From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from phobos.denx.de (phobos.denx.de [85.214.62.61]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id F035DC433EF for ; Thu, 25 Nov 2021 00:16:22 +0000 (UTC) Received: from h2850616.stratoserver.net (localhost [IPv6:::1]) by phobos.denx.de (Postfix) with ESMTP id A7C9283793; Thu, 25 Nov 2021 01:14:24 +0100 (CET) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=chromium.org Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de Authentication-Results: phobos.denx.de; dkim=pass (1024-bit key; unprotected) header.d=chromium.org header.i=@chromium.org header.b="mvOwIIDP"; dkim-atps=neutral Received: by phobos.denx.de (Postfix, from userid 109) id E65CA801E7; Thu, 25 Nov 2021 01:13:11 +0100 (CET) Received: from mail-ot1-x32c.google.com (mail-ot1-x32c.google.com [IPv6:2607:f8b0:4864:20::32c]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits)) (No client certificate requested) by phobos.denx.de (Postfix) with ESMTPS id 68E2F81184 for ; Thu, 25 Nov 2021 01:13:07 +0100 (CET) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=chromium.org Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=sjg@google.com Received: by mail-ot1-x32c.google.com with SMTP id n104-20020a9d2071000000b005799790cf0bso6848681ota.5 for ; Wed, 24 Nov 2021 16:13:07 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=XnvceHgM/HafK4yDdALJPZ16ew0rZSHebCX5YBPPXN8=; b=mvOwIIDPMACElV3rYmbXAWmf/PDIC1QDcY+PR9i7IEIjfDpOP+i/yAQEOs3lqgqWOE W8qMA3qamfRhxpQ3XfKvACAXyMM74NAvtedkXWGkAOkj++tLx6iF0hLhPyFFObpQFo+h Nf6FiRkF1jnyM+DaoIbHyBpw9PdjusSof2VUA= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=XnvceHgM/HafK4yDdALJPZ16ew0rZSHebCX5YBPPXN8=; b=GRkNRjIdskyg1kZ2ak8e+x1l9CXU3pM62WZpMnrVSq/ixTBYx7H/yQkA/pPgcGUFf6 UBJACYjAzzuz65erdvyBI96ybGNbZfM03CPh5eKNWCt95zVJvSFFG9dY1Qk6u8UGnc6v jVpHpgrJMmKt0IV9Aasx6lCW6pfOkzwMih1lDErOTCawuVP/DQP675ZNT884EZeWuKEf VGad7q5W4A84tCCvDlFnpABrMFanximTSEcsQsP1TKtzdhq4gpEnBbz6Urg2q+wj4Nj2 hsg8zjjGmMRELsLYD/twWGkS1HMbB1cMNh0bfsE40s4oRxgIO/Mq4GIr/zxPEO59cAtw yhgg== X-Gm-Message-State: AOAM531wBBWhfuyY6i4DR3ych/T7+NTt4teAxN61HI4fHI3Z8KlZmqsD 4soKRXTovgvKRUMtdEFeiltWhdIn8v58KYps2lXTqwY9jOE= X-Google-Smtp-Source: ABdhPJx7c/hqSMm9bk6q3NAa3pKGNcpp1xRiykvbP10Udv8pa4Ui6ixFOSXWJqlLimu1PltmWD+ZnPFG+p0V9Q4xtGc= X-Received: by 2002:a9d:17c5:: with SMTP id j63mr17381510otj.191.1637799185806; Wed, 24 Nov 2021 16:13:05 -0800 (PST) MIME-Version: 1.0 References: <20211117175215.24262-1-philippe.reynes@softathome.com> <20211117175215.24262-4-philippe.reynes@softathome.com> In-Reply-To: <20211117175215.24262-4-philippe.reynes@softathome.com> From: Simon Glass Date: Wed, 24 Nov 2021 17:12:52 -0700 Message-ID: Subject: Re: [RFC PATCH v3 3/8] lib: rsa: allow rsa verify with pkey in SPL To: Philippe Reynes Cc: mr.nuke.me@gmail.com, joel.peshkin@broadcom.com, u-boot@lists.denx.de Content-Type: text/plain; charset="UTF-8" X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.37 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" X-Virus-Scanned: clamav-milter 0.103.2 at phobos.denx.de X-Virus-Status: Clean On Wed, 17 Nov 2021 at 10:52, Philippe Reynes wrote: > > This commit adds the option SPL_RSA_VERIFY_WITH_PKEY. > > Signed-off-by: Philippe Reynes > --- > lib/rsa/Kconfig | 8 ++++++++ > 1 file changed, 8 insertions(+) > > diff --git a/lib/rsa/Kconfig b/lib/rsa/Kconfig > index 469596abe7..608d51c428 100644 > --- a/lib/rsa/Kconfig > +++ b/lib/rsa/Kconfig > @@ -46,6 +46,14 @@ config RSA_VERIFY_WITH_PKEY > directly specified in image_sign_info, where all the necessary > key properties will be calculated on the fly in verification code. > > +config SPL_RSA_VERIFY_WITH_PKEY > + bool "Execute RSA verification without key parameters from FDT within SPL" > + depends on SPL > + select SPL_RSA_VERIFY > + select SPL_ASYMMETRIC_KEY_TYPE > + select SPL_ASYMMETRIC_PUBLIC_KEY_SUBTYPE > + select SPL_RSA_PUBLIC_KEY_PARSER missing help > + > config RSA_SOFTWARE_EXP > bool "Enable driver for RSA Modular Exponentiation in software" > depends on DM > -- > 2.17.1 >