mirror of
https://source.denx.de/u-boot/u-boot.git
synced 2026-05-05 12:46:14 +02:00
binman: etype: fit: raise ValueError if key-name-hint is a path
mkimage doesn't fail if it cannot find the public key but it prints to
stderr. Considering that btool.run() discards stderr, it means binman
happily returns an unsigned FIT and doesn't tell you something went
wrong.
Binman will actually find the file if there's a path in the
key-name-hint property but the current logic expects key-name-hint to be
a filename and thus returns the dirname of the found path for the key,
but with the original key-name-hint appended. This means we can have the
following:
- key-name-hint = "keys/dev"
- name = "/home/qschulz/work/upstream/u-boot/keys/"
so we pass /home/qschulz/work/upstream/u-boot/keys/ to the -k option of
mkimage but the FIT still contains "keys/dev" in key-name-hint which
means mkimage will try to find the key at
/home/qschulz/work/upstream/u-boot/keys/keys/, which doesn't exist.
Let's assume paths are simply not supported (it is named key-name-hint
and not key-path-hint after all) and raise an error if the property
contains a path so that the build fails and not quietly.
Fixes: 133c000ca334 ("binman: implement signing FIT images during image build")
Signed-off-by: Quentin Schulz <quentin.schulz@cherry.de>
Reviewed-by: Simon Glass <sjg@chromium.org>
This commit is contained in:
parent
cb7555e930
commit
2ddc47f9aa
@ -557,6 +557,7 @@ class Entry_fit(Entry_section):
|
||||
Raises:
|
||||
ValueError: Filename 'rsa2048.key' not found in input path
|
||||
ValueError: Multiple key paths found
|
||||
ValueError: 'dir/rsa2048' is a path not a filename
|
||||
"""
|
||||
def _find_keys_dir(node):
|
||||
for subnode in node.subnodes:
|
||||
@ -565,6 +566,8 @@ class Entry_fit(Entry_section):
|
||||
if subnode.props.get('key-name-hint') is None:
|
||||
continue
|
||||
hint = subnode.props['key-name-hint'].value
|
||||
if '/' in hint:
|
||||
self.Raise(f"'{hint}' is a path not a filename")
|
||||
name = tools.get_input_filename(
|
||||
f"{hint}.key" if subnode.name.startswith('signature')
|
||||
else f"{hint}.bin")
|
||||
|
||||
@ -7940,6 +7940,24 @@ fdt fdtmap Extract the devicetree blob from the fdtmap
|
||||
entry_args=entry_args,
|
||||
extra_indirs=[test_subdir])[0]
|
||||
|
||||
def testKeyNameHintIsPathSimpleFit(self):
|
||||
"""Test that binman errors out on key-name-hint being a path"""
|
||||
if not elf.ELF_TOOLS:
|
||||
self.skipTest('Python elftools not available')
|
||||
entry_args = {
|
||||
'of-list': 'test-fdt1',
|
||||
'default-dt': 'test-fdt1',
|
||||
'atf-bl31-path': 'bl31.elf',
|
||||
}
|
||||
test_subdir = os.path.join(self._indir, TEST_FDT_SUBDIR)
|
||||
with self.assertRaises(ValueError) as e:
|
||||
self._DoReadFileDtb(
|
||||
'347_key_name_hint_dir_fit_signature.dts',
|
||||
entry_args=entry_args,
|
||||
extra_indirs=[test_subdir])
|
||||
self.assertIn(
|
||||
'Node \'/binman/fit\': \'keys/rsa2048\' is a path not a filename',
|
||||
str(e.exception))
|
||||
|
||||
def testSimpleFitEncryptedData(self):
|
||||
"""Test an image with a FIT containing data to be encrypted"""
|
||||
|
||||
98
tools/binman/test/347_key_name_hint_dir_fit_signature.dts
Normal file
98
tools/binman/test/347_key_name_hint_dir_fit_signature.dts
Normal file
@ -0,0 +1,98 @@
|
||||
// SPDX-License-Identifier: GPL-2.0+
|
||||
|
||||
/dts-v1/;
|
||||
|
||||
/ {
|
||||
#address-cells = <1>;
|
||||
#size-cells = <1>;
|
||||
|
||||
binman {
|
||||
fit {
|
||||
description = "test desc";
|
||||
#address-cells = <1>;
|
||||
fit,fdt-list = "of-list";
|
||||
fit,sign;
|
||||
|
||||
images {
|
||||
u-boot {
|
||||
description = "test u-boot";
|
||||
type = "standalone";
|
||||
arch = "arm64";
|
||||
os = "u-boot";
|
||||
compression = "none";
|
||||
load = <0x00000000>;
|
||||
entry = <0x00000000>;
|
||||
|
||||
u-boot-nodtb {
|
||||
};
|
||||
|
||||
hash {
|
||||
algo = "sha256";
|
||||
};
|
||||
|
||||
signature {
|
||||
algo = "sha256,rsa2048";
|
||||
key-name-hint = "keys/rsa2048";
|
||||
};
|
||||
};
|
||||
@atf-SEQ {
|
||||
fit,operation = "split-elf";
|
||||
description = "test tf-a";
|
||||
type = "firmware";
|
||||
arch = "arm64";
|
||||
os = "arm-trusted-firmware";
|
||||
compression = "none";
|
||||
fit,load;
|
||||
fit,entry;
|
||||
fit,data;
|
||||
|
||||
atf-bl31 {
|
||||
};
|
||||
|
||||
hash {
|
||||
algo = "sha256";
|
||||
};
|
||||
|
||||
signature {
|
||||
algo = "sha256,rsa2048";
|
||||
key-name-hint = "keys/rsa2048";
|
||||
};
|
||||
};
|
||||
@fdt-SEQ {
|
||||
description = "test fdt";
|
||||
type = "flat_dt";
|
||||
compression = "none";
|
||||
|
||||
hash {
|
||||
algo = "sha256";
|
||||
};
|
||||
|
||||
signature {
|
||||
algo = "sha256,rsa2048";
|
||||
key-name-hint = "keys/rsa2048";
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
configurations {
|
||||
default = "@conf-uboot-DEFAULT-SEQ";
|
||||
@conf-uboot-SEQ {
|
||||
description = "uboot config";
|
||||
fdt = "fdt-SEQ";
|
||||
fit,firmware = "u-boot";
|
||||
fit,loadables;
|
||||
|
||||
hash {
|
||||
algo = "sha256";
|
||||
};
|
||||
|
||||
signature {
|
||||
algo = "sha256,rsa2048";
|
||||
key-name-hint = "keys/rsa2048";
|
||||
sign-images = "firmware", "loadables", "fdt";
|
||||
};
|
||||
};
|
||||
};
|
||||
};
|
||||
};
|
||||
};
|
||||
Loading…
x
Reference in New Issue
Block a user