diff options
author | Alexey Neyman <stilor@att.net> | 2017-09-27 22:29:35 -0700 |
---|---|---|
committer | Alexey Neyman <stilor@att.net> | 2017-09-27 22:40:21 -0700 |
commit | 48a949cf60b422c1904dca42519e54902f3ed0a6 (patch) | |
tree | 923dd08ce1fee74b3431086e13be0ae0739dd9a1 /config/global | |
parent | f86adab1f41b2320c20ffe2e9ffe0c6d12954c33 (diff) | |
download | crosstool-ng-48a949cf60b422c1904dca42519e54902f3ed0a6.tar.gz crosstool-ng-48a949cf60b422c1904dca42519e54902f3ed0a6.tar.bz2 crosstool-ng-48a949cf60b422c1904dca42519e54902f3ed0a6.zip |
Add an ability to verify the digest/signature
Fixes #611.
Signed-off-by: Alexey Neyman <stilor@att.net>
Diffstat (limited to 'config/global')
-rw-r--r-- | config/global/download.in | 45 |
1 files changed, 45 insertions, 0 deletions
diff --git a/config/global/download.in b/config/global/download.in index fc79400e..89b05cea 100644 --- a/config/global/download.in +++ b/config/global/download.in @@ -132,4 +132,49 @@ config MIRROR_BASE_URL endif # USE_MIRROR +config VERIFY_DOWNLOAD_DIGEST + bool "Verify download digests (checksums)" + default y + +if VERIFY_DOWNLOAD_DIGEST + +choice + prompt "Digest algorithm" + +config VERIFY_DOWNLOAD_DIGEST_SHA512 + bool "SHA-512" + +config VERIFY_DOWNLOAD_DIGEST_SHA256 + bool "SHA-256" + +config VERIFY_DOWNLOAD_DIGEST_SHA1 + bool "SHA-1" + +config VERIFY_DOWNLOAD_DIGEST_MD5 + bool "MD5" + +endchoice + +config VERIFY_DOWNLOAD_DIGEST_ALG + string + default "md5" if VERIFY_DOWNLOAD_DIGEST_MD5 + default "sha1" if VERIFY_DOWNLOAD_DIGEST_SHA1 + default "sha256" if VERIFY_DOWNLOAD_DIGEST_SHA256 + default "sha512" if VERIFY_DOWNLOAD_DIGEST_SHA512 + +endif # VERIFY_DOWNLOAD_DIGEST + +config VERIFY_DOWNLOAD_SIGNATURE + bool "Verify detached signatures" + help + Verify the signatures for the downloads where available. + This requires the public keys for all the packages used in the build + to be imported into a keyring on the build machine. + + Note that the validation will succeed so long as the signature + is known and valid, even if the signature is not trusted! GnuPG + issues a warning in this case, but ultimately reports that validation + succeeded. Check the log file if this is a concern; crosstool-NG + may add an option to verify this more paranoidally later. + endif # ! FORBID_DOWNLOAD |