Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp2600398imu; Sun, 6 Jan 2019 05:37:48 -0800 (PST) X-Google-Smtp-Source: AFSGD/X9i6WImjYIWTAyjlHfnvG1zMgLTZ2KHKYMtOv1q5dctRTCl2DG0dvNl9QOWQ7t1kwctG15 X-Received: by 2002:a62:3888:: with SMTP id f130mr58278594pfa.132.1546781868380; Sun, 06 Jan 2019 05:37:48 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1546781868; cv=none; d=google.com; s=arc-20160816; b=PDLlBhgrFOv7L2nSRpYVi+OZj3VsgozDNS8dFIX3sSZUc6KF7x+esb0XJl1Onk+kkn ypr22EwkNabZNH1V82MT9Zf1UCbzsuCD4fatN5b2Ya0i3e7fF0IGJh+w1YdhCtY1+x4Z 9ChyThdsOakGiuQy+vnd+Az8HZfvKJzKZtdoE0pvxNuy32yQHba0pmY0T+w4a2MRAz98 AMsCkjZ0blT/UsBtPEdpqCbyCN0WZNo/ZVOaZVlzMgPXCc4MNELe3JFZbms5mpiJ9p+V /uzIpwBCOdn4jQczAC91DgLUuTD8D8o0Sxc96T+FD7ktZP6NPjhNx2J3eFhb0nlyYT+s Wzqg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:to:from; bh=pRXqHPNpvOE7vve5DoKq0VHgHgvsGsygjI0eu6oWE9k=; b=rBZegE01BsYE+v4QQhacQlyASHsD3FAaZA+AgyKB/dIYz8aEU+WNf3AJVNp0S+5ZiZ jCiWWnwa8pQIGFCBQnMvaXghZo9rGNZ6SL6GJ01Uzao39d5QoMCqsjcHKGn2Yixsd9+Y GhEZHYD4/vlw3DNf1bptVIy5uh2o5gXFrwL3nqNwQodC/Ukq0G6XBjsOuJ+K8lksfezf LK39d+8703DEXCqMQqSQskvSkX84pmPqSusanWc88pz5ZdEeE/4qJVudjmzXuW8SB/nc je5aAUMh9a/VAtulkzJppW3rzaioXW/AFGgBmO/ddCTGBm4ByFK2irozOjlHwDlAWgnB FjVQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i13si9310413pgi.260.2019.01.06.05.37.32; Sun, 06 Jan 2019 05:37:48 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726431AbfAFNg0 (ORCPT + 99 others); Sun, 6 Jan 2019 08:36:26 -0500 Received: from vmicros1.altlinux.org ([194.107.17.57]:52384 "EHLO vmicros1.altlinux.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726399AbfAFNg0 (ORCPT ); Sun, 6 Jan 2019 08:36:26 -0500 Received: from imap.altlinux.org (imap.altlinux.org [194.107.17.38]) by vmicros1.altlinux.org (Postfix) with ESMTP id A27E772CC6C; Sun, 6 Jan 2019 16:36:23 +0300 (MSK) Received: from beacon.altlinux.org (unknown [185.6.174.98]) by imap.altlinux.org (Postfix) with ESMTPSA id 0A83E4A4A14; Sun, 6 Jan 2019 16:36:23 +0300 (MSK) From: Vitaly Chikunov To: David Howells , Herbert Xu , Mimi Zohar , Dmitry Kasatkin , linux-integrity@vger.kernel.org, keyrings@vger.kernel.org, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [RFC PATCH 0/4] crypto: Add EC-RDSA algorithm Date: Sun, 6 Jan 2019 16:36:04 +0300 Message-Id: <20190106133608.820-1-vt@altlinux.org> X-Mailer: git-send-email 2.11.0 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This patchset changes akcipher api to support ECDSA style signature verification. Augments x509 parser to make it work with EC-RDSA certificates. And finally implements EC-RDSA (GOST 34.10) signature verification. It is intended to use in IMA for appraisal. Tested on x86_64 with openssl+gost-engine generated certificates. Vitaly Chikunov (4): X.509: Parse public key parameters from x509 for akcipher akcipher: Introduce verify2 for public key algorithms KEYS: set correct flags for keyctl if encrypt is not supported crypto: Add EC-RDSA algorithm crypto/Kconfig | 63 ++-- crypto/Makefile | 5 +- crypto/asymmetric_keys/public_key.c | 74 +++-- crypto/asymmetric_keys/x509.asn1 | 2 +- crypto/asymmetric_keys/x509_cert_parser.c | 51 ++- crypto/ecc.c | 421 +++++++++++++++++++++++-- crypto/ecc.h | 162 +++++++++- crypto/ecc_curve_defs.h | 15 - crypto/ecrdsa.c | 494 ++++++++++++++++++++++++++++++ crypto/testmgr.c | 5 + crypto/testmgr.h | 3 + include/crypto/akcipher.h | 87 +++++- include/crypto/public_key.h | 4 + include/linux/oid_registry.h | 18 ++ 14 files changed, 1319 insertions(+), 85 deletions(-) create mode 100644 crypto/ecrdsa.c -- 2.11.0