Yes, I don't see this tool in master branch.
May be I will take code and build this tool.

Do you have a plan for sharing it in repo?


-----Original Message-----
From: Rasmus Villemoes <rasmus.villem...@prevas.dk> 
Sent: Monday, August 2, 2021 12:37 PM
To: Roman Kopytin <roman.kopy...@kaspersky.com>; Simon Glass <s...@chromium.org>
Cc: Thomas Perrot <thomas.per...@bootlin.com>; Michael Nazzareno Trimarchi 
<mich...@amarulasolutions.com>; U-Boot-Denx <u-boot@lists.denx.de>; Alex 
Kiernan <alex.kier...@gmail.com>
Subject: Re: U-boot

Caution: This is an external email. Be cautious while opening links or 
attachments.



On 02/08/2021 11.25, Roman Kopytin wrote:
> Thanks a lot!
> Yes, looks like using of the 'fdtput' is not very safety for me.
> As I understood I need to use "fdt_add_pubkey" tool with CMD (example):
> ./ fdt_add_pubkey  -a rsa2048 -k <keydir> -n <keyname> -r <conf|image> 
> my_file.dtb
>
> -r <conf|image> is the same as for mkimage? As I remember we can use -r w/o 
> any values in mkimage.

Yes, that's very close to what our Yocto recipe currently does:

        for b in ${KERNEL_PUBLIC_KEYS} ; do
                fdt_add_pubkey -a 'sha1,rsa2048' -k "${KERNEL_SIGNING_DIR}" -n 
"$b" \
                        -r conf $dtb
        done

I doubt that old patch applies nowadays, I've only forward-ported it to
2020.04 internally.

As to Simon's old question of whether it could be done in mkimage with a new 
flag: I'd really prefer not to, mkimage is already an incoherent collection of 
tools that do very different things with different flags.
Having a flag that says "create and sign this FIT image, and as a side effect 
update $this dtb $overhere with the corresponding public key mangled 
appropriately, oh, and btw, _only_ do that side effect" is a non-starter.

Rasmus

Reply via email to