Hi Pelle

That's something where I did not yet look into all the details. But
this needs to be considered for new architecture. Would you mind to
document this aspect on this
bug https://bugzilla.yoctoproject.org/show_bug.cgi?id=12912? It's what
I tried to mention with

"However, signing u-boot and kernel might cause some tricky
dependencies which cannot be simplified. But understanding all these
details needs a PoC implementation, I guess."

in my comment from
today https://bugzilla.yoctoproject.org/show_bug.cgi?id=12912#c3. It
looks like you looked already deeper into this detail.

Adrian


On Wed, 2024-12-11 at 00:33 -0800, Pelle Windestam via
Lists.Yoctoproject.Org wrote:
> Thanks for the tips Adrian, I will look into that fitimage.bbclass. I
> was also thinking about the dependency between u-boot and linux
> kernel. It seems to be required since uboot-sign.bbclass "re-signs"
> the fitImage (and puts the public key in the u-boot dtb with the same
> command) and then does a verification to check that the key works.
> But is the re-signing really required? As far as I could tell trying
> to navigate the uboot-sign.bbclass the re-signed image is never used
> except for doing the verification. If one would skip the verification
> step, I think it would suffice to to put the public key into the u-
> boot dtb and thus be able drop the dependency on the kernel recipe?
> Doing the verification is of course a good idea to make sure you do
> not end up with a non-bootable fitImage, but it could work as a
> temporary work-around.

-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#64431): https://lists.yoctoproject.org/g/yocto/message/64431
Mute This Topic: https://lists.yoctoproject.org/mt/110031442/21656
Group Owner: yocto+ow...@lists.yoctoproject.org
Unsubscribe: https://lists.yoctoproject.org/g/yocto/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to