[PATCH 09/15] common: tlv: Add TLV-Signature support

Ahmad Fatoum a.fatoum at pengutronix.de
Wed Oct 22 03:00:19 PDT 2025



On 10/14/25 1:03 PM, Jonas Rebmann wrote:
> diff --git a/common/Kconfig b/common/Kconfig
> index d923d4c4b6..b7ac7094a6 100644
> --- a/common/Kconfig
> +++ b/common/Kconfig
> @@ -1122,6 +1122,10 @@ config TLV
>  	  barebox TLV is a scheme for storing factory data on non-volatile
>  	  storage. Unlike state, it's meant to be read-only.
>  
> +config TLV_SIGNATURE
> +	bool "barebox TLV signature support"

depends on TLV or open an if TLV to span this as well as TLV_DRV and
TLV_BAREBOX.

> +	select CRYPTO_BUILTIN_KEYS
> +
>  config TLV_DRV
>  	bool "barebox TLV generic driver"
>  	depends on TLV
> diff --git a/common/tlv/parser.c b/common/tlv/parser.c
> index f74ada99d7..0a23beba4e 100644
> --- a/common/tlv/parser.c
> +++ b/common/tlv/parser.c
> @@ -1,5 +1,6 @@
>  // SPDX-License-Identifier: GPL-2.0-only
>  
> +#include "tlv/format.h"

pr_fmt definition must be before any headers to ensure that it's seen
when pr_info is defined, even with future changes to headers.

>  #define pr_fmt(fmt) "barebox-tlv: " fmt
>  
>  #include <common.h>
> @@ -9,6 +10,81 @@
>  #include <linux/stat.h>
>  #include <crc.h>
>  #include <net.h>
> +#include <crypto/public_key.h>
> +
> +static int tlv_verify_try_key(const struct public_key *key, const uint8_t *sig,
> +			      const uint32_t sig_len, const void *data,
> +			      unsigned long data_len)
> +{
> +	enum hash_algo algo = HASH_ALGO_SHA256;
> +	int ret;
> +	struct digest *digest = digest_alloc_by_algo(algo);

Make it either the last definition or move the assignment before the if.

> +	void *hash;
> +
> +	if (!digest)
> +		return -ENOMEM;
> +
> +	digest_init(digest);
> +	if (IS_ERR(digest)) {
> +		digest_free(digest);
> +		return -EINVAL;
> +	}
> +	digest_update(digest, data, data_len);
> +	hash = xzalloc(digest_length(digest));
> +	digest_final(digest, hash);
> +
> +	ret = public_key_verify(key, sig, sig_len, hash, algo);
> +
> +	digest_free(digest);
> +	free(hash);
> +
> +	if (ret)
> +		return -ENOKEY;

We have no strerror text for ENOKEY, but I believe it's a bit
out-of-place here anyway. -ENOKEY could be an error code from
tlv_verify, but when trying a specific key, -ENOKEY appears to be
inaccurate.

> +	return 0;
> +}
> +
> +static int tlv_verify(struct tlv_header *header, const char *keyring)
> +{
> +	const struct public_key *key;
> +	size_t payload_sz = tlv_spki_hash_offset(header);
> +	void *spki_tlv_ptr = (void *)header + payload_sz;

Can this be made const void *.

> +	u32 spki_tlv = get_unaligned_le32(spki_tlv_ptr);
> +	const int SPKI_LEN = 4;

Drop the const without a pointer (this isn't C++).

> +	u32 sig_len = get_unaligned_be16(&header->length_sig);
> +	int ret;
> +	int count_spki_matches = 0;
> +
> +	if (!IS_ENABLED(CONFIG_TLV_SIGNATURE)) {
> +		pr_err("TLV signature selected in decoder but not enabled!\n");

Remove TLV prefix here and below, there's already a barebox-tlv: prefix.

> +		return -ENOSYS;
> +	} else if (sig_len == 0) {
> +		pr_err("TLV signature selected in decoder but an unsigned TLV matched by magic %08x!\n", be32_to_cpu(header->magic));
> +		return -EPROTO;
> +	}
> +	/* signature length field must always be zeroed during signage and verification */

s/signage/signing/

> +	header->length_sig = 0;
> +
> +	for_each_public_key_keyring(key, keyring) {
> +		u32 spki_key = get_unaligned_le32(key->hash);
> +
> +		if (spki_key == spki_tlv) {
> +			count_spki_matches++;
> +			ret = tlv_verify_try_key(key, spki_tlv_ptr + SPKI_LEN, sig_len - SPKI_LEN, header, payload_sz);
> +			if (!ret)
> +				return 0;
> +			pr_warn("TLV spki %08x matched available key but signature verification failed: %s!\n", spki_tlv, strerror(-ret));

"%s", strerror(-ret) -> "%pE", PTR_ERR(ret)

> +		}
> +	}
> +
> +	/* reset signature length field after verification to avoid later confusion */
> +	put_unaligned_be16(sig_len, &header->length_sig);
> +
> +	if (!count_spki_matches) {
> +		pr_warn("TLV spki %08x matched no key!\n", spki_tlv);
> +		return -ENOKEY;
> +	}
> +	return -EINVAL;
> +}
>  
>  int tlv_parse(struct tlv_device *tlvdev,
>  	      const struct tlv_decoder *decoder)
> @@ -17,6 +93,7 @@ int tlv_parse(struct tlv_device *tlvdev,
>  	struct tlv_mapping *map = NULL;
>  	struct tlv_header *header = tlv_device_header(tlvdev);
>  	u32 magic;
> +	u16 reserved;
>  	size_t size;
>  	int ret = 0;
>  	u32 crc = ~0;
> @@ -24,6 +101,7 @@ int tlv_parse(struct tlv_device *tlvdev,
>  	magic = be32_to_cpu(header->magic);
>  
>  	size = tlv_total_len(header);
> +	reserved = get_unaligned_be16(&header->reserved);
>  
>  	if (size == SIZE_MAX) {
>  		pr_warn("Invalid TLV header, overflows\n");
> @@ -36,6 +114,12 @@ int tlv_parse(struct tlv_device *tlvdev,
>  		return -EILSEQ;
>  	}
>  
> +	if (decoder->signature_keyring) {
> +		ret = tlv_verify(header, decoder->signature_keyring);
> +		if (ret)
> +			return ret;
> +	}
> +
>  	for_each_tlv(header, tlv) {
>  		struct tlv_mapping **mappings;
>  		u16 tag = TLV_TAG(tlv);
> diff --git a/include/tlv/format.h b/include/tlv/format.h
> index c4521c3131..cbe0a132b1 100644
> --- a/include/tlv/format.h
> +++ b/include/tlv/format.h
> @@ -47,11 +47,12 @@ struct tlv {
>  struct tlv_header {
>  	__be32 magic;
>  	__be32 length_tlv; /* in bytes */
> -	__be32 length_sig; /* in bytes */
> +	__be16 reserved;
> +	__be16 length_sig; /* in bytes */
>  	struct tlv tlvs[];
> -	/* __be32 crc; */
>  	/* u8 sig[]; */
> -};
> +	/* __be32 crc; */
> +} __packed;
>  static_assert(sizeof(struct tlv_header) == 3 * 4);
>  
>  #define for_each_tlv(tlv_head, tlv) \
> @@ -62,8 +63,19 @@ static inline size_t tlv_total_len(const struct tlv_header *header)
>  	size_t ret;
>  
>  	ret = size_add(sizeof(struct tlv_header), get_unaligned_be32(&header->length_tlv));
> -	ret = size_add(ret, sizeof(__be32)); /* CRC appended after TLVs */
> -	ret = size_add(ret, get_unaligned_be32(&header->length_sig)); /* optional signature appended after CRC */
> +	ret = size_add(ret, get_unaligned_be16(&header->length_sig)); /* optional signature appended after TLVs */
> +	ret = size_add(ret, sizeof(__be32)); /* CRC at end of file */
> +
> +	return ret; /* SIZE_MAX on overflow */
> +}
> +
> +/*
> + * Retrieve length of header+TLVs (offset of spki hash part of signature if available)
> + */
> +
> +static inline size_t tlv_spki_hash_offset(const struct tlv_header *header)
> +{
> +	size_t ret = size_add(sizeof(struct tlv_header), get_unaligned_be32(&header->length_tlv));
>  
>  	return ret; /* SIZE_MAX on overflow */

Shouldn't you then check for SIZE_MAX at callsites?

Cheers,
Ahmad

>  }
> 

-- 
Pengutronix e.K.                  |                             |
Steuerwalder Str. 21              | http://www.pengutronix.de/  |
31137 Hildesheim, Germany         | Phone: +49-5121-206917-0    |
Amtsgericht Hildesheim, HRA 2686  | Fax:   +49-5121-206917-5555 |




More information about the barebox mailing list