Hi, On 4 November 2014 19:36, Srinivasan S <srinivasa...@tataelxsi.co.in> wrote: > Hi Simon > > > Sorry to push you hard again could you please help me in resolving the below > issue that am facing while generating private key & certificate containing > public key > > ie., when executing Step 4: Create a key pair > (http://lists.denx.de/pipermail/u-boot/2014-June/180845.html) > > WARNING: can't open config file: > /tmp/xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx/yyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy/sysroots/i686-arago-linux/usr/lib/ssl/openssl.cnf > Unable to load config info from > /tmp/xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx/yyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy/sysroots/i686-arago-linux/usr/lib/ssl/openssl.cnf
Please don't top post. I don't know what xxxxyyyy is or why it appears. Did you 'mkdir keys'? Regards, Simon > > > Many Thanks a lot in advance > ________________________________________ > From: Srinivasan S > Sent: Tuesday, November 4, 2014 3:37 PM > To: Simon Glass > Cc: srinivasan; U-Boot Mailing List > Subject: Re: verifying & signing > > Hi Simon, > > When I was generating the keys ie., Step 4: Create a key pair > > Am facing one more error while generating private key & certificate > containing public key used for verification when I execute the below openssl > commands it is saying can't open config file: > > srinivasan@tata-HP-Elite-7100-Microtower-PC:~/TUNSTALL/board-support/linux-3.12.10-ti2013.12.01/work$ > openssl genrsa -F4 -out keys/dev.key 2048 > WARNING: can't open config file: > /tmp/xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx/yyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy/sysroots/i686-arago-linux/usr/lib/ssl/openssl.cnf > Generating RSA private key, 2048 bit long modulus > ............................+++ > ...............................................+++ > e is 65537 (0x10001) > srinivasan@tata-HP-Elite-7100-Microtower-PC:~/TUNSTALL/board-support/linux-3.12.10-ti2013.12.01/work$ > openssl req -batch -new -x509 -key keys/dev.key -out keys/dev.crt > WARNING: can't open config file: > /tmp/xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx/yyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy/sysroots/i686-arago-linux/usr/lib/ssl/openssl.cnf > Unable to load config info from > /tmp/xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx/yyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy/sysroots/i686-arago-linux/usr/lib/ssl/openssl.cnf > > Could you pls do the needful in resolving this errors cz of which am not able > to proceed further > > Many Thanks in advance > > ________________________________________ > From: s...@google.com <s...@google.com> on behalf of Simon Glass > <s...@chromium.org> > Sent: Tuesday, November 4, 2014 12:07 PM > To: Srinivasan S > Cc: srinivasan; U-Boot Mailing List > Subject: Re: verifying & signing > > Hi, > > On 3 November 2014 20:01, Srinivasan S <srinivasa...@tataelxsi.co.in> wrote: >> Hi Simon, >> >> Good Morning! >> >> Many Thanks a lot for all your support so far, >> >> 1. With respect to the verified boot , I want to put the images onto NAND >> FLASH, Could you please let me know what is the procedure of flashing the >> verified boot images onto NAND instead of micro-SD > > One option would be to use UBI to provide a consistent block interface > and then sit verity on top of that. But there may be other options, > I'm not sure. > >> >> 2.Does dm-verity works only on read-only rootfs?.. or it works on read-write >> rootfs?.. because as of now we are looking out only for a bare minimal >> rootfs , could you please suggest me if any rootfs with minimal support >> where dm-verity can be applied & verified apart from android > > It requires a read-only rootfs. You can enable it on a filesystem > fairly easily - you need to run a tool to generate the hashes and root > hash, then pass that to the kernel on boot. You don't need to use > Android or Chrome OS - it is available in mainline Linux. I'm not sure > if there is a cogent guide somewhere though. > >> >> I want to implement the automatic software update & recovery feature (ie., >> firmware update of uboot, kernel & rootfs) in ti-sdk-am335x-evm-07.00.00.00 >> BSP's , if in case if it bricks to unbrick by itself, >> Could you please help me with suitable pointers & source code links for >> implementing this feature > > This is one way. > > http://www.chromium.org/chromium-os/u-boot-porting-guide/2-concepts > > So ensure there can be no bricking you probably need to have a U-Boot > that you never update. It can then check the signature of a secondary > updateable U-Boot, and jump to it if it is OK. This is what Chrome OS > does. > > BTW as this is a mailing list you should normally put the replies > below the text, not above. > > Regards, > Simon > > >> >> Awaiting for your replies >> Many Thanks in advance again, >> >> Srinivasan S >> >> >> ________________________________________ >> From: s...@google.com <s...@google.com> on behalf of Simon Glass >> <s...@chromium.org> >> Sent: Monday, November 3, 2014 5:08 AM >> To: srinivasan >> Cc: U-Boot Mailing List; Srinivasan S >> Subject: Re: verifying & signing >> >> Hi, >> >> On 2 November 2014 07:06, srinivasan <srinivasan....@gmail.com> wrote: >>> >>> >>> >>> >>> Hi Simon, >>> >>> http://lists.denx.de/pipermail/u-boot/2014-June/180845.html >>> >>> As the above link explains the Signing of kernel & verifying with uboot, >>> >>> Could you please let me know do you have any methods of signing & verifying >>> the linux kernel with root file system ie., am using >>> ti-sdk-am335x-evm-07.00.00.00 BSP's where linux kernel is from this BSP only >>> & would be planning to use rootfs as my Angstrom filesystem or any others >> >> If you use dm-verity you can verify your root disk using a hash which >> is stored in the verified part of U-Boot. This is the method used by >> Chrome OS. This requires a read-only rootfs though. Is that >> acceptable? >> >> See this page for some info on how Android does this: >> >> https://source.android.com/devices/tech/security/dm-verity.html >> >>> >>> Could you please let me know how do we sign & verify the kernel with rootfs >>> with detailed steps as am using beaglebone black as my development board >>> with ti-sdk-am335x-evm-07.00.00.00 BSP's >> >> I don't have details steps of this part sorry. An overview is here: >> >> http://events.linuxfoundation.org/sites/events/files/slides/chromeos_and_diy_vboot_0.pdf >> >> >>> >>> Awaiting for your replies >>> Many Thanks in advance >>> >>> >>> >> >> Regards, >> Simon _______________________________________________ U-Boot mailing list U-Boot@lists.denx.de http://lists.denx.de/mailman/listinfo/u-boot