[PATCH 09/15] common: tlv: Add TLV-Signature support
Ahmad Fatoum
a.fatoum at pengutronix.de
Wed Oct 22 03:00:19 PDT 2025
On 10/14/25 1:03 PM, Jonas Rebmann wrote:
> diff --git a/common/Kconfig b/common/Kconfig
> index d923d4c4b6..b7ac7094a6 100644
> --- a/common/Kconfig
> +++ b/common/Kconfig
> @@ -1122,6 +1122,10 @@ config TLV
> barebox TLV is a scheme for storing factory data on non-volatile
> storage. Unlike state, it's meant to be read-only.
>
> +config TLV_SIGNATURE
> + bool "barebox TLV signature support"
depends on TLV or open an if TLV to span this as well as TLV_DRV and
TLV_BAREBOX.
> + select CRYPTO_BUILTIN_KEYS
> +
> config TLV_DRV
> bool "barebox TLV generic driver"
> depends on TLV
> diff --git a/common/tlv/parser.c b/common/tlv/parser.c
> index f74ada99d7..0a23beba4e 100644
> --- a/common/tlv/parser.c
> +++ b/common/tlv/parser.c
> @@ -1,5 +1,6 @@
> // SPDX-License-Identifier: GPL-2.0-only
>
> +#include "tlv/format.h"
pr_fmt definition must be before any headers to ensure that it's seen
when pr_info is defined, even with future changes to headers.
> #define pr_fmt(fmt) "barebox-tlv: " fmt
>
> #include <common.h>
> @@ -9,6 +10,81 @@
> #include <linux/stat.h>
> #include <crc.h>
> #include <net.h>
> +#include <crypto/public_key.h>
> +
> +static int tlv_verify_try_key(const struct public_key *key, const uint8_t *sig,
> + const uint32_t sig_len, const void *data,
> + unsigned long data_len)
> +{
> + enum hash_algo algo = HASH_ALGO_SHA256;
> + int ret;
> + struct digest *digest = digest_alloc_by_algo(algo);
Make it either the last definition or move the assignment before the if.
> + void *hash;
> +
> + if (!digest)
> + return -ENOMEM;
> +
> + digest_init(digest);
> + if (IS_ERR(digest)) {
> + digest_free(digest);
> + return -EINVAL;
> + }
> + digest_update(digest, data, data_len);
> + hash = xzalloc(digest_length(digest));
> + digest_final(digest, hash);
> +
> + ret = public_key_verify(key, sig, sig_len, hash, algo);
> +
> + digest_free(digest);
> + free(hash);
> +
> + if (ret)
> + return -ENOKEY;
We have no strerror text for ENOKEY, but I believe it's a bit
out-of-place here anyway. -ENOKEY could be an error code from
tlv_verify, but when trying a specific key, -ENOKEY appears to be
inaccurate.
> + return 0;
> +}
> +
> +static int tlv_verify(struct tlv_header *header, const char *keyring)
> +{
> + const struct public_key *key;
> + size_t payload_sz = tlv_spki_hash_offset(header);
> + void *spki_tlv_ptr = (void *)header + payload_sz;
Can this be made const void *.
> + u32 spki_tlv = get_unaligned_le32(spki_tlv_ptr);
> + const int SPKI_LEN = 4;
Drop the const without a pointer (this isn't C++).
> + u32 sig_len = get_unaligned_be16(&header->length_sig);
> + int ret;
> + int count_spki_matches = 0;
> +
> + if (!IS_ENABLED(CONFIG_TLV_SIGNATURE)) {
> + pr_err("TLV signature selected in decoder but not enabled!\n");
Remove TLV prefix here and below, there's already a barebox-tlv: prefix.
> + return -ENOSYS;
> + } else if (sig_len == 0) {
> + pr_err("TLV signature selected in decoder but an unsigned TLV matched by magic %08x!\n", be32_to_cpu(header->magic));
> + return -EPROTO;
> + }
> + /* signature length field must always be zeroed during signage and verification */
s/signage/signing/
> + header->length_sig = 0;
> +
> + for_each_public_key_keyring(key, keyring) {
> + u32 spki_key = get_unaligned_le32(key->hash);
> +
> + if (spki_key == spki_tlv) {
> + count_spki_matches++;
> + ret = tlv_verify_try_key(key, spki_tlv_ptr + SPKI_LEN, sig_len - SPKI_LEN, header, payload_sz);
> + if (!ret)
> + return 0;
> + pr_warn("TLV spki %08x matched available key but signature verification failed: %s!\n", spki_tlv, strerror(-ret));
"%s", strerror(-ret) -> "%pE", PTR_ERR(ret)
> + }
> + }
> +
> + /* reset signature length field after verification to avoid later confusion */
> + put_unaligned_be16(sig_len, &header->length_sig);
> +
> + if (!count_spki_matches) {
> + pr_warn("TLV spki %08x matched no key!\n", spki_tlv);
> + return -ENOKEY;
> + }
> + return -EINVAL;
> +}
>
> int tlv_parse(struct tlv_device *tlvdev,
> const struct tlv_decoder *decoder)
> @@ -17,6 +93,7 @@ int tlv_parse(struct tlv_device *tlvdev,
> struct tlv_mapping *map = NULL;
> struct tlv_header *header = tlv_device_header(tlvdev);
> u32 magic;
> + u16 reserved;
> size_t size;
> int ret = 0;
> u32 crc = ~0;
> @@ -24,6 +101,7 @@ int tlv_parse(struct tlv_device *tlvdev,
> magic = be32_to_cpu(header->magic);
>
> size = tlv_total_len(header);
> + reserved = get_unaligned_be16(&header->reserved);
>
> if (size == SIZE_MAX) {
> pr_warn("Invalid TLV header, overflows\n");
> @@ -36,6 +114,12 @@ int tlv_parse(struct tlv_device *tlvdev,
> return -EILSEQ;
> }
>
> + if (decoder->signature_keyring) {
> + ret = tlv_verify(header, decoder->signature_keyring);
> + if (ret)
> + return ret;
> + }
> +
> for_each_tlv(header, tlv) {
> struct tlv_mapping **mappings;
> u16 tag = TLV_TAG(tlv);
> diff --git a/include/tlv/format.h b/include/tlv/format.h
> index c4521c3131..cbe0a132b1 100644
> --- a/include/tlv/format.h
> +++ b/include/tlv/format.h
> @@ -47,11 +47,12 @@ struct tlv {
> struct tlv_header {
> __be32 magic;
> __be32 length_tlv; /* in bytes */
> - __be32 length_sig; /* in bytes */
> + __be16 reserved;
> + __be16 length_sig; /* in bytes */
> struct tlv tlvs[];
> - /* __be32 crc; */
> /* u8 sig[]; */
> -};
> + /* __be32 crc; */
> +} __packed;
> static_assert(sizeof(struct tlv_header) == 3 * 4);
>
> #define for_each_tlv(tlv_head, tlv) \
> @@ -62,8 +63,19 @@ static inline size_t tlv_total_len(const struct tlv_header *header)
> size_t ret;
>
> ret = size_add(sizeof(struct tlv_header), get_unaligned_be32(&header->length_tlv));
> - ret = size_add(ret, sizeof(__be32)); /* CRC appended after TLVs */
> - ret = size_add(ret, get_unaligned_be32(&header->length_sig)); /* optional signature appended after CRC */
> + ret = size_add(ret, get_unaligned_be16(&header->length_sig)); /* optional signature appended after TLVs */
> + ret = size_add(ret, sizeof(__be32)); /* CRC at end of file */
> +
> + return ret; /* SIZE_MAX on overflow */
> +}
> +
> +/*
> + * Retrieve length of header+TLVs (offset of spki hash part of signature if available)
> + */
> +
> +static inline size_t tlv_spki_hash_offset(const struct tlv_header *header)
> +{
> + size_t ret = size_add(sizeof(struct tlv_header), get_unaligned_be32(&header->length_tlv));
>
> return ret; /* SIZE_MAX on overflow */
Shouldn't you then check for SIZE_MAX at callsites?
Cheers,
Ahmad
> }
>
--
Pengutronix e.K. | |
Steuerwalder Str. 21 | http://www.pengutronix.de/ |
31137 Hildesheim, Germany | Phone: +49-5121-206917-0 |
Amtsgericht Hildesheim, HRA 2686 | Fax: +49-5121-206917-5555 |
More information about the barebox
mailing list