From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from shymkent.ilbers.de ([unix socket]) by shymkent (Cyrus 2.5.10-Debian-2.5.10-3+deb9u2) with LMTPA; Thu, 09 Oct 2025 16:46:33 +0200 X-Sieve: CMU Sieve 2.4 Received: from mail-il1-f188.google.com (mail-il1-f188.google.com [209.85.166.188]) by shymkent.ilbers.de (8.15.2/8.15.2/Debian-8+deb9u1) with ESMTPS id 599EkV0u013530 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT) for ; Thu, 9 Oct 2025 16:46:32 +0200 Received: by mail-il1-f188.google.com with SMTP id e9e14a558f8ab-42f911a1984sf47357655ab.0 for ; Thu, 09 Oct 2025 07:46:32 -0700 (PDT) ARC-Seal: i=3; a=rsa-sha256; t=1760021186; cv=pass; d=google.com; s=arc-20240605; b=YZQtUAsKzGK3r1nU4pWGAjl+gCVm7COu3r5InGLOMFnpMZ1iS3pWRlcaM+WMQsihyp Ezl3LtZjp2yusxNA1fpmohJCGwF2bHVtKisyYU9cH7IL20/GCGdZ4E3qcDGHklMuCEw+ miR8na/n5xYNKc8FlkBngs2pMtWtPHwpZMCD0kDUY8LticCbCg1QJZIXVOa4ZPqEQ/JD 6kbnt1RFism8qlsRRxdqmb0yXvvTKYf+NhVZRcsxBBmcixSH8U9bFYfJLY6VTeKXAwgG o5t/PMnwufLwK+YpYP6qo7WNWdBbWeS+CjtFpSzpaFBxlsq5NJ80xbnXwtqqK1GB0CoL Op0g== ARC-Message-Signature: i=3; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20240605; h=list-unsubscribe:list-subscribe:list-archive:list-help:list-post :list-id:mailing-list:precedence:reply-to:mime-version :content-transfer-encoding:content-id:user-agent:content-language :accept-language:in-reply-to:references:message-id:date:thread-index :thread-topic:subject:cc:to:from:dkim-signature; bh=6n2zLGdvK3D7FiXcC4sxMly7R5090XRpvJfOjK6nn0w=; fh=MAPTiqghXybCWOUzt517NRSogxhXw2btthCMBDpzztE=; b=KOLKiDOTg4cOK/GvKR+OdXVZSaheF6WB4+3BNAUklv37tu5KEq8J0dsS3MbFAsJsxh LBwRmKGaM3OWwauKk9wgjWkjHJNEeBE1IG+ZBEDwB+LR4Yo2cQ1FzneM2LyXMUjoDjvq SUyooWcfHIr3xZ1Ulkdg1PUHxAsAOmnyuDs5lruIM56EfsezU9ZU8iXqzJORxKu8u0GG /hyfX86NIZOUumJ2YipJ5ccV9BIm3ld6h4pUPXbREO+D7mcrLprpNYFuLNHtCm6pwgM0 q8pGfCtRSRtgaGhZifmotMVaKVF9Kj+x12oPnUtvb1GSZegUtYCnkuNpAJjAiPvpr4hE wTTg==; darn=ilbers.de ARC-Authentication-Results: i=3; gmr-mx.google.com; dkim=pass header.i=@siemens.com header.s=selector2 header.b="ZaxUYh/M"; arc=pass (i=1 spf=pass spfdomain=siemens.com dkim=pass dkdomain=siemens.com dmarc=pass fromdomain=siemens.com); spf=pass (google.com: domain of felix.moessbauer@siemens.com designates 2a01:111:f403:c20f::7 as permitted sender) smtp.mailfrom=felix.moessbauer@siemens.com; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=siemens.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=googlegroups.com; s=20230601; t=1760021186; x=1760625986; darn=ilbers.de; h=list-unsubscribe:list-subscribe:list-archive:list-help:list-post :list-id:mailing-list:precedence:reply-to :x-original-authentication-results:x-original-sender:mime-version :content-transfer-encoding:content-id:user-agent:content-language :accept-language:in-reply-to:references:message-id:date:thread-index :thread-topic:subject:cc:to:from:from:to:cc:subject:date:message-id :reply-to; bh=6n2zLGdvK3D7FiXcC4sxMly7R5090XRpvJfOjK6nn0w=; b=XqvZOgt41/dzkwZ7eNk/ablpTDgZC3noKyxd0GK82amHRGY1onvI+HxCc/qppQm30k yy8vp1da8gtYWAjJweLDAy4RdqBsXMunrBcqy1h/Uvh2KDqZMCSxp5QdGgmLYHL37wO5 Z3dN45jwRUJPfQrvDQD8cpISfkx/DtpqaOAtfx6cyXl07qZVPNUdabdlyqjNw94i2k1m P979wZP+koQb4AbtPK0dGy1uE9Hz+JSkXeYn0MAf9qOh0+8HTyLG5SeyGN7jwdmkT1EV GY0k8oNh+PpjbWMbL5GEN08AHxj8LW+v19EioKhzDRNYQpcIr1SZMJ1MsHCPXwNYPlzX 4z+w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1760021186; x=1760625986; h=list-unsubscribe:list-subscribe:list-archive:list-help:list-post :x-spam-checked-in-group:list-id:mailing-list:precedence:reply-to :x-original-authentication-results:x-original-sender:mime-version :content-transfer-encoding:content-id:user-agent:content-language :accept-language:in-reply-to:references:message-id:date:thread-index :thread-topic:subject:cc:to:from:x-beenthere:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=6n2zLGdvK3D7FiXcC4sxMly7R5090XRpvJfOjK6nn0w=; b=DSQVu2CnX825PgCQZKuzC84BvQW8fG3Ul8+5+3RG++seckSq9D06oGq9Qg4L2DjRZN Z0xWv/AAU2dz7r95Y9mo+/bOURsbyvKslsML5P39xQwo68HHcR0vgeUtQ7r0kW7LhP2M 2HxP3eb/lfXlHf8QOaDa6gRp0g1Xzo3FYBI94Elg/vATxpFJeDFxN25UPUZVD3fPe/Gm ldNAl8VK8UmtrGwda3Rl/56iERyNWSxHFruiOvOV5ip7dIh3TtXD0+/PB6S1MNUE9vxe 9OrWZ6TslSe/eWJ+vVx483eAxEUXYbqZ1JO7D9zuXxbFySVzXRJz1KoYkLjaZvLB0NH4 W9lw== X-Forwarded-Encrypted: i=3; AJvYcCXhDWq0Ly+W+DHwRbtybtO+/temNMANx846KRkCgVPrLz0+EzqJGEBX7J+m1QIaKGqX2Btw@ilbers.de X-Gm-Message-State: AOJu0YxsPotAvD7R1/Y/pMc6AOun8CZxEE4++nXl3tQb3tF1+GQg1dCU SpNeG82YDPkpSxCdYhW277j6/Hj6zq/b1M98UB8dzQwgG0pCZkZ+8FLG X-Google-Smtp-Source: AGHT+IGorJVDkCZBi5SQ4nrUug8OVQUUlYnyLU91t4iL5h+FaDyp1HNVKFb6YlBK2fyWZYFYBwIZkQ== X-Received: by 2002:a05:6e02:3d84:b0:42f:8b46:bc56 with SMTP id e9e14a558f8ab-42f8b46bf2amr63660335ab.25.1760021185884; Thu, 09 Oct 2025 07:46:25 -0700 (PDT) X-BeenThere: isar-users@googlegroups.com; h="ARHlJd66PSmWfNNP/yjDWYOBJjY6jKzDJUzhl43uuRsLsjTk3g==" Received: by 2002:a92:ce90:0:b0:424:2e6a:bc5b with SMTP id e9e14a558f8ab-42f90ab0b7cls10524535ab.1.-pod-prod-05-us; Thu, 09 Oct 2025 07:46:24 -0700 (PDT) X-Received: by 2002:a05:6602:3f8b:b0:92c:c80:dc61 with SMTP id ca18e2360f4ac-93bd1831bb2mr890837039f.1.1760021184553; Thu, 09 Oct 2025 07:46:24 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1760021184; cv=pass; d=google.com; s=arc-20240605; b=IWbMYtVyT25dAm5erGrRxQZAmedSok3ZeIiERsnBDE3gH5HXEnZBPr1Dxu148vF0nL 29gfHprh7Q1d1og5rqosR7vf9siD2B9kBewrimxDJAIAcXY7X9GJE7praLtTzT46DMDH +uANhy9G4opqqkk4nRQ20rTcV8ntdYQpqXkUjYzgQhF6Utv8ZabVQu0+94DJQJAanad2 E2Ijf2HHOBCI65tbjdxurWc4Wyyv1FLWSWQanJNX1LT9SHCdubSijiV28BGBZyoaKkPQ v3Ik8pM4T8c73o1xpTUmmFaNx1GhJRmkaUeTsBb5PR3K8+nGjBhwbNmdLdKNYTWGuotu 7Ung== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20240605; h=mime-version:content-transfer-encoding:content-id:user-agent :content-language:accept-language:in-reply-to:references:message-id :date:thread-index:thread-topic:subject:cc:to:from:dkim-signature; bh=jYfkLahvDds34fPwdmfedf4MdGiHjkF6uWwAZdneJXI=; fh=yypBr7k507m29YLO27Q55P5V5TF+B9KSV6zw24GBRb4=; b=O0IY91jptKlEfriZaEW1440E9Sp6dAaxf00OyxSzVO1qYCM1CUuQi1HxwTru2DmF7V Tw+/plmELfw2YpawBSDaLc4cd+RuWiRS/rFrdCYlo57BaJE3BMIHavezzkZPfiWxUS0Y R6Nn1tWLB6t0WV6DiPQNtVPNTdTtiH8+ovKt6uEX9WJigFZTrGJac5P6DICXtpzrZw1E irycIBXXi1ZqVHgsJfP6WH588q01czd0LAUXYIoT+DtMImwdaPIsixx4BnCKrHxuy32d QUxmVfTLyePqJLwTlrEoXhnKX68P/FXvcdsFNj5KWIFDgnrOWrwm8lTTyCOolNamGhHt pTRA==; dara=google.com ARC-Authentication-Results: i=2; gmr-mx.google.com; dkim=pass header.i=@siemens.com header.s=selector2 header.b="ZaxUYh/M"; arc=pass (i=1 spf=pass spfdomain=siemens.com dkim=pass dkdomain=siemens.com dmarc=pass fromdomain=siemens.com); spf=pass (google.com: domain of felix.moessbauer@siemens.com designates 2a01:111:f403:c20f::7 as permitted sender) smtp.mailfrom=felix.moessbauer@siemens.com; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=siemens.com Received: from OSPPR02CU001.outbound.protection.outlook.com (mail-norwayeastazlp170130007.outbound.protection.outlook.com. [2a01:111:f403:c20f::7]) by gmr-mx.google.com with ESMTPS id ca18e2360f4ac-93bdb31a7easi15024139f.2.2025.10.09.07.46.24 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 09 Oct 2025 07:46:24 -0700 (PDT) Received-SPF: pass (google.com: domain of felix.moessbauer@siemens.com designates 2a01:111:f403:c20f::7 as permitted sender) client-ip=2a01:111:f403:c20f::7; ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=J0yXZZGaF3e44WhozDikwHKZI2+44G8xKnEeNw0EXrGmJkJRrAUeqK3CunVY3OAwiSxGJ9ZfLrUZTjC96DTnBXYKTEsFyk2IfUyYg+KaJN7vqHYFPuG8NE5LCROzX+uVfq3x4ipL+stxK1bQIZtYdYUSOeIWocUVJQRZ/14Mb6uXJYKxN2YM2HT4ZfprWfuveBQGOrHW4v0RHNmGrr6ILncnZAA2jmzkb+61AwbUzaF4Vs2XsxaWtzXvotnf+kOsKPpq/L+q7c57fFtnci0t71QsOdcoOgZGzGAIddjFZBseNFj+/SYI0nqLpm5rgyz/NjpLWgKpiPUsU4LlMploBQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=jYfkLahvDds34fPwdmfedf4MdGiHjkF6uWwAZdneJXI=; b=ZWxmyh6D2NShlnQv2MbcelohqbQTolFFgKLwoFqnbBdhqrH0/K8bXACiRUWQ+mZXCDeauoWzrH0Cjo7b4NAYt2cBiZMUcAqauA2S72A1RpwSthesCfprQlyK8g9l0TJrAj5JbbcLuuUx5/UG0LbYvQ66c+GVHNSwBFsZSA1sCBgMnRVBuD/on/6Ap9WQesEwXHznVYiHTQr8+GQpkNcnc2DHpR0/+KcocGSikkX02wrO/2ihtdiv9GuhMmNpisb0nFwZbYUIsqo8Lm3h6k3/eg8higaWUgwtoop6ycaj+SLiLeJ5Wjp11BMxa/BzJ3XJMFgdneJWgBXe+15+rw4IxA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=siemens.com; dmarc=pass action=none header.from=siemens.com; dkim=pass header.d=siemens.com; arc=none Received: from DU0PR10MB6828.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:10:47f::13) by GV2PR10MB6982.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:150:d5::5) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9203.10; Thu, 9 Oct 2025 14:46:21 +0000 Received: from DU0PR10MB6828.EURPRD10.PROD.OUTLOOK.COM ([fe80::8198:b4e0:8d12:3dfe]) by DU0PR10MB6828.EURPRD10.PROD.OUTLOOK.COM ([fe80::8198:b4e0:8d12:3dfe%4]) with mapi id 15.20.9203.007; Thu, 9 Oct 2025 14:46:20 +0000 From: "'MOESSBAUER, Felix' via isar-users" To: "isar-users@googlegroups.com" , "cedric.hombourger@siemens.com" , "Vadivel, Arulpandiyan" CC: "Kiszka, Jan" Subject: Re: [PATCH] meta-isar: add support to verify sha512 checksum for target image Thread-Topic: [PATCH] meta-isar: add support to verify sha512 checksum for target image Thread-Index: AQHcOR2JOIm4+MYYE0yyYV2ma2nPC7S515gAgAANIAA= Date: Thu, 9 Oct 2025 14:46:20 +0000 Message-ID: <8d487c2c05a0a9b0cdde1b0241642187f001941c.camel@siemens.com> References: <20251009130928.84805-1-arulpandiyan.vadivel@siemens.com> In-Reply-To: Accept-Language: de-DE, en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: user-agent: Evolution 3.56.2-5 x-ms-publictraffictype: Email x-ms-traffictypediagnostic: DU0PR10MB6828:EE_|GV2PR10MB6982:EE_ x-ms-office365-filtering-correlation-id: 8a14bb3c-2c49-40ce-4585-08de07429c7d x-ms-exchange-atpmessageproperties: SA x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0;ARA:13230040|366016|376014|10070799003|1800799024|38070700021; x-microsoft-antispam-message-info: =?utf-8?B?ZGVybFF3c1ExaUcrMDBoeFFMOW9tT3g4QmFSdCszNkFSQU9xSWRsSXpuZUMr?= =?utf-8?B?Snp1blVNRGg0VGFlK3diSmpzRnJmS3AyMlZka2tkUXNCL2JlK0JmZVZTVUQ2?= =?utf-8?B?K2ZMekQrZlFXT1liaHhPQ1NTWXUvRThCdWVWVHpZUm1SLzk1ZndhQkl4bHJI?= =?utf-8?B?ZDFZcU5XS3hpRjRZcFFsRFFKVWIxOFFOY2Vsc3pnSnl4WUs0RE8wb1pKelFV?= =?utf-8?B?VU5ibCtKMUNqTFV5WFFpM0tXTGl3Q1pMcjBnR3RwdWZtME9Nc09XQVdMVWtS?= =?utf-8?B?Ymg0WWtsTkFEWjNnalo0SmJwMVNLTzYzV0VBTkdEU3FPSnh4cUhZdjhBODBJ?= =?utf-8?B?WU1lK094ejkxZWZkdG1IQXYxWE5yTjdIa00yUk1tWkxOaVV1UTYxYWV5eitK?= =?utf-8?B?UENHM2RDODNOcFpvNkUySFpOV1cydnZlMUI1Z3lORWp6UE9YMG84QVlqeUsx?= =?utf-8?B?RWtVTXZmZTBCSEo3aUFGNGVoM1laVTh6K0F3YjVVVWVGa1dBcWxCMUVQeFhK?= =?utf-8?B?czYzdG4vdkhpQU1BMG95RVFwK1Y1TXg2ZFpkWlFSWmlYbjNoVUJra2NhSjEr?= =?utf-8?B?MFFCZnAvVkdPbzhZeVJ5eWtvNk50UjFtRDQ2UVprU2RIS2lPWG5EZVUreDVL?= =?utf-8?B?SEZyL1AyVGlZS3EwTXNISkNmVkthV1RYc1J4UFFmMU5YVmZ0U2ZOaUxYN1Ax?= =?utf-8?B?TEJpcWNRbGlnSXY0YkM2ZFRpNk93VVdIa01JdVh5YVZGZG9mYUo2SjZYVjRV?= =?utf-8?B?UE1tOU8vRzN6eENHbXoxWWlRQVBEVTY1bkp3bm1BZ29pbVRjVmNZVW9zTzRF?= =?utf-8?B?eUZxTVNQMitpeDZWODh6QklWeXVDQWYyWCtJS0pZcEVlNS9qUm5pSEw4ZjZi?= =?utf-8?B?MjJKemVoeDVMVTFHUGd1cGIzc0lKcDdGMVp5bHNEeGltLytmMUtuTDdud3V2?= =?utf-8?B?Yms2OHVvQXhZRFZweU1uSnBaVER4bnZpYzYvb3VVMFN4a1dNcGx4VUhIN0xS?= =?utf-8?B?ODRPRkszdWxmdUkyMkl1aC9CQzR6UUpic1ZCSTYxb2Vtekp3WDVhMHREODVU?= =?utf-8?B?K1hFWnlCOU8zd2JHQTd0Sy9maGdUTzM5Nys4Y2pMcmFUdC9GNFZRMTZES2hz?= =?utf-8?B?eGxEZlZaUFpXbk5URks0eUJvN1ZOVVBwSjVmbXVQS29LNmVOMWFjRWVnRmFz?= =?utf-8?B?MzZlQXdXOTlzUXVvM0tQUVM4VE5IS2xYOERJbEI0blFBd05WRnpSc1IxQkFK?= =?utf-8?B?YTJrd1lLWi9uOTNiQ2JUQ2FkbEhJTU9NaUJzbjl3NU53aUZmc1UwbzdFVHRT?= =?utf-8?B?TkJMeStjYXI4MmN5RXRUNk5xNlRDcTBKZ2Y5bVAzZCtod3VQVjZ4WGZ1L3o0?= =?utf-8?B?ckdxMmhqL2Q0YzZ1b0N4LytyVWtENmVrY1dwNWdobnhVWkJUNW5UOVRVTVhN?= =?utf-8?B?Q3RsTFJUc3ZTc3kxYmdRcHM2ZDZydDBPWDZpU0FENzhVeWRyT0pXZ2RTT0RX?= =?utf-8?B?OFZsNjhMTjlEZkswY2xOU1ZBNk9nWXYwcElBL3laRkMzNXdkbWxwVTMwRmdW?= =?utf-8?B?Wm51MkgrN3J4aXJYdFAwUFNnU01HaVh4aVpIZ2tqQ3V1WThrbjFaSWdXSUth?= =?utf-8?B?cVRrUGgxQU1FOEtIcmxKYlYvMVI4YUpETjliTGt1Z2E2KzQvdVMzLzY0bzNp?= =?utf-8?B?U0xwWGNsbU9vQjF5b0hGY2JYQjBBNzRvaGZwREIvTk9jQ1hxVEJOMUo4amRF?= =?utf-8?B?eTI5cUp4ZC82VFR1QWErckJ1cUdLTnBMM3diWlJMdTYrSFhaYTAxMXVRWVpZ?= =?utf-8?B?SlNnRWthby9rRWRaK2FQMTV3YkgyTk5CVmh5b3pCaW10YXNiYUdlK2o2UFlu?= =?utf-8?B?NTVhZGVTV0RQMmFHdHVJVnQ1akxQTXBENzd1b1BpeVdkTlpuclE1WEMvZGNj?= =?utf-8?B?K1RURnBkUFFwTmQzYVpYWnUvWlgzZVlucG9WeVVSaytsOE1VWkY1d0RYMFVx?= =?utf-8?B?LzBhMkUxdVpRRHRjYk9GbEpibnNGQ3IraGRjNG1jNlY4SVhuZ3diS2NRSk5C?= =?utf-8?Q?pACnSk?= x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU0PR10MB6828.EURPRD10.PROD.OUTLOOK.COM;PTR:;CAT:NONE;SFS:(13230040)(366016)(376014)(10070799003)(1800799024)(38070700021);DIR:OUT;SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?utf-8?B?MnVid2JHMGhOUmFqQTE5eFp5eDcxY3RWYlJXakNqT1JPN1U3dCtJVWFyUVQ3?= =?utf-8?B?dWhHRU02S0FkbUtlYytwNEwrb2p1ckcrd3FuaUtQZEVZRm1mbEJQMlN2RUs5?= =?utf-8?B?am9ZVjVnWVdzR3RiVW9aMm9CcUdzTlRIRjZoRU5BUHdPVEgvSnRHeWI2NkpM?= =?utf-8?B?di9jWi9nQ3dBK1YzdTVCQUVHR0hrekpjT2VnK1hQZVNKakN6Q0l4YTl0cjRn?= =?utf-8?B?WnYwVDRlVmtLT0dlWjk1Y1QwMGppSm5RYVdselFTZ29SWlRja2p1RXNhTFBD?= =?utf-8?B?eVZVN09zbFBFTXpXcWpPTXRVTjFWR0VnSGkrTTIyQlRhajZ4WU80aERYdWpK?= =?utf-8?B?WEVvSU9WM2FNcWdVdDNaVEpyQmthNzdaWUsxZmU3ZTB0MXl5SWxEdnFST3pY?= =?utf-8?B?QU1VTlFla3N4eVVtOEJtdUhmSGFISHBVbXhpbC9paWExSXlUMVJFWlpKS29Q?= =?utf-8?B?cU5kSkJKSUtHZG0ybWp1VU90Q0VKQkdYc3Z4bGFVNG0yUHl6cDNFQkhBaHgy?= =?utf-8?B?MmtFbnpTem5mWThxNzdnZnppbzlQak45dkZnMTdLOEZ4bXp0cyt1Q3NKUGVD?= =?utf-8?B?cW1NbXQ3Mk42b0plNStMdGhVbnBldGNiNFlJU3luSWtRb1NDbEF6ZUJjZEVx?= =?utf-8?B?b0lZVmovSzZOam5XKzdNRkZONU1JU2tYK0Z0SGF2VXNBb3E5K1BoVWJncUwx?= =?utf-8?B?YnkvQUhVdlNFNGxkNjROcDQ3bzFmcER1YnpHQUxpQUNva24xK25lYnJPWmpn?= =?utf-8?B?N01CVks1M1FnQ0NBOTRVWlh2Qjc4cU41ZHl5akNaM3EwY0hqUnptc0VoYU1Z?= =?utf-8?B?anJhdjFPMGxYUjVyZmRsTkZqYkZMN0Rid2dsUitFeVF6d0RnekViMEg1VDgy?= =?utf-8?B?ZjZEcVpxaVphUVF0aE5aYzlGNTJSakpPNXNha2JFUFVIdytIVXFGR0pwelZI?= =?utf-8?B?ZWZBSEVyTGk0OFNEeHl3VzdCSEdNMk5mNDNZOFN0eVRsVmd4b1dCLzdBdkRU?= =?utf-8?B?OGM1UzBRczJaNEhDV01jTDRDemlyZ3ZzZ2tDV0ZFSUg5dVdtUVRVVkRxaS9p?= =?utf-8?B?Y0NEQzRQZHhSVlZsMXZjaDFCN3JqVU1WL21Xa2w3WWtHbE9TWkpHUWNURHZk?= =?utf-8?B?d1VCaFFQbGJPSXJnVDkyeEpGeXozRnQwUmVQNStobGNPZEt6Q292bjFOcDBq?= =?utf-8?B?UHVudll1b1dhYU1mOExHSllyK2hGaXdiTDkrQ2N6LzFhUS9leGRORFRFOW1F?= =?utf-8?B?TC9HQ3RwamNRWkJBamU5WFQyaVdKZUJoZEI4Y1JydTJjZzdBQnArdW1tSStB?= =?utf-8?B?YWN5cTk3YW01cFh5dStWcS9EYkM1WWdWZG1PS3pJaEhFYlZoYkFaOUlJSFky?= =?utf-8?B?eDBISGF3YXI1c3VkS29zbTY2RndVeGRjSHQ5R25PKzZTOTVrZFZIYlNqY2VI?= =?utf-8?B?Z0ljbVdaMitBNjdmZ21BZGJSbDd0dUNxOE1XTUZTbVdhazZPLzgyTDFHRThj?= =?utf-8?B?NHVNNS91TS9nL0ttNDc2MVB0b2wybSsydk9tM3p5SHZET1RlZzN0Vjk5SHkv?= =?utf-8?B?RzAwdnFVR0h2NWViaTAzYy9BYXJXVm9HK2NGUElISFZWNzZ6ZHZQcW8zUUxL?= =?utf-8?B?dkFCdGtXTnR3bVVPelJ5QkdYazV4YS9PTy9OVnA2aHcyb3BhN0FaUm9aT0lq?= =?utf-8?B?TG9zRUV0cDlnTDhmcFlOeWFxT1Nubm1PTjFhbDEydk9wMTBXMGQ1VTlGVUtr?= =?utf-8?B?UW00TU1FdzdaN0pYTkR4WTAvNkJoeUlxdVcwaHYyUU5GRHVsdTFiWlpGNWoy?= =?utf-8?B?UXY5aWhuZlI2Znh4c1FTVEtERjNQTFpXc3d5U2FDMXdMQ0dLVlR3L2w0U0dG?= =?utf-8?B?eUZrOEFudyt0NU1mVTBZVXFGUkxKQ2R0Ry9IejczdW5NUFhzcFUyN3piWXAw?= =?utf-8?B?QkUrMitqY2NUeXArQjF3Tk1QKzRaRkUwQVNjUUViL3VaRTlhTlFCRitHdlJQ?= =?utf-8?B?VndPT3BEWmk5NnMxNW9COFNOb0o0Zmd1eEdvQUViWGdVVXpEazQzMmFOa1lV?= =?utf-8?B?Y29hVFBKRGpoWGd0L1QzbldOOUlXTzJ2R3c1d3B5WDE5cDNTcmFtMHNoblRB?= =?utf-8?B?MGdwcnhYMUlmbjVDb1FWY01oaVJUT2l4R29vQ1hYZkk0K0JKemdDY3ZPdlpI?= =?utf-8?B?MG5XeTJkUlkyVG9xUGRlSGx0Ulg0VkFiV1M0V1M4UTNaei85MEJNL1Vad3Vw?= =?utf-8?Q?HfKFKoCj73ErAeyBgfiZAaWCIkmrPWXbpabNQZtN10=3D?= Content-Type: text/plain; charset="UTF-8" Content-ID: <0755AF0EC8145043923986EEEE535C01@EURPRD10.PROD.OUTLOOK.COM> Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: siemens.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: DU0PR10MB6828.EURPRD10.PROD.OUTLOOK.COM X-MS-Exchange-CrossTenant-Network-Message-Id: 8a14bb3c-2c49-40ce-4585-08de07429c7d X-MS-Exchange-CrossTenant-originalarrivaltime: 09 Oct 2025 14:46:20.7835 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 38ae3bcd-9579-4fd4-adda-b42e1495d55a X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: 8E4+/tn+7yNFpEU7Ch1Bh4csMfXEuSdG7MYYRP2dz4QLSRpgZxjAO4VFsRJHp8LBiaZiKZLmvKlg/53WvZ3x+mC+a4x1NAvxV1LRvKKnvTA= X-MS-Exchange-Transport-CrossTenantHeadersStamped: GV2PR10MB6982 X-Original-Sender: felix.moessbauer@siemens.com X-Original-Authentication-Results: gmr-mx.google.com; dkim=pass header.i=@siemens.com header.s=selector2 header.b="ZaxUYh/M"; arc=pass (i=1 spf=pass spfdomain=siemens.com dkim=pass dkdomain=siemens.com dmarc=pass fromdomain=siemens.com); spf=pass (google.com: domain of felix.moessbauer@siemens.com designates 2a01:111:f403:c20f::7 as permitted sender) smtp.mailfrom=felix.moessbauer@siemens.com; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=siemens.com X-Original-From: "MOESSBAUER, Felix" Reply-To: "MOESSBAUER, Felix" Precedence: list Mailing-list: list isar-users@googlegroups.com; contact isar-users+owners@googlegroups.com List-ID: X-Spam-Checked-In-Group: isar-users@googlegroups.com X-Google-Group-Id: 914930254986 List-Post: , List-Help: , List-Archive: , List-Unsubscribe: , X-Spam-Status: No, score=-4.9 required=5.0 tests=DKIMWL_WL_MED,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,MAILING_LIST_MULTI, RCVD_IN_DNSWL_BLOCKED,RCVD_IN_MSPIKE_H2,RCVD_IN_RP_CERTIFIED, RCVD_IN_RP_RNBL,RCVD_IN_RP_SAFE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on shymkent.ilbers.de X-TUID: oZvGKYr1cboI On Thu, 2025-10-09 at 13:59 +0000, Hombourger, Cedric (FT FDS CES LX) wrote: > On Thu, 2025-10-09 at 18:39 +0530, Arulpandiyan Vadivel wrote: > > In current approach, target images from installer is installed > > without any > > verifications and validations. > > Adding support of verifying image with sha512 checksum before > > installing image > > Currently during the image installation .bmap files also listed in > > the menu. > > Update to show only image name instead of showing supported artifacts > > like .bmap and .sha512. > > Added a class to support generating sha512 checksum for the images. Hi, is there a particular reason why not rely on the checksums in the bmap? These are WAY better than checksums on compressed artifacts and are also correctly checked by the bmap tool (instead of an error prone custom implementation). > >=20 > > Signed-off-by: Arulpandiyan Vadivel > > > > --- > > =C2=A0.../classes/installer-add-rootfs.bbclass=C2=A0=C2=A0=C2=A0=C2=A0= =C2=A0 |=C2=A0 6 +- > > =C2=A0...eploy-image_0.1.bb =3D> deploy-image_0.2.bb} |=C2=A0 2 +- > > =C2=A0.../files/usr/bin/deploy-image-wic.sh=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0=C2=A0=C2=A0 | 56 > > ++++++++++++++++++- > > =C2=A0meta/classes/image-checksum.bbclass=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0= =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 | 14 +++++ > > =C2=A0meta/classes/image.bbclass=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0= |=C2=A0 1 + > > =C2=A05 files changed, 76 insertions(+), 3 deletions(-) > > =C2=A0rename meta-isar/recipes-installer/deploy-image/{deploy-image_0.1= .bb > > =3D> deploy-image_0.2.bb} (96%) > > =C2=A0create mode 100644 meta/classes/image-checksum.bbclass > >=20 > > diff --git a/meta-isar/classes/installer-add-rootfs.bbclass b/meta- > > isar/classes/installer-add-rootfs.bbclass > > index c738f690..185e4a3c 100644 > > --- a/meta-isar/classes/installer-add-rootfs.bbclass > > +++ b/meta-isar/classes/installer-add-rootfs.bbclass > > @@ -19,7 +19,7 @@ IMAGE_DATA_POSTFIX ??=3D "wic.zst" > > =C2=A0IMAGE_DATA_POSTFIX:buster ??=3D "wic.xz" > > =C2=A0IMAGE_DATA_POSTFIX:bullseye ??=3D "wic.xz" > > =C2=A0 > > -ROOTFS_ADDITIONAL_FILES ??=3D "installer-target installer-target-bmap" > > +ROOTFS_ADDITIONAL_FILES ??=3D "installer-target installer-target-bmap > > installer-target-sha512" > > =C2=A0 > > =C2=A0def get_installer_source(d, suffix): > > =C2=A0=C2=A0=C2=A0=C2=A0 installer_target_image =3D d.getVar('INSTALLER= _TARGET_IMAGE') or > > "" > > @@ -49,4 +49,8 @@ ROOTFS_ADDITIONAL_FILE_installer- > > target[destination] =3D "${@ get_installer_destin > > =C2=A0ROOTFS_ADDITIONAL_FILE_installer-target-bmap[source] =3D "${@ > > get_installer_source(d, "wic.bmap")}" > > =C2=A0ROOTFS_ADDITIONAL_FILE_installer-target-bmap[destination] =3D "${= @ > > get_installer_destination(d, "wic.bmap")}" > > =C2=A0 > > +# Add support for SHA512 checksum files > > +ROOTFS_ADDITIONAL_FILE_installer-target-sha512[source] =3D "${@ > > get_installer_source(d, d.getVar('IMAGE_DATA_POSTFIX') + '.sha512')}" > > +ROOTFS_ADDITIONAL_FILE_installer-target-sha512[destination] =3D "${@ > > get_installer_destination(d, d.getVar('IMAGE_DATA_POSTFIX') + > > '.sha512')}" > > + > > =C2=A0do_rootfs_install[mcdepends] +=3D "${@ get_mc_depends(d, > > "do_image_wic")}" > > diff --git a/meta-isar/recipes-installer/deploy-image/deploy- > > image_0.1.bb b/meta-isar/recipes-installer/deploy-image/deploy- > > image_0.2.bb > > similarity index 96% > > rename from meta-isar/recipes-installer/deploy-image/deploy- > > image_0.1.bb > > rename to meta-isar/recipes-installer/deploy-image/deploy- > > image_0.2.bb > > index b287a8d1..0259a5af 100644 > > --- a/meta-isar/recipes-installer/deploy-image/deploy-image_0.1.bb > > +++ b/meta-isar/recipes-installer/deploy-image/deploy-image_0.2.bb > > @@ -1,5 +1,5 @@ > > =C2=A0# This software is a part of ISAR. > > -# Copyright (C) Siemens AG, 2024 > > +# Copyright (C) Siemens AG, 2025 > > =C2=A0# > > =C2=A0# SPDX-License-Identifier: MIT > > =C2=A0 > > diff --git a/meta-isar/recipes-installer/deploy- > > image/files/usr/bin/deploy-image-wic.sh b/meta-isar/recipes- > > installer/deploy-image/files/usr/bin/deploy-image-wic.sh > > index 333762f1..963f5756 100755 > > --- a/meta-isar/recipes-installer/deploy-image/files/usr/bin/deploy- > > image-wic.sh > > +++ b/meta-isar/recipes-installer/deploy-image/files/usr/bin/deploy- > > image-wic.sh > > @@ -10,11 +10,65 @@ SCRIPT_DIR=3D$( dirname -- "$( readlink -f -- "$0"; > > )"; ) > > =C2=A0 > > =C2=A0. "${SCRIPT_DIR}/../lib/deploy-image-wic/handle-config.sh" > > =C2=A0 > > +verify_checksum() { > > +=C2=A0=C2=A0=C2=A0 checksum_file=3D"$1" > > +=C2=A0=C2=A0=C2=A0 hash_image_file=3D"$2" > > + > > +=C2=A0=C2=A0=C2=A0 # Get the extension from the checksum file > > +=C2=A0=C2=A0=C2=A0 algorithm=3D$(echo "$checksum_file" | awk -F. '{pri= nt $NF}') > > + > > +=C2=A0=C2=A0=C2=A0 #Read the expected checksum > inconsistency (missing space after #) >=20 > > +=C2=A0=C2=A0=C2=A0 expected_checksum=3D$(cut -d' ' -f1 "$checksum_file= ") > > + > > +=C2=A0=C2=A0=C2=A0 # Check if the checksum file was empty > > +=C2=A0=C2=A0=C2=A0 if [[ -z "$expected_checksum" ]]; then > > +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 dialog --msgbox "Error: Che= cksum file is empty or > > unreadable, Installation aborted." 6 60 > > +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 exit 1 > > +=C2=A0=C2=A0=C2=A0 fi > > + > > +=C2=A0=C2=A0=C2=A0 # Calculate the current checksum of the file > > +=C2=A0=C2=A0=C2=A0 local current_checksum > > +=C2=A0=C2=A0=C2=A0 case "$algorithm" in > > +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 sha512) > could easily be changed to sha512|sha256|md5 > > +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 cur= rent_checksum=3D$("${algorithm}sum" "$hash_image_file" >=20 > this may take a while, use dialog to let the user abort the > verification while running in the background? or ask upfront if > integrity of the image should be checked (only if checksum files were > found) >=20 > also sha512sum -c may be used and would greatly simply this function I'm wondering why you decided to use sha512 which is super slow. The checksums anyways just protect against bitflips as the checksum files are not signed. By that, a much faster checksum like sha1 or sha256 can be used as well. >=20 > > | awk '{print $1}') > > +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 ;; > > +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 *) > > +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 dia= log --msgbox "Error: Unsupported > > algorithm($algorithm), Installation aborted." 6 60 > > +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 exi= t 1 > > +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 ;; > > +=C2=A0=C2=A0=C2=A0 esac > > + > > +=C2=A0=C2=A0=C2=A0 # Compare the checksums > this comment does not add any value > > +=C2=A0=C2=A0=C2=A0 if [[ "$current_checksum" =3D=3D "$expected_checksu= m" ]]; then > > +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 echo "Checksum validation s= uccess for $checksum_file and > > $hash_image_file" > > +=C2=A0=C2=A0=C2=A0 else > > +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 dialog --msgbox "Error: Che= cksum validation failure for > > $checksum_file and $hash_image_file, Installation aborted." 6 60 > > +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 exit 1 > I would not mix backend and UI code in the same function. Return well > defined error codes and display error messages in your UI code > > +=C2=A0=C2=A0=C2=A0 fi > > +} > > + > > +hash_files_uri=3D$(find "$installdata" -type f -iname "*.sha512") >=20 > you have above a mechanism to handle various algorithms but only sha512 > is considered here >=20 > > +if [ -n "$hash_files_uri" ]; then > > +=C2=A0=C2=A0=C2=A0 for hash_file in $hash_files_uri; do > > +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 # extract the checksum / bm= ap file from signed files name > > +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 hash_image_file=3D"${hash_f= ile%.*}" > > +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 if [ -f "$hash_image_file" = ] && [ -f "$hash_file" ]; then > > +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 ver= ify_checksum "$hash_file" "$hash_image_file" > > +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 else > > +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 dia= log --msgbox "[ERROR] Checksum file or image file is > > missing! Installation aborted" 6 60 > > +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 exi= t 1 > > +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 fi > > +=C2=A0=C2=A0=C2=A0 done > > +else > > +=C2=A0=C2=A0=C2=A0 dialog --msgbox "Error: No checksum file(s) found f= or image > > artifacts, Installation aborted." 6 60 > > +=C2=A0=C2=A0=C2=A0 exit 1 >=20 > this should only be fatal if the installer was configured to generate > checksum files along image artifacts and if there are not there but > only in that case! What would be valuable is to encode the checksum either in the initrd or a dm-verity container to sign this externally. By that, we could ensure that only "allowed" artifacts can be deployed. But then the question still remains, why not simply use a dm-verity container for cryptographic integrity and the bmap checksums to check if the artifact is written correctly. >=20 > > +fi > > + > > =C2=A0if ! $installer_unattended; then > > =C2=A0=C2=A0=C2=A0=C2=A0 installer_image_uri=3D$(find "$installdata" -t= ype f -iname > > "*.wic*" -a -not -iname "*.wic.bmap" -exec basename {} \;) > > =C2=A0=C2=A0=C2=A0=C2=A0 if [ -z "$installer_image_uri" ] || [ ! -f > > "$installdata/$installer_image_uri" ]; then > > =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 pushd "$installdata" > > -=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 for f in $(find . -type f);= do > > +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 for f in $(find . -type f -= iname "*.wic.zst" -exec basename > > {} \;); do > > =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0 array+=3D("$f" "$f") > > =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 done > > =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 popd > > diff --git a/meta/classes/image-checksum.bbclass > > b/meta/classes/image-checksum.bbclass > > new file mode 100644 > > index 00000000..673235a0 > > --- /dev/null > > +++ b/meta/classes/image-checksum.bbclass > > @@ -0,0 +1,14 @@ > > +# This software is a part of ISAR. > > +# Copyright (C) 2025 Siemens AG > > +# > > +# SPDX-License-Identifier: MIT > > + > > +do_generate_checksum() { > > +=C2=A0=C2=A0=C2=A0 cd ${DEPLOY_DIR_IMAGE} > > +=C2=A0=C2=A0=C2=A0 for postfix in ${IMAGE_FSTYPES}; do > > +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 [ -f "${IMAGE_FULLNAME}.$po= stfix" ] || continue > > +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 sha512sum "${IMAGE_FULLNAME= }.$postfix" > > > "${IMAGE_FULLNAME}.$postfix.sha512" > > +=C2=A0=C2=A0=C2=A0 done > > +} > > + > > +do_image_wic[postfuncs] +=3D "do_generate_checksum" > > diff --git a/meta/classes/image.bbclass b/meta/classes/image.bbclass > > index bd1b8552..57216014 100644 > > --- a/meta/classes/image.bbclass > > +++ b/meta/classes/image.bbclass > > @@ -141,6 +141,7 @@ IMAGE_CLASSES ??=3D "" > > =C2=A0IMGCLASSES =3D "imagetypes imagetypes_wic imagetypes_vm > > imagetypes_container squashfs" > > =C2=A0IMGCLASSES +=3D "${IMAGE_CLASSES}" > > =C2=A0inherit ${IMGCLASSES} > > +inherit image-checksum > not sure we want to always generate checksums (e.g. for development > builds, I don't need or want them but would for release builds) > > =C2=A0 > > =C2=A0# convenience variables to be used by CMDs > > =C2=A0IMAGE_FILE_HOST =3D "${DEPLOY_DIR_IMAGE}/${IMAGE_FULLNAME}.${type= }" >=20 > While I believe the feature being added would be useful, I think we > should make it an opt-in and ensure that no changes are introduced in > builds that do not require or want the feature I would like to clarify the requirements first, mainly by defining a threat model. Felix >=20 > tests using the Isar test suite are also missing. --=20 Siemens AG Linux Expert Center Friedrich-Ludwig-Bauer-Str. 3 85748 Garching, Germany --=20 You received this message because you are subscribed to the Google Groups "= isar-users" group. To unsubscribe from this group and stop receiving emails from it, send an e= mail to isar-users+unsubscribe@googlegroups.com. To view this discussion visit https://groups.google.com/d/msgid/isar-users/= 8d487c2c05a0a9b0cdde1b0241642187f001941c.camel%40siemens.com.