buildman: Move output-file setup into one place
[platform/kernel/u-boot.git] / tools / fdt_add_pubkey.c
1 // SPDX-License-Identifier: GPL-2.0+
2 #include <image.h>
3 #include "fit_common.h"
4
5 static const char *cmdname;
6
7 static const char *algo_name = "sha1,rsa2048"; /* -a <algo> */
8 static const char *keydir = "."; /* -k <keydir> */
9 static const char *keyname = "key"; /* -n <keyname> */
10 static const char *require_keys; /* -r <conf|image> */
11 static const char *keydest; /* argv[n] */
12
13 static void __attribute__((__noreturn__)) print_usage(const char *msg)
14 {
15         fprintf(stderr, "Error: %s\n", msg);
16         fprintf(stderr, "Usage: %s [-a <algo>] [-k <keydir>] [-n <keyname>] [-r <conf|image>]"
17                         " <fdt blob>\n", cmdname);
18         fprintf(stderr, "Help information: %s [-h]\n", cmdname);
19         exit(EXIT_FAILURE);
20 }
21
22 static void __attribute__((__noreturn__)) print_help(void)
23 {
24         fprintf(stderr, "Options:\n"
25                 "\t-a <algo>       Cryptographic algorithm. Optional parameter, default value: sha1,rsa2048\n"
26                 "\t-k <keydir>     Directory with public key. Optional parameter, default value: .\n"
27                 "\t-n <keyname>    Public key name. Optional parameter, default value: key\n"
28                 "\t-r <conf|image> Required: If present this indicates that the key must be verified for the image / configuration to be considered valid.\n"
29                 "\t<fdt blob>      FDT blob file for adding of the public key. Required parameter.\n");
30         exit(EXIT_FAILURE);
31 }
32
33 static void process_args(int argc, char *argv[])
34 {
35         int opt;
36
37         while ((opt = getopt(argc, argv, "a:k:n:r:h")) != -1) {
38                 switch (opt) {
39                 case 'k':
40                         keydir = optarg;
41                         break;
42                 case 'a':
43                         algo_name = optarg;
44                         break;
45                 case 'n':
46                         keyname = optarg;
47                         break;
48                 case 'r':
49                         require_keys = optarg;
50                         break;
51                 case 'h':
52                         print_help();
53                 default:
54                         print_usage("Invalid option");
55                 }
56         }
57         /* The last parameter is expected to be the .dtb to add the public key to */
58         if (optind < argc)
59                 keydest = argv[optind];
60
61         if (!keydest)
62                 print_usage("Missing dtb file to update");
63 }
64
65 static void reset_info(struct image_sign_info *info)
66 {
67         if (!info)
68                 fprintf(stderr, "Error: info is NULL in %s\n", __func__);
69
70         memset(info, 0, sizeof(struct image_sign_info));
71
72         info->keydir = keydir;
73         info->keyname = keyname;
74         info->name = algo_name;
75         info->require_keys = require_keys;
76         info->crypto = image_get_crypto_algo(algo_name);
77
78         if (!info->crypto) {
79                 fprintf(stderr, "Unsupported signature algorithm '%s'\n",
80                         algo_name);
81                 exit(EXIT_FAILURE);
82         }
83 }
84
85 static int add_pubkey(struct image_sign_info *info)
86 {
87         int destfd = -1, ret;
88         void *dest_blob = NULL;
89         struct stat dest_sbuf;
90         size_t size_inc = 0;
91
92         if (!info)
93                 fprintf(stderr, "Error: info is NULL in %s\n", __func__);
94
95         do {
96                 if (destfd >= 0) {
97                         munmap(dest_blob, dest_sbuf.st_size);
98                         close(destfd);
99
100                         fprintf(stderr, ".dtb too small, increasing size by 1024 bytes\n");
101                         size_inc = 1024;
102                 }
103
104                 destfd = mmap_fdt(cmdname, keydest, size_inc, &dest_blob,
105                                   &dest_sbuf, false, false);
106                 if (destfd < 0)
107                         exit(EXIT_FAILURE);
108
109                 ret = info->crypto->add_verify_data(info, dest_blob);
110                 if (ret == -ENOSPC)
111                         continue;
112                 else if (ret < 0)
113                         break;
114         } while (ret == -ENOSPC);
115
116         return ret;
117 }
118
119 int main(int argc, char *argv[])
120 {
121         struct image_sign_info info;
122         int ret;
123
124         cmdname = argv[0];
125
126         process_args(argc, argv);
127         reset_info(&info);
128         ret = add_pubkey(&info);
129
130         if (ret < 0) {
131                 fprintf(stderr, "%s: Cannot add public key to FIT blob: %s\n",
132                         cmdname, strerror(ret));
133                 exit(EXIT_FAILURE);
134         }
135
136         exit(EXIT_SUCCESS);
137 }
138