On Mon, Feb 01, 2021 at 11:45:16AM -0500, Stefan Berger wrote:
>
> With the crypto module missing in the kernel you will get an error trying to
> load an x509 certificate that needs the algorithm to verify the self-signed
> signature.
>
> Before I post yet another series I hope that Herbert can sa
On 2/1/21 11:36 AM, David Howells wrote:
Stefan Berger wrote:
1) the whole series goes through the crypto tree
2) I make the OIDs addition patch 1 that both keyrings and crypto take
separately?
The first might be easiest, but 2 is okay also. You'll just need to give
myself and Herbert separ
Stefan Berger wrote:
> 1) the whole series goes through the crypto tree
>
> 2) I make the OIDs addition patch 1 that both keyrings and crypto take
> separately?
The first might be easiest, but 2 is okay also. You'll just need to give
myself and Herbert separate branches to pull, rooted on the
On 2/1/21 11:13 AM, David Howells wrote:
Stefan Berger wrote:
v6->v7:
- Moved some OID defintions to patch 1 for bisectability
- Applied R-b's
But I can't now apply 2-4 without patch 1.
Two possible solutions:
1) the whole series goes through the crypto tree
2) I make the OIDs addit
Stefan Berger wrote:
> v6->v7:
> - Moved some OID defintions to patch 1 for bisectability
> - Applied R-b's
But I can't now apply 2-4 without patch 1.
David
This series of patches adds support for x509 certificates signed by a CA
that uses NIST p256 or p192 keys for signing. It also adds support for
certificates where the public key is a NIST p256 or p192 key. The math
for ECDSA signature verification is also added.
Since self-signed certificates are