|
|
@@ -152,7 +152,18 @@ esp_err_t esp_secure_boot_verify_rsa_signature_block(const ets_secure_boot_signa
|
|
|
bootloader_sha256_finish(sig_block_sha, (unsigned char *)sig_block_trusted_digest);
|
|
|
|
|
|
if (memcmp(efuse_trusted_digest, sig_block_trusted_digest, DIGEST_LEN) != 0) {
|
|
|
- ESP_LOGW(TAG, "Public key digest in eFuse BLK2 and the signature block don't match.");
|
|
|
+ /* Most likely explanation for this is that BLK2 is empty, and we're going to burn it
|
|
|
+ after we verify that the signature is valid. However, if BLK2 is not empty then we need to
|
|
|
+ fail here.
|
|
|
+ */
|
|
|
+ bool all_zeroes = true;
|
|
|
+ for (int i = 0; i < DIGEST_LEN; i++) {
|
|
|
+ all_zeroes = all_zeroes && (efuse_trusted_digest[i] == 0);
|
|
|
+ }
|
|
|
+ if (!all_zeroes) {
|
|
|
+ ESP_LOGE(TAG, "Different public key digest burned to eFuse BLK2");
|
|
|
+ return ESP_ERR_INVALID_STATE;
|
|
|
+ }
|
|
|
}
|
|
|
|
|
|
memcpy(efuse_trusted_digest, sig_block_trusted_digest, DIGEST_LEN);
|