18 15:05:16 +0100214 return "<Image version={}, header_size={}, security_counter={}, \
215 base_addr={}, load_addr={}, align={}, slot_size={}, \
216 max_sectors={}, overwrite_only={}, endian={} format={}, \
217 payloadlen=0x{:x}>".format(
Fabio Utzig263d4392018-06-05 10:37:35 -0300218 self.version,
219 self.header_size,
David Vincze1a7a6902020-02-18 15:05:16 +0100220 self.security_counter,
Fabio Utzig263d4392018-06-05 10:37:35 -0300221 self.base_addr if self.base_addr is not None else "N/A",
Håkon Øye Amundsendf8c8912019-08-26 12:15:28 +0000222 self.load_addr,
Fabio Utzig263d4392018-06-05 10:37:35 -0300223 self.align,
224 self.slot_size,
225 self.max_sectors,
Fabio Utzigdcf0c9b2018-06-11 12:27:49 -0700226 self.overwrite_only,
Mark Schultea66c6872018-09-26 17:24:40 -0700227 self.endian,
Fabio Utzig263d4392018-06-05 10:37:35 -0300228 self.__class__.__name__,
229 len(self.payload))
David Brown23f91ad2017-05-16 11:38:17 -0600230
Fabio Utzig7c00acd2019-01-07 09:54:20 -0200231 def load(self, path):
232 """Load an image from a given file"""
233 ext = os.path.splitext(path)[1][1:].lower()
Fabio Utzig1f508922020-01-15 11:37:51 -0300234 try:
235 if ext == INTEL_HEX_EXT:
236 ih = IntelHex(path)
237 self.payload = ih.tobinarray()
238 self.base_addr = ih.minaddr()
239 else:
240 with open(path, 'rb') as f:
241 self.payload = f.read()
242 except FileNotFoundError:
243 raise click.UsageError("Input file not found")
Fabio Utzig7c00acd2019-01-07 09:54:20 -0200244
245 # Add the image header if needed.
246 if self.pad_header and self.header_size > 0:
247 if self.base_addr:
248 # Adjust base_addr for new header
249 self.base_addr -= self.header_size
Fabio Utzig9117fde2019-10-17 11:11:46 -0300250 self.payload = bytes([self.erased_val] * self.header_size) + \
251 self.payload
Fabio Utzig7c00acd2019-01-07 09:54:20 -0200252
Fabio Utzig9a492d52020-01-15 11:31:52 -0300253 self.check_header()
Fabio Utzig7c00acd2019-01-07 09:54:20 -0200254
Fabio Utzigedbabcf2019-10-11 13:03:37 -0300255 def save(self, path, hex_addr=None):
Fabio Utzig7c00acd2019-01-07 09:54:20 -0200256 """Save an image from a given file"""
Fabio Utzig7c00acd2019-01-07 09:54:20 -0200257 ext = os.path.splitext(path)[1][1:].lower()
258 if ext == INTEL_HEX_EXT:
259 # input was in binary format, but HEX needs to know the base addr
Fabio Utzigedbabcf2019-10-11 13:03:37 -0300260 if self.base_addr is None and hex_addr is None:
Fabio Utzig1f508922020-01-15 11:37:51 -0300261 raise click.UsageError("No address exists in input file "
262 "neither was it provided by user")
Fabio Utzig7c00acd2019-01-07 09:54:20 -0200263 h = IntelHex()
Fabio Utzigedbabcf2019-10-11 13:03:37 -0300264 if hex_addr is not None:
265 self.base_addr = hex_addr
Fabio Utzig7c00acd2019-01-07 09:54:20 -0200266 h.frombytes(bytes=self.payload, offset=self.base_addr)
Fabio Utzigedbabcf2019-10-11 13:03:37 -0300267 if self.pad:
Fabio Utzig2269f472019-10-17 11:14:33 -0300268 trailer_size = self._trailer_size(self.align, self.max_sectors,
269 self.overwrite_only,
Fabio Utzig9a492d52020-01-15 11:31:52 -0300270 self.enckey,
271 self.save_enctlv,
272 self.enctlv_len)
Fabio Utzig2269f472019-10-17 11:14:33 -0300273 trailer_addr = (self.base_addr + self.slot_size) - trailer_size
Kristine Jassmann73c38c62021-02-03 16:56:14 +0000274 if self.confirm and not self.overwrite_only:
Roland Mikhel57041742023-02-03 14:43:13 +0100275 magic_align_size = align_up(len(self.boot_magic),
276 self.max_align)
Kristine Jassmann73c38c62021-02-03 16:56:14 +0000277 image_ok_idx = -(magic_align_size + self.max_align)
Alexander Mihajlovicf4df58f2022-08-17 15:44:53 +0200278 flag = bytearray([self.erased_val] * self.max_align)
Roland Mikhel57041742023-02-03 14:43:13 +0100279 flag[0] = 0x01 # image_ok = 0x01
280 h.puts(trailer_addr + trailer_size + image_ok_idx,
281 bytes(flag))
Wouter Cappellec028d452022-01-25 10:25:24 +0100282 h.puts(trailer_addr + (trailer_size - len(self.boot_magic)),
283 bytes(self.boot_magic))
Fabio Utzig7c00acd2019-01-07 09:54:20 -0200284 h.tofile(path, 'hex')
285 else:
Fabio Utzigedbabcf2019-10-11 13:03:37 -0300286 if self.pad:
287 self.pad_to(self.slot_size)
Fabio Utzig7c00acd2019-01-07 09:54:20 -0200288 with open(path, 'wb') as f:
289 f.write(self.payload)
290
Fabio Utzig9a492d52020-01-15 11:31:52 -0300291 def check_header(self):
Fabio Utzigf5556c32019-10-23 11:00:27 -0300292 if self.header_size > 0 and not self.pad_header:
David Brown23f91ad2017-05-16 11:38:17 -0600293 if any(v != 0 for v in self.payload[0:self.header_size]):
Fabio Utzig9a492d52020-01-15 11:31:52 -0300294 raise click.UsageError("Header padding was not requested and "
295 "image does not start with zeros")
296
297 def check_trailer(self):
Fabio Utzig263d4392018-06-05 10:37:35 -0300298 if self.slot_size > 0:
Fabio Utzigdcf0c9b2018-06-11 12:27:49 -0700299 tsize = self._trailer_size(self.align, self.max_sectors,
Fabio Utzig9a492d52020-01-15 11:31:52 -0300300 self.overwrite_only, self.enckey,
301 self.save_enctlv, self.enctlv_len)
Fabio Utzig263d4392018-06-05 10:37:35 -0300302 padding = self.slot_size - (len(self.payload) + tsize)
303 if padding < 0:
Fabio Utzig9a492d52020-01-15 11:31:52 -0300304 msg = "Image size (0x{:x}) + trailer (0x{:x}) exceeds " \
305 "requested size 0x{:x}".format(
306 len(self.payload), tsize, self.slot_size)
307 raise click.UsageError(msg)
David Brown23f91ad2017-05-16 11:38:17 -0600308
Fabio Utzig960b4c52020-04-02 13:07:12 -0300309 def ecies_hkdf(self, enckey, plainkey):
310 if isinstance(enckey, ecdsa.ECDSA256P1Public):
311 newpk = ec.generate_private_key(ec.SECP256R1(), default_backend())
312 shared = newpk.exchange(ec.ECDH(), enckey._get_public())
313 else:
314 newpk = X25519PrivateKey.generate()
315 shared = newpk.exchange(enckey._get_public())
Fabio Utzig7a3b2602019-10-22 09:56:44 -0300316 derived_key = HKDF(
317 algorithm=hashes.SHA256(), length=48, salt=None,
318 info=b'MCUBoot_ECIES_v1', backend=default_backend()).derive(shared)
319 encryptor = Cipher(algorithms.AES(derived_key[:16]),
320 modes.CTR(bytes([0] * 16)),
321 backend=default_backend()).encryptor()
322 cipherkey = encryptor.update(plainkey) + encryptor.finalize()
323 mac = hmac.HMAC(derived_key[16:], hashes.SHA256(),
324 backend=default_backend())
325 mac.update(cipherkey)
326 ciphermac = mac.finalize()
Fabio Utzig960b4c52020-04-02 13:07:12 -0300327 if isinstance(enckey, ecdsa.ECDSA256P1Public):
328 pubk = newpk.public_key().public_bytes(
329 encoding=Encoding.X962,
330 format=PublicFormat.UncompressedPoint)
331 else:
332 pubk = newpk.public_key().public_bytes(
333 encoding=Encoding.Raw,
334 format=PublicFormat.Raw)
Fabio Utzig7a3b2602019-10-22 09:56:44 -0300335 return cipherkey, ciphermac, pubk
336
David Vinczedde178d2020-03-26 20:06:01 +0100337 def create(self, key, public_key_format, enckey, dependencies=None,
Roland Mikhel57041742023-02-03 14:43:13 +0100338 sw_type=None, custom_tlvs=None, encrypt_keylen=128, clear=False,
David Vincze7f982b02023-04-27 16:12:17 +0200339 fixed_sig=None, pub_key=None, vector_to_sign=None):
Fabio Utzig649d80f2019-09-12 10:26:23 -0300340 self.enckey = enckey
341
Roland Mikhel57041742023-02-03 14:43:13 +0100342 # Check what hashing algorithm should be used
Rustam Ismayilov36f8bf32023-11-27 21:44:54 +0100343 if (key and isinstance(key, ecdsa.ECDSA384P1)
344 or pub_key and isinstance(pub_key, ecdsa.ECDSA384P1Public)):
Roland Mikhel57041742023-02-03 14:43:13 +0100345 hash_algorithm = hashlib.sha384
346 hash_tlv = "SHA384"
347 else:
348 hash_algorithm = hashlib.sha256
349 hash_tlv = "SHA256"
David Vincze71b8f982020-03-17 19:08:12 +0100350 # Calculate the hash of the public key
351 if key is not None:
352 pub = key.get_public_bytes()
Roland Mikhel57041742023-02-03 14:43:13 +0100353 sha = hash_algorithm()
David Vincze71b8f982020-03-17 19:08:12 +0100354 sha.update(pub)
355 pubbytes = sha.digest()
Andrzej Puzdrowski160303c2022-03-15 15:41:14 +0100356 elif pub_key is not None:
Andrzej Puzdrowskidfce0be2022-03-28 09:34:15 +0200357 if hasattr(pub_key, 'sign'):
Antonio de Angelis284b8fe2022-11-15 13:54:47 +0000358 print(os.path.basename(__file__) + ": sign the payload")
Andrzej Puzdrowski160303c2022-03-15 15:41:14 +0100359 pub = pub_key.get_public_bytes()
Roland Mikhel57041742023-02-03 14:43:13 +0100360 sha = hash_algorithm()
Andrzej Puzdrowski160303c2022-03-15 15:41:14 +0100361 sha.update(pub)
362 pubbytes = sha.digest()
David Vincze71b8f982020-03-17 19:08:12 +0100363 else:
364 pubbytes = bytes(hashlib.sha256().digest_size)
365
David Vincze1a7a6902020-02-18 15:05:16 +0100366 protected_tlv_size = 0
367
368 if self.security_counter is not None:
369 # Size of the security counter TLV: header ('HH') + payload ('I')
370 # = 4 + 4 = 8 Bytes
371 protected_tlv_size += TLV_SIZE + 4
372
David Vincze71b8f982020-03-17 19:08:12 +0100373 if sw_type is not None:
374 if len(sw_type) > MAX_SW_TYPE_LENGTH:
375 msg = "'{}' is too long ({} characters) for sw_type. Its " \
376 "maximum allowed length is 12 characters.".format(
377 sw_type, len(sw_type))
378 raise click.UsageError(msg)
379
380 image_version = (str(self.version.major) + '.'
381 + str(self.version.minor) + '.'
382 + str(self.version.revision))
383
384 # The image hash is computed over the image header, the image
385 # itself and the protected TLV area. However, the boot record TLV
386 # (which is part of the protected area) should contain this hash
387 # before it is even calculated. For this reason the script fills
388 # this field with zeros and the bootloader will insert the right
389 # value later.
Roland Mikhel57041742023-02-03 14:43:13 +0100390 digest = bytes(hash_algorithm().digest_size)
David Vincze71b8f982020-03-17 19:08:12 +0100391
392 # Create CBOR encoded boot record
393 boot_record = create_sw_component_data(sw_type, image_version,
Roland Mikhel57041742023-02-03 14:43:13 +0100394 hash_tlv, digest,
David Vincze71b8f982020-03-17 19:08:12 +0100395 pubbytes)
396
397 protected_tlv_size += TLV_SIZE + len(boot_record)
398
David Vincze1a7a6902020-02-18 15:05:16 +0100399 if dependencies is not None:
400 # Size of a Dependency TLV = Header ('HH') + Payload('IBBHI')
401 # = 4 + 12 = 16 Bytes
David Vinczeda8c9192019-03-26 17:17:41 +0100402 dependencies_num = len(dependencies[DEP_IMAGES_KEY])
David Vincze1a7a6902020-02-18 15:05:16 +0100403 protected_tlv_size += (dependencies_num * 16)
404
David Vinczeb2a1a482020-09-18 11:54:30 +0200405 if custom_tlvs is not None:
Ihor Slabkyy24d93732020-03-10 15:33:57 +0200406 for value in custom_tlvs.values():
407 protected_tlv_size += TLV_SIZE + len(value)
408
David Vincze1a7a6902020-02-18 15:05:16 +0100409 if protected_tlv_size != 0:
410 # Add the size of the TLV info header
411 protected_tlv_size += TLV_INFO_SIZE
David Vinczeda8c9192019-03-26 17:17:41 +0100412
Ihor Slabkyy24d93732020-03-10 15:33:57 +0200413 # At this point the image is already on the payload
414 #
415 # This adds the padding if image is not aligned to the 16 Bytes
416 # in encrypted mode
417 if self.enckey is not None:
418 pad_len = len(self.payload) % 16
419 if pad_len > 0:
Fabio Utzigd62631a2021-02-04 19:45:27 -0300420 pad = bytes(16 - pad_len)
421 if isinstance(self.payload, bytes):
422 self.payload += pad
423 else:
424 self.payload.extend(pad)
Ihor Slabkyy24d93732020-03-10 15:33:57 +0200425
426 # This adds the header to the payload as well
Salome Thirot0f641972021-05-14 11:19:55 +0100427 if encrypt_keylen == 256:
428 self.add_header(enckey, protected_tlv_size, 256)
429 else:
430 self.add_header(enckey, protected_tlv_size)
David Brown23f91ad2017-05-16 11:38:17 -0600431
Fabio Utzig510fddb2019-09-12 12:15:36 -0300432 prot_tlv = TLV(self.endian, TLV_PROT_INFO_MAGIC)
David Brown23f91ad2017-05-16 11:38:17 -0600433
Fabio Utzig510fddb2019-09-12 12:15:36 -0300434 # Protected TLVs must be added first, because they are also included
435 # in the hash calculation
436 protected_tlv_off = None
David Vinczeda8c9192019-03-26 17:17:41 +0100437 if protected_tlv_size != 0:
David Vincze1a7a6902020-02-18 15:05:16 +0100438
439 e = STRUCT_ENDIAN_DICT[self.endian]
440
441 if self.security_counter is not None:
442 payload = struct.pack(e + 'I', self.security_counter)
443 prot_tlv.add('SEC_CNT', payload)
444
David Vincze71b8f982020-03-17 19:08:12 +0100445 if sw_type is not None:
446 prot_tlv.add('BOOT_RECORD', boot_record)
447
David Vincze1a7a6902020-02-18 15:05:16 +0100448 if dependencies is not None:
449 for i in range(dependencies_num):
450 payload = struct.pack(
Rustam Ismayilov36f8bf32023-11-27 21:44:54 +0100451 e + 'B3x' + 'BBHI',
452 int(dependencies[DEP_IMAGES_KEY][i]),
453 dependencies[DEP_VERSIONS_KEY][i].major,
454 dependencies[DEP_VERSIONS_KEY][i].minor,
455 dependencies[DEP_VERSIONS_KEY][i].revision,
456 dependencies[DEP_VERSIONS_KEY][i].build
457 )
David Vincze1a7a6902020-02-18 15:05:16 +0100458 prot_tlv.add('DEPENDENCY', payload)
David Vinczeda8c9192019-03-26 17:17:41 +0100459
David Vinczeb2a1a482020-09-18 11:54:30 +0200460 if custom_tlvs is not None:
461 for tag, value in custom_tlvs.items():
462 prot_tlv.add(tag, value)
Ihor Slabkyy24d93732020-03-10 15:33:57 +0200463
Fabio Utzig510fddb2019-09-12 12:15:36 -0300464 protected_tlv_off = len(self.payload)
465 self.payload += prot_tlv.get()
466
467 tlv = TLV(self.endian)
David Vinczeda8c9192019-03-26 17:17:41 +0100468
David Brown23f91ad2017-05-16 11:38:17 -0600469 # Note that ecdsa wants to do the hashing itself, which means
470 # we get to hash it twice.
Roland Mikhel57041742023-02-03 14:43:13 +0100471 sha = hash_algorithm()
David Brown23f91ad2017-05-16 11:38:17 -0600472 sha.update(self.payload)
473 digest = sha.digest()
Roland Mikhel57041742023-02-03 14:43:13 +0100474 tlv.add(hash_tlv, digest)
David Brown23f91ad2017-05-16 11:38:17 -0600475
Fabio Utzig08a716d2022-11-18 10:54:07 -0300476 if vector_to_sign == 'payload':
477 # Stop amending data to the image
478 # Just keep data vector which is expected to be signed
479 print(os.path.basename(__file__) + ': export payload')
480 return
481 elif vector_to_sign == 'digest':
482 self.payload = digest
483 print(os.path.basename(__file__) + ': export digest')
484 return
485
Almir Okato3eb50262022-05-09 16:23:50 -0300486 if key is not None or fixed_sig is not None:
487 if public_key_format == 'hash':
488 tlv.add('KEYHASH', pubbytes)
Fabio Utzig8101d1f2019-05-09 15:03:22 -0300489 else:
Almir Okato3eb50262022-05-09 16:23:50 -0300490 tlv.add('PUBKEY', pub)
491
Almir Okato3eb50262022-05-09 16:23:50 -0300492 if key is not None and fixed_sig is None:
Roland Mikhel57041742023-02-03 14:43:13 +0100493 # `sign` expects the full image payload (hashing done
494 # internally), while `sign_digest` expects only the digest
495 # of the payload
Almir Okato3eb50262022-05-09 16:23:50 -0300496
497 if hasattr(key, 'sign'):
Antonio de Angelis284b8fe2022-11-15 13:54:47 +0000498 print(os.path.basename(__file__) + ": sign the payload")
Almir Okato3eb50262022-05-09 16:23:50 -0300499 sig = key.sign(bytes(self.payload))
500 else:
Antonio de Angelis284b8fe2022-11-15 13:54:47 +0000501 print(os.path.basename(__file__) + ": sign the digest")
Almir Okato3eb50262022-05-09 16:23:50 -0300502 sig = key.sign_digest(digest)
David Vincze7f982b02023-04-27 16:12:17 +0200503 tlv.add(key.sig_tlv(), sig)
Almir Okato3eb50262022-05-09 16:23:50 -0300504 self.signature = sig
505 elif fixed_sig is not None and key is None:
David Vincze7f982b02023-04-27 16:12:17 +0200506 tlv.add(pub_key.sig_tlv(), fixed_sig['value'])
Almir Okato3eb50262022-05-09 16:23:50 -0300507 self.signature = fixed_sig['value']
508 else:
509 raise click.UsageError("Can not sign using key and provide fixed-signature at the same time")
David Brown23f91ad2017-05-16 11:38:17 -0600510
Fabio Utzig510fddb2019-09-12 12:15:36 -0300511 # At this point the image was hashed + signed, we can remove the
512 # protected TLVs from the payload (will be re-added later)
513 if protected_tlv_off is not None:
514 self.payload = self.payload[:protected_tlv_off]
515
Fabio Utzig06b77b82018-08-23 16:01:16 -0300516 if enckey is not None:
Salome Thirot0f641972021-05-14 11:19:55 +0100517 if encrypt_keylen == 256:
518 plainkey = os.urandom(32)
519 else:
520 plainkey = os.urandom(16)
Fabio Utzig7a3b2602019-10-22 09:56:44 -0300521
522 if isinstance(enckey, rsa.RSAPublic):
523 cipherkey = enckey._get_public().encrypt(
524 plainkey, padding.OAEP(
525 mgf=padding.MGF1(algorithm=hashes.SHA256()),
526 algorithm=hashes.SHA256(),
527 label=None))
Fabio Utzig9a492d52020-01-15 11:31:52 -0300528 self.enctlv_len = len(cipherkey)
Fabio Utzig7a3b2602019-10-22 09:56:44 -0300529 tlv.add('ENCRSA2048', cipherkey)
Fabio Utzig960b4c52020-04-02 13:07:12 -0300530 elif isinstance(enckey, (ecdsa.ECDSA256P1Public,
531 x25519.X25519Public)):
532 cipherkey, mac, pubk = self.ecies_hkdf(enckey, plainkey)
Fabio Utzig9a492d52020-01-15 11:31:52 -0300533 enctlv = pubk + mac + cipherkey
534 self.enctlv_len = len(enctlv)
Fabio Utzig960b4c52020-04-02 13:07:12 -0300535 if isinstance(enckey, ecdsa.ECDSA256P1Public):
536 tlv.add('ENCEC256', enctlv)
537 else:
538 tlv.add('ENCX25519', enctlv)
Fabio Utzig06b77b82018-08-23 16:01:16 -0300539
Michel Jaouend09aa6b2022-01-07 16:48:58 +0100540 if not clear:
541 nonce = bytes([0] * 16)
542 cipher = Cipher(algorithms.AES(plainkey), modes.CTR(nonce),
543 backend=default_backend())
544 encryptor = cipher.encryptor()
545 img = bytes(self.payload[self.header_size:])
546 self.payload[self.header_size:] = \
547 encryptor.update(img) + encryptor.finalize()
Fabio Utzig06b77b82018-08-23 16:01:16 -0300548
Fabio Utzig510fddb2019-09-12 12:15:36 -0300549 self.payload += prot_tlv.get()
550 self.payload += tlv.get()
David Brown23f91ad2017-05-16 11:38:17 -0600551
Fabio Utzig9a492d52020-01-15 11:31:52 -0300552 self.check_trailer()
553
Andrzej Puzdrowski160303c2022-03-15 15:41:14 +0100554 def get_signature(self):
555 return self.signature
556
Salome Thirot0f641972021-05-14 11:19:55 +0100557 def add_header(self, enckey, protected_tlv_size, aes_length=128):
Fabio Utzigcd284062018-11-30 11:05:45 -0200558 """Install the image header."""
David Brown23f91ad2017-05-16 11:38:17 -0600559
David Brown0f0c6a82017-06-08 09:26:24 -0600560 flags = 0
Fabio Utzig06b77b82018-08-23 16:01:16 -0300561 if enckey is not None:
Salome Thirot0f641972021-05-14 11:19:55 +0100562 if aes_length == 128:
563 flags |= IMAGE_F['ENCRYPTED_AES128']
564 else:
565 flags |= IMAGE_F['ENCRYPTED_AES256']
David Vincze1e0c5442020-04-07 14:12:33 +0200566 if self.load_addr != 0:
567 # Indicates that this image should be loaded into RAM
568 # instead of run directly from flash.
569 flags |= IMAGE_F['RAM_LOAD']
Dominik Ermel50820b12020-12-14 13:16:46 +0000570 if self.rom_fixed:
571 flags |= IMAGE_F['ROM_FIXED']
Mateusz Wielgosdc030552024-02-26 15:02:45 -0600572 if self.non_bootable:
573 flags |= IMAGE_F['NON_BOOTABLE']
David Brown23f91ad2017-05-16 11:38:17 -0600574
Mark Schultea66c6872018-09-26 17:24:40 -0700575 e = STRUCT_ENDIAN_DICT[self.endian]
576 fmt = (e +
David Vinczeda8c9192019-03-26 17:17:41 +0100577 # type ImageHdr struct {
578 'I' + # Magic uint32
579 'I' + # LoadAddr uint32
580 'H' + # HdrSz uint16
581 'H' + # PTLVSz uint16
582 'I' + # ImgSz uint32
583 'I' + # Flags uint32
584 'BBHI' + # Vers ImageVersion
585 'I' # Pad1 uint32
586 ) # }
David Brown23f91ad2017-05-16 11:38:17 -0600587 assert struct.calcsize(fmt) == IMAGE_HEADER_SIZE
588 header = struct.pack(fmt,
Roland Mikhel57041742023-02-03 14:43:13 +0100589 IMAGE_MAGIC,
590 self.rom_fixed or self.load_addr,
591 self.header_size,
592 protected_tlv_size, # TLV Info header +
593 # Protected TLVs
594 len(self.payload) - self.header_size, # ImageSz
595 flags,
596 self.version.major,
597 self.version.minor or 0,
598 self.version.revision or 0,
599 self.version.build or 0,
600 0) # Pad1
David Brown23f91ad2017-05-16 11:38:17 -0600601 self.payload = bytearray(self.payload)
602 self.payload[:len(header)] = header
603
Fabio Utzig9a492d52020-01-15 11:31:52 -0300604 def _trailer_size(self, write_size, max_sectors, overwrite_only, enckey,
605 save_enctlv, enctlv_len):
Fabio Utzig519285f2018-06-04 11:11:53 -0300606 # NOTE: should already be checked by the argument parser
Fabio Utzig649d80f2019-09-12 10:26:23 -0300607 magic_size = 16
Gustavo Henrique Niheicf120ba2021-11-22 18:44:11 -0300608 magic_align_size = align_up(magic_size, self.max_align)
Fabio Utzigdcf0c9b2018-06-11 12:27:49 -0700609 if overwrite_only:
Kristine Jassmann73c38c62021-02-03 16:56:14 +0000610 return self.max_align * 2 + magic_align_size
Fabio Utzigdcf0c9b2018-06-11 12:27:49 -0700611 else:
Kristine Jassmann73c38c62021-02-03 16:56:14 +0000612 if write_size not in set([1, 2, 4, 8, 16, 32]):
Fabio Utzig1f508922020-01-15 11:37:51 -0300613 raise click.BadParameter("Invalid alignment: {}".format(
614 write_size))
Fabio Utzigdcf0c9b2018-06-11 12:27:49 -0700615 m = DEFAULT_MAX_SECTORS if max_sectors is None else max_sectors
Fabio Utzig649d80f2019-09-12 10:26:23 -0300616 trailer = m * 3 * write_size # status area
617 if enckey is not None:
Fabio Utzig9a492d52020-01-15 11:31:52 -0300618 if save_enctlv:
619 # TLV saved by the bootloader is aligned
Gustavo Henrique Niheicf120ba2021-11-22 18:44:11 -0300620 keylen = align_up(enctlv_len, self.max_align)
Fabio Utzig9a492d52020-01-15 11:31:52 -0300621 else:
Gustavo Henrique Niheicf120ba2021-11-22 18:44:11 -0300622 keylen = align_up(16, self.max_align)
Fabio Utzig9a492d52020-01-15 11:31:52 -0300623 trailer += keylen * 2 # encryption keys
Kristine Jassmann73c38c62021-02-03 16:56:14 +0000624 trailer += self.max_align * 4 # image_ok/copy_done/swap_info/swap_size
625 trailer += magic_align_size
Fabio Utzig649d80f2019-09-12 10:26:23 -0300626 return trailer
Fabio Utzig519285f2018-06-04 11:11:53 -0300627
Fabio Utzig263d4392018-06-05 10:37:35 -0300628 def pad_to(self, size):
David Brown23f91ad2017-05-16 11:38:17 -0600629 """Pad the image to the given size, with the given flash alignment."""
Fabio Utzigdcf0c9b2018-06-11 12:27:49 -0700630 tsize = self._trailer_size(self.align, self.max_sectors,
Fabio Utzig9a492d52020-01-15 11:31:52 -0300631 self.overwrite_only, self.enckey,
632 self.save_enctlv, self.enctlv_len)
David Brown23f91ad2017-05-16 11:38:17 -0600633 padding = size - (len(self.payload) + tsize)
Henrik Brix Andersen0ce958e2020-03-11 14:04:11 +0100634 pbytes = bytearray([self.erased_val] * padding)
Gustavo Henrique Niheicf120ba2021-11-22 18:44:11 -0300635 pbytes += bytearray([self.erased_val] * (tsize - len(self.boot_magic)))
636 pbytes += self.boot_magic
Kristine Jassmann73c38c62021-02-03 16:56:14 +0000637 if self.confirm and not self.overwrite_only:
638 magic_size = 16
Gustavo Henrique Niheicf120ba2021-11-22 18:44:11 -0300639 magic_align_size = align_up(magic_size, self.max_align)
Kristine Jassmann73c38c62021-02-03 16:56:14 +0000640 image_ok_idx = -(magic_align_size + self.max_align)
641 pbytes[image_ok_idx] = 0x01 # image_ok = 0x01
David Brown23f91ad2017-05-16 11:38:17 -0600642 self.payload += pbytes
Fabio Utzig4a5477a2019-05-27 15:45:08 -0300643
644 @staticmethod
645 def verify(imgfile, key):
Lucian Zala79c284b2024-01-30 17:43:11 +0200646 ext = os.path.splitext(imgfile)[1][1:].lower()
647 try:
648 if ext == INTEL_HEX_EXT:
649 b = IntelHex(imgfile).tobinstr()
650 else:
651 with open(imgfile, 'rb') as f:
652 b = f.read()
653 except FileNotFoundError:
654 raise click.UsageError(f"Image file {imgfile} not found")
Fabio Utzig4a5477a2019-05-27 15:45:08 -0300655
656 magic, _, header_size, _, img_size = struct.unpack('IIHHI', b[:16])
Marek Pietae9555102019-08-08 16:08:16 +0200657 version = struct.unpack('BBHI', b[20:28])
658
Fabio Utzig4a5477a2019-05-27 15:45:08 -0300659 if magic != IMAGE_MAGIC:
Casper Meijn2a01f3f2020-08-22 13:51:40 +0200660 return VerifyResult.INVALID_MAGIC, None, None
Fabio Utzig4a5477a2019-05-27 15:45:08 -0300661
Fabio Utzigd12a8da2021-01-21 08:44:59 -0300662 tlv_off = header_size + img_size
Rustam Ismayilov36f8bf32023-11-27 21:44:54 +0100663 tlv_info = b[tlv_off:tlv_off + TLV_INFO_SIZE]
Fabio Utzig4a5477a2019-05-27 15:45:08 -0300664 magic, tlv_tot = struct.unpack('HH', tlv_info)
Fabio Utzigd12a8da2021-01-21 08:44:59 -0300665 if magic == TLV_PROT_INFO_MAGIC:
666 tlv_off += tlv_tot
Rustam Ismayilov36f8bf32023-11-27 21:44:54 +0100667 tlv_info = b[tlv_off:tlv_off + TLV_INFO_SIZE]
Fabio Utzigd12a8da2021-01-21 08:44:59 -0300668 magic, tlv_tot = struct.unpack('HH', tlv_info)
669
Fabio Utzig4a5477a2019-05-27 15:45:08 -0300670 if magic != TLV_INFO_MAGIC:
Casper Meijn2a01f3f2020-08-22 13:51:40 +0200671 return VerifyResult.INVALID_TLV_INFO_MAGIC, None, None
Fabio Utzig4a5477a2019-05-27 15:45:08 -0300672
Fabio Utzigd12a8da2021-01-21 08:44:59 -0300673 prot_tlv_size = tlv_off
Rustam Ismayilov36f8bf32023-11-27 21:44:54 +0100674 hash_region = b[:prot_tlv_size]
675 digest = None
Fabio Utzig4a5477a2019-05-27 15:45:08 -0300676 tlv_end = tlv_off + tlv_tot
677 tlv_off += TLV_INFO_SIZE # skip tlv info
678 while tlv_off < tlv_end:
Rustam Ismayilov36f8bf32023-11-27 21:44:54 +0100679 tlv = b[tlv_off:tlv_off + TLV_SIZE]
Fabio Utzig4a5477a2019-05-27 15:45:08 -0300680 tlv_type, _, tlv_len = struct.unpack('BBH', tlv)
Rustam Ismayilov36f8bf32023-11-27 21:44:54 +0100681 if tlv_type == TLV_VALUES["SHA256"] or tlv_type == TLV_VALUES["SHA384"]:
682 if not tlv_matches_key_type(tlv_type, key):
683 return VerifyResult.KEY_MISMATCH, None, None
Fabio Utzig4a5477a2019-05-27 15:45:08 -0300684 off = tlv_off + TLV_SIZE
Rustam Ismayilov36f8bf32023-11-27 21:44:54 +0100685 digest = get_digest(tlv_type, hash_region)
686 if digest == b[off:off + tlv_len]:
Fabio Utzig4a5477a2019-05-27 15:45:08 -0300687 if key is None:
Casper Meijn2a01f3f2020-08-22 13:51:40 +0200688 return VerifyResult.OK, version, digest
Fabio Utzig4a5477a2019-05-27 15:45:08 -0300689 else:
Casper Meijn2a01f3f2020-08-22 13:51:40 +0200690 return VerifyResult.INVALID_HASH, None, None
Fabio Utzig4a5477a2019-05-27 15:45:08 -0300691 elif key is not None and tlv_type == TLV_VALUES[key.sig_tlv()]:
692 off = tlv_off + TLV_SIZE
Rustam Ismayilov36f8bf32023-11-27 21:44:54 +0100693 tlv_sig = b[off:off + tlv_len]
Fabio Utzigd12a8da2021-01-21 08:44:59 -0300694 payload = b[:prot_tlv_size]
Fabio Utzig4a5477a2019-05-27 15:45:08 -0300695 try:
Fabio Utzig8101d1f2019-05-09 15:03:22 -0300696 if hasattr(key, 'verify'):
697 key.verify(tlv_sig, payload)
698 else:
699 key.verify_digest(tlv_sig, digest)
Casper Meijn2a01f3f2020-08-22 13:51:40 +0200700 return VerifyResult.OK, version, digest
Fabio Utzig4a5477a2019-05-27 15:45:08 -0300701 except InvalidSignature:
702 # continue to next TLV
703 pass
704 tlv_off += TLV_SIZE + tlv_len
Casper Meijn2a01f3f2020-08-22 13:51:40 +0200705 return VerifyResult.INVALID_SIGNATURE, None, None