Message ID | bf67febf-ff82-dadc-32cd-ca5c26640c83@siemens.com |
---|---|
State | New |
Headers | show |
Series | lib: rsa: Fix unaligned 64-bit fdt accesses | expand |
On Wed, May 06, 2020 at 06:32:03PM +0200, Jan Kiszka wrote: > From: Jan Kiszka <jan.kiszka at siemens.com> > > The fdt only provides 32-bit alignment of data. If the public_exponent > happens to be not 64-bit aligned, we can trigger an exception on certain > architectures. Seen on TI AM64x. > > Note that the normal way of accessing such a number would be > fdtdec_get_number. However, this is not available for tools, and this > is one use case for lib/rsa. > > Signed-off-by: Jan Kiszka <jan.kiszka at siemens.com> This is the same as: http://patchwork.ozlabs.org/project/uboot/patch/20200503112634.590399-1-heiko at sntech.de/ I think which I'm testing right now. Can you please confirm and tested-by? Thanks!
On 06.05.20 22:00, Tom Rini wrote: > On Wed, May 06, 2020 at 06:32:03PM +0200, Jan Kiszka wrote: > >> From: Jan Kiszka <jan.kiszka at siemens.com> >> >> The fdt only provides 32-bit alignment of data. If the public_exponent >> happens to be not 64-bit aligned, we can trigger an exception on certain >> architectures. Seen on TI AM64x. >> >> Note that the normal way of accessing such a number would be >> fdtdec_get_number. However, this is not available for tools, and this >> is one use case for lib/rsa. >> >> Signed-off-by: Jan Kiszka <jan.kiszka at siemens.com> > > This is the same as: > http://patchwork.ozlabs.org/project/uboot/patch/20200503112634.590399-1-heiko at sntech.de/ > I think which I'm testing right now. Can you please confirm and > tested-by? Thanks! > Oh, I should monitor the list better (I'm lacking an nntp archive for it, like lore.kernel.org). Heiko's looks nicer, will test. Jan
diff --git a/lib/rsa/rsa-mod-exp.c b/lib/rsa/rsa-mod-exp.c index 420ab2eba0..4b9c4b1459 100644 --- a/lib/rsa/rsa-mod-exp.c +++ b/lib/rsa/rsa-mod-exp.c @@ -246,6 +246,11 @@ static void rsa_convert_big_endian(uint32_t *dst, const uint32_t *src, int len) dst[i] = fdt32_to_cpu(src[len - 1 - i]); } +static uint64_t fdt64_get(const uint32_t *data) +{ + return ((uint64_t)fdt32_to_cpu(data[0]) << 32) | fdt32_to_cpu(data[1]); +} + int rsa_mod_exp_sw(const uint8_t *sig, uint32_t sig_len, struct key_prop *prop, uint8_t *out) { @@ -262,8 +267,7 @@ int rsa_mod_exp_sw(const uint8_t *sig, uint32_t sig_len, if (!prop->public_exponent) key.exponent = RSA_DEFAULT_PUBEXP; else - key.exponent = - fdt64_to_cpu(*((uint64_t *)(prop->public_exponent))); + key.exponent = fdt64_get(prop->public_exponent); if (!key.len || !prop->modulus || !prop->rr) { debug("%s: Missing RSA key info", __func__);