From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-17.3 required=3.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_CR_TRAILER, INCLUDES_PATCH,MAILING_LIST_MULTI,NICE_REPLY_A,SPF_HELO_NONE,SPF_PASS, URIBL_BLOCKED,USER_AGENT_SANE_1 autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 0ABA1C64E7A for ; Wed, 25 Nov 2020 17:26:05 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id BD0A82065E for ; Wed, 25 Nov 2020 17:26:04 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=infradead.org header.i=@infradead.org header.b="17Rwd0Ms" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732739AbgKYR0A (ORCPT ); Wed, 25 Nov 2020 12:26:00 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39238 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730868AbgKYR0A (ORCPT ); Wed, 25 Nov 2020 12:26:00 -0500 Received: from merlin.infradead.org (merlin.infradead.org [IPv6:2001:8b0:10b:1231::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 2B6E2C0613D4; Wed, 25 Nov 2020 09:26:00 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=merlin.20170209; h=Content-Transfer-Encoding:Content-Type: In-Reply-To:MIME-Version:Date:Message-ID:From:References:Cc:To:Subject:Sender :Reply-To:Content-ID:Content-Description; bh=wNUJaMYaw9Om5kTEvwoI8y+Hyo8Am2Dmz8bzn7pzxLY=; b=17Rwd0MsOskJ/cUSJdfuW9XsMn KsT2OnSBtt6xsVSE4FN1zlczDLTGkm75/HO/znDkmdV5ZxFrQhhdB+QWxn+fhra/ajZzfxX8wkpQP oerOaUupdUhFFfEjoR639m/PocGb6XnkAVfPH70WdsZSJEuS202kYhK1NL9EWPN0AkCsgjFTi1drD 31xEciB0h4/scEdoSW1rV4Tn2VrwQMUdjPjaSVN2Krj6CtXBPdHDKkrTaM2gYE4bT7k1+lyfYqIv1 b9QjARNV4J9h/SoVc0Rf09Ou8qvMmTHgYkiJvl289M2D9tqM7YAf0ufRTJovU8nBLiQW0T4HryhX9 cbOWWn2w==; Received: from [2601:1c0:6280:3f0::cc1f] by merlin.infradead.org with esmtpsa (Exim 4.92.3 #3 (Red Hat Linux)) id 1khyYG-0004SP-5q; Wed, 25 Nov 2020 17:25:56 +0000 Subject: Re: [PATCH 4/4] Documentation/admin-guide/module-signing.rst: add openssl command option example for CodeSign EKU To: "Lee, Chun-Yi" , David Howells Cc: Herbert Xu , "David S . Miller" , Ben Boeckel , Malte Gell , keyrings@vger.kernel.org, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, "Lee, Chun-Yi" References: <20201125072653.15657-1-jlee@suse.com> <20201125072653.15657-5-jlee@suse.com> From: Randy Dunlap Message-ID: Date: Wed, 25 Nov 2020 09:25:51 -0800 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.4.0 MIME-Version: 1.0 In-Reply-To: <20201125072653.15657-5-jlee@suse.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: keyrings@vger.kernel.org Hi-- On 11/24/20 11:26 PM, Lee, Chun-Yi wrote: > Add an openssl command option example for generating CodeSign extended > key usage in X.509 when CONFIG_CHECK_CODESIGN_EKU be enabled. is enabled. > > Signed-off-by: "Lee, Chun-Yi" > --- > Documentation/admin-guide/module-signing.rst | 6 ++++++ > 1 file changed, 6 insertions(+) > > diff --git a/Documentation/admin-guide/module-signing.rst b/Documentation/admin-guide/module-signing.rst > index f8b584179cff..bc184124d646 100644 > --- a/Documentation/admin-guide/module-signing.rst > +++ b/Documentation/admin-guide/module-signing.rst > @@ -170,6 +170,12 @@ generate the public/private key files:: > -config x509.genkey -outform PEM -out kernel_key.pem \ > -keyout kernel_key.pem > > +When ``CONFIG_CHECK_CODESIGN_EKU`` option be enabled, the following openssl is enabled, > +command option should be added for generating CodeSign extended key usage in > +X.509:: > + > + -addext "extendedKeyUsage=codeSigning" > + > The full pathname for the resulting kernel_key.pem file can then be specified > in the ``CONFIG_MODULE_SIG_KEY`` option, and the certificate and key therein will > be used instead of an autogenerated keypair. > -- ~Randy