OSTree commit sign/verify with OpenSSL command with ed25519 Private key #3239
Replies: 1 comment 1 reply
-
You can either create the signature during the commit For example, using ostree commit, There are 2 ways ed25519 signatures are made. In theory, 2 is what you want. Unfortunately, the only way presently to load the private key is from data provided to the OSTree API. It would be pretty difficult to generate the signature without the OSTree API. In theory if you got the correct data (I believe it's just the raw I don't think using an HSM is possible at present. OSTree only allows signing with a raw private key, so you'd need to have the HSM export the private key. Most HSMs don't let you do that since it would kinda defeat the purpose. |
Beta Was this translation helpful? Give feedback.
-
Hi,
I am new to OSTree & looking for help in understanding how OSTree commits gets signed. I have few questions regarding what all possible ways to sign the OSTree commits. I am using Yocto build system to create the embedded Linux. After build I can see ostree-repo is getting created.
Signing with OpenSSL:
For testing purpose I created local ed25519 keys & trying to sign the commit with OpenSSL command
openssl genpkey -algorithm ed25519 -outform PEM -out ed25519.pem
Any example for signing the ostree commit will be helpful. Please provide your suggestions & valuable inputs.
Thanks,
jbhaijy
Beta Was this translation helpful? Give feedback.
All reactions