Received: by 10.223.185.116 with SMTP id b49csp4187422wrg; Tue, 6 Mar 2018 11:15:11 -0800 (PST) X-Google-Smtp-Source: AG47ELv0X/b0Q8I3TQ+fYGWomFGAeBeD78TjTd3yjoRl6EYxTa7Zn0geWj14+Ty1d8MTgc940DW+ X-Received: by 10.98.252.22 with SMTP id e22mr19962790pfh.235.1520363711762; Tue, 06 Mar 2018 11:15:11 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1520363711; cv=none; d=google.com; s=arc-20160816; b=dk+FZe1KyhyRBT/enS6Cmth2XYvnXn7sko+qaMTkShQpv4dZMUX8U8ZgVdLk6LZ4gt J5xcvkdrJ0AFYwo/K7HdcNuyC8J3fFni71HDFwbUGryajUaTj8YnZFhAwQY0B38p+HJd cBErGphaauUJkADTTn1Jk494Sh4TV6E72dcMt3XTLpeF5hKGcbo8VE+P8pBqgfhM3lXD NjmzOljWt6Ck2i7tjI+sbQQIm1ObKWxx6hWGmkgMQeLvfZm3+E4cUr8gKlKTJ0NUE9Vh i1Hj2oFpBQkI8G+u0AfyzlrLzT9cGXWaB+0KieHABPfikYwTbjNZ2Upk8KqgfGB10EBo nR1w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:mime-version:user-agent:date:message-id:cc:to :subject:from:arc-authentication-results; bh=tELetn/X/roVqEVkjUVVPM1axjgkfVseIDxRdaO1G1o=; b=wn2IpQ20aHK/e8n9XdXR2yD6UHXx6RIJV/gM0Y3kMaXaOSESTvOkkEV5cUGWpci26I JTzKYJD8P+zCtURJQnCe0fGthoURuaQfxiQyNskG5hhxg95RSYLiyH1jVwllDjGalF/2 YGakiFe+DBcQ/D0tOgWnhkqKsA4ivJLKDkfuxLvwaPwzJoLVANrh26+2z3trrRJJFOhA DX4hxwh0IeDIhjo6cB1aKArrrpqAsG9ApzxH2GidLouZg+K6XKKChX3yA7CMYx5jBmb+ Mshe2jozFZb7HCUhX8AXxelob1KXhQUl2QQqEyWH3oxSgtUJJTtj4zDFkgAoltnNDOgz ZXOA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p17si10200933pge.348.2018.03.06.11.14.57; Tue, 06 Mar 2018 11:15:11 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753917AbeCFTN2 (ORCPT + 99 others); Tue, 6 Mar 2018 14:13:28 -0500 Received: from vps-vb.mhejs.net ([37.28.154.113]:57048 "EHLO vps-vb.mhejs.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750836AbeCFTN1 (ORCPT ); Tue, 6 Mar 2018 14:13:27 -0500 Received: by vps-vb.mhejs.net with esmtps (TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128) (Exim 4.89) (envelope-from ) id 1etI1X-0001rh-Vb; Tue, 06 Mar 2018 20:13:20 +0100 From: "Maciej S. Szmigiero" Subject: [PATCH] X.509: unpack RSA signatureValue field from BIT STRING To: David Howells Cc: Herbert Xu , "David S. Miller" , Tom Lendacky , Gary Hook , keyrings@vger.kernel.org, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org Message-ID: <88da0c24-385c-64a9-6d56-36696d433bc7@maciej.szmigiero.name> Date: Tue, 6 Mar 2018 20:13:18 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.6.0 MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Language: en-US Content-Transfer-Encoding: 7BIT Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The signatureValue field of a X.509 certificate is encoded as a BIT STRING. For RSA signatures this BIT STRING is of so-called primitive subtype, which contains a u8 prefix indicating a count of unused bits in the encoding. We have to strip this prefix from signature data, just as we already do for key data in x509_extract_key_data() function. This wasn't noticed earlier because this prefix byte is zero for RSA key sizes divisible by 8. Since BIT STRING is a big-endian encoding adding zero prefixes has no bearing on its value. The signature length, however was incorrect, which is a problem for RSA implementations that need it to be exactly correct (like AMD CCP). Signed-off-by: Maciej S. Szmigiero Fixes: c26fd69fa009 ("X.509: Add a crypto key parser for binary (DER) X.509 certificates") Cc: stable@vger.kernel.org --- This is a resend without changes of a patch that was previously submitted in one series with CCP driver changes since this particular patch should go through the security (rather than crypto) tree. crypto/asymmetric_keys/x509_cert_parser.c | 9 +++++++++ 1 file changed, 9 insertions(+) diff --git a/crypto/asymmetric_keys/x509_cert_parser.c b/crypto/asymmetric_keys/x509_cert_parser.c index ce2df8c9c583..88c26a4538ae 100644 --- a/crypto/asymmetric_keys/x509_cert_parser.c +++ b/crypto/asymmetric_keys/x509_cert_parser.c @@ -249,6 +249,15 @@ int x509_note_signature(void *context, size_t hdrlen, return -EINVAL; } + if (!strcmp(ctx->cert->sig->pkey_algo, "rsa")) { + /* Discard the BIT STRING metadata */ + if (vlen < 1 || *(const u8 *)value != 0) + return -EBADMSG; + + value++; + vlen--; + } + ctx->cert->raw_sig = value; ctx->cert->raw_sig_size = vlen; return 0;