Received: by 2002:a05:6a10:17d3:0:0:0:0 with SMTP id hz19csp1483544pxb; Sun, 11 Apr 2021 21:48:45 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwHag37EHL38gru2k/3IOpLl1JbAbyILJbYhqFUEncjhNRN+i/qCn4Ycsy2Pd9zUxSpd/xI X-Received: by 2002:a17:906:7806:: with SMTP id u6mr24226780ejm.130.1618202925452; Sun, 11 Apr 2021 21:48:45 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1618202925; cv=none; d=google.com; s=arc-20160816; b=nT5ww0aUqNr4McJ8IiWPdzp+Dzwks0lf1EXjOq82GVqclKAjM+yaLKrYT4CpqfjwBF Rn8c3xG4g0+LQT3asNv0KbAeZ02yGdJF9EQG61TD/69d2s1nIGY4ks4/r+lv/jOWzoLE hPtQqRLDdAPjbmzLfg/DYv5/6xnWrPCLdw0hyfhApc81a3RoSN0EeqfcalDDIF1spe8U rWAh1Jh0xILiWcZkDuMz6ShgSXLasRdDDpVzAG7JQBBrFLyXReNZ3eUzjAGx1zg+HSBl i6t3rTIT69QmQdjYsIK+9R+OtbLo0+R9xRPuAQ0CGdlDfIMgENXQlWX+IJS9Jj91uI54 Nq4A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:message-id:date:subject:cc:to:from :dkim-signature; bh=/CvRWYjORCw8flby47H5HqIvyfw8yrJSz4E5Q321rKY=; b=PkGYRvGnFMWtx6UKvaXcGoxqSq9hqKV3/+CLUXPsPqckvTf6xq7z2kGIWnVjFg8u4k 0XaExjLyzeZZ2ronoD4cPf926Ao0brXwtbCN6O2kNAxTXyBo+7v5FKKiwlAxedWLTxgU yxkSSDQyaWYiWyXJNS+/MnTa8p7R3zUPqNIZOwvHnuPIxmYzkmoIqhsM0lADFsvw4ucT 0LfbYg6utM4t6xIdyua+GPfJQWRbozQBio3XeFyT8xGwsCQVGeFEyDN2dQTxZI0UZWB7 l/KLQn0rmF52HKWARgtxBKtW1hUSYaN+wRD1glrCAMrxMPs0jBdZqNX+112zRUXuQptO M/ww== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=KOJoASlQ; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v12si6961761edr.542.2021.04.11.21.48.05; Sun, 11 Apr 2021 21:48:45 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=KOJoASlQ; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229574AbhDLErl (ORCPT + 99 others); Mon, 12 Apr 2021 00:47:41 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39720 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229482AbhDLErl (ORCPT ); Mon, 12 Apr 2021 00:47:41 -0400 Received: from mail-pf1-x42a.google.com (mail-pf1-x42a.google.com [IPv6:2607:f8b0:4864:20::42a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 900F2C061574; Sun, 11 Apr 2021 21:47:23 -0700 (PDT) Received: by mail-pf1-x42a.google.com with SMTP id p67so3455953pfp.10; Sun, 11 Apr 2021 21:47:23 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id; bh=/CvRWYjORCw8flby47H5HqIvyfw8yrJSz4E5Q321rKY=; b=KOJoASlQcl/BKUS4nbQKocohT+zQtX7LC71aAXn2OPx/RTrfLWN7d2yNZBzmOrUdcQ mXS/NWUu/7SuUC+dwNNgwMagSx0DNNa291x+cCgWpQQazUATwjOwNan0ewVMO4K92SkT R1PWF1wVNnekd+caFqyL2zOAstpFAlXbE6ovXMNa3u5+J060yLNTDGZS2N3fZXa7owYo c9wIInp9EpWf7SAbCF/ERWIY/wMJjbfZh3gipc/QbE4lQk/WoToJadkGh+FUZInesHSq H+tbhyebXpWN66zKhpRhoRc/fo8dy++wmaTm4xTKb3onPfDn17bHuLOtX3m06tPfSsom 3/YQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id; bh=/CvRWYjORCw8flby47H5HqIvyfw8yrJSz4E5Q321rKY=; b=mljSnXUMcRQW8KRUbIKxRhIEU7veXth4FzeqFLO8R+bE0u9VvFiQ8kSNlNjA6AgT2x +vIBUBz6jzi/lDl5VYOa8cJvCawly0gjYtUMQBGHVCjp2lrWXnnb+p44FhpN6ENGX8xe JZ29UqwHzyn3XhBLwfpGf9zPpKyy1uHZSi6QYataE0GqFb84DzYiSdsnE+YcFfuiQNiz ElyDCIoRMWjReOtgAtiK6UCulTWspwqx0fE9809vX45sOe0uJMFvDWMIzA/rFNMTh3xs GJnD70s5/h/u+QiqV+FjOvsNuOsw7S0jSxginzZ1P3iR2ha6UDvEobCC3MxP4RWp8f8l DQPw== X-Gm-Message-State: AOAM533RE8o5n5rglcJ53AofW5YiYoR+NMxKpJKok9YwAFEZXzpyVe+U oN6fxI4Yn8tyjcueh5eyfF0= X-Received: by 2002:aa7:8097:0:b029:229:83ec:cac0 with SMTP id v23-20020aa780970000b029022983eccac0mr23116294pff.67.1618202842611; Sun, 11 Apr 2021 21:47:22 -0700 (PDT) Received: from linux-l9pv.suse ([124.11.22.254]) by smtp.gmail.com with ESMTPSA id w16sm8514851pfj.87.2021.04.11.21.47.19 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Sun, 11 Apr 2021 21:47:21 -0700 (PDT) From: "Lee, Chun-Yi" X-Google-Original-From: "Lee, Chun-Yi" To: David Howells Cc: Herbert Xu , "David S . Miller" , Ben Boeckel , Randy Dunlap , Malte Gell , keyrings@vger.kernel.org, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, "Lee, Chun-Yi" Subject: [PATCH v5 0/4] Check codeSigning extended key usage extension Date: Mon, 12 Apr 2021 12:46:56 +0800 Message-Id: <20210412044700.31639-1-jlee@suse.com> X-Mailer: git-send-email 2.12.3 Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org NIAP PP_OS certification requests that the OS shall validate the CodeSigning extended key usage extension field for integrity verifiction of exectable code: https://www.niap-ccevs.org/MMO/PP/-442-/ FIA_X509_EXT.1.1 This patchset adds the logic for parsing the codeSigning EKU extension field in X.509. And checking the CodeSigning EKU when verifying signature of kernel module or kexec PE binary in PKCS#7. v5: Fixed the wording in module-signing.rst. v4: Fixed the wording in patch description. v3: - Add codeSigning EKU to x509.genkey key generation config. - Add openssl command option example for generating CodeSign EKU to module-signing.rst document. v2: Changed the help wording in the Kconfig. Lee, Chun-Yi (4): X.509: Add CodeSigning extended key usage parsing PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification modsign: Add codeSigning EKU when generating X.509 key generation config Documentation/admin-guide/module-signing.rst: add openssl command option example for CodeSign EKU Documentation/admin-guide/module-signing.rst | 6 +++++ certs/Makefile | 1 + certs/system_keyring.c | 2 +- crypto/asymmetric_keys/Kconfig | 9 +++++++ crypto/asymmetric_keys/pkcs7_trust.c | 37 +++++++++++++++++++++++++--- crypto/asymmetric_keys/x509_cert_parser.c | 24 ++++++++++++++++++ include/crypto/pkcs7.h | 3 ++- include/crypto/public_key.h | 1 + include/linux/oid_registry.h | 5 ++++ 9 files changed, 83 insertions(+), 5 deletions(-) -- 2.16.4