-
Notifications
You must be signed in to change notification settings - Fork 9
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Validate encrypted content before writing it to RAM #159
base: ncs
Are you sure you want to change the base?
Validate encrypted content before writing it to RAM #159
Conversation
This commit modifies the encrypted application manifest so first decrypts the encrypted content without storing it to MRAM, in order to verify if the the AAD and Tag are correct. If it wasn't done, then the device would need to enter recovery in case of a decryption failure. Ref: NCSDK-30932 Signed-off-by: Artur Hadasz <[email protected]>
pytest coverage results
Note: This message is automatically posted and updated by the CI (latest/test-sdk-dfu/master/267) |
@@ -136,19 +121,16 @@ SUIT_Envelope_Tagged: | |||
suit-digest-algorithm-id: cose-alg-sha-256 | |||
suit-digest-bytes: | |||
file: {{ application['encryption_artifacts_dir'] }}/encrypted_content.bin | |||
suit-parameter-encryption-info: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
-
What is a meaning of line 120 (setting parameter-image-digest)?
-
Why in case of suit-candidate-verification (line 119) just that URI is considered:
suit-parameter-uri: '#{{ application['name'] }}'... while, in case of suit-install (line 81), also that one is considered:
suit-parameter-uri: '{{ application['config']['CONFIG_SUIT_IMAGE_DFU_CACHE_URI'] }}'
I think you should rebase & redirect the PR to the |
This PR modifies the encrypted application manifest so first decrypts the encrypted content without storing it to MRAM, in order to verify if the the AAD and Tag are correct.
If it wasn't done, then the device would need to enter recovery in case of a decryption failure.