1
0
Fork 0

X.509: parse public key parameters from x509 for akcipher

Some public key algorithms (like EC-DSA) keep in parameters field
important data such as digest and curve OIDs (possibly more for
different EC-DSA variants). Thus, just setting a public key (as
for RSA) is not enough.

Append parameters into the key stream for akcipher_set_{pub,priv}_key.
Appended data is: (u32) algo OID, (u32) parameters length, parameters
data.

This does not affect current akcipher API nor RSA ciphers (they could
ignore it). Idea of appending parameters to the key stream is by Herbert
Xu.

Cc: David Howells <dhowells@redhat.com>
Cc: Denis Kenzior <denkenz@gmail.com>
Cc: keyrings@vger.kernel.org
Signed-off-by: Vitaly Chikunov <vt@altlinux.org>
Reviewed-by: Denis Kenzior <denkenz@gmail.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
hifive-unleashed-5.2
Vitaly Chikunov 2019-04-11 18:51:17 +03:00 committed by Herbert Xu
parent 83bc029996
commit f1774cb895
8 changed files with 142 additions and 35 deletions

View File

@ -276,6 +276,10 @@ static int tpm_sign(struct tpm_buf *tb,
return datalen; return datalen;
} }
/* Room to fit two u32 zeros for algo id and parameters length. */
#define SETKEY_PARAMS_SIZE (sizeof(u32) * 2)
/* /*
* Maximum buffer size for the BER/DER encoded public key. The public key * Maximum buffer size for the BER/DER encoded public key. The public key
* is of the form SEQUENCE { INTEGER n, INTEGER e } where n is a maximum 2048 * is of the form SEQUENCE { INTEGER n, INTEGER e } where n is a maximum 2048
@ -286,8 +290,9 @@ static int tpm_sign(struct tpm_buf *tb,
* - 257 bytes of n * - 257 bytes of n
* - max 2 bytes for INTEGER e type/length * - max 2 bytes for INTEGER e type/length
* - 3 bytes of e * - 3 bytes of e
* - 4+4 of zeros for set_pub_key parameters (SETKEY_PARAMS_SIZE)
*/ */
#define PUB_KEY_BUF_SIZE (4 + 4 + 257 + 2 + 3) #define PUB_KEY_BUF_SIZE (4 + 4 + 257 + 2 + 3 + SETKEY_PARAMS_SIZE)
/* /*
* Provide a part of a description of the key for /proc/keys. * Provide a part of a description of the key for /proc/keys.
@ -364,6 +369,8 @@ static uint32_t derive_pub_key(const void *pub_key, uint32_t len, uint8_t *buf)
cur = encode_tag_length(cur, 0x02, sizeof(e)); cur = encode_tag_length(cur, 0x02, sizeof(e));
memcpy(cur, e, sizeof(e)); memcpy(cur, e, sizeof(e));
cur += sizeof(e); cur += sizeof(e);
/* Zero parameters to satisfy set_pub_key ABI. */
memset(cur, 0, SETKEY_PARAMS_SIZE);
return cur - buf; return cur - buf;
} }

View File

@ -45,6 +45,7 @@ void public_key_free(struct public_key *key)
{ {
if (key) { if (key) {
kfree(key->key); kfree(key->key);
kfree(key->params);
kfree(key); kfree(key);
} }
} }
@ -94,6 +95,12 @@ int software_key_determine_akcipher(const char *encoding,
return -ENOPKG; return -ENOPKG;
} }
static u8 *pkey_pack_u32(u8 *dst, u32 val)
{
memcpy(dst, &val, sizeof(val));
return dst + sizeof(val);
}
/* /*
* Query information about a key. * Query information about a key.
*/ */
@ -103,6 +110,7 @@ static int software_key_query(const struct kernel_pkey_params *params,
struct crypto_akcipher *tfm; struct crypto_akcipher *tfm;
struct public_key *pkey = params->key->payload.data[asym_crypto]; struct public_key *pkey = params->key->payload.data[asym_crypto];
char alg_name[CRYPTO_MAX_ALG_NAME]; char alg_name[CRYPTO_MAX_ALG_NAME];
u8 *key, *ptr;
int ret, len; int ret, len;
ret = software_key_determine_akcipher(params->encoding, ret = software_key_determine_akcipher(params->encoding,
@ -115,14 +123,22 @@ static int software_key_query(const struct kernel_pkey_params *params,
if (IS_ERR(tfm)) if (IS_ERR(tfm))
return PTR_ERR(tfm); return PTR_ERR(tfm);
if (pkey->key_is_private) key = kmalloc(pkey->keylen + sizeof(u32) * 2 + pkey->paramlen,
ret = crypto_akcipher_set_priv_key(tfm, GFP_KERNEL);
pkey->key, pkey->keylen); if (!key)
else
ret = crypto_akcipher_set_pub_key(tfm,
pkey->key, pkey->keylen);
if (ret < 0)
goto error_free_tfm; goto error_free_tfm;
memcpy(key, pkey->key, pkey->keylen);
ptr = key + pkey->keylen;
ptr = pkey_pack_u32(ptr, pkey->algo);
ptr = pkey_pack_u32(ptr, pkey->paramlen);
memcpy(ptr, pkey->params, pkey->paramlen);
if (pkey->key_is_private)
ret = crypto_akcipher_set_priv_key(tfm, key, pkey->keylen);
else
ret = crypto_akcipher_set_pub_key(tfm, key, pkey->keylen);
if (ret < 0)
goto error_free_key;
len = crypto_akcipher_maxsize(tfm); len = crypto_akcipher_maxsize(tfm);
info->key_size = len * 8; info->key_size = len * 8;
@ -137,6 +153,8 @@ static int software_key_query(const struct kernel_pkey_params *params,
KEYCTL_SUPPORTS_SIGN); KEYCTL_SUPPORTS_SIGN);
ret = 0; ret = 0;
error_free_key:
kfree(key);
error_free_tfm: error_free_tfm:
crypto_free_akcipher(tfm); crypto_free_akcipher(tfm);
pr_devel("<==%s() = %d\n", __func__, ret); pr_devel("<==%s() = %d\n", __func__, ret);
@ -155,6 +173,7 @@ static int software_key_eds_op(struct kernel_pkey_params *params,
struct crypto_wait cwait; struct crypto_wait cwait;
struct scatterlist in_sg, out_sg; struct scatterlist in_sg, out_sg;
char alg_name[CRYPTO_MAX_ALG_NAME]; char alg_name[CRYPTO_MAX_ALG_NAME];
char *key, *ptr;
int ret; int ret;
pr_devel("==>%s()\n", __func__); pr_devel("==>%s()\n", __func__);
@ -173,15 +192,24 @@ static int software_key_eds_op(struct kernel_pkey_params *params,
if (!req) if (!req)
goto error_free_tfm; goto error_free_tfm;
if (pkey->key_is_private) key = kmalloc(pkey->keylen + sizeof(u32) * 2 + pkey->paramlen,
ret = crypto_akcipher_set_priv_key(tfm, GFP_KERNEL);
pkey->key, pkey->keylen); if (!key)
else
ret = crypto_akcipher_set_pub_key(tfm,
pkey->key, pkey->keylen);
if (ret)
goto error_free_req; goto error_free_req;
memcpy(key, pkey->key, pkey->keylen);
ptr = key + pkey->keylen;
ptr = pkey_pack_u32(ptr, pkey->algo);
ptr = pkey_pack_u32(ptr, pkey->paramlen);
memcpy(ptr, pkey->params, pkey->paramlen);
if (pkey->key_is_private)
ret = crypto_akcipher_set_priv_key(tfm, key, pkey->keylen);
else
ret = crypto_akcipher_set_pub_key(tfm, key, pkey->keylen);
if (ret)
goto error_free_key;
sg_init_one(&in_sg, in, params->in_len); sg_init_one(&in_sg, in, params->in_len);
sg_init_one(&out_sg, out, params->out_len); sg_init_one(&out_sg, out, params->out_len);
akcipher_request_set_crypt(req, &in_sg, &out_sg, params->in_len, akcipher_request_set_crypt(req, &in_sg, &out_sg, params->in_len,
@ -210,6 +238,8 @@ static int software_key_eds_op(struct kernel_pkey_params *params,
if (ret == 0) if (ret == 0)
ret = req->dst_len; ret = req->dst_len;
error_free_key:
kfree(key);
error_free_req: error_free_req:
akcipher_request_free(req); akcipher_request_free(req);
error_free_tfm: error_free_tfm:
@ -229,6 +259,7 @@ int public_key_verify_signature(const struct public_key *pkey,
struct akcipher_request *req; struct akcipher_request *req;
struct scatterlist src_sg[2]; struct scatterlist src_sg[2];
char alg_name[CRYPTO_MAX_ALG_NAME]; char alg_name[CRYPTO_MAX_ALG_NAME];
char *key, *ptr;
int ret; int ret;
pr_devel("==>%s()\n", __func__); pr_devel("==>%s()\n", __func__);
@ -252,15 +283,24 @@ int public_key_verify_signature(const struct public_key *pkey,
if (!req) if (!req)
goto error_free_tfm; goto error_free_tfm;
if (pkey->key_is_private) key = kmalloc(pkey->keylen + sizeof(u32) * 2 + pkey->paramlen,
ret = crypto_akcipher_set_priv_key(tfm, GFP_KERNEL);
pkey->key, pkey->keylen); if (!key)
else
ret = crypto_akcipher_set_pub_key(tfm,
pkey->key, pkey->keylen);
if (ret)
goto error_free_req; goto error_free_req;
memcpy(key, pkey->key, pkey->keylen);
ptr = key + pkey->keylen;
ptr = pkey_pack_u32(ptr, pkey->algo);
ptr = pkey_pack_u32(ptr, pkey->paramlen);
memcpy(ptr, pkey->params, pkey->paramlen);
if (pkey->key_is_private)
ret = crypto_akcipher_set_priv_key(tfm, key, pkey->keylen);
else
ret = crypto_akcipher_set_pub_key(tfm, key, pkey->keylen);
if (ret)
goto error_free_key;
sg_init_table(src_sg, 2); sg_init_table(src_sg, 2);
sg_set_buf(&src_sg[0], sig->s, sig->s_size); sg_set_buf(&src_sg[0], sig->s, sig->s_size);
sg_set_buf(&src_sg[1], sig->digest, sig->digest_size); sg_set_buf(&src_sg[1], sig->digest, sig->digest_size);
@ -272,6 +312,8 @@ int public_key_verify_signature(const struct public_key *pkey,
crypto_req_done, &cwait); crypto_req_done, &cwait);
ret = crypto_wait_req(crypto_akcipher_verify(req), &cwait); ret = crypto_wait_req(crypto_akcipher_verify(req), &cwait);
error_free_key:
kfree(key);
error_free_req: error_free_req:
akcipher_request_free(req); akcipher_request_free(req);
error_free_tfm: error_free_tfm:

View File

@ -22,7 +22,7 @@ CertificateSerialNumber ::= INTEGER
AlgorithmIdentifier ::= SEQUENCE { AlgorithmIdentifier ::= SEQUENCE {
algorithm OBJECT IDENTIFIER ({ x509_note_OID }), algorithm OBJECT IDENTIFIER ({ x509_note_OID }),
parameters ANY OPTIONAL parameters ANY OPTIONAL ({ x509_note_params })
} }
Name ::= SEQUENCE OF RelativeDistinguishedName Name ::= SEQUENCE OF RelativeDistinguishedName

View File

@ -26,6 +26,9 @@ struct x509_parse_context {
const void *cert_start; /* Start of cert content */ const void *cert_start; /* Start of cert content */
const void *key; /* Key data */ const void *key; /* Key data */
size_t key_size; /* Size of key data */ size_t key_size; /* Size of key data */
const void *params; /* Key parameters */
size_t params_size; /* Size of key parameters */
enum OID key_algo; /* Public key algorithm */
enum OID last_oid; /* Last OID encountered */ enum OID last_oid; /* Last OID encountered */
enum OID algo_oid; /* Algorithm OID */ enum OID algo_oid; /* Algorithm OID */
unsigned char nr_mpi; /* Number of MPIs stored */ unsigned char nr_mpi; /* Number of MPIs stored */
@ -109,6 +112,13 @@ struct x509_certificate *x509_cert_parse(const void *data, size_t datalen)
cert->pub->keylen = ctx->key_size; cert->pub->keylen = ctx->key_size;
cert->pub->params = kmemdup(ctx->params, ctx->params_size, GFP_KERNEL);
if (!cert->pub->params)
goto error_decode;
cert->pub->paramlen = ctx->params_size;
cert->pub->algo = ctx->key_algo;
/* Grab the signature bits */ /* Grab the signature bits */
ret = x509_get_sig_params(cert); ret = x509_get_sig_params(cert);
if (ret < 0) if (ret < 0)
@ -400,6 +410,27 @@ int x509_note_subject(void *context, size_t hdrlen,
return x509_fabricate_name(ctx, hdrlen, tag, &ctx->cert->subject, vlen); return x509_fabricate_name(ctx, hdrlen, tag, &ctx->cert->subject, vlen);
} }
/*
* Extract the parameters for the public key
*/
int x509_note_params(void *context, size_t hdrlen,
unsigned char tag,
const void *value, size_t vlen)
{
struct x509_parse_context *ctx = context;
/*
* AlgorithmIdentifier is used three times in the x509, we should skip
* first and ignore third, using second one which is after subject and
* before subjectPublicKey.
*/
if (!ctx->cert->raw_subject || ctx->key)
return 0;
ctx->params = value - hdrlen;
ctx->params_size = vlen + hdrlen;
return 0;
}
/* /*
* Extract the data for the public key algorithm * Extract the data for the public key algorithm
*/ */

View File

@ -2585,6 +2585,12 @@ static int alg_test_kpp(const struct alg_test_desc *desc, const char *driver,
return err; return err;
} }
static u8 *test_pack_u32(u8 *dst, u32 val)
{
memcpy(dst, &val, sizeof(val));
return dst + sizeof(val);
}
static int test_akcipher_one(struct crypto_akcipher *tfm, static int test_akcipher_one(struct crypto_akcipher *tfm,
const struct akcipher_testvec *vecs) const struct akcipher_testvec *vecs)
{ {
@ -2599,6 +2605,7 @@ static int test_akcipher_one(struct crypto_akcipher *tfm,
const char *m, *c; const char *m, *c;
unsigned int m_size, c_size; unsigned int m_size, c_size;
const char *op; const char *op;
u8 *key, *ptr;
if (testmgr_alloc_buf(xbuf)) if (testmgr_alloc_buf(xbuf))
return err; return err;
@ -2609,12 +2616,20 @@ static int test_akcipher_one(struct crypto_akcipher *tfm,
crypto_init_wait(&wait); crypto_init_wait(&wait);
key = kmalloc(vecs->key_len + sizeof(u32) * 2 + vecs->param_len,
GFP_KERNEL);
if (!key)
goto free_xbuf;
memcpy(key, vecs->key, vecs->key_len);
ptr = key + vecs->key_len;
ptr = test_pack_u32(ptr, vecs->algo);
ptr = test_pack_u32(ptr, vecs->param_len);
memcpy(ptr, vecs->params, vecs->param_len);
if (vecs->public_key_vec) if (vecs->public_key_vec)
err = crypto_akcipher_set_pub_key(tfm, vecs->key, err = crypto_akcipher_set_pub_key(tfm, key, vecs->key_len);
vecs->key_len);
else else
err = crypto_akcipher_set_priv_key(tfm, vecs->key, err = crypto_akcipher_set_priv_key(tfm, key, vecs->key_len);
vecs->key_len);
if (err) if (err)
goto free_req; goto free_req;
@ -2744,6 +2759,7 @@ free_all:
kfree(outbuf_enc); kfree(outbuf_enc);
free_req: free_req:
akcipher_request_free(req); akcipher_request_free(req);
kfree(key);
free_xbuf: free_xbuf:
testmgr_free_buf(xbuf); testmgr_free_buf(xbuf);
return err; return err;

View File

@ -25,6 +25,8 @@
#ifndef _CRYPTO_TESTMGR_H #ifndef _CRYPTO_TESTMGR_H
#define _CRYPTO_TESTMGR_H #define _CRYPTO_TESTMGR_H
#include <linux/oid_registry.h>
#define MAX_IVLEN 32 #define MAX_IVLEN 32
/* /*
@ -135,13 +137,16 @@ struct drbg_testvec {
struct akcipher_testvec { struct akcipher_testvec {
const unsigned char *key; const unsigned char *key;
const unsigned char *params;
const unsigned char *m; const unsigned char *m;
const unsigned char *c; const unsigned char *c;
unsigned int key_len; unsigned int key_len;
unsigned int param_len;
unsigned int m_size; unsigned int m_size;
unsigned int c_size; unsigned int c_size;
bool public_key_vec; bool public_key_vec;
bool siggen_sigver_test; bool siggen_sigver_test;
enum OID algo;
}; };
struct kpp_testvec { struct kpp_testvec {

View File

@ -74,10 +74,10 @@ struct crypto_akcipher {
* operation * operation
* @set_pub_key: Function invokes the algorithm specific set public key * @set_pub_key: Function invokes the algorithm specific set public key
* function, which knows how to decode and interpret * function, which knows how to decode and interpret
* the BER encoded public key * the BER encoded public key and parameters
* @set_priv_key: Function invokes the algorithm specific set private key * @set_priv_key: Function invokes the algorithm specific set private key
* function, which knows how to decode and interpret * function, which knows how to decode and interpret
* the BER encoded private key * the BER encoded private key and parameters
* @max_size: Function returns dest buffer size required for a given key. * @max_size: Function returns dest buffer size required for a given key.
* @init: Initialize the cryptographic transformation object. * @init: Initialize the cryptographic transformation object.
* This function is used to initialize the cryptographic * This function is used to initialize the cryptographic
@ -379,11 +379,12 @@ static inline int crypto_akcipher_verify(struct akcipher_request *req)
* crypto_akcipher_set_pub_key() - Invoke set public key operation * crypto_akcipher_set_pub_key() - Invoke set public key operation
* *
* Function invokes the algorithm specific set key function, which knows * Function invokes the algorithm specific set key function, which knows
* how to decode and interpret the encoded key * how to decode and interpret the encoded key and parameters
* *
* @tfm: tfm handle * @tfm: tfm handle
* @key: BER encoded public key * @key: BER encoded public key, algo OID, paramlen, BER encoded
* @keylen: length of the key * parameters
* @keylen: length of the key (not including other data)
* *
* Return: zero on success; error code in case of error * Return: zero on success; error code in case of error
*/ */
@ -400,11 +401,12 @@ static inline int crypto_akcipher_set_pub_key(struct crypto_akcipher *tfm,
* crypto_akcipher_set_priv_key() - Invoke set private key operation * crypto_akcipher_set_priv_key() - Invoke set private key operation
* *
* Function invokes the algorithm specific set key function, which knows * Function invokes the algorithm specific set key function, which knows
* how to decode and interpret the encoded key * how to decode and interpret the encoded key and parameters
* *
* @tfm: tfm handle * @tfm: tfm handle
* @key: BER encoded private key * @key: BER encoded private key, algo OID, paramlen, BER encoded
* @keylen: length of the key * parameters
* @keylen: length of the key (not including other data)
* *
* Return: zero on success; error code in case of error * Return: zero on success; error code in case of error
*/ */

View File

@ -15,6 +15,7 @@
#define _LINUX_PUBLIC_KEY_H #define _LINUX_PUBLIC_KEY_H
#include <linux/keyctl.h> #include <linux/keyctl.h>
#include <linux/oid_registry.h>
/* /*
* Cryptographic data for the public-key subtype of the asymmetric key type. * Cryptographic data for the public-key subtype of the asymmetric key type.
@ -25,6 +26,9 @@
struct public_key { struct public_key {
void *key; void *key;
u32 keylen; u32 keylen;
enum OID algo;
void *params;
u32 paramlen;
bool key_is_private; bool key_is_private;
const char *id_type; const char *id_type;
const char *pkey_algo; const char *pkey_algo;