Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp2397665pxb; Tue, 9 Mar 2021 01:12:28 -0800 (PST) X-Google-Smtp-Source: ABdhPJwPYr9u4bJDFvLDqaOf7QbpnlCqm98NKPti6oBwotFBD5pklaWzFibMQQ9q0Rz4Yo+j9qTD X-Received: by 2002:aa7:dc4e:: with SMTP id g14mr2984327edu.114.1615281147953; Tue, 09 Mar 2021 01:12:27 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1615281147; cv=none; d=google.com; s=arc-20160816; b=BfqYUXvLLQeomAKL+DGVxM7d/OYo2uJKH8cbFKGd+GyykoZHusxnvIot58qvI+bXOQ GqYeUiwfeBGLGpm35YIt9zkTeDY2lgPfgEtdrF8fryGqWzD9/Eh5+sqOiwFfqQB2UJ9u 6Z4apOgg/SDYzu2GMMkUncFAgXQ2NiZRL2iVDIHSvZcw7XV27mlRhmsenJh5FG0q7RHL kYFVaYDWfKp/Nknn1NBhhm6vcjReCzhBHM7MuK21yl7td5mVPhR3TbHygzDYPOgNyefR us/1uCvURpkCbo+TQ2ReCoZp02OCYUtmEK/otQUjq752wM4LVGd+7C2zDAhGPtN8UPVW 1jXQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:message-id:date:subject:cc:to:from :dkim-signature; bh=/CvRWYjORCw8flby47H5HqIvyfw8yrJSz4E5Q321rKY=; b=oTRzdDNPj2jhYCsVUhAL3zwg9oPi9qYreK9DJPc1kc4pkySTZUPR2TshVZ+WY0ZpbR T5jAJrsHTtmQguRls6tQAtmUsO555G0Zb1I6hEBWJhH8sQBvO9xMcsB4Mlr1RCLLMsFF UwbsT5yhVpo0TDcyUgli7jfPH5w4j+LEWdDp6an4EW5nSPs7gOxg+76AT82so1P9yb9h Q3qF6XJj77ensXWx+VD8cg7bXg93mcjQtrVL0sQlXSSbqaapedYaVpLJHyDKwMXpC9zn v6cbC1RLWI2c+H8HrjE2Vd2GWjG5Ml2A4gf3sh3U8AzihKNZzDrr4A0NPpG8w9ZtdJ+6 fzhw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=KhGsELbe; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id t17si8955953ejx.576.2021.03.09.01.11.59; Tue, 09 Mar 2021 01:12:27 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=KhGsELbe; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229641AbhCIJLV (ORCPT + 99 others); Tue, 9 Mar 2021 04:11:21 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:46012 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229840AbhCIJLU (ORCPT ); Tue, 9 Mar 2021 04:11:20 -0500 Received: from mail-pg1-x52d.google.com (mail-pg1-x52d.google.com [IPv6:2607:f8b0:4864:20::52d]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4C9CBC06174A; Tue, 9 Mar 2021 01:11:19 -0800 (PST) Received: by mail-pg1-x52d.google.com with SMTP id x29so8346152pgk.6; Tue, 09 Mar 2021 01:11:19 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id; bh=/CvRWYjORCw8flby47H5HqIvyfw8yrJSz4E5Q321rKY=; b=KhGsELbeaVZ6fva0mXjyYAtemsZGD5reVs23Ve6MCIp49iOr9f/Z8lsUe9PzyN4AiN ahCfPk4zBSGIceUjwb+XTczDg+nl1Ghpp4KG69cgItLu6iUpx2+w6tjgmPtd1yKHZ9o/ 0n3EVCwaKUO9cF3G5NFK0/hENzH4tX4ecvB/NkMIFRRfnTFjptPK7HteEBjVRUh0t89T 3yu10uBdV+7u75xJym5RIIrTMn5/foqi5+JXHXwD4vQZg6VGqbfDB2p0XFPuyeETEoaf 43OOW+39Ubp6f9vcxDCobgRculalzTl1FXuEQhJIYUzNATifBuuhPjJl38ei6BYDS28m 3QgQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id; bh=/CvRWYjORCw8flby47H5HqIvyfw8yrJSz4E5Q321rKY=; b=ebrdna47zz1/fhm3YwYrjvOULG2zEGQWFHbM3Y4s9AWWHsJcw170CiEhqpGhIfPP9a tLLwDY0hJxnIg7urBNk2WpWE3ACyrOlWglfMcUcDyMkH413sYcugK9MulyGOc1kZdfz8 6YopXTGxU86OPIOfhgLCvg63SZPCS5NCWB1SZOCljkTdvq6BtiBH2/zzReWVg9M75OlL 00Ft65q6mlcwOA8rVqIr+k0otAaehuvJmHiVDTZ7ZMrD1oKIxZz94YrA1BOtWeFygp3K d3Iaha8sbxfeQUrWRX9UYTqJydfjnbvpxOmjMXTnnaqNtVxD8UPlEBh7SEait7a04VUV 5aig== X-Gm-Message-State: AOAM532AFGOhcicePyGVo0NGnQxY17N+slFlGfkvfwx86RTjl6OKuCg/ N1fxuEnldY+xApnaqyIzyK8= X-Received: by 2002:a63:ab05:: with SMTP id p5mr8228421pgf.149.1615281078913; Tue, 09 Mar 2021 01:11:18 -0800 (PST) Received: from linux-l9pv.suse ([124.11.22.254]) by smtp.gmail.com with ESMTPSA id js16sm2094860pjb.21.2021.03.09.01.11.16 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Tue, 09 Mar 2021 01:11:18 -0800 (PST) From: "Lee, Chun-Yi" X-Google-Original-From: "Lee, Chun-Yi" To: David Howells Cc: Herbert Xu , "David S . Miller" , Ben Boeckel , Randy Dunlap , Malte Gell , keyrings@vger.kernel.org, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, "Lee, Chun-Yi" Subject: [PATCH v5 0/4] Check codeSigning extended key usage extension Date: Tue, 9 Mar 2021 17:10:40 +0800 Message-Id: <20210309091044.2298-1-jlee@suse.com> X-Mailer: git-send-email 2.12.3 Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org NIAP PP_OS certification requests that the OS shall validate the CodeSigning extended key usage extension field for integrity verifiction of exectable code: https://www.niap-ccevs.org/MMO/PP/-442-/ FIA_X509_EXT.1.1 This patchset adds the logic for parsing the codeSigning EKU extension field in X.509. And checking the CodeSigning EKU when verifying signature of kernel module or kexec PE binary in PKCS#7. v5: Fixed the wording in module-signing.rst. v4: Fixed the wording in patch description. v3: - Add codeSigning EKU to x509.genkey key generation config. - Add openssl command option example for generating CodeSign EKU to module-signing.rst document. v2: Changed the help wording in the Kconfig. Lee, Chun-Yi (4): X.509: Add CodeSigning extended key usage parsing PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification modsign: Add codeSigning EKU when generating X.509 key generation config Documentation/admin-guide/module-signing.rst: add openssl command option example for CodeSign EKU Documentation/admin-guide/module-signing.rst | 6 +++++ certs/Makefile | 1 + certs/system_keyring.c | 2 +- crypto/asymmetric_keys/Kconfig | 9 +++++++ crypto/asymmetric_keys/pkcs7_trust.c | 37 +++++++++++++++++++++++++--- crypto/asymmetric_keys/x509_cert_parser.c | 24 ++++++++++++++++++ include/crypto/pkcs7.h | 3 ++- include/crypto/public_key.h | 1 + include/linux/oid_registry.h | 5 ++++ 9 files changed, 83 insertions(+), 5 deletions(-) -- 2.16.4