mirror of
https://github.com/espressif/esp-idf.git
synced 2025-07-30 18:57:19 +02:00
secure_boot: Do not allow key revocation in bootloader
This commit is contained in:
@ -137,10 +137,13 @@ esp_err_t esp_secure_boot_verify_rsa_signature_block(const ets_secure_boot_signa
|
|||||||
#if SOC_EFUSE_SECURE_BOOT_KEY_DIGESTS == 1
|
#if SOC_EFUSE_SECURE_BOOT_KEY_DIGESTS == 1
|
||||||
int sb_result = ets_secure_boot_verify_signature(sig_block, image_digest, trusted.key_digests[0], verified_digest);
|
int sb_result = ets_secure_boot_verify_signature(sig_block, image_digest, trusted.key_digests[0], verified_digest);
|
||||||
#else
|
#else
|
||||||
ets_secure_boot_key_digests_t trusted_key_digests;
|
ets_secure_boot_key_digests_t trusted_key_digests = {0};
|
||||||
for (unsigned i = 0; i < SECURE_BOOT_NUM_BLOCKS; i++) {
|
for (unsigned i = 0; i < SECURE_BOOT_NUM_BLOCKS; i++) {
|
||||||
trusted_key_digests.key_digests[i] = &trusted.key_digests[i];
|
trusted_key_digests.key_digests[i] = &trusted.key_digests[i];
|
||||||
}
|
}
|
||||||
|
// Key revocation happens in ROM bootloader.
|
||||||
|
// Do NOT allow key revocation while verifying application
|
||||||
|
trusted_key_digests.allow_key_revoke = false;
|
||||||
int sb_result = ets_secure_boot_verify_signature(sig_block, image_digest, &trusted_key_digests, verified_digest);
|
int sb_result = ets_secure_boot_verify_signature(sig_block, image_digest, &trusted_key_digests, verified_digest);
|
||||||
#endif
|
#endif
|
||||||
if (sb_result != SB_SUCCESS) {
|
if (sb_result != SB_SUCCESS) {
|
||||||
|
Reference in New Issue
Block a user