From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from phobos.denx.de (phobos.denx.de [85.214.62.61]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 68E88C433F5 for ; Fri, 3 Dec 2021 07:10:16 +0000 (UTC) Received: from h2850616.stratoserver.net (localhost [IPv6:::1]) by phobos.denx.de (Postfix) with ESMTP id ADD7F80F6E; Fri, 3 Dec 2021 08:10:13 +0100 (CET) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=linaro.org Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de Authentication-Results: phobos.denx.de; dkim=pass (2048-bit key; unprotected) header.d=linaro.org header.i=@linaro.org header.b="X966C4Us"; dkim-atps=neutral Received: by phobos.denx.de (Postfix, from userid 109) id 0A5F580FCC; Fri, 3 Dec 2021 08:10:11 +0100 (CET) Received: from mail-pf1-x429.google.com (mail-pf1-x429.google.com [IPv6:2607:f8b0:4864:20::429]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits)) (No client certificate requested) by phobos.denx.de (Postfix) with ESMTPS id C925F80C72 for ; Fri, 3 Dec 2021 08:10:06 +0100 (CET) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=linaro.org Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=takahiro.akashi@linaro.org Received: by mail-pf1-x429.google.com with SMTP id 8so2040443pfo.4 for ; Thu, 02 Dec 2021 23:10:06 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=date:from:to:subject:message-id:mail-followup-to:references :mime-version:content-disposition:in-reply-to; bh=S2fF3PjWN9GjbpxkMETAZKd9k4IqVbIJwz31aYgIKdo=; b=X966C4UsUjIe4DSUyIJiuYCLp1wPa/mVPjgFWmMn151euO1tNce8BqOYdreDA6Jfzr pKp4xwjgPmqYWFKMCKfFowlCK2w+YhWgrqnzRp1Fcq1lvcdzw3ioyL/t82Uyap4aKF+l LMCcuHLoKdkpwOGT38RVCtSyH8EuuqaavbDg/p8aiNQ6yO0yzdTfM8skHCOleBoS48lt dFxxZ9hnY9Dq1hGKXWimffXfEL8cSvoET4j+bBKdZk6dqdvzTjpFh3YDYhkqek3HKEpa 7npZ58Asd4sdjVDUkn/QgKDO02z0IwteTmRl0nMWgs8iR+pZkqlMaOqbuiEvey7vI92x lWfA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:date:from:to:subject:message-id:mail-followup-to :references:mime-version:content-disposition:in-reply-to; bh=S2fF3PjWN9GjbpxkMETAZKd9k4IqVbIJwz31aYgIKdo=; b=KCLP0dK5xsAb8oC9vbClQ+tKF7emDWpbaP14UdrJxaypNNJC7jtrY20yv2Ng611FDP ipcHLKR+q5dXyV8rrnugO7na4/Oa/lFoD027WhN3kPErp1Bw7pqvHMri7guX1tY4ptU5 xhgFYorq2Vc8mNiNAPeYhAXmBIGgaaYcyp3yzEdiuyBw9C3KrLJrqULxbvbszYU5nbcw fWef7dln5CiXI8noJVRvEik/L7CeKajT/OuSeGqK/XAkC12M+KaOUZ54qESLh3Oo7drX hsuTuEGdeuvz96eSyc8TYQpf6qESbw0EhAdQrk6ms0KLL/9V/vfWq4F9ChVtpFxt5G1z je1Q== X-Gm-Message-State: AOAM533F/8XtRxmv4ulneZ3I1NRDpgFYmEditoL/3WOBvPdDS4o5cvb4 1UevW6aki3pr0BMTCEwrgj/UUQ== X-Google-Smtp-Source: ABdhPJzFn5bNVFrjV6gX071+wRkm9OwKnYFh8sAP9sv55APclro0DW0At/yunSFbNbr+CmI0E3pNFQ== X-Received: by 2002:a63:a50e:: with SMTP id n14mr3321821pgf.6.1638515404803; Thu, 02 Dec 2021 23:10:04 -0800 (PST) Received: from laputa ([2400:4050:c3e1:100:59ee:cdb7:e187:43ff]) by smtp.gmail.com with ESMTPSA id 11sm1852551pfl.41.2021.12.02.23.10.00 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 02 Dec 2021 23:10:03 -0800 (PST) Date: Fri, 3 Dec 2021 16:09:58 +0900 From: AKASHI Takahiro To: xypron.glpk@gmx.de, agraf@csgraf.de, sjg@chromium.org, ilias.apalodimas@linaro.org, sughosh.ganu@linaro.org, masami.hiramatsu@linaro.org, mark.kettenis@xs4all.nl, u-boot@lists.denx.de Subject: Re: [PATCH v7 00/12] efi_loader: capsule: improve capsule authentication support Message-ID: <20211203070958.GB17147@laputa> Mail-Followup-To: AKASHI Takahiro , xypron.glpk@gmx.de, agraf@csgraf.de, sjg@chromium.org, ilias.apalodimas@linaro.org, sughosh.ganu@linaro.org, masami.hiramatsu@linaro.org, mark.kettenis@xs4all.nl, u-boot@lists.denx.de References: <20211116043238.67226-1-takahiro.akashi@linaro.org> <20211125060235.GD41281@laputa> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20211125060235.GD41281@laputa> X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.38 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" X-Virus-Scanned: clamav-milter 0.103.2 at phobos.denx.de X-Virus-Status: Clean Heinrich, On Thu, Nov 25, 2021 at 03:02:35PM +0900, AKASHI Takahiro wrote: > Hi Heinrich > > On Tue, Nov 16, 2021 at 01:32:26PM +0900, AKASHI Takahiro wrote: > > As I proposed and discussed in [1] and [2], I have made a couple of > > improvements on the current implementation of capsule update in this > > patch set. > > For this version(v7), I have seen your review comments only > on patch#1 and #2. > Please take your time to review the rest (the main part of > commits) as well. > I don't want to respin the patch series and post its new version > which is almost the same as the old one(v7). Ping. -Takahiro Akashi > -Takahiro Akashi > > > > * add signing feature to mkeficapsule > > * add "--guid" option to mkeficapsule > > * add man page of mkeficapsule > > * update uefi document regarding capsule update > > * revise pytests > > * (as RFC) add CONFIG_EFI_CAPSULE_KEY_PATH > > > > # We have had some discussion about fdtsig.sh. > > # So RFCs (patch#11,#12) are still included for further discussion > > # if they are useful or not. > > # For smooth merge, the rest (patch#1-10) should work without them. > > > > [1] https://lists.denx.de/pipermail/u-boot/2021-April/447918.html > > [2] https://lists.denx.de/pipermail/u-boot/2021-July/455292.html > > > > Prerequisite patches > > ==================== > > None > > > > Test > > ==== > > * locally passed the pytest which is included in this patch series > > on sandbox built. > > (CONFIG_EFI_CAPSULE_AUTHENTICATE should explicitly be turned on > > in order to exercise the authentication code.) > > > > Changes > > ======= > > v7 (Nov 16, 2021) > > * rebased on pre-v2022.01-rc2 > > * drop already-merged patch > > * check for a size of firmware binary file (patch#1) > > * enable mkeficapsule in tools-only_defconfig (patch#2) > > * define eficapsule.h and include it from mkeficapsule (patch#3) > > Hopefully, the tool can now compile on non-linux host. > > > > v6 (Nov 02, 2021) > > * rebased on pre-v2022.01-rc1 > > * add patch#2 to rework/refactor the code for better readability (patch#2) > > * use exit(EXIT_SUCCESS/FAILURE) (patch#3) > > * truncate >80chars lines in pytest scripts (patch#6) > > > > v5 (Oct 27, 2021) > > * rebased on pre-v2022.01-rc1 (WIP/26Oct2021) > > * drop already-merged patches > > * drop __weak from efi_get_public_key_data() (patch#1) > > * describe the format of public key node in device tree (patch#4) > > * re-order patches by grouping closely-related patches (patch#6-8) > > * modify pytest to make the test results correctly verified > > either with or without CONFIG_EFI_CAPSULE_AUTHENTICATE (patch#9) > > * add RFCs for embedding public keys during the build process (patch#10,11) > > > > v4 (Oct 7, 2021) > > * rebased on v2021.10 > > * align with "Revert "efi_capsule: Move signature from DTB to .rodata"" > > * add more missing *revert* commits (patch#1,#2,#3) > > * add fdtsig.sh, replacing dtb support in mkeficapsule (patch#4) > > * update/revise the man/uefi doc (patch#6,#7) > > * fix a bug in parsing guid string (patch#8) > > * add a test for "--guid" option (patch#10) > > * use dtb-based authentication test as done in v1 (patch#11) > > > > v3 (Aug 31, 2021) > > * rebased on v2021.10-rc3 > > * remove pytest-related patches > > * add function descriptions in mkeficapsule.c > > * correct format specifiers in printf() > > * let main() return 0 or -1 only > > * update doc/develop/uefi/uefi.rst for syntax change of mkeficapsule > > > > v2 (July 28, 2021) > > * rebased on v2021.10-rc* > > * removed dependency on target's configuration > > * removed fdtsig.sh and others > > * add man page > > * update the UEFI document > > * add dedicate defconfig for testing on sandbox > > * add gitlab CI support > > * add "--guid" option to mkeficapsule > > (yet rather RFC) > > > > Initial release (May 12, 2021) > > * based on v2021.07-rc2 > > > > AKASHI Takahiro (12): > > tools: mkeficapsule: rework the code a little bit > > tools: build mkeficapsule with tools-only_defconfig > > tools: mkeficapsule: add firmwware image signing > > tools: mkeficapsule: add man page > > doc: update UEFI document for usage of mkeficapsule > > test/py: efi_capsule: add image authentication test > > tools: mkeficapsule: allow for specifying GUID explicitly > > test/py: efi_capsule: align with the syntax change of mkeficapsule > > test/py: efi_capsule: add a test for "--guid" option > > test/py: efi_capsule: check the results in case of > > CAPSULE_AUTHENTICATE > > (RFC) tools: add fdtsig.sh > > (RFC) efi_loader, dts: add public keys for capsules to device tree > > > > MAINTAINERS | 2 + > > configs/tools-only_defconfig | 1 + > > doc/develop/uefi/uefi.rst | 143 ++-- > > doc/mkeficapsule.1 | 107 +++ > > dts/Makefile | 23 +- > > lib/efi_loader/Kconfig | 7 + > > .../py/tests/test_efi_capsule/capsule_defs.py | 5 + > > test/py/tests/test_efi_capsule/conftest.py | 59 +- > > test/py/tests/test_efi_capsule/signature.dts | 10 + > > .../test_efi_capsule/test_capsule_firmware.py | 91 ++- > > .../test_capsule_firmware_signed.py | 254 +++++++ > > tools/Kconfig | 8 + > > tools/Makefile | 8 +- > > tools/eficapsule.h | 115 +++ > > tools/fdtsig.sh | 40 ++ > > tools/mkeficapsule.c | 680 +++++++++++++++--- > > 16 files changed, 1360 insertions(+), 193 deletions(-) > > create mode 100644 doc/mkeficapsule.1 > > create mode 100644 test/py/tests/test_efi_capsule/signature.dts > > create mode 100644 test/py/tests/test_efi_capsule/test_capsule_firmware_signed.py > > create mode 100644 tools/eficapsule.h > > create mode 100755 tools/fdtsig.sh > > > > -- > > 2.33.0 > >