Blame view
tools/fit_check_sign.c
2 KB
83d290c56
|
1 |
// SPDX-License-Identifier: GPL-2.0+ |
29a23f9d6
|
2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 |
/* * (C) Copyright 2014 * DENX Software Engineering * Heiko Schocher <hs@denx.de> * * Based on: * (C) Copyright 2008 Semihalf * * (C) Copyright 2000-2004 * DENX Software Engineering * Wolfgang Denk, wd@denx.de * * Updated-by: Prafulla Wadaskar <prafulla@marvell.com> * FIT image specific code abstracted from mkimage.c * some functions added to address abstraction * * All rights reserved. |
29a23f9d6
|
19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 |
*/ #include "mkimage.h" #include "fit_common.h" #include <image.h> #include <u-boot/crc.h> void usage(char *cmdname) { fprintf(stderr, "Usage: %s -f fit file -k key file " " -f ==> set fit file which should be checked' " " -k ==> set key file which contains the key' ", cmdname); exit(EXIT_FAILURE); } int main(int argc, char **argv) { int ffd = -1; int kfd = -1; struct stat fsbuf; struct stat ksbuf; void *fit_blob; char *fdtfile = NULL; char *keyfile = NULL; |
64375014c
|
47 |
char cmdname[256]; |
29a23f9d6
|
48 49 50 |
int ret; void *key_blob; int c; |
64375014c
|
51 52 |
strncpy(cmdname, *argv, sizeof(cmdname) - 1); cmdname[sizeof(cmdname) - 1] = '\0'; |
29a23f9d6
|
53 54 55 56 57 58 59 60 61 62 63 64 |
while ((c = getopt(argc, argv, "f:k:")) != -1) switch (c) { case 'f': fdtfile = optarg; break; case 'k': keyfile = optarg; break; default: usage(cmdname); break; } |
ba923cab0
|
65 66 67 68 69 70 71 72 73 74 |
if (!fdtfile) { fprintf(stderr, "%s: Missing fdt file ", *argv); usage(*argv); } if (!keyfile) { fprintf(stderr, "%s: Missing key file ", *argv); usage(*argv); } |
a94681156
|
75 |
ffd = mmap_fdt(cmdname, fdtfile, 0, &fit_blob, &fsbuf, false); |
29a23f9d6
|
76 77 |
if (ffd < 0) return EXIT_FAILURE; |
a94681156
|
78 |
kfd = mmap_fdt(cmdname, keyfile, 0, &key_blob, &ksbuf, false); |
310ae37ed
|
79 |
if (kfd < 0) |
29a23f9d6
|
80 81 82 83 |
return EXIT_FAILURE; image_set_host_blob(key_blob); ret = fit_check_sign(fit_blob, key_blob); |
ce1400f69
|
84 |
if (!ret) { |
29a23f9d6
|
85 |
ret = EXIT_SUCCESS; |
ce1400f69
|
86 87 88 |
fprintf(stderr, "Signature check OK "); } else { |
29a23f9d6
|
89 |
ret = EXIT_FAILURE; |
ce1400f69
|
90 91 92 |
fprintf(stderr, "Signature check Bad (error %d) ", ret); } |
29a23f9d6
|
93 94 95 96 97 98 99 100 |
(void) munmap((void *)fit_blob, fsbuf.st_size); (void) munmap((void *)key_blob, ksbuf.st_size); close(ffd); close(kfd); exit(ret); } |