Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp854461pxb; Wed, 3 Feb 2021 21:32:09 -0800 (PST) X-Google-Smtp-Source: ABdhPJwNAtEoeQHxnvjhzyiK0KFSL/3QaXAHBQ4dBoGtH0AQBNHGg/QxwnkIxTZ8me1u5c6UmcuA X-Received: by 2002:a17:906:7ca:: with SMTP id m10mr6283495ejc.257.1612416729296; Wed, 03 Feb 2021 21:32:09 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1612416729; cv=none; d=google.com; s=arc-20160816; b=yf3kB9ce76JyTjc5EZQjyFRmEZGORIyZuKUKv6B7NPCWRP4RJyLkJ29Gx/t6Prr9x1 v1rkgVijcAYd6ehPya6NRlMXKnTM5Sk2yvJmbD0uecqUxrwtAbS0OYCk+fkcf4B3INhk /PtZgnerPSbumAULYoYxDi3n4W+MzL1bPFoXSUyQUGpJTLqgdkcf49oq0Qh7Ya40w3d2 j1BgU6NPxQ+mWU3phn+LB+CJYEj+avbzO0t0rHtB5ZIBbQ0nB5YHRIzOc/smtA+zzuEk dFobMLgFL29vfRobTqTRnzLLqBOdsCBID0Mdqx/UCoXmGIbLLqlxZlk3najtNPS3s4JI T7GA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=P5bn6ukkag4OVo+akjXOgMzuB/x2/mDNaN1i4gHn54Q=; b=Gezcx9VXfxOmIjeMEg4tr8DeUoZo6+h8gPCFWAvuMVBVgdlhrLTmnTjGU35qIlMYvU GOil4MknvMJULJ3NmqIvOKPwddDJP9tv0AoJ/QxG1l/zJbVt+iekNQbEmuq9A8SAEEEd wXyVp28SUQ/sH0q6/NdqdazsILtKK6GtKDD2JG/8AlEnfxoHk68NL1dGZxTTZ0E9qKRL JJcevt6Gee4x8xHVILbdzEdV2PPZleH2EQiMJj47yNAnEwGPXo62SyS8ZRAx2qQQSWFP 7z2ITdqyxALSVuIIIDJqbSLh5/Hf5X/P/YRSogdza/xOLIvhORx2TZX+VxqDxkZP8PTg EP+g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id i3si2623875ejj.583.2021.02.03.21.31.45; Wed, 03 Feb 2021 21:32:09 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230270AbhBDF2b (ORCPT + 99 others); Thu, 4 Feb 2021 00:28:31 -0500 Received: from helcar.hmeau.com ([216.24.177.18]:51552 "EHLO fornost.hmeau.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229601AbhBDF2a (ORCPT ); Thu, 4 Feb 2021 00:28:30 -0500 Received: from gwarestrin.arnor.me.apana.org.au ([192.168.103.7]) by fornost.hmeau.com with smtp (Exim 4.92 #5 (Debian)) id 1l7XB5-0001sW-6F; Thu, 04 Feb 2021 16:27:40 +1100 Received: by gwarestrin.arnor.me.apana.org.au (sSMTP sendmail emulation); Thu, 04 Feb 2021 16:27:39 +1100 Date: Thu, 4 Feb 2021 16:27:39 +1100 From: Herbert Xu To: Stefan Berger , Saulo Alessandre Cc: keyrings@vger.kernel.org, linux-crypto@vger.kernel.org, davem@davemloft.net, dhowells@redhat.com, zohar@linux.ibm.com, linux-kernel@vger.kernel.org, patrick@puiterwijk.org, linux-integrity@vger.kernel.org Subject: Re: [PATCH v7 1/4] crypto: Add support for ECDSA signature verification Message-ID: <20210204052738.GA7086@gondor.apana.org.au> References: <20210201151910.1465705-1-stefanb@linux.ibm.com> <20210201151910.1465705-2-stefanb@linux.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210201151910.1465705-2-stefanb@linux.ibm.com> User-Agent: Mutt/1.10.1 (2018-07-13) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Feb 01, 2021 at 10:19:07AM -0500, Stefan Berger wrote: > Add support for parsing the parameters of a NIST P256 or NIST P192 key. > Enable signature verification using these keys. The new module is > enabled with CONFIG_ECDSA: > Elliptic Curve Digital Signature Algorithm (NIST P192, P256 etc.) > is A NIST cryptographic standard algorithm. Only signature verification > is implemented. > > Signed-off-by: Stefan Berger > Cc: Herbert Xu > Cc: "David S. Miller" > Cc: linux-crypto@vger.kernel.org > --- > crypto/Kconfig | 10 + > crypto/Makefile | 6 + > crypto/ecc.c | 13 +- > crypto/ecc.h | 28 +++ > crypto/ecdsa.c | 361 +++++++++++++++++++++++++++++++++++ > crypto/ecdsasignature.asn1 | 4 + > crypto/testmgr.c | 12 ++ > crypto/testmgr.h | 267 ++++++++++++++++++++++++++ > include/linux/oid_registry.h | 4 + > 9 files changed, 694 insertions(+), 11 deletions(-) > create mode 100644 crypto/ecdsa.c > create mode 100644 crypto/ecdsasignature.asn1 Saulo Alessandre is implementing ecdsa with signing so you two should coordinate on this. Thanks, -- Email: Herbert Xu Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt