From 52579639ce1b17de251fc69619d95d18b93fb377 Mon Sep 17 00:00:00 2001 From: Laurent Pinchart Date: Fri, 5 May 2023 18:03:00 +0300 Subject: apps: Add ipa-verify application When packaging libcamera, distributions may break IPA module signatures if the packaging process strips binaries. This can be fixed by resigning the modules, but the process is error-prone. Add a command line ipa-verify utility that tests the signature on an IPA module to help packagers. The tool takes a single argument, the path to an IPA module shared object, and expects the signature file (.sign) to be in the same directory. In order to access the public key needed for signature verification, add a static function to the IPAManager class. As the class is internal to libcamera, this doesn't affect the public API. Signed-off-by: Laurent Pinchart Reviewed-by: Umang Jain Reviewed-by: Kieran Bingham Tested-by: Javier Martinez Canillas --- src/apps/ipa-verify/meson.build | 15 +++++++++++++++ 1 file changed, 15 insertions(+) create mode 100644 src/apps/ipa-verify/meson.build (limited to 'src/apps/ipa-verify/meson.build') diff --git a/src/apps/ipa-verify/meson.build b/src/apps/ipa-verify/meson.build new file mode 100644 index 00000000..7fdda3b9 --- /dev/null +++ b/src/apps/ipa-verify/meson.build @@ -0,0 +1,15 @@ +# SPDX-License-Identifier: CC0-1.0 + +if not ipa_sign_module + subdir_done() +endif + +ipa_verify_sources = files([ + 'main.cpp', +]) + +ipa_verify = executable('ipa_verify', ipa_verify_sources, + dependencies : [ + libcamera_private, + ], + install : false) -- cgit v1.2.1