X.509: Support parsing certificate using SM2 algorithm
authorTianjia Zhang <tianjia.zhang@linux.alibaba.com>
Mon, 27 Jun 2022 09:19:58 +0000 (17:19 +0800)
committerJarkko Sakkinen <jarkko@kernel.org>
Wed, 3 Aug 2022 20:56:20 +0000 (23:56 +0300)
The SM2-with-SM3 certificate generated by latest openssl no longer
reuses the OID_id_ecPublicKey, but directly uses OID_sm2. This patch
supports this type of x509 certificate parsing.

Signed-off-by: Tianjia Zhang <tianjia.zhang@linux.alibaba.com>
Signed-off-by: Jarkko Sakkinen <jarkko@kernel.org>
crypto/asymmetric_keys/x509_cert_parser.c

index 2899ed8..7a9b084 100644 (file)
@@ -508,6 +508,9 @@ int x509_extract_key_data(void *context, size_t hdrlen,
        case OID_gost2012PKey512:
                ctx->cert->pub->pkey_algo = "ecrdsa";
                break;
+       case OID_sm2:
+               ctx->cert->pub->pkey_algo = "sm2";
+               break;
        case OID_id_ecPublicKey:
                if (parse_OID(ctx->params, ctx->params_size, &oid) != 0)
                        return -EBADMSG;