Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp700218yba; Thu, 18 Apr 2019 08:10:50 -0700 (PDT) X-Google-Smtp-Source: APXvYqzRGEbO4N5Mbs32Qr0BydU9vFH2xm9++mKGAvWjmCTEZRY7xjqHF1iZ1Mdg+go7QliJm2MK X-Received: by 2002:a63:360c:: with SMTP id d12mr84892949pga.404.1555600250411; Thu, 18 Apr 2019 08:10:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1555600250; cv=none; d=google.com; s=arc-20160816; b=UOoPdMyuiEoC2/OHbiLlmLvxXxaH3BG19g/pYxZ4vuv4AtUMHsxuoYIlhxxqiUl1Z3 fZ+ri6dIr+oJp2T9p+H8b7tmM6yVjwKyoykHs7v+0XHnK/CTXSdLkrokTDkjiv8Wi7rx HKaKKRoLWP/Cfz+bVEV0aMmX4Dt5a34Z6yL2PCDbPOn2sn3QZnOWEWDonJSZx0PbAXt1 +lEkHD3Y3IR83SARjmJzKb+P6H1QolpECRCDzNNmlFNAnI1R3byZgP3JMaE76q8jz1tk 6X0CITW6lE2zE1nGvqxiexlNL8cGP3naw8Kr4w+Jgxpm4rmiGZHQ9VCKeT8geyESLZo2 Bsng== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=UN0OWvZK9IKTqsT10Jz98k0fBIHJpbzOz8+B/JyTexA=; b=Oa5ACkQLMUE9NIEEbmhxbcYsmzyHuqIqBmaFVpOKCDWRHcHBMAqh9EQ7Q2ASWv8MiW +jK1XkjPRSyFoI46pckUDZS6Kn+Rlw70hMM6qg+ULkosd8KYsW3qi8S9r4hr8577KrbS 6XoVe6vUtpvApAxWo5Vqw1Jn1o4iEgUmM/bh0duYpusSydpcVsetrBBunkR2UTy8825N kd95yDvq+BMeozKHzjwmCFJdhtNcyeGtg2vyPc+4dbLDjJlZ2Pk+53i8zZwWX6flGSyx tepkHIZzyljWWAqIPXClPzal8+SXymvxMeoJbFKOgwhvNfCEsaiHbUWz+GXEuU824CVq 3+CQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d17si2023912pgh.7.2019.04.18.08.10.35; Thu, 18 Apr 2019 08:10:50 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389453AbfDRPIG (ORCPT + 99 others); Thu, 18 Apr 2019 11:08:06 -0400 Received: from [5.180.42.13] ([5.180.42.13]:55618 "EHLO deadmen.hmeau.com" rhost-flags-FAIL-FAIL-OK-FAIL) by vger.kernel.org with ESMTP id S2388392AbfDRPIF (ORCPT ); Thu, 18 Apr 2019 11:08:05 -0400 X-Greylist: delayed 2566 seconds by postgrey-1.27 at vger.kernel.org; Thu, 18 Apr 2019 11:08:01 EDT Received: from gondobar.mordor.me.apana.org.au ([192.168.128.4] helo=gondobar) by deadmen.hmeau.com with esmtps (Exim 4.89 #2 (Debian)) id 1hH7yO-0004lu-Ec; Thu, 18 Apr 2019 22:25:08 +0800 Received: from herbert by gondobar with local (Exim 4.89) (envelope-from ) id 1hH7yL-0004DA-RF; Thu, 18 Apr 2019 22:25:05 +0800 Date: Thu, 18 Apr 2019 22:25:05 +0800 From: Herbert Xu To: Vitaly Chikunov Cc: David Howells , Mimi Zohar , Dmitry Kasatkin , linux-integrity@vger.kernel.org, keyrings@vger.kernel.org, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v9 00/10] crypto: add EC-RDSA (GOST 34.10) algorithm Message-ID: <20190418142505.tkd4bgf76imzuu3g@gondor.apana.org.au> References: <20190411155122.13245-1-vt@altlinux.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190411155122.13245-1-vt@altlinux.org> User-Agent: NeoMutt/20170113 (1.7.2) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Apr 11, 2019 at 06:51:12PM +0300, Vitaly Chikunov wrote: > > Vitaly Chikunov (10): > crypto: akcipher - default implementations for request callbacks > crypto: rsa - unimplement sign/verify for raw RSA backends > crypto: akcipher - new verify API for public key algorithms > KEYS: do not kmemdup digest in {public,tpm}_key_verify_signature > X.509: parse public key parameters from x509 for akcipher > crypto: Kconfig - create Public-key cryptography section > crypto: ecc - make ecc into separate module > crypto: ecrdsa - add EC-RDSA (GOST 34.10) algorithm > crypto: ecrdsa - add EC-RDSA test vectors to testmgr > integrity: support EC-RDSA signatures for asymmetric_verify > > crypto/Kconfig | 63 ++-- > crypto/Makefile | 10 +- > crypto/akcipher.c | 14 + > crypto/asymmetric_keys/asym_tpm.c | 43 +-- > crypto/asymmetric_keys/public_key.c | 105 ++++--- > crypto/asymmetric_keys/x509.asn1 | 2 +- > crypto/asymmetric_keys/x509_cert_parser.c | 57 +++- > crypto/ecc.c | 417 +++++++++++++++++++++++++- > crypto/ecc.h | 153 +++++++++- > crypto/ecc_curve_defs.h | 15 - > crypto/ecrdsa.c | 296 ++++++++++++++++++ > crypto/ecrdsa_defs.h | 225 ++++++++++++++ > crypto/ecrdsa_params.asn1 | 4 + > crypto/ecrdsa_pub_key.asn1 | 1 + > crypto/rsa-pkcs1pad.c | 33 +- > crypto/rsa.c | 109 ------- > crypto/testmgr.c | 80 +++-- > crypto/testmgr.h | 159 ++++++++++ > drivers/crypto/caam/caampkc.c | 2 - > drivers/crypto/ccp/ccp-crypto-rsa.c | 2 - > drivers/crypto/qat/qat_common/qat_asym_algs.c | 2 - > include/crypto/akcipher.h | 54 ++-- > include/crypto/public_key.h | 4 + > include/linux/oid_registry.h | 18 ++ > security/integrity/digsig_asymmetric.c | 11 +- > 25 files changed, 1574 insertions(+), 305 deletions(-) > create mode 100644 crypto/ecrdsa.c > create mode 100644 crypto/ecrdsa_defs.h > create mode 100644 crypto/ecrdsa_params.asn1 > create mode 100644 crypto/ecrdsa_pub_key.asn1 All applied. Thanks. -- Email: Herbert Xu Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt