[PATCH] X.509: Support parse long form of length octets in Authority Key Identifier

2013-02-05 Thread Lee, Chun-Yi
long form format against Authority Key Identifier. Cc: David Howells Cc: Rusty Russell Cc: Josh Boyer Cc: Randy Dunlap Cc: Herbert Xu Cc: "David S. Miller" Signed-off-by: Lee, Chun-Yi --- crypto/asymmetric_keys/x509_cert_parser.c | 56 1 files c

[PATCH] X.509: Support parse long form of length octets in Authority Key Identifier

2013-02-05 Thread Lee, Chun-Yi
long form format against Authority Key Identifier. Cc: David Howells Cc: Rusty Russell Cc: Josh Boyer Cc: Randy Dunlap Cc: Herbert Xu Cc: "David S. Miller" Signed-off-by: Lee, Chun-Yi --- crypto/asymmetric_keys/x509_cert_parser.c | 56 1 files c

[RESEND][PATCH] gpu: remove gma500 stub driver

2013-02-19 Thread Lee, Chun-Yi
y: Matthew Garrett Acked-by: Greg Kroah-Hartman Signed-off-by: Lee, Chun-Yi --- drivers/gpu/Makefile |2 +- drivers/gpu/stub/Kconfig | 18 drivers/gpu/stub/Makefile |1 - drivers/gpu/stub/poulsbo.c | 64 drivers/vid

[PATCH v2] X.509: Support parse long form of length octets in Authority Key Identifier

2013-03-14 Thread Lee, Chun-Yi
From: Chun-Yi Lee Per X.509 spec in 4.2.1.1 section, the structure of Authority Key Identifier Extension is: AuthorityKeyIdentifier ::= SEQUENCE { keyIdentifier [0] KeyIdentifier OPTIONAL, authorityCertIssuer [1] GeneralNamesOPTIONAL,

[PATCH] efi: add efivars kobject to efi sysfs folder

2012-10-03 Thread Lee, Chun-Yi
UEFI variable filesystem need a new mount point, so this patch add efivars kobject to efi_kobj for create a /sys/firmware/efi/efivars folder. Cc: Matt Fleming Cc: Jeremy Kerr Cc: Matthew Garrett Cc: H. Peter Anvin Signed-off-by: Lee, Chun-Yi --- drivers/firmware/efivars.c | 11

[PATCH] asymmetric keys: explicitly add the leading zero byte to encoded message

2013-07-11 Thread Lee, Chun-Yi
From: Chun-Yi Lee Per PKCS1 spec, the EMSA-PKCS1-v1_5 encoded message is leading by 0x00 0x01 in its first 2 bytes. The leading zero byte is suppressed by MPI so we pass a pointer to the _preceding_ byte to RSA_verify() in original code, but it has risk for the byte is not zero because it's not i

[RFC V4 PATCH 00/15] Signature verification of hibernate snapshot

2013-09-14 Thread Lee, Chun-Yi
RIFICATION kernel config to earlier patch. - Add dummy functions to simplify the ifdef check. - Sent to opensuse-ker...@opensuse.org for review: http://lists.opensuse.org/opensuse-kernel/2013-08/msg00025.html V1: - Internal review - github: https://github.com/joeyli/linux-s4sign/commit

[PATCH V4 07/15] asymmetric keys: explicitly add the leading zero byte to encoded message

2013-09-14 Thread Lee, Chun-Yi
te to zero in EM and copy the remaining bytes from _EM. V2: - Check the memory allocate result of EM to avoid use it when allocate fail. Cc: Pavel Machek Reviewed-by: Jiri Kosina Signed-off-by: Lee, Chun-Yi --- crypto/asymmetric_keys/rsa.c | 20 +++- 1 files changed, 15 insert

[PATCH V4 05/15] asymmetric keys: implement RSASP1

2013-09-14 Thread Lee, Chun-Yi
el naming convention, it useful when look at them with spec. Reference: ftp://ftp.rsasecurity.com/pub/pkcs/pkcs-1v2/pkcs1ietffinal.txt Reference: http://www.emc.com/collateral/white-papers/h11300-pkcs-1v2-2-rsa-cryptography-standard-wp.pdf Cc: Pavel Machek Reviewed-by: Jiri Kosina Signed-off-by: Lee

[PATCH V4 06/15] asymmetric keys: support parsing PKCS #8 private key information

2013-09-14 Thread Lee, Chun-Yi
go in struct pkcs8_info because it does not help on reduce memory space. - Replace privkey_algo by pkey_algo in struct pkcs8_info to simplify naming. Cc: Pavel Machek Reviewed-by: Jiri Kosina Signed-off-by: Lee, Chun-Yi --- crypto/asymmetric_keys/Kconfig | 11 ++ c

[PATCH V4 02/15] asymmetric keys: implement EMSA_PKCS1-v1_5-ENCODE in rsa

2013-09-14 Thread Lee, Chun-Yi
www.emc.com/collateral/white-papers/h11300-pkcs-1v2-2-rsa-cryptography-standard-wp.pdf V2: - Clean up naming of variable: replace _EM by EM, replace EM by EM_tmp. - Add comment to EMSA_PKCS1-v1_5-ENCODE function. Cc: Pavel Machek Reviewed-by: Jiri Kosina Signed-off-by: Lee, Chun-Yi --- crypto/asym

[PATCH V4 08/15] Hibernate: introduced RSA key-pair to verify signature of snapshot

2013-09-14 Thread Lee, Chun-Yi
mage. It makes sure the new sign key will be transfer to resume target kernel. - Set "depends on EFI_STUB" in Kconfig V2: Add CONFIG_SNAPSHOT_VERIFICATION for build of hibernate_keys.c depend on Kconfig. Cc: Matthew Garrett Cc: Takashi Iwai Reviewed-by: Jiri Kosina Signed-off-by: Lee,

[PATCH V4 04/15] asymmetric keys: implement OS2IP in rsa

2013-09-14 Thread Lee, Chun-Yi
Signed-off-by: Lee, Chun-Yi --- crypto/asymmetric_keys/rsa.c | 29 - 1 files changed, 24 insertions(+), 5 deletions(-) diff --git a/crypto/asymmetric_keys/rsa.c b/crypto/asymmetric_keys/rsa.c index aac8b77..a092aac 100644 --- a/crypto/asymmetric_keys/rsa.c +++

[PATCH V4 13/15] Hibernate: introduced SNAPSHOT_SIG_HASH config for select hash algorithm

2013-09-14 Thread Lee, Chun-Yi
This patch introduced SNAPSHOT_SIG_HASH config for user to select which hash algorithm will be used during signature generation of snapshot. v2: Add define check of oCONFIG_SNAPSHOT_VERIFICATION in snapshot.c before declare pkey_hash(). Reviewed-by: Jiri Kosina Signed-off-by: Lee, Chun-Yi

[PATCH V4 09/15] Hibernate: generate and verify signature of snapshot

2013-09-14 Thread Lee, Chun-Yi
ed-by: Jiri Kosina Signed-off-by: Lee, Chun-Yi --- kernel/power/power.h| 13 ++ kernel/power/snapshot.c | 288 ++- kernel/power/swap.c |4 + kernel/power/user.c |5 + 4 files changed, 307 insertions(+), 3 deletions(-) diff --git a/k

[PATCH V4 12/15] Hibernate: show the verification time for monitor performance

2013-09-14 Thread Lee, Chun-Yi
Show the verification time for monitor the performance of SHA256 and RSA verification. Reviewed-by: Jiri Kosina Signed-off-by: Lee, Chun-Yi --- kernel/power/snapshot.c |7 +++ 1 files changed, 7 insertions(+), 0 deletions(-) diff --git a/kernel/power/snapshot.c b/kernel/power

[PATCH 10/15] Hibernate: Avoid S4 sign key data included in snapshot image

2013-09-14 Thread Lee, Chun-Yi
This patch add swsusp_page_is_sign_key() method to hibernate_key.c and check the page is S4 sign key data when collect saveable page in snapshot.c to avoid sign key data included in snapshot image. Reviewed-by: Jiri Kosina Signed-off-by: Lee, Chun-Yi --- kernel/power/snapshot.c |6

[PATCH V4 15/15] Hibernate: adapt to UEFI secure boot with signature check

2013-09-14 Thread Lee, Chun-Yi
off) taint kernel when signature check fail or didn't find key-pair. V3: Use helper function secure_hibernate() to reduce ifdef block. V2: Replace sign_key_data_loaded() by skey_data_available() to check sign key data is available for hibernate. Reviewed-by: Jiri Kosina Signed-off-by: Lee,

[PATCH V4 11/15] Hibernate: taint kernel when signature check fail

2013-09-14 Thread Lee, Chun-Yi
it through snapshot_sig_enforce parameter or EFI_SECURE_BOOT_SNAPSHOT_SIG_ENFORCE. Signed-off-by: Lee, Chun-Yi --- Documentation/kernel-parameters.txt |7 +++ arch/x86/Kconfig| 11 +++ include/linux/kernel.h |1 + include/linux/suspend.h

[PATCH V4 14/15] Hibernate: notify bootloader regenerate key-pair for snapshot verification

2013-09-14 Thread Lee, Chun-Yi
() in hibernate.c and user.c Cc: Matthew Garrett Signed-off-by: Lee, Chun-Yi --- kernel/power/Kconfig | 15 + kernel/power/hibernate.c |4 ++- kernel/power/hibernate_keys.c | 67 + kernel/power/power.h |5

[PATCH V4 01/15] asymmetric keys: add interface and skeleton for implement signature generation

2013-09-14 Thread Lee, Chun-Yi
Add generate_signature interface on signature.c, asymmetric-subtype and rsa.c for prepare to implement signature generation. Reviewed-by: Jiri Kosina Signed-off-by: Lee, Chun-Yi --- crypto/asymmetric_keys/private_key.h | 29 + crypto/asymmetric_keys/public_key.c

[PATCH V4 03/15] asymmetric keys: separate the length checking of octet string from RSA_I2OSP

2013-09-14 Thread Lee, Chun-Yi
f Cc: Pavel Machek Reviewed-by: Jiri Kosina Signed-off-by: Lee, Chun-Yi --- crypto/asymmetric_keys/rsa.c | 33 - 1 files changed, 24 insertions(+), 9 deletions(-) diff --git a/crypto/asymmetric_keys/rsa.c b/crypto/asymmetric_keys/rsa.c index 352ba45..aac8b77 1

[PATCH] X.509: Remove validity check of certificate date

2013-09-24 Thread Lee, Chun-Yi
;[PATCH] X.509: Remove certificate date checks": https://lkml.org/lkml/2013/3/14/257 This patch removed the validity check of certificate date but still keep the valid_from and valid_to fields for future usage. Signed-off-by: Lee, Chun-Yi cc: David Howells cc: David Woodhouse cc: Rusty Ru

[PATCH 2/3] rtc-efi: add timezone to rtc_time that will used by rtc-efi

2012-12-28 Thread Lee, Chun-Yi
r Cc: Ingo Molnar Cc: Jan Beulich Signed-off-by: Lee, Chun-Yi --- drivers/rtc/rtc-efi.c| 20 +--- include/uapi/linux/rtc.h |1 + 2 files changed, 18 insertions(+), 3 deletions(-) diff --git a/drivers/rtc/rtc-efi.c b/drivers/rtc/rtc-efi.c index c9f890b..4e74ec0 100644

[PATCH 3/3] rtc-efi: set uie_unsupported for indicate rtc-efi doesn't support UIE mode

2012-12-28 Thread Lee, Chun-Yi
IE_EMUL to emulate RTC_UIE on rtc-efi. Cc: Matt Fleming Cc: H. Peter Anvin Cc: Matthew Garrett Cc: Thomas Gleixner Cc: Ingo Molnar Cc: Jan Beulich Signed-off-by: Lee, Chun-Yi --- drivers/rtc/rtc-efi.c |2 ++ 1 files changed, 2 insertions(+), 0 deletions(-) diff --git a/drivers/rtc/r

[PATCH 1/3] rtc-efi: register rtc-efi device when EFI enabled

2012-12-28 Thread Lee, Chun-Yi
. Cc: Matt Fleming Cc: H. Peter Anvin Cc: Matthew Garrett Cc: Thomas Gleixner Cc: Ingo Molnar Cc: Jan Beulich Signed-off-by: Lee, Chun-Yi --- arch/x86/platform/efi/efi.c | 20 drivers/rtc/Kconfig |2 +- 2 files changed, 21 insertions(+), 1 deletions(-) diff

[PATCH] x86, efi: Allow slash in file path of initrd

2012-12-20 Thread Lee, Chun-Yi
good for debug and discover typo. Cc: Matthew Garrett Cc: H. Peter Anvin Cc: Matt Fleming Signed-off-by: Lee, Chun-Yi --- arch/x86/boot/compressed/eboot.c | 26 +++--- 1 files changed, 19 insertions(+), 7 deletions(-) diff --git a/arch/x86/boot/compressed/eboot.c

[PATCH] sign-file: fix the perl warning message when extracting ASN.1

2012-11-20 Thread Lee, Chun-Yi
161. Found = in conditional, should be == at scripts/sign-file line 159. This patch change replace '=' by '==' in elsif conditions for avoid the above warning messages. Signed-off-by: Lee, Chun-Yi --- scripts/sign-file |6 +++--- 1 files changed, 3 insertions(+), 3 deleti

[PATCH v3] X.509: Support parse long form of length octets in Authority Key Identifier

2013-04-18 Thread Lee, Chun-Yi
From: Chun-Yi Lee Per X.509 spec in 4.2.1.1 section, the structure of Authority Key Identifier Extension is: AuthorityKeyIdentifier ::= SEQUENCE { keyIdentifier [0] KeyIdentifier OPTIONAL, authorityCertIssuer [1] GeneralNamesOPTIONAL,

[PATCH] asymmetric keys: explicitly add the leading zero byte to encoded message

2013-06-15 Thread Lee, Chun-Yi
From: Chun-Yi Lee Per PKCS1 spec, the EMSA-PKCS1-v1_5 encoded message is leading by 0x00 0x01 in its first 2 bytes. The leading zero byte is suppressed by MPI so we pass a pointer to the _preceding_ byte to RSA_verify() in original code, but it has risk for the byte is not zero because it's not i

[PATCH v2 1/2] acpi: video: add function to support unregister backlight interface

2013-05-30 Thread Lee, Chun-Yi
: Also unregister cooling devices. Tested-by: Andrzej Krentosz Cc: Zhang Rui Cc: Len Brown Cc: Rafael J. Wysocki Cc: Carlos Corbacho Cc: Matthew Garrett Cc: Dmitry Torokhov Cc: Corentin Chary Cc: Aaron Lu Cc: Thomas Renninger Signed-off-by: Lee, Chun-Yi --- drivers/acpi/video.c | 54

[PATCH v2 2/2] acer-wmi: add Acer Aspire 5750G to video vendor list but keep acpi video driver

2013-05-30 Thread Lee, Chun-Yi
d the information statement of keeping acpi video driver. Tested-by: Andrzej Krentosz Cc: Zhang Rui Cc: Len Brown Cc: Carlos Corbacho Cc: Matthew Garrett Cc: Dmitry Torokhov Cc: Corentin Chary Cc: Rafael J. Wysocki Cc: Aaron Lu Cc: Thomas Renninger Signed-off-by: Lee, Chun-Yi --- drivers/platfor

[PATCH] asymmetric keys: explicitly add the leading zero byte to encoded message

2013-06-27 Thread Lee, Chun-Yi
From: Chun-Yi Lee Per PKCS1 spec, the EMSA-PKCS1-v1_5 encoded message is leading by 0x00 0x01 in its first 2 bytes. The leading zero byte is suppressed by MPI so we pass a pointer to the _preceding_ byte to RSA_verify() in original code, but it has risk for the byte is not zero because it's not i

[PATCH] asymmetric keys: explicitly add the leading zero byte to encoded message

2013-07-31 Thread Lee, Chun-Yi
From: Chun-Yi Lee Per PKCS1 spec, the EMSA-PKCS1-v1_5 encoded message is leading by 0x00 0x01 in its first 2 bytes. The leading zero byte is suppressed by MPI so we pass a pointer to the _preceding_ byte to RSA_verify() in original code, but it has risk for the byte is not zero because it's not i

[PATCH 00/18 v3] Signature verification of hibernate snapshot

2013-08-22 Thread Lee, Chun-Yi
ign Josh Boyer (1): Secure boot: Add a dummy kernel parameter that will switch on Secure Boot mode Lee, Chun-Yi (15): asymmetric keys: add interface and skeleton for implement signature generation asymmetric keys: implement EMSA_PKCS1-v1_5-ENCODE in rsa asymmetric keys: separate th

[PATCH 01/18] asymmetric keys: add interface and skeleton for implement signature generation

2013-08-22 Thread Lee, Chun-Yi
Add generate_signature interface on signature.c, asymmetric-subtype and rsa.c for prepare to implement signature generation. Reviewed-by: Jiri Kosina Signed-off-by: Lee, Chun-Yi --- crypto/asymmetric_keys/private_key.h | 29 + crypto/asymmetric_keys/public_key.c

[RFC PATCH 00/18 v3] Signature verification of hibernate snapshot

2013-08-22 Thread Lee, Chun-Yi
ign Josh Boyer (1): Secure boot: Add a dummy kernel parameter that will switch on Secure Boot mode Lee, Chun-Yi (15): asymmetric keys: add interface and skeleton for implement signature generation asymmetric keys: implement EMSA_PKCS1-v1_5-ENCODE in rsa asymmetric keys: separate th

[PATCH 01/18] asymmetric keys: add interface and skeleton for implement signature generation

2013-08-22 Thread Lee, Chun-Yi
Add generate_signature interface on signature.c, asymmetric-subtype and rsa.c for prepare to implement signature generation. Reviewed-by: Jiri Kosina Signed-off-by: Lee, Chun-Yi --- crypto/asymmetric_keys/private_key.h | 29 + crypto/asymmetric_keys/public_key.c

[PATCH 02/18] asymmetric keys: implement EMSA_PKCS1-v1_5-ENCODE in rsa

2013-08-22 Thread Lee, Chun-Yi
ature after implement RSASP1. Reviewed-by: Jiri Kosina Signed-off-by: Lee, Chun-Yi --- crypto/asymmetric_keys/rsa.c | 158 +- include/crypto/public_key.h |2 + 2 files changed, 158 insertions(+), 2 deletions(-) diff --git a/crypto/asymmetric_keys/rsa

[PATCH 04/18] asymmetric keys: implement OS2IP in rsa

2013-08-22 Thread Lee, Chun-Yi
Implement Octet String to Integer conversion [RFC3447 sec 4.2] in rsa.c. It's the second step of signature generation operation. This patch is temporary set non-RSASP1 message to pks->S for debugging. Reviewed-by: Jiri Kosina Signed-off-by: Lee, Chun-Yi --- crypto/asymmetric_keys/rsa.

[PATCH 03/18] asymmetric keys: separate the length checking of octet string from RSA_I2OSP

2013-08-22 Thread Lee, Chun-Yi
: Lee, Chun-Yi --- crypto/asymmetric_keys/rsa.c | 33 - 1 files changed, 24 insertions(+), 9 deletions(-) diff --git a/crypto/asymmetric_keys/rsa.c b/crypto/asymmetric_keys/rsa.c index 6996ff7..c26ae77 100644 --- a/crypto/asymmetric_keys/rsa.c +++ b/crypto/asymmetric

[PATCH 07/18] asymmetric keys: explicitly add the leading zero byte to encoded message

2013-08-22 Thread Lee, Chun-Yi
te to zero in EM and copy the remaining bytes from _EM. Reviewed-by: Jiri Kosina Signed-off-by: Lee, Chun-Yi --- crypto/asymmetric_keys/rsa.c | 14 ++ 1 files changed, 10 insertions(+), 4 deletions(-) diff --git a/crypto/asymmetric_keys/rsa.c b/crypto/asymmetric_keys/rsa.c in

[PATCH 05/18] asymmetric keys: implement RSASP1

2013-08-22 Thread Lee, Chun-Yi
Implement RSASP1 and fill-in the following data to public key signature structure: signature length (pkcs->k), signature octet strings (pks->S) and MPI of signature (pks->rsa.s). Reviewed-by: Jiri Kosina Signed-off-by: Lee, Chun-Yi --- crypto/asymmetric_keys/rsa

[PATCH 06/18] asymmetric keys: support parsing PKCS #8 private key information

2013-08-22 Thread Lee, Chun-Yi
tificate parser + * + * Copyright (C) 2013 SUSE Linux Products GmbH. All rights reserved. + * Written by Lee, Chun-Yi (j...@suse.com) + * + * This program is free software; you can redistribute it and/or + * modify it under the terms of the GNU General Public Licence + * as published by the Free Soft

[PATCH 08/18] Secure boot: Add new capability

2013-08-22 Thread Lee, Chun-Yi
27;ll then strip it from the initial capability set if required. Signed-off-by: Matthew Garrett Acked-by: Lee, Chun-Yi Signed-off-by: Lee, Chun-Yi --- include/uapi/linux/capability.h |6 +- 1 files changed, 5 insertions(+), 1 deletions(-) diff --git a/include/uapi/linux/capability.h b/in

[PATCH 11/18] Hibernate: introduced RSA key-pair to verify signature of snapshot

2013-08-22 Thread Lee, Chun-Yi
depends on EFI_STUB" in Kconfig v2: Add CONFIG_SNAPSHOT_VERIFICATION for build of hibernate_keys.c depend on Kconfig. Cc: Matthew Garrett Cc: Takashi Iwai Reviewed-by: Jiri Kosina Signed-off-by: Lee, Chun-Yi --- arch/x86/boot/compressed/eboot.c | 89 ++ arch/x86/in

[PATCH 09/18] Secure boot: Add a dummy kernel parameter that will switch on Secure Boot mode

2013-08-22 Thread Lee, Chun-Yi
Chun-Yi Signed-off-by: Lee, Chun-Yi --- Documentation/kernel-parameters.txt |7 +++ kernel/cred.c | 17 + 2 files changed, 24 insertions(+), 0 deletions(-) diff --git a/Documentation/kernel-parameters.txt b/Documentation/kernel-parameters.txt

[PATCH 10/18] efi: Enable secure boot lockdown automatically when enabled in firmware

2013-08-22 Thread Lee, Chun-Yi
. Signed-off-by: Matthew Garrett Signed-off-by: Josh Boyer Acked-by: Lee, Chun-Yi Signed-off-by: Lee, Chun-Yi --- Documentation/x86/zero-page.txt|2 ++ arch/x86/boot/compressed/eboot.c | 32 arch/x86/include/asm/bootparam_utils.h |8

[PATCH 13/18] Hibernate: Avoid S4 sign key data included in snapshot image

2013-08-22 Thread Lee, Chun-Yi
This patch add swsusp_page_is_sign_key() method to hibernate_key.c and check the page is S4 sign key data when collect saveable page in snapshot.c to avoid sign key data included in snapshot image. Reviewed-by: Jiri Kosina Signed-off-by: Lee, Chun-Yi --- kernel/power/snapshot.c |6

[PATCH 16/18] Hibernate: show the verification time for monitor performance

2013-08-22 Thread Lee, Chun-Yi
Show the verification time for monitor the performance of SHA256 and RSA verification. Reviewed-by: Jiri Kosina Signed-off-by: Lee, Chun-Yi --- kernel/power/snapshot.c |7 +++ 1 files changed, 7 insertions(+), 0 deletions(-) diff --git a/kernel/power/snapshot.c b/kernel/power

[PATCH 12/18] Hibernate: generate and verify signature of snapshot

2013-08-22 Thread Lee, Chun-Yi
to resume target kernel but don't need write new private key to any other storage, e.g. swap. Cc: Matthew Garrett Reviewed-by: Jiri Kosina Signed-off-by: Lee, Chun-Yi --- kernel/power/power.h|6 + kernel/power/snapshot.c | 280 +- k

[PATCH 14/18] Hibernate: applied SNAPSHOT_VERIFICATION config to switch signature check

2013-08-22 Thread Lee, Chun-Yi
This patch applied SNAPSHOT_VERIFICATION kernel config for switching signature check of hibernate snapshot image. Reviewed-by: Jiri Kosina Signed-off-by: Lee, Chun-Yi --- kernel/power/snapshot.c | 19 +++ kernel/power/swap.c | 30 +++--- kernel

[PATCH 15/18] Hibernate: adapt to UEFI secure boot with signature check

2013-08-22 Thread Lee, Chun-Yi
e any keys from bootloader. v2: Replace sign_key_data_loaded() by skey_data_available() to check sign key data is available for hibernate. Reviewed-by: Jiri Kosina Signed-off-by: Lee, Chun-Yi --- kernel/power/hibernate.c | 36 +- kernel/power/main.c | 11 +- kernel/

[PATCH 17/18] Hibernate: introduced SNAPSHOT_SIG_HASH config for select hash algorithm

2013-08-22 Thread Lee, Chun-Yi
This patch introduced SNAPSHOT_SIG_HASH config for user to select which hash algorithm will be used during signature generation of snapshot. v2: Add define check of oCONFIG_SNAPSHOT_VERIFICATION in snapshot.c before declare pkey_hash(). Reviewed-by: Jiri Kosina Signed-off-by: Lee, Chun-Yi

[PATCH 18/18] Hibernate: notify bootloader regenerate key-pair for snapshot verification

2013-08-22 Thread Lee, Chun-Yi
. Userland hibernate tool can write GenS4Key at runtime, kernel will respect the value but not overwrite it when S4. This mechanism let userland tool can also notify bootloader to regenerate key-pair through GenS4Key flag. Cc: Matthew Garrett Signed-off-by: Lee, Chun-Yi --- kernel/power/Kconfig

[PATCH] efivarfs: fix abnormal GUID in variable name by using strcpy to replace null with dash

2013-02-28 Thread Lee, Chun-Yi
ached before GUID. Tested on On HP z220. Cc: Matt Fleming Cc: Josh Boyer Cc: Jeremy Kerr Cc: Michael Schroeder Reported-by: Frederic Crozat Tested-by: Frederic Crozat Signed-off-by: Lee, Chun-Yi --- drivers/firmware/efivars.c |2 +- 1 files changed, 1 insertions(+), 1 deletion

[PATCH 1/2 v2] acpi: video: add function to support unregister backlight interface

2013-05-13 Thread Lee, Chun-Yi
: Also unregister cooling devices. Tested-by: Andrzej Krentosz Cc: Carlos Corbacho Cc: Matthew Garrett Cc: Dmitry Torokhov Cc: Corentin Chary Cc: Rafael J. Wysocki Cc: Aaron Lu Cc: Thomas Renninger Signed-off-by: Lee, Chun-Yi --- drivers/acpi/video.c | 54

[PATCH 2/2 v2] acer-wmi: add Acer Aspire 5750G to video vendor list but keep acpi video driver

2013-05-13 Thread Lee, Chun-Yi
d the information statement of keeping acpi video driver. Tested-by: Andrzej Krentosz Cc: Carlos Corbacho Cc: Matthew Garrett Cc: Dmitry Torokhov Cc: Corentin Chary Cc: Rafael J. Wysocki Cc: Aaron Lu Cc: Thomas Renninger Signed-off-by: Lee, Chun-Yi --- drivers/platform/x86/acer-wmi.c |

[PATCH v2 1/2] acpi: video: add function to support unregister backlight interface

2013-05-15 Thread Lee, Chun-Yi
: Also unregister cooling devices. Tested-by: Andrzej Krentosz Cc: Zhang Rui Cc: Len Brown Cc: Rafael J. Wysocki Cc: Carlos Corbacho Cc: Matthew Garrett Cc: Dmitry Torokhov Cc: Corentin Chary Cc: Aaron Lu Cc: Thomas Renninger Signed-off-by: Lee, Chun-Yi --- drivers/acpi/video.c | 54

[PATCH v2 2/2] acer-wmi: add Acer Aspire 5750G to video vendor list but keep acpi video driver

2013-05-15 Thread Lee, Chun-Yi
d the information statement of keeping acpi video driver. Tested-by: Andrzej Krentosz Cc: Zhang Rui Cc: Len Brown Cc: Carlos Corbacho Cc: Matthew Garrett Cc: Dmitry Torokhov Cc: Corentin Chary Cc: Rafael J. Wysocki Cc: Aaron Lu Cc: Thomas Renninger Signed-off-by: Lee, Chun-Yi --- drivers/platfor

[PATCH] x86, efi: initial the local variable of DataSize to zero

2013-05-02 Thread Lee, Chun-Yi
ire V3 BIOS, it will not return the size of data if we input a non-zero DataSize. Cc: Matthew Garrett Cc: Matt Fleming Cc: H. Peter Anvin Signed-off-by: Lee, Chun-Yi --- arch/x86/platform/efi/efi.c |2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git a/arch/x86/platform/efi/

[PATCH] x86, efi: initial the local variable of DataSize to zero

2013-04-26 Thread Lee, Chun-Yi
e of data if we input a non-zero DataSize. Cc: Matthew Garrett Cc: Matt Fleming Cc: H. Peter Anvin Signed-off-by: Lee, Chun-Yi --- arch/x86/platform/efi/efi.c |2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git a/arch/x86/platform/efi/efi.c b/arch/x86/platform/efi/efi.

[PATCH v3] X.509: Support parse long form of length octets in Authority Key Identifier

2013-03-29 Thread Lee, Chun-Yi
From: Chun-Yi Lee Per X.509 spec in 4.2.1.1 section, the structure of Authority Key Identifier Extension is: AuthorityKeyIdentifier ::= SEQUENCE { keyIdentifier [0] KeyIdentifier OPTIONAL, authorityCertIssuer [1] GeneralNamesOPTIONAL,

[PATCH] efivars: allow efi pstore variable when validate filename

2013-03-11 Thread Lee, Chun-Yi
ass the "GUID should be right after the first '-'" check. This patch allow the variable name that has 'dump-type' pass the name check. Cc: Seiji Aguchi Cc: Matthew Garrett Cc: Al Viro Cc: Lingzhu Xiang Signed-off-by: Lee, Chun-Yi --- drivers/firmware/efivar

[PATCH] efivars: allow efi pstore variable when validate filename

2013-03-11 Thread Lee, Chun-Yi
ass the "GUID should be right after the first '-'" check. This patch allow the variable name that has 'dump-type' pass the name check. Cc: Matt Fleming Cc: Seiji Aguchi Cc: Matthew Garrett Cc: Al Viro Cc: Lingzhu Xiang Signed-off-by: Lee, Chun-Yi --- driver

[PATCH v2] X.509: Support parse long form of length octets in Authority Key Identifier

2013-02-14 Thread Lee, Chun-Yi
From: Chun-Yi Lee Per X.509 spec in 4.2.1.1 section, the structure of Authority Key Identifier Extension is: AuthorityKeyIdentifier ::= SEQUENCE { keyIdentifier [0] KeyIdentifier OPTIONAL, authorityCertIssuer [1] GeneralNamesOPTIONAL,

[RESEND][PATCH] gpu: remove gma500 stub driver

2012-12-13 Thread Lee, Chun-Yi
y: Matthew Garrett Acked-by: Greg Kroah-Hartman Signed-off-by: Lee, Chun-Yi --- drivers/gpu/Makefile |2 +- drivers/gpu/stub/Kconfig | 18 drivers/gpu/stub/Makefile |1 - drivers/gpu/stub/poulsbo.c | 64 drivers/vid

[PATCH] acer-wmi: Using zero as the first WMI instance number

2017-06-20 Thread Lee, Chun-Yi
Hart Cc: Andy Shevchenko Cc: Pali Rohár Signed-off-by: "Lee, Chun-Yi" --- drivers/platform/x86/acer-wmi.c | 8 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/drivers/platform/x86/acer-wmi.c b/drivers/platform/x86/acer-wmi.c index 79fa5ab..ef420b6 100644 --- a/

[PATCH v2] acpi: handle the acpi hotplug schedule error

2017-06-21 Thread Lee, Chun-Yi
Shevchenko Signed-off-by: "Lee, Chun-Yi" --- drivers/acpi/bus.c | 9 +++-- 1 file changed, 7 insertions(+), 2 deletions(-) diff --git a/drivers/acpi/bus.c b/drivers/acpi/bus.c index 34fbe02..91adb71 100644 --- a/drivers/acpi/bus.c +++ b/drivers/acpi/bus.c @@ -427,12 +427,17 @@ static

[RFC PATCH v3] acpi: indicate to platform when hot remove returns busy

2017-06-21 Thread Lee, Chun-Yi
) Cc: "Rafael J. Wysocki" Cc: Len Brown Cc: Andy Shevchenko Cc: Michal Hocko Signed-off-by: "Lee, Chun-Yi" --- drivers/acpi/scan.c | 21 +++-- 1 file changed, 15 insertions(+), 6 deletions(-) diff --git a/drivers/acpi/scan.c b/drivers/acpi/scan.c index 3a

[PATCH] efi: setting secure boot flag in EFI stub when the sentinel is tainted.

2017-10-28 Thread Lee, Chun-Yi
ecure boot flag can be kept when the secure mode is not _unset_. Therefore the flag value from EFI stub can also be kept. Reference: https://bugzilla.redhat.com/show_bug.cgi?id=1418360 Signed-off-by: "Lee, Chun-Yi" Cc: Matt Fleming Cc: David Howells Cc: Ard Biesheuvel --- arch/x86/boo

[PATCH] acer-wmi: remove threeg and interface sysfs interfaces

2015-10-05 Thread Lee, Chun-Yi
exposes which ACPI-WMI method used by acer-wmi driver on the machine. The information is already exposed by the acer-wmi initial log. Cc: Carlos Corbacho Cc: Matthew Garrett Cc: Dmitry Torokhov Cc: Corentin Chary Cc: Martin Kepplinger Cc: Darren Hart Signed-off-by: Lee, Chun-Yi --- drivers

[PATCH] x86/PCI: Claim the resources of firmware enabled IOAPIC before children bus

2018-07-24 Thread Lee, Chun-Yi
claims the resources of firmware enabled IOAPIC before children bus. Then kernel gets a chance to reassign the resources of children bus to avoid the conflict. Cc: Bjorn Helgaas Cc: Thomas Gleixner Cc: Ingo Molnar Cc: "H. Peter Anvin" Signed-off-by: "Lee, Chun-Yi"

[PATCH] efi: Fix the size not consistent issue when unmapping memory map

2018-04-12 Thread Lee, Chun-Yi
: Ingo Molnar Signed-off-by: "Lee, Chun-Yi" --- drivers/firmware/efi/memmap.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/firmware/efi/memmap.c b/drivers/firmware/efi/memmap.c index 5fc7052..1f592d8 100644 --- a/drivers/firmware/efi/memmap.c +++ b/dr

[PATCH v2] ACPI / scan: Send the change uevent with offine environmental data

2018-03-19 Thread Lee, Chun-Yi
ocko Signed-off-by: "Lee, Chun-Yi" --- drivers/acpi/scan.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/drivers/acpi/scan.c b/drivers/acpi/scan.c index 8e63d93..490498e 100644 --- a/drivers/acpi/scan.c +++ b/drivers/acpi/scan.c @@ -116,6 +116,7 @@ bool acpi_scan_

[PATCH 0/5 v2] Using the hash in MOKx to blacklist kernel module

2018-03-13 Thread Lee, Chun-Yi
error message prints out appropriate status string for reading by human being. v2: Chekcikng the attributes of db and mok before loading certificates. Lee, Chun-Yi (5): MODSIGN: do not load mok when secure boot disabled MODSIGN: print appropriate status message when getting UEFI certificates

[PATCH 2/5] MODSIGN: print appropriate status message when getting UEFI certificates list

2018-03-13 Thread Lee, Chun-Yi
t get UEFI MokListRT: EFI_NOT_FOUND [0.788537] MODSIGN: Couldn't get UEFI MokListXRT: EFI_NOT_FOUND Cc: David Howells Cc: Josh Boyer Cc: James Bottomley Signed-off-by: Lee, Chun-Yi --- certs/load_uefi.c | 43 ++- include/l

[PATCH 1/5] MODSIGN: do not load mok when secure boot disabled

2018-03-13 Thread Lee, Chun-Yi
Josh Boyer Cc: James Bottomley Signed-off-by: Lee, Chun-Yi --- certs/load_uefi.c | 26 +++--- 1 file changed, 15 insertions(+), 11 deletions(-) diff --git a/certs/load_uefi.c b/certs/load_uefi.c index 3d88459..d6de4d0 100644 --- a/certs/load_uefi.c +++ b/certs/load_u

[PATCH 5/5] MODSIGN: check the attributes of db and mok

2018-03-13 Thread Lee, Chun-Yi
bit before we trust it. Cc: David Howells Cc: Josh Boyer Cc: James Bottomley Signed-off-by: "Lee, Chun-Yi" --- certs/load_uefi.c | 35 +++ 1 file changed, 23 insertions(+), 12 deletions(-) diff --git a/certs/load_uefi.c b/certs/load_uefi.c index dc6

[PATCH 4/5] MODSIGN: checking the blacklisted hash before loading a kernel module

2018-03-13 Thread Lee, Chun-Yi
, the hash can be compared by kernel. Cc: David Howells Cc: Josh Boyer Cc: James Bottomley Signed-off-by: "Lee, Chun-Yi" --- kernel/module_signing.c | 62 +++-- 1 file changed, 60 insertions(+), 2 deletions(-) diff --git a/kernel/module_sig

[PATCH 2/5] MODSIGN: print appropriate status message when getting UEFI certificates list

2018-03-13 Thread Lee, Chun-Yi
t get UEFI MokListRT: EFI_NOT_FOUND [0.788537] MODSIGN: Couldn't get UEFI MokListXRT: EFI_NOT_FOUND Cc: David Howells Cc: Josh Boyer Cc: James Bottomley Signed-off-by: "Lee, Chun-Yi" --- certs/load_uefi.c | 43 ++-

[PATCH 3/5] MODSIGN: load blacklist from MOKx

2018-03-13 Thread Lee, Chun-Yi
This patch adds the logic to load the blacklisted hash and certificates from MOKx which is maintained by shim bootloader. Cc: David Howells Cc: Josh Boyer Cc: James Bottomley Signed-off-by: "Lee, Chun-Yi" --- certs/load_uefi.c | 16 +--- 1 file changed, 13 insert

[PATCH 0/5 v2] Using the hash in MOKx to blacklist kernel module

2018-03-13 Thread Lee, Chun-Yi
error message prints out appropriate status string for reading by human being. v2: Chekcikng the attributes of db and mok before loading certificates. Lee, Chun-Yi (5): MODSIGN: do not load mok when secure boot disabled MODSIGN: print appropriate status message when getting UEFI certificates

[PATCH 1/5] MODSIGN: do not load mok when secure boot disabled

2018-03-13 Thread Lee, Chun-Yi
Josh Boyer Cc: James Bottomley Signed-off-by: "Lee, Chun-Yi" --- certs/load_uefi.c | 26 +++--- 1 file changed, 15 insertions(+), 11 deletions(-) diff --git a/certs/load_uefi.c b/certs/load_uefi.c index 3d88459..d6de4d0 100644 --- a/certs/load_uefi.c +++ b/ce

[PATCH 0/5 v2][RFC] Encryption and authentication for hibernate snapshot image

2019-01-03 Thread Lee, Chun-Yi
Pavel Machek Cc: Chen Yu Cc: Oliver Neukum Cc: Ryan Chen Cc: David Howells Cc: Giovanni Gherdovich Cc: Randy Dunlap Cc: Jann Horn Cc: Andy Lutomirski Signed-off-by: "Lee, Chun-Yi" Lee, Chun-Yi (5): PM / hibernate: Create snapshot keys handler PM / hibernate: Generate and

[PATCH 1/5 v2] PM / hibernate: Create snapshot keys handler

2019-01-03 Thread Lee, Chun-Yi
g. Cc: "Rafael J. Wysocki" Cc: Pavel Machek Cc: Chen Yu Cc: Oliver Neukum Cc: Ryan Chen Cc: David Howells Cc: Giovanni Gherdovich Cc: Randy Dunlap Cc: Jann Horn Cc: Andy Lutomirski Signed-off-by: "Lee, Chun-Yi" --- kernel/power/Kconfig| 14 +++ kernel/power

[PATCH 2/5] PM / hibernate: Generate and verify signature for snapshot image

2019-01-03 Thread Lee, Chun-Yi
ael J. Wysocki" Cc: Pavel Machek Cc: Chen Yu Cc: Oliver Neukum Cc: Ryan Chen Cc: David Howells Cc: Giovanni Gherdovich Cc: Randy Dunlap Cc: Jann Horn Cc: Andy Lutomirski Signed-off-by: "Lee, Chun-Yi" --- kernel/power/hibernate.c | 18 ++- kernel/power/power.h | 2

[PATCH 4/5 v2] PM / hibernate: Erase the snapshot master key in snapshot pages

2019-01-03 Thread Lee, Chun-Yi
Lutomirski Signed-off-by: "Lee, Chun-Yi" --- kernel/power/power.h| 6 kernel/power/snapshot.c | 5 kernel/power/snapshot_key.c | 67 + 3 files changed, 78 insertions(+) diff --git a/kernel/power/power.h b/kernel

[PATCH 3/5] PM / hibernate: Encrypt snapshot image

2019-01-03 Thread Lee, Chun-Yi
y. And the initialization vector will be kept in snapshot header for resuming. Cc: "Rafael J. Wysocki" Cc: Pavel Machek Cc: Chen Yu Cc: Oliver Neukum Cc: Ryan Chen Cc: David Howells Cc: Giovanni Gherdovich Cc: Randy Dunlap Cc: Jann Horn Cc: Andy Lutomirski Signed-off-by: "Lee, Ch

[PATCH 5/5 v2] PM / hibernate: An option to request that snapshot image must be authenticated

2019-01-03 Thread Lee, Chun-Yi
Kconfig Cc: "Rafael J. Wysocki" Cc: Pavel Machek Cc: Chen Yu Cc: Oliver Neukum Cc: Ryan Chen Cc: David Howells Cc: Giovanni Gherdovich Cc: Randy Dunlap Cc: Jann Horn Cc: Andy Lutomirski Signed-off-by: "Lee, Chun-Yi" --- Documentation/admin-guide/kernel-parameters.tx

[PATCH 1/2] sysfs: Add hook for checking the file capable for opener

2018-12-30 Thread Lee, Chun-Yi
achek Cc: Len Brown Cc: "Martin K. Petersen" Cc: Randy Dunlap Cc: Joe Perches Cc: Bart Van Assche Signed-off-by: "Lee, Chun-Yi" --- fs/sysfs/file.c | 8 include/linux/kobject.h | 2 ++ include/linux/sysfs.h | 2 ++ lib/kobject.c | 26 +++

[PATCH 0/2] [RFC] sysfs: Add hook for checking the file capability of opener

2018-12-30 Thread Lee, Chun-Yi
capability. Cc: Greg Kroah-Hartman Cc: "Rafael J. Wysocki" Cc: Chen Yu Cc: Giovanni Gherdovich Cc: Jann Horn Cc: Andy Lutomirski Cc: Pavel Machek Cc: Len Brown Cc: "Martin K. Petersen" Cc: Randy Dunlap Cc: Joe Perches Cc: Bart Van Assche Signed-off-by: "Lee, C

[PATCH 2/2] PM / Sleep: Check the file capability when writing wake lock interface

2018-12-30 Thread Lee, Chun-Yi
oah-Hartman Cc: "Rafael J. Wysocki" Cc: Chen Yu Cc: Giovanni Gherdovich Cc: Jann Horn Cc: Andy Lutomirski Cc: Pavel Machek Cc: Len Brown Cc: "Martin K. Petersen" Cc: Randy Dunlap Cc: Joe Perches Cc: Bart Van Assche Signed-off-by: "Lee, Chun-Yi" --- kernel/p

[PATCH v5 0/4] Check codeSigning extended key usage extension

2021-04-08 Thread Lee, Chun-Yi
option example for generating CodeSign EKU to module-signing.rst document. v2: Changed the help wording in the Kconfig. Lee, Chun-Yi (4): X.509: Add CodeSigning extended key usage parsing PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification modsign: Add

[PATCH 1/4] X.509: Add CodeSigning extended key usage parsing

2021-04-08 Thread Lee, Chun-Yi
This patch adds the logic for parsing the CodeSign extended key usage extension in X.509. The parsing result will be set to the eku flag which is carried by public key. It can be used in the PKCS#7 verification. Signed-off-by: "Lee, Chun-Yi" --- crypto/asymmetric_keys/x509_cert_par

[PATCH 2/4] PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification

2021-04-08 Thread Lee, Chun-Yi
This patch adds the logic for checking the CodeSigning extended key usage when verifying signature of kernel module or kexec PE binary in PKCS#7. Signed-off-by: "Lee, Chun-Yi" --- certs/system_keyring.c | 2 +- crypto/asymmetric_keys/Kconfig | 9 +++

[PATCH 3/4] modsign: Add codeSigning EKU when generating X.509 key generation config

2021-04-08 Thread Lee, Chun-Yi
Add codeSigning EKU to the X.509 key generation config for the build time autogenerated kernel key. Signed-off-by: "Lee, Chun-Yi" --- certs/Makefile | 1 + 1 file changed, 1 insertion(+) diff --git a/certs/Makefile b/certs/Makefile index f4c25b67aad9..1ef4d6ca43b7 100644 --- a/cert

[PATCH 4/4] Documentation/admin-guide/module-signing.rst: add openssl command option example for CodeSign EKU

2021-04-08 Thread Lee, Chun-Yi
Add an openssl command option example for generating CodeSign extended key usage in X.509 when CONFIG_CHECK_CODESIGN_EKU is enabled. Signed-off-by: "Lee, Chun-Yi" --- Documentation/admin-guide/module-signing.rst | 6 ++ 1 file changed, 6 insertions(+) diff --git a/Documentation/a

[PATCH] efi: Fix the size not consistent issue when unmapping memory map

2018-05-01 Thread Lee, Chun-Yi
Biesheuvel Cc: Takashi Iwai Cc: Vivek Goyal Cc: Ingo Molnar Tested-by: Randy Wright Signed-off-by: "Lee, Chun-Yi" --- drivers/firmware/efi/memmap.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/firmware/efi/memmap.c b/drivers/firmware/efi/memmap.c index 5

[PATCH] efi/efivars: create efivars mount point when get variable services are available

2020-08-19 Thread Lee, Chun-Yi
Apalodimas Cc: Ard Biesheuvel Signed-off-by: "Lee, Chun-Yi" --- drivers/firmware/efi/efi.c | 13 - 1 file changed, 8 insertions(+), 5 deletions(-) diff --git a/drivers/firmware/efi/efi.c b/drivers/firmware/efi/efi.c index fdd1db025dbf..929fbf4dfd5d 100644 --- a/drivers/fi

  1   2   3   >