Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp81671pxb; Wed, 20 Jan 2021 01:33:14 -0800 (PST) X-Google-Smtp-Source: ABdhPJy3K5UIu7/+9kuo1RVGPvzUAFQvB59jYLTbZe4OGRTbQd1962z2E+YlMjgmvh5xitU+CL2d X-Received: by 2002:a17:907:7292:: with SMTP id dt18mr5856458ejc.317.1611135194239; Wed, 20 Jan 2021 01:33:14 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1611135194; cv=none; d=google.com; s=arc-20160816; b=hYF4HNL8PhOBS8/ta3aCMvX8RLN1dvO5UiZRKDLUiYIqhr0AqV5MGq8HyFvDp5vJGb PXYjpHo0HrDRk/4wbM76ZQlpZoJcLrSFZfeitf0zRd1HpNia6VHWOkGavuX1M9fojtL2 iM0jJ2JJ5zaUH9YpsmGkVp60dUe978I+9vBps2j/w7IYjthMZNpe/lspho564cDZcgKl FnUTJwSbyggZSFttqDsdxHopfGC8iHvp4MMiYfnc35CAMZirzdnPnrWUxvBWz14V1JWo qBvUCYk1zRDbbk3edPQ8ntHSeSRh7AA4AxwL8r+tI9vR8ZsmSjIC8Te2+hiqhIH/E5QA bvsA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:references:in-reply-to:message-id:date:subject :cc:to:from:dkim-signature; bh=M1CBK07C46laJoyWYovF4lSgfEz56MEL8US4G4KcnR0=; b=LRQIOOadFqwTV12jhpCc3P9YqwqYk46aAu+p5r9TTXcBx9e5hNo5+ohYuvzAcvrdaB fI3qVcWvfy6ah/PzreCEgJKXNqOildYRpJ4YBIErbRE/r6H094yY0ztY7ntXlZQZ2LHW xQXnUkcKbn1W2CJs5IUg1jAG7QIsFsjtZth/uEmyMj15XdMXGUkk9Icx+XmSyjsGsgmr xNGGuuN8XYfDBRIv6wj7JMIHkhyzxuoJ06dHcoykMgeviYUFlcMw8IDMKsGxKFu4dai0 mx90/2SDF4JMrMwusgaaXcIOnPMphYsARqUq2gAHAxq/i0wH9yQkFu/o/5idICYWQwO7 L2OQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=n2l91F4B; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b20si465927eju.613.2021.01.20.01.32.42; Wed, 20 Jan 2021 01:33:14 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=n2l91F4B; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729156AbhATJKm (ORCPT + 99 others); Wed, 20 Jan 2021 04:10:42 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40232 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729178AbhATJHK (ORCPT ); Wed, 20 Jan 2021 04:07:10 -0500 Received: from mail-pj1-x1034.google.com (mail-pj1-x1034.google.com [IPv6:2607:f8b0:4864:20::1034]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id C4261C0613D6; Wed, 20 Jan 2021 01:06:12 -0800 (PST) Received: by mail-pj1-x1034.google.com with SMTP id cq1so1784214pjb.4; Wed, 20 Jan 2021 01:06:12 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=M1CBK07C46laJoyWYovF4lSgfEz56MEL8US4G4KcnR0=; b=n2l91F4By3VLGwLBJpVvXP1nkvLFb4J3UfQ45CgFVauOpq/R8UE7naJRjzVsK1Z6Tc yWUZFgzSvOsCrj4dSiqWh5zkhzAAyNGOpRjfytobhn3SySy85wP/rh7m4zAat4FSGBVi GATV3bkpxqrkswVNkMig1anryhdnb0I2uzsBHTN8EdV5edS/0Gvy2JAmU3Wio6v9sm9o fk8/5az/W4xrAJyZbNPUJnnO8bb3S/8s2nydTMMcWJC8cZMWw3NOvyUcmF+2rr4sQXuF tlXrpNK/tOOiOU+uCeNypTb3qrO3y35dI8eJKRbXPzu0zwu6zqzGldfo14lHb+JN+L+g 4WOQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=M1CBK07C46laJoyWYovF4lSgfEz56MEL8US4G4KcnR0=; b=gz/tnbNrS8+BuLvdl6LktTzRRSoglFNfueYJWJS5Y1cMRAMY6leNJJ5kZcPcCwp5Hi tv5gYM/gMufM+4ufT+ygls9RB7xZ+/XFnXvMsEocW7avh4OHWRVo1V1f/jC39siS6RcE cs2gEyon4o8DMmOVpAbtZEHSQNRNZPCwCLL+heOv0UUleH1JyZNbE0BqfEqAs6rRmW0o PdyL+I/EKfOR3tSEpIEfzvLg2fldJiTONzwLs1NcIySO/rtQ97WqhaMH3BFPqfgjo1Wy LBm8u0AKLwvVgn7UDUStLAWV0tw0miY3UEjOEGKHM3KSKVBrCbCC0zq+5wN+ZW+4xbGT iWcg== X-Gm-Message-State: AOAM533Al0dSBFv9UYQobsq4sjHtv/bpi5bkS0JOpa8zP+hDreJu4rFc SbM7/uEjmm54mEqOBbTkFuI= X-Received: by 2002:a17:90a:d3c7:: with SMTP id d7mr4594364pjw.169.1611133572338; Wed, 20 Jan 2021 01:06:12 -0800 (PST) Received: from linux-l9pv.suse ([124.11.22.254]) by smtp.gmail.com with ESMTPSA id z2sm1585226pgl.49.2021.01.20.01.06.08 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Wed, 20 Jan 2021 01:06:11 -0800 (PST) From: "Lee, Chun-Yi" X-Google-Original-From: "Lee, Chun-Yi" To: David Howells Cc: Herbert Xu , "David S . Miller" , Ben Boeckel , Randy Dunlap , Malte Gell , keyrings@vger.kernel.org, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, "Lee, Chun-Yi" Subject: [PATCH 4/4] Documentation/admin-guide/module-signing.rst: add openssl command option example for CodeSign EKU Date: Wed, 20 Jan 2021 17:05:17 +0800 Message-Id: <20210120090517.23851-5-jlee@suse.com> X-Mailer: git-send-email 2.12.3 In-Reply-To: <20210120090517.23851-1-jlee@suse.com> References: <20210120090517.23851-1-jlee@suse.com> Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Add an openssl command option example for generating CodeSign extended key usage in X.509 when CONFIG_CHECK_CODESIGN_EKU is enabled. Signed-off-by: "Lee, Chun-Yi" --- Documentation/admin-guide/module-signing.rst | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/Documentation/admin-guide/module-signing.rst b/Documentation/admin-guide/module-signing.rst index 7d7c7c8a545c..b57b30c7125f 100644 --- a/Documentation/admin-guide/module-signing.rst +++ b/Documentation/admin-guide/module-signing.rst @@ -170,6 +170,12 @@ generate the public/private key files:: -config x509.genkey -outform PEM -out kernel_key.pem \ -keyout kernel_key.pem +When ``CONFIG_CHECK_CODESIGN_EKU`` option be enabled, the following openssl +command option should be added for generating CodeSign extended key usage in +X.509:: + + -addext "extendedKeyUsage=codeSigning" + The full pathname for the resulting kernel_key.pem file can then be specified in the ``CONFIG_MODULE_SIG_KEY`` option, and the certificate and key therein will be used instead of an autogenerated keypair. -- 2.16.4