Re: [PATCH v3 2/3] x509: Add support for parsing x509 certs with NIST p256 keys

2021-01-27 Thread Stefan Berger
On 1/27/21 2:31 PM, Herbert Xu wrote: On Wed, Jan 27, 2021 at 07:33:49AM -0500, Stefan Berger wrote: +static struct akcipher_alg ecc_nist_p256 = { + .verify = ecdsa_verify, + .set_pub_key = ecc_set_pub_key, + .max_size = ecc_nist_p256_max_size, + .init = ecc_nist_p256_ini

Re: [PATCH v3 2/3] x509: Add support for parsing x509 certs with NIST p256 keys

2021-01-27 Thread Herbert Xu
On Wed, Jan 27, 2021 at 07:33:49AM -0500, Stefan Berger wrote: > > +static struct akcipher_alg ecc_nist_p256 = { > + .verify = ecdsa_verify, > + .set_pub_key = ecc_set_pub_key, > + .max_size = ecc_nist_p256_max_size, > + .init = ecc_nist_p256_init_tfm, > + .exit = ecc_exit_tfm,

[PATCH v3 2/3] x509: Add support for parsing x509 certs with NIST p256 keys

2021-01-27 Thread Stefan Berger
From: Stefan Berger This patch adds support for parsing of x509 certificates that contain NIST P256 keys that have been signed by a CA using any of the current SHA hash algorithms. Since self-signed certificates are verified, the ecc math for signature verification is also added. Signed-off-by: