lib: ecdsa: Verifying signature on target

Marko Mäkelä marko.makela at iki.fi
Fri Jan 30 09:58:10 CET 2026


Thu, Jan 29, 2026 at 10:18:03PM +0000, Jonny Green wrote:
>Hello,
>
>I am implementing FIT booting with an ECDSA signature. I am building 
>from a TI fork of U-Boot that is based off of v2025.01 from the 
>mainline repo.

Nice. I have been meaning to do the same;
https://lists.denx.de/pipermail/u-boot/2025-November/602918.html 
contains some notes.

>However, attempts to boot on the target with the signed u-boot.img and 
>generated .itb are failing. Debug printouts show that the call to 
>ecdsa_verify in ecdsa-verify.c is failing after calling 
>uclass_first_device_err: "ECDSA: Could not find ECDSA implementation: 
>-19".

I only found some implementations for some specific firmware or 
hardware. In mbedtls there is an implementation, which I have been 
intending to write an interface for. A first challenge was to actually 
include the mbedtls in the build. The attached patch would introduce 
CONFIG_ECDSA_MBEDTLS.

A challenge with the Kconfig system is that you can create an "overlay" 
of a default configuration that adds things, but you cannot remove 
things that are part of the default configuration. Here's an example of 
adding things (without modifying any existing files in u-boot):

cat > configs/a53_defconfig << "EOF"
#include <configs/phycore_am62x_a53_defconfig>
CONFIG_FIT_SIGNATURE=y
CONFIG_ECDSA=y
CONFIG_ECDSA_VERIFY=y
EOF

The above actually is how I was originally experimenting with ECDSA.  
Currently, I am using a Raspberry Pi 4. I figured out that there is a 
lower-level configuration interface:

make rpi_4_defconfig &&
scripts/config -e FIT_SIGNATURE -e ECDSA -e SHA256 -e ECDSA_VERIFY \
-d BOOTSTD \
-e MBEDTLS_LIB -e MBEDTLS_LIB_CRYPTO -e ECDSA_MBEDTLS \
-e SHA256_MBEDTLS -e SHA256_SMALLER -e MBEDTLS_LIB_X509 -d HKDF_MBEDTLS \
-d LEGACY_HASHING_AND_CRYPTO &&
make -j$(nproc) CROSS_COMPILE=aarch64-linux-gnu-

If the LEGACY_HASHING_AND_CRYPTO were not disabled, it would override 
any MBEDTLS parameters.

>Other debugging steps I've taken:
>* Ensured public key is present in the booted image via inspection with fdt
>* Ensured relevant config values are set: ECDSA, ECDSA_VERIFY, FIT_SIGNATURE
>* Attempted to get trace information from the boot attempt, but it 
>appears my board does not support the required clock

One problem that I noticed is that the ECDSA signature verification in 
fit_check_sign needs access to the private key. Were you able to fix it 
so that only a public key is needed, like it is the case with the RSA 
signature verification?

Also, I understood that u-boot prefers to store a parsed RSA or ECDSA 
key in the FIT in its own pre-parsed way, while the MBEDTLS library 
would apparently input the raw key. This problem would have to be solved 
in some way. Maybe, by just embedding the key in binary form in a FDT 
node and letting MBEDTLS parse it? This would of course require some 
changes to fit_check_sign and other tools as well.

Storing the key in the canonical format would seem to make it easier to 
add further algorithms. I'm actually not that interested in ECDSA; my 
ultimate goal would be to integrate an algorithm that is expected to be 
safe against attacks based on quantum computers.

With best regards,

	Marko Mäkelä
-------------- next part --------------
A non-text attachment was scrubbed...
Name: config_ECDSA_MBEDTLS.patch
Type: text/x-diff
Size: 2127 bytes
Desc: not available
URL: <https://lists.denx.de/pipermail/u-boot/attachments/20260130/d7d9416b/attachment-0001.patch>


More information about the U-Boot mailing list