crypto: ecdsa - Fix module auto-load on add-key
commit 48e4fd6d54f54d0ceab5a952d73e47a9454a6ccb upstream.
Add module alias with the algorithm cra_name similar to what we have for
RSA-related and other algorithms.
The kernel attempts to modprobe asymmetric algorithms using the names
"crypto-$cra_name" and "crypto-$cra_name-all." However, since these
aliases are currently missing, the modules are not loaded. For instance,
when using the `add_key` function, the hash algorithm is typically
loaded automatically, but the asymmetric algorithm is not.
Steps to test:
1. Create certificate
openssl req -x509 -sha256 -newkey ec \
-pkeyopt "ec_paramgen_curve:secp384r1" -keyout key.pem -days 365 \
-subj '/CN=test' -nodes -outform der -out nist-p384.der
2. Optionally, trace module requests with: trace-cmd stream -e module &
3. Trigger add_key call for the cert:
# keyctl padd asymmetric "" @u < nist-p384.der
641069229
# lsmod | head -2
Module Size Used by
ecdsa_generic 16384 0
Fixes: c12d448ba9
("crypto: ecdsa - Register NIST P384 and extend test suite")
Cc: stable@vger.kernel.org
Signed-off-by: Stefan Berger <stefanb@linux.ibm.com>
Reviewed-by: Vitaly Chikunov <vt@altlinux.org>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
This commit is contained in:
parent
a68c0c55fa
commit
cc3306fb04
|
@ -373,4 +373,7 @@ module_exit(ecdsa_exit);
|
|||
MODULE_LICENSE("GPL");
|
||||
MODULE_AUTHOR("Stefan Berger <stefanb@linux.ibm.com>");
|
||||
MODULE_DESCRIPTION("ECDSA generic algorithm");
|
||||
MODULE_ALIAS_CRYPTO("ecdsa-nist-p192");
|
||||
MODULE_ALIAS_CRYPTO("ecdsa-nist-p256");
|
||||
MODULE_ALIAS_CRYPTO("ecdsa-nist-p384");
|
||||
MODULE_ALIAS_CRYPTO("ecdsa-generic");
|
||||
|
|
Loading…
Reference in New Issue