Hi Jan,

On Thu, 13 Jan 2022 at 05:38, Jan Kiszka <jan.kis...@siemens.com> wrote:
>
> On 25.11.21 20:03, Jan Kiszka wrote:
> > Another step to decouple the FIT image specification from the actual
> > signing: With these changes, the signature nodes can leave out an algo
> > property, mkimage will initialize that as well while signing. This way,
> > in-tree FIT source files can be prepared for gaining signatures without
> > defining the key type or size upfront, forcing users to patch the code
> > to change that.
> >
> > Patch 1 is preparatory for this, patch 2 a drive-by cleanup.
> >
> > A better solution would actually be if the algorithm was derived from
> > the provided key. But the underlying crypto layer seems to be rather
> > unprepared for that.
> >
> > Jan
> >
> > Jan Kiszka (3):
> >    image-fit: Make string of algo parameter constant
> >    mkimage: Drop unused OPT_STRING constant
> >    mkimage: Allow to specify the signature algorithm on the command line
> >
> >   boot/image-fit-sig.c |  2 +-
> >   boot/image-fit.c     |  8 +++----
> >   doc/mkimage.1        |  5 +++++
> >   include/image.h      |  5 +++--
> >   tools/fit_image.c    |  3 ++-
> >   tools/image-host.c   | 50 +++++++++++++++++++++++++-------------------
> >   tools/imagetool.h    |  1 +
> >   tools/mkimage.c      |  6 ++++--
> >   8 files changed, 49 insertions(+), 31 deletions(-)
> >
>
> Ping on this series.
>
> Jan
>
> --
> Siemens AG, Technology
> Competence Center Embedded Linux

Somehow I did not get this. Can you please resend it?  I have lost
some patches to spam filters.

Regards,
Simon

Reply via email to