Skip to content

Conversation

@strumtrar
Copy link
Member

To test the fitimage signing codepath a fitimage with a signing key is needed as input. The file sandbox.its describes this fitimage, which than can be generated with mkimage.
Three different iterations from this input are generated:
fit/fit-image-null.bin
fit/fit-image-only-dtb.bin
fit/fit-image-sign.bin
These represent a fitimage with no data for kernel and dtb, only a dtb and with a dtb and a signing key. These inputs result in different code paths in the fitimage parser.
The binary seeds that are generated from these inputs by the fuzzer are also added.

To test the fitimage signing codepath a fitimage with a signing key is
needed as input. The file sandbox.its describes this fitimage, which
than can be generated with mkimage.
Three different iterations from this input are generated:
    fit/fit-image-null.bin
    fit/fit-image-only-dtb.bin
    fit/fit-image-sign.bin
These represent a fitimage with no data for kernel and dtb, only a dtb
and with a dtb and a signing key. These inputs result in different code
paths in the fitimage parser.
The binary seeds that are generated from these inputs by the fuzzer are
also added.

Signed-off-by: Steffen Trumtrar <s.trumtrar@pengutronix.de>
@a3f
Copy link
Member

a3f commented Jun 11, 2025

Thanks @strumtrar, can you also include the dtsi snippet that needs to be passed to CONFIG_BOOTM_FITIMAGE_PUBKEY?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants