mirror of
https://github.com/u-boot/u-boot.git
synced 2024-11-23 20:24:26 +08:00
2d2384bbaf
At present mkimage displays the node information but it is not clear what signing action was taken. Add a message that shows it. For now it only supports showing a single signing action, since that is the common case. Sample: Signature written to 'sha1-basic/test.fit', node '/configurations/conf-1/signature' Public key written to 'sha1-basic/sandbox-u-boot.dtb', node '/signature/key-dev' Signed-off-by: Simon Glass <sjg@chromium.org>
191 lines
3.7 KiB
C
191 lines
3.7 KiB
C
// SPDX-License-Identifier: GPL-2.0+
|
|
/*
|
|
* (C) Copyright 2014
|
|
* DENX Software Engineering
|
|
* Heiko Schocher <hs@denx.de>
|
|
*
|
|
* (C) Copyright 2008 Semihalf
|
|
*
|
|
* (C) Copyright 2000-2004
|
|
* DENX Software Engineering
|
|
* Wolfgang Denk, wd@denx.de
|
|
*
|
|
* Updated-by: Prafulla Wadaskar <prafulla@marvell.com>
|
|
* FIT image specific code abstracted from mkimage.c
|
|
* some functions added to address abstraction
|
|
*
|
|
* All rights reserved.
|
|
*/
|
|
|
|
#include "imagetool.h"
|
|
#include "mkimage.h"
|
|
#include "fit_common.h"
|
|
#include <image.h>
|
|
#include <u-boot/crc.h>
|
|
|
|
int fit_verify_header(unsigned char *ptr, int image_size,
|
|
struct image_tool_params *params)
|
|
{
|
|
int ret;
|
|
|
|
if (fdt_check_header(ptr) != EXIT_SUCCESS)
|
|
return EXIT_FAILURE;
|
|
|
|
ret = fit_check_format(ptr, IMAGE_SIZE_INVAL);
|
|
if (ret) {
|
|
if (ret != -EADDRNOTAVAIL)
|
|
return EXIT_FAILURE;
|
|
fprintf(stderr, "Image contains unit addresses @, this will break signing\n");
|
|
}
|
|
|
|
return EXIT_SUCCESS;
|
|
}
|
|
|
|
int fit_check_image_types(uint8_t type)
|
|
{
|
|
if (type == IH_TYPE_FLATDT)
|
|
return EXIT_SUCCESS;
|
|
else
|
|
return EXIT_FAILURE;
|
|
}
|
|
|
|
int mmap_fdt(const char *cmdname, const char *fname, size_t size_inc,
|
|
void **blobp, struct stat *sbuf, bool delete_on_error,
|
|
bool read_only)
|
|
{
|
|
void *ptr;
|
|
int fd;
|
|
|
|
/* Load FIT blob into memory (we need to write hashes/signatures) */
|
|
fd = open(fname, (read_only ? O_RDONLY : O_RDWR) | O_BINARY);
|
|
|
|
if (fd < 0) {
|
|
fprintf(stderr, "%s: Can't open %s: %s\n",
|
|
cmdname, fname, strerror(errno));
|
|
goto err;
|
|
}
|
|
|
|
if (fstat(fd, sbuf) < 0) {
|
|
fprintf(stderr, "%s: Can't stat %s: %s\n",
|
|
cmdname, fname, strerror(errno));
|
|
goto err;
|
|
}
|
|
|
|
if (size_inc) {
|
|
sbuf->st_size += size_inc;
|
|
if (ftruncate(fd, sbuf->st_size)) {
|
|
fprintf(stderr, "%s: Can't expand %s: %s\n",
|
|
cmdname, fname, strerror(errno));
|
|
goto err;
|
|
}
|
|
}
|
|
|
|
errno = 0;
|
|
ptr = mmap(0, sbuf->st_size,
|
|
(read_only ? PROT_READ : PROT_READ | PROT_WRITE), MAP_SHARED,
|
|
fd, 0);
|
|
if ((ptr == MAP_FAILED) || (errno != 0)) {
|
|
fprintf(stderr, "%s: Can't read %s: %s\n",
|
|
cmdname, fname, strerror(errno));
|
|
goto err;
|
|
}
|
|
|
|
/* check if ptr has a valid blob */
|
|
if (fdt_check_header(ptr)) {
|
|
fprintf(stderr, "%s: Invalid FIT blob\n", cmdname);
|
|
goto err;
|
|
}
|
|
|
|
/* expand if needed */
|
|
if (size_inc) {
|
|
int ret;
|
|
|
|
ret = fdt_open_into(ptr, ptr, sbuf->st_size);
|
|
if (ret) {
|
|
fprintf(stderr, "%s: Cannot expand FDT: %s\n",
|
|
cmdname, fdt_strerror(ret));
|
|
goto err;
|
|
}
|
|
}
|
|
|
|
*blobp = ptr;
|
|
return fd;
|
|
|
|
err:
|
|
if (fd >= 0)
|
|
close(fd);
|
|
if (delete_on_error)
|
|
unlink(fname);
|
|
|
|
return -1;
|
|
}
|
|
|
|
int copyfile(const char *src, const char *dst)
|
|
{
|
|
int fd_src = -1, fd_dst = -1;
|
|
void *buf = NULL;
|
|
ssize_t size;
|
|
size_t count;
|
|
int ret = -1;
|
|
|
|
fd_src = open(src, O_RDONLY);
|
|
if (fd_src < 0) {
|
|
printf("Can't open file %s (%s)\n", src, strerror(errno));
|
|
goto out;
|
|
}
|
|
|
|
fd_dst = open(dst, O_WRONLY | O_CREAT | O_TRUNC, 0666);
|
|
if (fd_dst < 0) {
|
|
printf("Can't open file %s (%s)\n", dst, strerror(errno));
|
|
goto out;
|
|
}
|
|
|
|
buf = calloc(1, 512);
|
|
if (!buf) {
|
|
printf("Can't allocate buffer to copy file\n");
|
|
goto out;
|
|
}
|
|
|
|
while (1) {
|
|
size = read(fd_src, buf, 512);
|
|
if (size < 0) {
|
|
printf("Can't read file %s\n", src);
|
|
goto out;
|
|
}
|
|
if (!size)
|
|
break;
|
|
|
|
count = size;
|
|
size = write(fd_dst, buf, count);
|
|
if (size < 0) {
|
|
printf("Can't write file %s\n", dst);
|
|
goto out;
|
|
}
|
|
}
|
|
|
|
ret = 0;
|
|
|
|
out:
|
|
if (fd_src >= 0)
|
|
close(fd_src);
|
|
if (fd_dst >= 0)
|
|
close(fd_dst);
|
|
if (buf)
|
|
free(buf);
|
|
|
|
return ret;
|
|
}
|
|
|
|
void summary_show(struct image_summary *summary, const char *imagefile,
|
|
const char *keydest)
|
|
{
|
|
if (summary->sig_offset) {
|
|
printf("Signature written to '%s', node '%s'\n", imagefile,
|
|
summary->sig_path);
|
|
if (keydest) {
|
|
printf("Public key written to '%s', node '%s'\n",
|
|
keydest, summary->keydest_path);
|
|
}
|
|
}
|
|
}
|