On Tue, Dec 3, 2024 at 8:45 AM Jan Lübbe <[email protected]> wrote:
>
> On Sat, 2024-11-30 at 13:48 +0100, Johannes Schneider wrote:
> > Add a mechanism to establish a (metadata) link between roles, in the
> > form of a new 'ca' variable.  Which is intended to point from one role
> > to another, to preserve the leaf->intermediary certificate relation.
> >
> > With this additional mechanism, it would be now possible to import a
> > complex PKI tree of certificates (either just the certificates, or
> > both cert+key where available); and then later during usage of one
> > role, reconstruct the verification chain from the leaf, through
> > multiple intermediary, and up to the root role.
> >
> > Signed-off-by: Johannes Schneider <[email protected]>
>
> No, as explained in the other thread, CA certificates are *not* roles.
> A possible extension would be that roles refer to a CA certificate. We
> should continue to discuss this in the thread "signing.bbclass: add
> set|get|has_ca functions"

perhaps a plugin sort ?

>
> Khem: This should not be merged in the current form.

yeah thanks

>
> Jan
>
> > ---
> >  meta-oe/classes/signing.bbclass | 34 +++++++++++++++++++++++++++++++++
> >  1 file changed, 34 insertions(+)
> >
> > diff --git a/meta-oe/classes/signing.bbclass 
> > b/meta-oe/classes/signing.bbclass
> > index 8af7bbf8e..f1765e96b 100644
> > --- a/meta-oe/classes/signing.bbclass
> > +++ b/meta-oe/classes/signing.bbclass
> > @@ -246,6 +246,18 @@ signing_import_key_from_pem() {
> >      signing_import_privkey_from_pem "${role}" "${pem}"
> >  }
> >
> > +# signing_import_set_ca <role> <role_ca>
> > +#
> > +# Link the certificate from <role> to its issuer stored in <ca_role>
> > +# By walking this linked list a CA-chain can later be reconstructed from 
> > the
> > +# involed roles.
> > +signing_import_set_ca() {
> > +    local role="${1}"
> > +    local ca_role="${2}"
> > +
> > +    echo "_SIGNING_CA_${role}_=\"${ca_role}\"" >> $_SIGNING_ENV_FILE_
> > +}
> > +
> >  signing_import_finish() {
> >      echo "loaded objects:"
> >      signing_pkcs11_tool --list-objects
> > @@ -346,6 +358,28 @@ signing_get_module() {
> >      fi
> >  }
> >
> > +# signing_get_ca <role>
> > +#
> > +# returns the <ca_role> that has been set previously through
> > +# signing_import_set_ca; or the empty string if none was set
> > +signing_get_ca() {
> > +    local role="${1}"
> > +
> > +    eval local ca_role="\$_SIGNING_CA_${role}_"
> > +    echo "$ca_role"
> > +}
> > +
> > +# signing_has_ca <role>
> > +#
> > +# check if the role links to another role that is its certificate
> > +# authority/issuer.
> > +signing_has_ca() {
> > +    local ca_role="$(signing_get_ca ${1})"
> > +
> > +    test -n "$ca_role"
> > +    return $?
> > +}
> > +
> >  python () {
> >      signing_class_prepare(d)
> >  }
>
> --
> Pengutronix e.K.                        |                             |
> Steuerwalder Str. 21                    | https://www.pengutronix.de/ |
> 31137 Hildesheim, Germany               | Phone: +49-5121-206917-0    |
> Amtsgericht Hildesheim, HRA 2686        | Fax:   +49-5121-206917-5555 |
>
>
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#114186): 
https://lists.openembedded.org/g/openembedded-devel/message/114186
Mute This Topic: https://lists.openembedded.org/mt/109846831/21656
Group Owner: [email protected]
Unsubscribe: https://lists.openembedded.org/g/openembedded-devel/unsub 
[[email protected]]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to