This pull request is more for discussion, and get some commentary on the value of having device firmware (such as u-boot) that can verify DSA signatures of kernel and userspace payloads.
Things that I need are some help with the simplest example code to check DSA signatures, and any pointers to any other smaller embedded DSA signature codes, or some discussion on whether adapting secp256k to this application is even a good idea.
In particular, maybe @laanwj might find this interesting for a riscv-laptop
Adds about ~36k or so (big for a bootloader)
Also needs the following in u-boot:
diff –git a/lib/Kconfig b/lib/Kconfig index 622f3c26c33..38c2f6493a1 100644 — a/lib/Kconfig +++ b/lib/Kconfig @@ -175,2 +175,3 @@ config AES source lib/rsa/Kconfig +source lib/secp256k1/Kconfig
diff –git a/lib/Makefile b/lib/Makefile index 5f583aed37d..02ec35e8201 100644 — a/lib/Makefile +++ b/lib/Makefile @@ -51,2 +51,3 @@ endif obj-$(CONFIG_RSA) += rsa/ +obj-$(CONFIG_DSA) += secp256k1/ obj-$(CONFIG_SHA1) += sha1.o