Jonathan Adams wrote:
> On Tue, Jul 08, 2008 at 03:30:01PM +0100, Darren J Moffat wrote:
>> Milan Jurik wrote:
>>> I could hack it to the module by some Makefile, but it will change
>>> revision in every build, not good for new packaging system I think.
>> It seems to me that the simplest solution here is to have at least the 
>> .SUNW_signature section in a kernel crash dump and in a userland core 
>> file.   That means no new build process and it works for all 
>> consolidations that have their binaries signed and any 3rd party code 
>> that is also signed.  See 6365439 which I logged on 2005-12-20.
>>
> 
> I agree that having the signatures available might be good, we do already
> have this information with ::showrev -v, right?  And it's perfectly usable?
> 
> Out of curiosity, do the signatures have the same version information that
> the CTF data does?

The signatures I'm talking about are the ones in .SUNW_signature.  These 
are a sha1 hash over the SHF_ALLOC ELF sections[1].  That sha1 hash is 
then  signed with an RSA private key and certificate.

There is no relationship between the .SUNW_signature and .SUNW_ctf sections.

The CTF data might actually be useful in determining the "version" of 
modules too - but IIRC CTF isn't completely deterministic right (but 
that might not matter here) ?

$SRC/lib/libelfsign has the code that does this.

[1] for historical reasons crypto framework modules are actually over 
all sections - this may change in the future but is actually a useful 
side effect at the moment.

-- 
Darren J Moffat

Reply via email to