Re: [PATCH v2 07/11] Bluetooth: btnxpuart: Add device authentication
From: Marcel Holtmann
Date: Wed Jan 21 2026 - 15:58:37 EST
Hi Neeraj,
> This implements secure device authentication during TLS 1.3-like
> handshake with ECDSA signature verification.
>
> The authentication flow:
> - Derive handshake traffic secret from ECDH shared secret
> - Decrypt device hello encrypted section using AES-GCM with traffic secret
> - Extract ECDSA public key from firmware metadata for verification
where is the storage of the private key?
And where are the firmware files? When looking this up I saw that NXP has not updated linux-firmware for a long time. The current driver references firmware files that are not contributed to linux-firmware. That is not ok.
> - Verify device handshake signature to authenticate device identity
> - Validate device finished message using calculated verify data
> - Clear handshake traffic secret after successful authentication
>
> This ensures only devices with valid private keys can complete the
> handshake.
>
> Key components added:
> - AES-GCM encrypt/decrypt with traffic secret derived keys
> - ECDSA P-256 signature verification using kernel crypto API
> - X9.62 to P1363 signature format conversion
> - TLS 1.3 finished message verification
> - Secure memory cleanup of cryptographic material
Why not just use HPKE here? Seems a lot simpler than trying to emulate TLS 1.3.
Regards
Marcel