On Wed, May 29, 2024 at 03:42:04PM -0400, Raymond Mao wrote: > Hi Tom, > > On Wed, 29 May 2024 at 14:43, Tom Rini <tr...@konsulko.com> wrote: > > > On Wed, May 29, 2024 at 02:38:10PM -0400, Raymond Mao wrote: > > > Hi Tom, > > > > > > On Wed, 29 May 2024 at 14:01, Tom Rini <tr...@konsulko.com> wrote: > > > > > > > On Wed, May 29, 2024 at 01:42:16PM -0400, Raymond Mao wrote: > > > > > Hi Tom, > > > > > > > > > > On Wed, 29 May 2024 at 12:58, Tom Rini <tr...@konsulko.com> wrote: > > > > > > > > > > > On Tue, May 28, 2024 at 07:09:14AM -0700, Raymond Mao wrote: > > > > > > > > > > > > > Port mbedtls with dummy libc header files. > > > > > > > Add mbedtls default config header file. > > > > > > > Optimize mbedtls default config by disabling unused features to > > > > > > > reduce the target size. > > > > > > > Add mbedtls kbuild makefile. > > > > > > > Add Kconfig and mbedtls config submenu. > > > > > > [snip] > > > > > > > diff --git a/lib/mbedtls/Kconfig b/lib/mbedtls/Kconfig > > > > > > > new file mode 100644 > > > > > > > index 00000000000..d6e77d56871 > > > > > > > --- /dev/null > > > > > > > +++ b/lib/mbedtls/Kconfig > > > > > > > @@ -0,0 +1,25 @@ > > > > > > > +menuconfig MBEDTLS_LIB > > > > > > > + bool "Use mbedtls libraries" > > > > > > > + select MBEDTLS_LIB_CRYPTO > > > > > > > + select MBEDTLS_LIB_X509 > > > > > > > + help > > > > > > > + Enable mbedtls libraries > > > > > > > + > > > > > > > +if MBEDTLS_LIB > > > > > > > + > > > > > > > +config MBEDTLS_LIB_CRYPTO > > > > > > > + bool "Crypto library" > > > > > > > + help > > > > > > > + Enable mbedtls crypto library > > > > > > > + > > > > > > > +config MBEDTLS_LIB_X509 > > > > > > > + bool "X509 library" > > > > > > > + help > > > > > > > + Enable mbedtls X509 library > > > > > > > + > > > > > > > +config MBEDTLS_LIB_TLS > > > > > > > + bool "TLS library" > > > > > > > + help > > > > > > > + Enable mbedtls TLS library > > > > > > > + > > > > > > > +endif # MBEDTLS_LIB > > > > > > > > > > > > We need much more granularity here, and to re-think some existing > > > > > > symbols too perhaps. What we should be able to do is pick mbedTLS > > or > > > > > > "legacy SW implementation" or "HW implementation" for the various > > > > > > algorithms, and that in turn can have some higher level grouping > > to it. > > > > > > This should then negate a bunch of the Makefile work you're doing > > as we > > > > > > won't have CONFIG_SHA256 enabled as we'll have > > > > CONFIG_MBEDTLS_LIB_SHA256 > > > > > > or whatever enabled. > > > > > > > > > > > > > > > > I think we should use CONFIG_MBEDTLS_LIB_[CRYPTO,X509,TLS] for > > high-level > > > > > grouping. > > > > > Underneath, the CONFIG_SHA[1,256,512] switches (and other crypto > > options) > > > > > can be > > > > > used as sub build options in both MbedTLS and "legacy libs". > > > > > > > > > > Take hash as an example, if the users prefer to use MbedTLS other > > than > > > > > "legacy libs" for > > > > > hash operation, CONFIG_MBEDTLS_LIB_CRYPTO should be defined as the > > main > > > > > switch > > > > > (the users can still prefer to use "legacy libs" for X509 by > > > > > keeping CONFIG_MBEDTLS_LIB_X509 > > > > > disabled). > > > > > Then enable the algorithms they need (e.g. CONFIG_SHA256) - the > > algorithm > > > > > options works > > > > > for both MbedTLS and "legacy libs". > > > > > > > > > > HW implementations with MbedTLS (aka, Alternative algorithms in > > MbedTLS) > > > > is > > > > > another > > > > > topic which is not covered in this patch set (It needs to migrate > > each > > > > > vendor's solution under > > > > > MbedTLS alternative algorithm). > > > > > Current patch set is focused on SW implementation with MbedTLS. > > > > > > > > The "easy" problem with what's in v3 is that X509 and CRYPTO are > > > > select'd under the main heading. > > > > > > Not sure if I get what you mentioned, currently all MbedTLS options are > > > under > > > Library routines > Security support > > > Do you think we should keep them in other places? > > > > > > > > > > The harder problem is that we > > > > intentionally have granularity for SHA256, SHA512, etc, etc and all of > > > > that goes away with the current Kconfig option if you select mbedTLS. > > We > > > > need to bring that back. And we shouldn't need to have all of the ifneq > > > > statements in Makefiles because both CONFIG_SHA256 and > > > > CONFIG_MBEDLTS_LIB_CRYPTO_SHA256 will not be true (Or possibly, > > > > CONFIG_SHA256 gates things U-Boot's internal API for sha256'ing > > > > something and CONFIG_LEGACY_SHA256 controls building lib/sha256.c). > > > > > > > > I think we should not introduce new ones like CONFIG_LEGACY_, > > > CONFIG_SHA[1,256,512] should be used no matter whether MbedTLS is > > > enabled or not. > > > I understand your concern, I will bring CONFIG_SHA[1,256,512] back when > > > MbedTLS is enabled. Those options should control the options in the > > MbedTLS > > > default config file. > > > > My concern is that we do not have the correct level of granularity, and > > that can partly be seen by the number of ifneq(...) statements being > > added around already conditional logic. We should have almost none of > > those, in the end, is what I'm saying. We have a mechanism for > > configuring the build, Kconfig, and that should drive the decisions as > > much as possible. > > The `ifneq(ONFIG_MBEDTLS_LIB_*)` statements are due to the fact that we > still > need lib/Makefile and lib/crypto/Makefile when building hash and x509 > stuffs with > MbedTLS enabled. > To address this, I guess we have to first refactor all "legacy libs" that > will be replaced > by MbedTLS: > Move md5, sha* from lib to to a new dir lib/hash and move public_key, > rsapubkey*, > rsa_helper, x509*, pkcs7*,mscode* from lib/crypto to a new dir lib/x509. > When they are all independent modules with separated Makefile, we can remove > `ifneq(ONFIG_MBEDTLS_LIB_*)` and all can be driven in lib/Makefile. > > Is that something you expect? > If yes I can do this for v4, or put it into another prerequisite/refactor > series.
We should not need to do that because we should not have CONFIG_SHA256 set if we are not building lib/sha256.c at that stage, is what I'm saying. CONFIG_LEGACY_SHA256 should control it and CONFIG_SHA256 should control the API and CONFIG_MBEDTLS_LIB_CRYPTO_SHA256 should control the mbedTLS version, and this should either expand on, or if needed update/rework, the mechanism that lets us also have say CONFIG_ARMV8_CE_SHA256 for using that HW based version of the support. -- Tom
signature.asc
Description: PGP signature