Skip to content
Snippets Groups Projects
  1. Nov 06, 2017
    • Masahiro Yamada's avatar
      tools: image: allow to sign image nodes without -K option · 6793d017
      Masahiro Yamada authored
      
      If -K option is missing when you sign image nodes, it fails with
      an unclear error message:
      
        tools/mkimage Can't add hashes to FIT blob: -1
      
      It is hard to figure out the cause of the failure.
      
      In contrast, when you sign configuration nodes, -K is optional because
      fit_config_process_sig() returns successfully if keydest is unset.
      Probably this is a preferred behavior when you want to update FIT with
      the same key; you do not have to update the public key in this case.
      
      So, this commit changes fit_image_process_sig() to continue signing
      without keydest.  If ->add_verify_data() fails, show a clearer error
      message, which has been borrowed from fit_config_process_sig().
      
      Signed-off-by: default avatarMasahiro Yamada <yamada.masahiro@socionext.com>
      6793d017
    • Masahiro Yamada's avatar
      tools: image: fix "algo" property of public key for verified boot · 1d88a99d
      Masahiro Yamada authored
      
      The "algo_name" points to a property in a blob being edited.  The
      pointer becomes stale when fit_image_write_sig() inserts signatures.
      Then crypto->add_verify_data() writes wrong data to the public key
      destination.
      
      Signed-off-by: default avatarMasahiro Yamada <yamada.masahiro@socionext.com>
      1d88a99d
  2. Oct 23, 2017
  3. Jan 14, 2017
  4. Nov 21, 2016
  5. Jul 25, 2016
  6. Jul 22, 2016
    • mario.six@gdsys.cc's avatar
      tools: Fix return code of fit_image_process_sig() · c236ebd2
      mario.six@gdsys.cc authored
      When signing images, we repeatedly call fit_add_file_data() with
      successively increasing size values to include the keys in the DTB.
      
      Unfortunately, if large keys are used (such as 4096 bit RSA keys), this
      process fails sometimes, and mkimage needs to be called repeatedly to
      integrate the keys into the DTB.
      
      This is because fit_add_file_data actually returns the wrong error
      code, and the loop terminates prematurely, instead of trying again with
      a larger size value.
      
      This patch corrects the return value and also removes a error message,
      which is misleading, since we actually allow the function to fail. A
      (hopefully helpful) comment is also added to explain the lack of error
      message.
      
      This is probably related to 1152a05e ("tools: Correct error handling in
      fit_image_process_hash()") and the corresponding error reported here:
      
      https://www.mail-archive.com/u-boot@lists.denx.de/msg217417.html
      
      
      
      Signed-off-by: default avatarMario Six <mario.six@gdsys.cc>
      c236ebd2
  7. Jul 14, 2016
  8. Aug 14, 2014
  9. Jun 19, 2014
  10. Jun 11, 2014
  11. Mar 21, 2014
  12. Jul 24, 2013
  13. Jun 26, 2013
    • Simon Glass's avatar
      image: Add support for signing of FIT configurations · 4d098529
      Simon Glass authored
      
      While signing images is useful, it does not provide complete protection
      against several types of attack. For example, it it possible to create a
      FIT with the same signed images, but with the configuration changed such
      that a different one is selected (mix and match attack). It is also possible
      to substitute a signed image from an older FIT version into a newer FIT
      (roll-back attack).
      
      Add support for signing of FIT configurations using the libfdt's region
      support.
      
      Please see doc/uImage.FIT/signature.txt for more information.
      
      Signed-off-by: default avatarSimon Glass <sjg@chromium.org>
      4d098529
    • Simon Glass's avatar
      image: Support signing of images · 56518e71
      Simon Glass authored
      
      Add support for signing images using a new signature node. The process
      is handled by fdt_add_verification_data() which now takes parameters to
      provide the keys and related information.
      
      Signed-off-by: default avatarSimon Glass <sjg@chromium.org>
      56518e71
  14. May 14, 2013
Loading