Received: by 2002:a6b:fb09:0:0:0:0:0 with SMTP id h9csp3436932iog; Mon, 27 Jun 2022 16:22:45 -0700 (PDT) X-Google-Smtp-Source: AGRyM1tk6H2+lhaNmxmwQro3BK2zVhrcf4T1Qc7+JdbuSCG7+LORSU/oqsbMMnjEQsYJdKi1osOF X-Received: by 2002:a05:6402:2786:b0:435:da07:14cb with SMTP id b6-20020a056402278600b00435da0714cbmr19473546ede.408.1656372165483; Mon, 27 Jun 2022 16:22:45 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1656372165; cv=none; d=google.com; s=arc-20160816; b=WIN61z1K1/lKngI9W8J5iVduQddPIFuICmm70RyL27EthxWjTreuU0+55O7z4tj6bm JVEShSbEAmps1vL1fDCQhMfDvnH9iHLLyYXmFsaZLAe7g59NnUzcQrdyFWxSCL/QSJVM SU7bA4yi5P/yDKZLCjxXOoqbbipKNhzzmEMuLih1xAK8QagHR1YjhJI8AhvURY0RJ94F KdOCoCBPO7zZVHgCBnT6UGdpKgcUczPQX9XUgZv8rFisNMV+SIsYQ7PQxuKFTq7xHZzN 6wK5dvvjN6NpLysm36ZaCmnYfIXkL8sgkkKlTX2j0/SwFYzsJhVc+BTaBt2/yj3eVCNJ eBEQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=LQkBisVYdDsjNhYx1XLUgFMMesZGVqYA6E5mJVsgH2Y=; b=QBS9TyarJ0OZehDiuGK24+nqoBmBrn40Dyz/cjKIaobqSiqrSIwoIEU070vEctJ1Bp j5L+tuBj9MTz537+HnvvVHJ21NjKlIkTqWiZVqelEGkeWFd93r+Z/TdsaOqXfgkeyzhT 1WFLWJjW9eVDexdymlJOYEt3mxk9L9HNSaH08nzrUi3iwsH6PMpuBplIkzcuP6xH3Byt kE4GGpdnlm9MkLJfEnNzGDmN+OW7S8Avfc7b05FCMYMmiquxRWeRkK+OFfX3sHccUbmD TxDCWBz/IhgfYb9xBj5SHk12QtICzHRDhhwvw2ZWV+l9vdgpDXh0XS9QfxAg4/DMZg7O aEzg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=Gdjqnp7g; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id x4-20020a05640226c400b00435adb7520asi17187536edd.338.2022.06.27.16.22.20; Mon, 27 Jun 2022 16:22:45 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=Gdjqnp7g; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240368AbiF0XS6 (ORCPT + 99 others); Mon, 27 Jun 2022 19:18:58 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55266 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240970AbiF0XRJ (ORCPT ); Mon, 27 Jun 2022 19:17:09 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 65CD6237E9; Mon, 27 Jun 2022 16:17:07 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id ED4A96152E; Mon, 27 Jun 2022 23:17:06 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 030D9C34115; Mon, 27 Jun 2022 23:17:05 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1656371826; bh=xK/0Jo6bbbOr8Su6qSlzhWJlbL3Ou6nGEBskw/gJN6w=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=Gdjqnp7gzy7ZTPEUKfdbOqeFJEN/O/BYL4VEKBpEKVbwjd09UG9BxxKpVsD1KYeCa i3dcZwhZNPDgzim3GabS0RB16XMcveEZkNr5pnCUs9UbsZDlHFHSVFwIADz/RuhYO1 +X6jmug6bGuNwd5qfmumJzvYe7FnpUjEEEC29dYCDyP4/7X6PW7K9ZF4Y7BkA+bUPN v9xiPwa0oN9Be40+n8jRhyukCy76ntvcIQx0/8sNERa+6sCQRST9oB8eb6hwAd9TPD ccPjBGSWynfhc8fEjPnmY1kiUubF+Dbh6sEYH6iAUD7Fy31aa9BsnUA052Wx1MnwYj R9mUu/hA9pOkw== Date: Tue, 28 Jun 2022 02:17:02 +0300 From: Jarkko Sakkinen To: Tianjia Zhang Cc: David Howells , Herbert Xu , "David S. Miller" , Elvira Khabirova , Vitaly Chikunov , Stefan Berger , keyrings@vger.kernel.org, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v4 2/2 RESEND] pkcs7: support EC-RDSA/streebog in SignerInfo Message-ID: References: <20220627092142.21095-1-tianjia.zhang@linux.alibaba.com> <20220627092142.21095-3-tianjia.zhang@linux.alibaba.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20220627092142.21095-3-tianjia.zhang@linux.alibaba.com> X-Spam-Status: No, score=-7.5 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Mon, Jun 27, 2022 at 05:21:42PM +0800, Tianjia Zhang wrote: > From: Elvira Khabirova > > Allow using EC-RDSA/streebog in pkcs7 certificates in a similar way > to how it's done in the x509 parser. > > This is needed e.g. for loading kernel modules signed with EC-RDSA. > > Signed-off-by: Elvira Khabirova > Reviewed-by: Vitaly Chikunov > Reviewed-by: Tianjia Zhang > --- > crypto/asymmetric_keys/pkcs7_parser.c | 11 +++++++++++ > 1 file changed, 11 insertions(+) > > diff --git a/crypto/asymmetric_keys/pkcs7_parser.c b/crypto/asymmetric_keys/pkcs7_parser.c > index 24e2e4a6d842..277482bb1777 100644 > --- a/crypto/asymmetric_keys/pkcs7_parser.c > +++ b/crypto/asymmetric_keys/pkcs7_parser.c > @@ -251,6 +251,12 @@ int pkcs7_sig_note_digest_algo(void *context, size_t hdrlen, > case OID_sm3: > ctx->sinfo->sig->hash_algo = "sm3"; > break; > + case OID_gost2012Digest256: > + ctx->sinfo->sig->hash_algo = "streebog256"; > + break; > + case OID_gost2012Digest512: > + ctx->sinfo->sig->hash_algo = "streebog512"; > + break; > default: > printk("Unsupported digest algo: %u\n", ctx->last_oid); > return -ENOPKG; > @@ -284,6 +290,11 @@ int pkcs7_sig_note_pkey_algo(void *context, size_t hdrlen, > ctx->sinfo->sig->pkey_algo = "sm2"; > ctx->sinfo->sig->encoding = "raw"; > break; > + case OID_gost2012PKey256: > + case OID_gost2012PKey512: > + ctx->sinfo->sig->pkey_algo = "ecrdsa"; > + ctx->sinfo->sig->encoding = "raw"; > + break; > default: > printk("Unsupported pkey algo: %u\n", ctx->last_oid); > return -ENOPKG; > -- > 2.24.3 (Apple Git-128) > Reviewed-by: Jarkko Sakkinen BR, Jarkko