Skip to content

base: pkcs11-provider: add recipe#1058

Closed
quaresmajose wants to merge 8 commits intofoundriesio:mainfrom
quaresmajose:pkcs11-provider
Closed

base: pkcs11-provider: add recipe#1058
quaresmajose wants to merge 8 commits intofoundriesio:mainfrom
quaresmajose:pkcs11-provider

Conversation

@quaresmajose
Copy link
Copy Markdown
Member

@quaresmajose quaresmajose commented Mar 2, 2023

A pkcs#11 provider for OpenSSL 3.0+

This is an Openssl 3.x provider to access Hardware or Software
Tokens using the PKCS#11 Cryptographic Token Interface

Signed-off-by: Jose Quaresma [email protected]

@quaresmajose quaresmajose requested a review from a team March 2, 2023 15:58
Comment thread meta-lmp-base/recipes-security/pkcs11/pkcs11-provider_git.bb Outdated
@ricardosalveti
Copy link
Copy Markdown
Member

Please add a description of the recipe as part of your commit message (body).

@ricardosalveti ricardosalveti requested a review from a team March 2, 2023 16:10
@ldts
Copy link
Copy Markdown
Contributor

ldts commented Mar 2, 2023

is this patch something that can be proposed to meta-security?

@quaresmajose
Copy link
Copy Markdown
Member Author

Please add a description of the recipe as part of your commit message (body).

Add the description on commit and on the PR

@quaresmajose
Copy link
Copy Markdown
Member Author

is this patch something that can be proposed to meta-security?

since nothing exists, it might be useful. after we test for a while i can send.

@ldts
Copy link
Copy Markdown
Contributor

ldts commented Mar 2, 2023

also, do we need to add the recipe to lmp-feature-tpm2.inc?

@quaresmajose
Copy link
Copy Markdown
Member Author

I think so, if the idea is to have it installed when we have a machine with tpm2.

@ricardosalveti
Copy link
Copy Markdown
Member

Yeah, once we find a stable rev and we know it works correctly we can send to meta-security.

Copy link
Copy Markdown
Member

@ricardosalveti ricardosalveti left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM, @ldts merge when needed.

@ldts
Copy link
Copy Markdown
Contributor

ldts commented Mar 2, 2023

testing now. btw when I build this is not landing in my wic and I dont want to trigger a clean build so just copying it manually to the target for testing

@quaresmajose quaresmajose force-pushed the pkcs11-provider branch 2 times, most recently from 194a5e6 to 58d00ab Compare March 3, 2023 18:22
@quaresmajose quaresmajose marked this pull request as draft March 3, 2023 18:22
@quaresmajose
Copy link
Copy Markdown
Member Author

Move to draft because we need to propose a change of BBFILE_PRIORITY in meta-security.

A pkcs#11 provider for OpenSSL 3.0+

This is an Openssl 3.x provider to access Hardware or Software
Tokens using the PKCS#11 Cryptographic Token Interface

Signed-off-by: Jose Quaresma <[email protected]>
The meta-tpm layer on meta-securit have the BBFILE_PRIORITY 10
and with that is not possible to provide other versions
of the recipes in meta-lmp-base.

Signed-off-by: Jose Quaresma <[email protected]>
This reverts commit 1f89e9832946d6669cb121491df4cbdfa3b0bd81.

Signed-off-by: Jose Quaresma <[email protected]>
@quaresmajose
Copy link
Copy Markdown
Member Author

I have already sent the patch to meta-security to change the layer priority but it can take a while for they land on kirstone stable branch, this if they are accepted.

Another solution can be rename our fork recipe to tpm2-pkcs11-fio_1.9.0.bb renaming acordante also our tpm2-pkcs11_%.bbappend and create a bbappend to replace the upstream version with ours in packagegroup-security-tpm2.bbappend

RDEPENDS:packagegroup-security-tpm2 += "tpm2-pkcs11-fio"
RDEPENDS:packagegroup-security-tpm2:remove = "tpm2-pkcs11"

A quick local test show that it works.

@ricardosalveti
Copy link
Copy Markdown
Member

Will close this one as we're not going to use provider atm, and the other changes were merged in the other pr.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants