All of lore.kernel.org
 help / color / mirror / Atom feed
From: Jan Kiszka <jan.kiszka@siemens.com>
To: Dhananjay Phadke <dphadke@linux.microsoft.com>,
	U-Boot Mailing List <u-boot@lists.denx.de>,
	Simon Glass <sjg@chromium.org>
Cc: Ivan Mikhaylov <ivan.mikhaylov@siemens.com>
Subject: Re: [PATCH 0/3] mkimage: allow to specify signing algorithm
Date: Fri, 14 Jan 2022 10:21:47 +0100	[thread overview]
Message-ID: <3f5b1588-0ff8-0d14-e7b7-1aebf913dc0e@siemens.com> (raw)
In-Reply-To: <b47ea726-775b-f004-4d1f-5e4b8ef038bc@linux.microsoft.com>

On 14.01.22 00:28, Dhananjay Phadke wrote:
> On 1/13/2022 4:38 AM, Jan Kiszka wrote:
>> On 25.11.21 20:03, Jan Kiszka wrote:
>>> Another step to decouple the FIT image specification from the actual
>>> signing: With these changes, the signature nodes can leave out an algo
>>> property, mkimage will initialize that as well while signing. This way,
>>> in-tree FIT source files can be prepared for gaining signatures without
>>> defining the key type or size upfront, forcing users to patch the code
>>> to change that.
> 
> [resend to the list]
> 
> While encryption algo (rsa2048 vs rsa4096, etc) shouldn't need to be
> explicitly specified as you noted below, how does it help to add it to
> (already exhaustive) mkimage args? Parsing OID / length from keyfile
> would be real change.
> 
> While rotating keys is common, how often algo is changed?
> 

The use case is decoupling of signature preparation from actual signing. 
Means, we would like to prepare binman image device trees for applying 
signature but without making the decision which key type and width 
should be used. That shall be up to the user (integrator) of the 
firmware image.

This series will enable a patch like 
https://github.com/siemens/u-boot/commit/1215a357ec1f58acde56c8ca4085aa43f8fdbf5a 
and a signature workflow that does not require to patch the U-Boot 
source anymore. It still makes the decision of using hash algo SHA256, 
but that is acceptable.

Jan

-- 
Siemens AG, Technology
Competence Center Embedded Linux

      reply	other threads:[~2022-01-14  9:22 UTC|newest]

Thread overview: 8+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2021-11-25 19:03 [PATCH 0/3] mkimage: allow to specify signing algorithm Jan Kiszka
2021-11-25 19:03 ` [PATCH 1/3] image-fit: Make string of algo parameter constant Jan Kiszka
2021-11-25 19:03 ` [PATCH 2/3] mkimage: Drop unused OPT_STRING constant Jan Kiszka
2021-11-25 19:03 ` [PATCH 3/3] mkimage: Allow to specify the signature algorithm on the command line Jan Kiszka
2022-01-13 12:38 ` [PATCH 0/3] mkimage: allow to specify signing algorithm Jan Kiszka
2022-01-13 13:40   ` Simon Glass
2022-01-13 23:28   ` Dhananjay Phadke
2022-01-14  9:21     ` Jan Kiszka [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=3f5b1588-0ff8-0d14-e7b7-1aebf913dc0e@siemens.com \
    --to=jan.kiszka@siemens.com \
    --cc=dphadke@linux.microsoft.com \
    --cc=ivan.mikhaylov@siemens.com \
    --cc=sjg@chromium.org \
    --cc=u-boot@lists.denx.de \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.