Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp3592363ybv; Sun, 16 Feb 2020 01:00:34 -0800 (PST) X-Google-Smtp-Source: APXvYqxejXx9ZVYYzSAlDPtEuY8aGM5ON08HcwlATwf5NgCoREh0ruqstjmV1OnIqY6cVvDHkK35 X-Received: by 2002:a9d:34c:: with SMTP id 70mr7869658otv.174.1581843634393; Sun, 16 Feb 2020 01:00:34 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1581843634; cv=none; d=google.com; s=arc-20160816; b=H77umQN0cRJrMopYRcFqelosu2i9PsxhHv5d/aPuHeAlphFVOasyXO8H7Hr6uSuKlS /7Mcw9ASgWyqCEJ21i2uuqZ4bpEPFaYu+8oZh9eN3EQqo+goIM5ISYTpuaweIwUM37vg wlqCM3UE9LF6X9KGK/oNqjyyPakzqdcPeRyvz69uLx5mM1wZDSf6aYUZ58ii+P2uSfXX bDwWos48URSD9ZgBMnXeG81LSARvriLYw1g8R1Pky+K4pVGhaTKwg5TXsIB9Q9beKjyS OqEsvK2cToyIwMlsz32EYh+ljTyJk7WgKAuZYDY3G+BUQwbfu2lolN7WLPy9j3QocSum P04g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from; bh=trOUiaVB87yC3PHfXHlOl2BnMPKVw9zHLURdLw9s78M=; b=lQK6d8SRKhyRBHX4sF2aeDp0akdj7W/oYfV86igGCUf/9yNyTsSxmbs/znjYg0jjYZ Ws3e9ND02OKTfJJEszGXA1+hdZiQ3b76yVGfpPnxjU8cLARE4i6U+foVDGmdjY/SJICz FFbTTJQQaD5y6tCB15BjVOXhDgCHGDb6MHxdC8PGi+GSxL8ZUb7OWsr8B7FEdt5tu7TK iZ02u5BckNlv5GeNnbGE4M4A3knQ7qiw4visXrDDMWZrRV0M2uzzIkzUNLSVhdKUfsW8 7/3XulRsTIoWOUttDxWHVxozSWVK8W9cmdM99ZpKSs3F2bGSNAQmlXgLiOwRWH7zdj8G Uc2g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s21si6208084otr.304.2020.02.16.01.00.17; Sun, 16 Feb 2020 01:00:34 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726203AbgBPJAG (ORCPT + 99 others); Sun, 16 Feb 2020 04:00:06 -0500 Received: from out30-56.freemail.mail.aliyun.com ([115.124.30.56]:43888 "EHLO out30-56.freemail.mail.aliyun.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726140AbgBPJAF (ORCPT ); Sun, 16 Feb 2020 04:00:05 -0500 X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R891e4;CH=green;DM=||false|;DS=||;FP=0|-1|-1|-1|0|-1|-1|-1;HT=e01e04426;MF=tianjia.zhang@linux.alibaba.com;NM=1;PH=DS;RN=7;SR=0;TI=SMTPD_---0Tq4XVIS_1581843589; Received: from localhost(mailfrom:tianjia.zhang@linux.alibaba.com fp:SMTPD_---0Tq4XVIS_1581843589) by smtp.aliyun-inc.com(127.0.0.1); Sun, 16 Feb 2020 16:59:50 +0800 From: Tianjia Zhang To: herbert@gondor.apana.org.au, davem@davemloft.net, ebiggers@kernel.org, pvanleeuwen@rambus.com, zohar@linux.ibm.com Cc: linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH] Introduce OSCCA certificate and SM2 asymmetric algorithm Date: Sun, 16 Feb 2020 16:59:21 +0800 Message-Id: <20200216085928.108838-1-tianjia.zhang@linux.alibaba.com> X-Mailer: git-send-email 2.17.1 Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Hello all, This new module implement the OSCCA certificate and SM2 public key algorithm. It was published by State Encryption Management Bureau, China. List of specifications for OSCCA certificate and SM2 elliptic curve public key cryptography: * GM/T 0003.1-2012 * GM/T 0003.2-2012 * GM/T 0003.3-2012 * GM/T 0003.4-2012 * GM/T 0003.5-2012 * GM/T 0015-2012 * GM/T 0009-2012 IETF: https://tools.ietf.org/html/draft-shen-sm2-ecdsa-02 oscca: http://www.oscca.gov.cn/sca/xxgk/2010-12/17/content_1002386.shtml scctc: http://www.gmbz.org.cn/main/bzlb.html These patchs add the OID object identifier defined by OSCCA. The x509 certificate supports sm2-with-sm3 type certificate parsing and verification. The sm2 algorithm is based on libgcrypt's mpi implementation, and has made some additions to the kernel's original mpi library, and added the implementation of ec to better support elliptic curve-like algorithms. sm2 has good support in both openssl and gnupg projects, and sm3 and sm4 of the OSCCA algorithm family have also been implemented in the kernel. Signed-off-by: Tianjia Zhang Thanks, Tianjia