Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp430605pxb; Wed, 24 Feb 2021 06:09:14 -0800 (PST) X-Google-Smtp-Source: ABdhPJy48kIWRF1DOj/WW3qrJMdQPHSdkPi7h8GHpCXi/S/1bEzsGTjrfBc58fpgs9Uy9TVKsI3k X-Received: by 2002:a05:6402:2690:: with SMTP id w16mr33677936edd.304.1614175754475; Wed, 24 Feb 2021 06:09:14 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1614175754; cv=none; d=google.com; s=arc-20160816; b=zh65+hukKzxDXHKnb9/p6rv+qG3iEZUs7govK+CpvaeSf5Occr6YcopVOG0vxIG0eX 23TrWFPilLubvXXcpWBJmb8G6O968oRE7b//UEjgVtG5YTXpGaR5SWCZJSt4r9eCgCDk nP+F8/3TKA8B2zMA0O5nTxmm/wgTb/h09lZEXl+GIl1ON540RLBaz1iPK119d1PBub2e JFXH61ckGhB1q/JnnUHKardfYWjSeU46yso2A1ccsCsuayV6v0mp1uS2ZKiyNLvP9PDk 0vtom/M2FkBeJfVsL1lf0ftXQQNo3Mmx/2WEvlV46BWE4d0CG8EqpRi9mmFJ6Mq1Ix9b 9xng== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=E35Anx43LiPy05GsYti9BfkgPBUJtvGhlU3qclOt8K4=; b=luK4PbxSXIhRY/dLm/msRru/V7ouy1Vbovfk0fKnzXzRs9jsYB6C9hJ33BjFp/mDyx 11RMAsROiy2ukdu5E6/8/06YhCHPklq0XdKe7uHZMLpypQMx24jj+JYyqhUhQIiFSQtK /oYKC8Mim/bAjElpcVVwtBtD6AMNlH92mOeh6Mq96g1KhEGmi6gMzd1GPuFrtrFwkZdX 24wKQJtpWlg4G77HhgMJYkDpEFoWmhVtAeyKKUo6GPEe+lWiiWEZ8lJxYyVbJKzvokJy Zu9OshnZ7u9iLsiR6C22dggRuKUQo1mMQWn6BP7/gdbrTXJEvEtBlIt4DlqVSoYCEaqr rnxw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=Qzae4gSd; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id p5si1120762edt.50.2021.02.24.06.08.28; Wed, 24 Feb 2021 06:09:14 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=Qzae4gSd; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233734AbhBXODu (ORCPT + 99 others); Wed, 24 Feb 2021 09:03:50 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:46840 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238035AbhBXNuF (ORCPT ); Wed, 24 Feb 2021 08:50:05 -0500 Received: from mail-ej1-x633.google.com (mail-ej1-x633.google.com [IPv6:2a00:1450:4864:20::633]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 21B58C061574; Wed, 24 Feb 2021 05:35:43 -0800 (PST) Received: by mail-ej1-x633.google.com with SMTP id t11so3091709ejx.6; Wed, 24 Feb 2021 05:35:43 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=E35Anx43LiPy05GsYti9BfkgPBUJtvGhlU3qclOt8K4=; b=Qzae4gSdEODSQi/0QwqZBX1N+d+1Ib4hCbF6In4F2pJulVBJpk0rGiziSFVGIdtjk8 wPdM97UUjXVmXu7WCjrzvIKG6GNshOfKbNcJHHzjfRFzfNGT9X2/q/vf9s2+HlrMOqtG BKAsdvevRzsxTgebyrfSG50JZtn+SiJa7Oa5ErIyySLihTr1vQzJtYh5/POtBBTwd+85 o2lY3ydtCPE6mJIP30PuPJ7rKrPq4If5DKW+e0hJl9iCRuuqwTkg2GD8CjKTj8DZDn4R OJzrmHpNuG6j6SMvPe5VfA0SEZi5ynYd3SbTgN14yt/lxLKM5Y4niPwrdDBGL1axb4Yi lUYg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=E35Anx43LiPy05GsYti9BfkgPBUJtvGhlU3qclOt8K4=; b=qLzkaXJT1Mor7hAQzMl/J5vREpManaMonSpZ44uP5Y+to5E6UiTCfKLrxadB2F9cZd JfyY2TqVdfG/P0KJ0D4zllJdffgMCh8kKgWa4YWG0w8jSZEWd1tOdJizJlSaLg71o3tZ FcTYknwwXofAzL94GSlfME/Mksw79Dpc6W7sZvJEzOwvWC31F8z/OWjk3iDdp57dko79 J9nvOJ8Y/gq/ikzKufn6bjwn4gkNxCwXI7DQSkosQkb3DGMtiKytXI1bDqGuWQJOnOi+ iDySdEwffSlOQm8mKvZEe64wYnpvxYLT0GhfaWs6X9lOxsVGWAI1yLW+pWXOemYQnuOe Ycug== X-Gm-Message-State: AOAM533umbrn2hgvSAO8uI3EynAv+s9qtEleFaXQqWd+woufm78n7P7H 1HpBZj3ZGaTAgqGr7/rn0flWU5aJwhVRzNn1tfbv49ddzHTlbEEt X-Received: by 2002:a17:906:e0cb:: with SMTP id gl11mr19893581ejb.87.1614173741708; Wed, 24 Feb 2021 05:35:41 -0800 (PST) MIME-Version: 1.0 References: <20210215162532.1077098-1-stefanb@linux.ibm.com> <20210222175850.1131780-1-saulo.alessandre@gmail.com> <2e829730-bb0c-47eb-70f2-731c184eba33@linux.ibm.com> In-Reply-To: <2e829730-bb0c-47eb-70f2-731c184eba33@linux.ibm.com> From: Saulo Alessandre de Lima Date: Wed, 24 Feb 2021 10:35:30 -0300 Message-ID: Subject: Re: [PATCH v2 1/3] add params and ids to support nist_p384 To: linux-crypto@vger.kernel.org Cc: linux-integrity@vger.kernel.org, linux-kernel@vger.kernel.org, keyrings@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Em seg., 22 de fev. de 2021 =C3=A0s 17:26, Stefan Berger escreveu: > > On 2/22/21 12:58 PM, Saulo Alessandre wrote: > > From: Saulo Alessandre > > > > * crypto/asymmetric_keys/x509_cert_parser.c > > - prepare x509 parser to load nist_secp384r1 > > > > * crypto/ecc_curve_defs.h > > - add nist_p384 params > > > > * include/crypto/ecdh.h > > - add ECC_CURVE_NIST_P384 > > > > * include/linux/oid_registry.h > > - reorder OID_id_ecdsa_with_sha1 > > - add OID_id_secp384r1 > > > > Signed-off-by: Saulo Alessandre > > I would separate this patch into an x509: and certs: part since it > touches two subsystems. > > I can take this series of patches and post my v9 including them at the > end. This would make it easier for others to test. I would massage them > a bit, including the separation of the 1st patch into 2 patches, if you > don't mind, preserving your Signed-off-by. I need to fix something in my > v8 regarding registration failure handling. Let me know whether this is > fine with you. For me it's ok. > > I had tested your patches over the weekend with my endless test tool > creating keys in user space and loading them into the kernel. It worked > fine for NIST p256 & p384. Also signing kernel modules with NIST p384 is > working fine. > > So, for the series: > > Tested-by: Stefan Berger > > Regards, > > Stefan > > Regards --=20 []'s ----- Saulo Alessandre