Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp751333imu; Thu, 13 Dec 2018 04:00:40 -0800 (PST) X-Google-Smtp-Source: AFSGD/UF9EMLgDUx82RqWH70cGTy+j1jYzAXVNhaKqKPs/hoBsB3W3rUIhvjFw8yaD5OqBgbol4Y X-Received: by 2002:a62:e044:: with SMTP id f65mr23598427pfh.208.1544702440107; Thu, 13 Dec 2018 04:00:40 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1544702440; cv=none; d=google.com; s=arc-20160816; b=vnToeovOa91R3IhbD4jMkCCVs1VeFUMvDIozUY4bW75kJaaa1SfmZVWyGC6cQPdN+c JFqDtQGRGyVl7AImD1WMxuJzNkBCT3D8xWo1GZIoct2GeVUm1mT+SuVW6EB87SGCwmdq 1IxWUa4WF6m+FSXODs7K41mGhsJAYfh02bpfSmUnKfKOhXaxm2tM7JKNTUe4qbOCr/Xb PQTCf43r/VI0zNgWZBn/G/raslRBNoxfEuUHLVZK8LoVzncd75aow6O9m/jmi3Wy2Pv5 stzWPPSSRU9BQl/efBhtd2l59m5rZoVkKhyuw4pKrPuzTJhJTvRWW1YWh+XKVNyeBhe+ fawQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:mail-followup-to :message-id:subject:cc:to:from:date; bh=BKA1gKJGgRBm7ZII3TQ9K/7yHiZ0BNiBFeaSrd/1ovo=; b=cKuBr1mMmHE/n3wu88GQhio089yfMIMdX2m1TiONzM501/SUboGJ6unwfqA/MPKL8Q KqW3wS9k2FJWVATIr3V+fiG5WpkK2VqLAkHdsVneevzCuBDHxsNWr1A0RlfTpLQbexfO MBQ+3mu/NdvPbtp+a8d4oZLQ/yK8WFKXl6SKmZNBMa5RvJk7qrR37wGLj/H9CvL4R9Hg 2n1FR19kb3NWhnIHUHsKmQvDSd/CxWo6/eiJ/q/Y+M8SQ85H+5PueHspKB1wZ1xMJAc3 /kfswHcrvyDz2Eh/8McBL+eoK48DOEgxdVLayH99w8VuLADRKs89QSGo+LtkJod79YyC 1CKw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b21si1547822pfb.89.2018.12.13.04.00.24; Thu, 13 Dec 2018 04:00:40 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728811AbeLML6P (ORCPT + 99 others); Thu, 13 Dec 2018 06:58:15 -0500 Received: from vmicros1.altlinux.org ([194.107.17.57]:40572 "EHLO vmicros1.altlinux.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728733AbeLML6P (ORCPT ); Thu, 13 Dec 2018 06:58:15 -0500 Received: from imap.altlinux.org (imap.altlinux.org [194.107.17.38]) by vmicros1.altlinux.org (Postfix) with ESMTP id 9910672CC6C; Thu, 13 Dec 2018 14:58:12 +0300 (MSK) Received: from sole.flsd.net (sole.flsd.net [185.75.180.6]) by imap.altlinux.org (Postfix) with ESMTPSA id 5D4174A4A14; Thu, 13 Dec 2018 14:58:12 +0300 (MSK) Date: Thu, 13 Dec 2018 14:58:12 +0300 From: Vitaly Chikunov To: Tudor.Ambarus@microchip.com Cc: dhowells@redhat.com, herbert@gondor.apana.org.au, davem@davemloft.net, keyrings@vger.kernel.org, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, linux-integrity@vger.kernel.org Subject: Re: [RFC PATCH] akcipher: Introduce verify2 for public key algorithms Message-ID: <20181213115811.22ebsv6y6vqclfrz@sole.flsd.net> Mail-Followup-To: Tudor.Ambarus@microchip.com, dhowells@redhat.com, herbert@gondor.apana.org.au, davem@davemloft.net, keyrings@vger.kernel.org, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, linux-integrity@vger.kernel.org References: <20181211165938.1150-1-vt@altlinux.org> MIME-Version: 1.0 Content-Type: text/plain; charset=koi8-r Content-Disposition: inline In-Reply-To: User-Agent: NeoMutt/20171215-106-ac61c7 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Tudor, On Thu, Dec 13, 2018 at 10:26:53AM +0000, Tudor.Ambarus@microchip.com wrote: > > On 12/11/2018 06:59 PM, Vitaly Chikunov wrote: > > Current akcipher .verify() just decrypts signature to uncover message > > hash, which is then verified in upper level public_key_verify_signature > > by memcmp with the expected signature value, which is never passed into > > verify(). > > > > This approach is incompatible with ECDSA algorithms, because, to verify > > I would love to have ECDSA in kernel but unfortunately it hasn't reached kernel > because there is no in-kernel user for it. Do we have an agreement that we will > add support for it? If not, who will benefit of these patches? I will post patchset for EC-RDSA support (which is slightly different from ECDSA, but is the same algorithm family). This is intended for use in IMA. Even though EC-RDSA is different from ECDSA it will require the same changes that I propose in these RFCs. Basically, after EC-RDSA is implemented and hooked into IMA it will be much easier to implement ECDSA. An additional use case is future possibility to implement other signature schemes out of tree, which is currently not possible because API is very RSA-centric. Thanks, > > Thanks, > ta