Received: by 2002:a05:6a11:4021:0:0:0:0 with SMTP id ky33csp364302pxb; Sat, 18 Sep 2021 05:10:53 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwncv5Z+efy9bAO46OZwGOD6jGqKWT3yEbd7YNN1Ztwv/BetM7cqlpA/22+QELJU5WvKM1T X-Received: by 2002:a05:6638:b10:: with SMTP id a16mr13024108jab.149.1631967053117; Sat, 18 Sep 2021 05:10:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1631967053; cv=none; d=google.com; s=arc-20160816; b=Rbey2STyx/AOSDhj4uRS0sJ8f/g/e0cUAceem1zk/VvaN9hwhdnIM/vwLF7EiSWbqg YII/pKHU8qge6YGoIYnA7WVUUcIH0CMbkZGp19GTlvUipHtrnrzHPrvVezrmH+3nMODH VKAwkBVuzIQoQWV6E2b4UBlf0UkgICWKvNVNwnhfhGHeXbyjWZlUEjXDu9sT8FISPcX0 VechbiBEi2c9MGQ8zsq2uhMEvteQwNR23H+rpqsJKSaW4dIHa4TVWwQI4ODtsTZJQGLT Qcap85YRqmru3a2PofbVRP9ZOKgtR/UjR5ttDMlZWVr3tMiI9yW5kj3PGFDoxyL3Q3YZ /FBA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :to:subject; bh=W85ehEB8pAQV5kxsc1NEvmwL6TVHQkLJHicE0Q+6lzA=; b=Z6EKiwi9WeEeN/rh74WbQif5fNyTz64U3iJYaYkv/Lw3fj5xLb6p0+RGY1cT9qXH/v 3Qzgmd40YSIfuenLigzcOzeS8jEc8VhFR9mxusRp+EDWok5hgMoCNRyFJ3fitknNdBt/ R3HrGx7w5Cj7sM2cyQMEpenvDS36sSWgbPChfcrpexHaNleRihyIs2sP/dSxSm22Qube 9fQmRHkmXd5CdBQVORsxHir/nINa9fVQ1y3EQRFymuFCurPf/EMM70uEh+3/PPsu0nhh NAmmKI9/0qwTzRWzsgZ43eSTgOXV06I6nBzPXznlK81gy1uzF+5o9rYLiqJ2PS+HNnZQ rvbQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v13si9607906ilu.168.2021.09.18.05.10.24; Sat, 18 Sep 2021 05:10:53 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236293AbhIRC0b (ORCPT + 99 others); Fri, 17 Sep 2021 22:26:31 -0400 Received: from out30-131.freemail.mail.aliyun.com ([115.124.30.131]:38332 "EHLO out30-131.freemail.mail.aliyun.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232711AbhIRC0a (ORCPT ); Fri, 17 Sep 2021 22:26:30 -0400 X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R141e4;CH=green;DM=||false|;DS=||;FP=0|-1|-1|-1|0|-1|-1|-1;HT=e01e04357;MF=tianjia.zhang@linux.alibaba.com;NM=1;PH=DS;RN=14;SR=0;TI=SMTPD_---0Uojb6DE_1631931902; Received: from B-455UMD6M-2027.local(mailfrom:tianjia.zhang@linux.alibaba.com fp:SMTPD_---0Uojb6DE_1631931902) by smtp.aliyun-inc.com(127.0.0.1); Sat, 18 Sep 2021 10:25:04 +0800 Subject: Re: [PATCH] X.509: Support parsing certificate using SM2 algorithm To: David Howells , Herbert Xu , "David S. Miller" , Eric Biggers , Eric Biggers , Mimi Zohar , Vitaly Chikunov , Gilad Ben-Yossef , Pascal van Leeuwen , keyrings@vger.kernel.org, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, Jia Zhang , "YiLin . Li" References: <20210712081352.23692-1-tianjia.zhang@linux.alibaba.com> From: Tianjia Zhang Message-ID: <99a79ccb-8dd9-ac37-2a1d-ec390bcb0c8a@linux.alibaba.com> Date: Sat, 18 Sep 2021 10:25:02 +0800 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:78.0) Gecko/20100101 Thunderbird/78.14.0 MIME-Version: 1.0 In-Reply-To: <20210712081352.23692-1-tianjia.zhang@linux.alibaba.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org ping. On 7/12/21 4:13 PM, Tianjia Zhang wrote: > The SM2-with-SM3 certificate generated by latest openssl no longer > reuses the OID_id_ecPublicKey, but directly uses OID_sm2. This patch > supports this type of x509 certificate parsing. > > Signed-off-by: Tianjia Zhang > --- > crypto/asymmetric_keys/x509_cert_parser.c | 3 +++ > 1 file changed, 3 insertions(+) > > diff --git a/crypto/asymmetric_keys/x509_cert_parser.c b/crypto/asymmetric_keys/x509_cert_parser.c > index 6d003096b5bc..6a945a6ce787 100644 > --- a/crypto/asymmetric_keys/x509_cert_parser.c > +++ b/crypto/asymmetric_keys/x509_cert_parser.c > @@ -496,6 +496,9 @@ int x509_extract_key_data(void *context, size_t hdrlen, > case OID_gost2012PKey512: > ctx->cert->pub->pkey_algo = "ecrdsa"; > break; > + case OID_sm2: > + ctx->cert->pub->pkey_algo = "sm2"; > + break; > case OID_id_ecPublicKey: > if (parse_OID(ctx->params, ctx->params_size, &oid) != 0) > return -EBADMSG; >