Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp57090imm; Wed, 5 Sep 2018 14:56:50 -0700 (PDT) X-Google-Smtp-Source: ANB0Vdb/cmqGLQw+wDtZOQlEZba2zgv38quJ6WqoKIZU8KAOUd7t1TlCQDf4oqBkFK/+6Yp+3i8+ X-Received: by 2002:a62:3909:: with SMTP id g9-v6mr42572610pfa.176.1536184610603; Wed, 05 Sep 2018 14:56:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1536184610; cv=none; d=google.com; s=arc-20160816; b=aBk0qomowWWCbOEcFUn/0Yw1NPDVtQDWKBqkizw3TJPor8bPn8yUvkXsrpBEQm85Wm KTNJr6g4mePFn325QWlKqvqvnX8ktSHrukXn7fa6mPlvjSqCeBV44RuR49tLQzC5TGEQ HLKi3rmb+NvRsW5PbiU2qeLpfS9iCoYJckorIhlPz0S3kjJoMXOK+w2zG20jTH47/ew+ 8ItSz9sq11A1Blh5VA8RIU3KVvQFzclIqrwU3F+/A68gwqobrDOu8seAZ1Fu2F+U4qx/ nIdhXUWd5siyJ69A+9hvRo1QfTv8RY/+17IChdn3jx7+ZESt3h7Vn/HPljfQazZbab7c j88Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:cc:to:from :subject:organization; bh=5siGI9GHbvo86F+nxVup8k2yWXS/OBJWUsA8GU3vSQ0=; b=RBzrGLEf5M6RoAUFWlqG2/EezsMpO4X5k66uPWPkASjtStL6/FDnVrR6g6NqJppzWN 4jqRJYNvdqBhWyqW1yHFwTyy+u4DydjbGj+48VtE7VwTMaWyLrvWy2Okq1gsoSmx5bJa dPHmhn4zbkuflleN3svI9gFP0Rh+QSHieI+4p9NOO0mmrA2+kf7/X0oeJOB0fymfy+Qc kBmFo3WrLyGHeotu4gda4pG/GUzVrmZEPvgBY+25U4GKRUguyjyxsDbusdqhsUoK4eHB xduGxwwxE50Hv832GKjQeVibImn30kgF+cAuMPzKN21FkEddCYRkcOYzsyNdn2eW3OFW F2wg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 64-v6si3416301pfs.7.2018.09.05.14.56.28; Wed, 05 Sep 2018 14:56:50 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727990AbeIFC1I (ORCPT + 99 others); Wed, 5 Sep 2018 22:27:08 -0400 Received: from mx3-rdu2.redhat.com ([66.187.233.73]:44240 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1727682AbeIFC1H (ORCPT ); Wed, 5 Sep 2018 22:27:07 -0400 Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.rdu2.redhat.com [10.11.54.4]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id F035E40216E3; Wed, 5 Sep 2018 21:54:58 +0000 (UTC) Received: from warthog.procyon.org.uk (ovpn-123-84.rdu2.redhat.com [10.10.123.84]) by smtp.corp.redhat.com (Postfix) with ESMTP id 371612027EA0; Wed, 5 Sep 2018 21:54:58 +0000 (UTC) Organization: Red Hat UK Ltd. Registered Address: Red Hat UK Ltd, Amberley Place, 107-111 Peascod Street, Windsor, Berkshire, SI4 1TE, United Kingdom. Registered in England and Wales under Company Registration No. 3798903 Subject: [PATCH 06/22] KEYS: Allow the public_key struct to hold a private key From: David Howells To: jmorris@namei.org Cc: denkenz@gmail.com, keyrings@vger.kernel.org, linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org Date: Wed, 05 Sep 2018 22:54:57 +0100 Message-ID: <153618449772.7946.7781296222641718446.stgit@warthog.procyon.org.uk> In-Reply-To: <153618445730.7946.10001472635835806478.stgit@warthog.procyon.org.uk> References: <153618445730.7946.10001472635835806478.stgit@warthog.procyon.org.uk> User-Agent: StGit/unknown-version MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit X-Scanned-By: MIMEDefang 2.78 on 10.11.54.4 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.5]); Wed, 05 Sep 2018 21:54:59 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.5]); Wed, 05 Sep 2018 21:54:59 +0000 (UTC) for IP:'10.11.54.4' DOMAIN:'int-mx04.intmail.prod.int.rdu2.redhat.com' HELO:'smtp.corp.redhat.com' FROM:'dhowells@redhat.com' RCPT:'' Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Put a flag in the public_key struct to indicate if the structure is holding a private key. The private key must be held ASN.1 encoded in the format specified in RFC 3447 A.1.2. This is the form required by crypto/rsa.c. The software encryption subtype's verification and query functions then need to select the appropriate crypto function to set the key. Signed-off-by: David Howells --- crypto/asymmetric_keys/public_key.c | 14 ++++++++++++-- include/crypto/public_key.h | 1 + 2 files changed, 13 insertions(+), 2 deletions(-) diff --git a/crypto/asymmetric_keys/public_key.c b/crypto/asymmetric_keys/public_key.c index 761bfab352dc..f2dc27897319 100644 --- a/crypto/asymmetric_keys/public_key.c +++ b/crypto/asymmetric_keys/public_key.c @@ -115,7 +115,12 @@ static int software_key_query(const struct kernel_pkey_params *params, if (IS_ERR(tfm)) return PTR_ERR(tfm); - ret = crypto_akcipher_set_pub_key(tfm, pkey->key, pkey->keylen); + if (pkey->key_is_private) + ret = crypto_akcipher_set_priv_key(tfm, + pkey->key, pkey->keylen); + else + ret = crypto_akcipher_set_pub_key(tfm, + pkey->key, pkey->keylen); if (ret < 0) goto error_free_tfm; @@ -170,7 +175,12 @@ int public_key_verify_signature(const struct public_key *pkey, if (!req) goto error_free_tfm; - ret = crypto_akcipher_set_pub_key(tfm, pkey->key, pkey->keylen); + if (pkey->key_is_private) + ret = crypto_akcipher_set_priv_key(tfm, + pkey->key, pkey->keylen); + else + ret = crypto_akcipher_set_pub_key(tfm, + pkey->key, pkey->keylen); if (ret) goto error_free_req; diff --git a/include/crypto/public_key.h b/include/crypto/public_key.h index 3a1047a0195c..be626eac9113 100644 --- a/include/crypto/public_key.h +++ b/include/crypto/public_key.h @@ -25,6 +25,7 @@ struct public_key { void *key; u32 keylen; + bool key_is_private; const char *id_type; const char *pkey_algo; };