Received: by 2002:ac0:a582:0:0:0:0:0 with SMTP id m2-v6csp5109600imm; Tue, 9 Oct 2018 09:48:39 -0700 (PDT) X-Google-Smtp-Source: ACcGV62P2NDNyP1FeL4CyaMmLIl5gR1Nb99etbEVcKfBozvsdZmAYW2IuqEvHrcplbi6VWXGDRb1 X-Received: by 2002:a63:db44:: with SMTP id x4-v6mr26458226pgi.285.1539103719518; Tue, 09 Oct 2018 09:48:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1539103719; cv=none; d=google.com; s=arc-20160816; b=Bae5IlI1/KJmJ9BA4sA8Hp4/r8bE/w58Xea6PRafPonHYs7c1paya2/YxWAMifqNBB KO66CiGIcl+BtKM4RXw1S0eWqjsYFbbkwYWpJKiebfH7Q/qmKnBQEF95ou14hJByAQye /eBO90N+kCru3FORBzBk2tmS/9+xfzTPztwIsSx47ikhEmO6s24TUopH/K/XBgIcbgOp zj44XHDJAMyhZZNEt/3jZPTKT50+dqIrN0ynLIubs8MstLaAQBzAQ9CGwLYuxyFCSpTc C/jtpmlYRCl+qUrNNs+s4zM6fHjhtlqFpJeKxlXoHCvIsCjrl5QTCPQCVI9pDfNgGhLN TYsw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:cc:to:from :subject:organization; bh=XUf9OKxr4qK+mJ+Rz0tzqY6Xk6xLrB5/Y4CTSC9u6gM=; b=EOWFGOZ4uGZKHLEHaZwagLAV1ho+pshvHRBVOvp/1XDtgp570a0gKYr01nKwN5Xxb/ cqs5etlCZ5Wg8RPxH5mp6ip+5ABerBz9p8qvmG/12jOMXbTtnX45XEb41jCrb6qIDcW0 +zQWGMWcPG0rF+GFXURB0aF5NzwPoV5fQLZIda0/1r/8pteKNlsCPRlPI3xbzyRUb3hO 1SLxklYH5P5VZScc4Z3XtnXDL22PDEl2vgdK47N73ZC+pQjujjxTAb3myKi6fCPHArNM HQpI78yilt+XZ+MSJxFzH3yD8SdYj1XpfMrxP1BgQS4OOExqeMZRHRFZEwiInRZqeOqn yOfg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y5-v6si21535781plt.438.2018.10.09.09.48.25; Tue, 09 Oct 2018 09:48:39 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727268AbeJJAFY (ORCPT + 99 others); Tue, 9 Oct 2018 20:05:24 -0400 Received: from mx1.redhat.com ([209.132.183.28]:52486 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726393AbeJJAFX (ORCPT ); Tue, 9 Oct 2018 20:05:23 -0400 Received: from smtp.corp.redhat.com (int-mx02.intmail.prod.int.phx2.redhat.com [10.5.11.12]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 36AA031B31A; Tue, 9 Oct 2018 16:47:33 +0000 (UTC) Received: from warthog.procyon.org.uk (ovpn-120-149.rdu2.redhat.com [10.10.120.149]) by smtp.corp.redhat.com (Postfix) with ESMTP id C9BD76B498; Tue, 9 Oct 2018 16:47:31 +0000 (UTC) Organization: Red Hat UK Ltd. Registered Address: Red Hat UK Ltd, Amberley Place, 107-111 Peascod Street, Windsor, Berkshire, SI4 1TE, United Kingdom. Registered in England and Wales under Company Registration No. 3798903 Subject: [PATCH 06/22] KEYS: Allow the public_key struct to hold a private key [ver #2] From: David Howells To: jmorris@namei.org Cc: Marcel Holtmann , Marcel Holtmann , Denis Kenzior , Denis Kenzior , dhowells@redhat.com, denkenz@gmail.com, keyrings@vger.kernel.org, linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org Date: Tue, 09 Oct 2018 17:47:31 +0100 Message-ID: <153910365097.12141.17819540114453509322.stgit@warthog.procyon.org.uk> In-Reply-To: <153910360263.12141.6032694262361399627.stgit@warthog.procyon.org.uk> References: <153910360263.12141.6032694262361399627.stgit@warthog.procyon.org.uk> User-Agent: StGit/unknown-version MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit X-Scanned-By: MIMEDefang 2.79 on 10.5.11.12 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.29]); Tue, 09 Oct 2018 16:47:33 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Put a flag in the public_key struct to indicate if the structure is holding a private key. The private key must be held ASN.1 encoded in the format specified in RFC 3447 A.1.2. This is the form required by crypto/rsa.c. The software encryption subtype's verification and query functions then need to select the appropriate crypto function to set the key. Signed-off-by: David Howells Tested-by: Marcel Holtmann Reviewed-by: Marcel Holtmann Reviewed-by: Denis Kenzior Tested-by: Denis Kenzior --- crypto/asymmetric_keys/public_key.c | 14 ++++++++++++-- include/crypto/public_key.h | 1 + 2 files changed, 13 insertions(+), 2 deletions(-) diff --git a/crypto/asymmetric_keys/public_key.c b/crypto/asymmetric_keys/public_key.c index 761bfab352dc..f2dc27897319 100644 --- a/crypto/asymmetric_keys/public_key.c +++ b/crypto/asymmetric_keys/public_key.c @@ -115,7 +115,12 @@ static int software_key_query(const struct kernel_pkey_params *params, if (IS_ERR(tfm)) return PTR_ERR(tfm); - ret = crypto_akcipher_set_pub_key(tfm, pkey->key, pkey->keylen); + if (pkey->key_is_private) + ret = crypto_akcipher_set_priv_key(tfm, + pkey->key, pkey->keylen); + else + ret = crypto_akcipher_set_pub_key(tfm, + pkey->key, pkey->keylen); if (ret < 0) goto error_free_tfm; @@ -170,7 +175,12 @@ int public_key_verify_signature(const struct public_key *pkey, if (!req) goto error_free_tfm; - ret = crypto_akcipher_set_pub_key(tfm, pkey->key, pkey->keylen); + if (pkey->key_is_private) + ret = crypto_akcipher_set_priv_key(tfm, + pkey->key, pkey->keylen); + else + ret = crypto_akcipher_set_pub_key(tfm, + pkey->key, pkey->keylen); if (ret) goto error_free_req; diff --git a/include/crypto/public_key.h b/include/crypto/public_key.h index 3a1047a0195c..be626eac9113 100644 --- a/include/crypto/public_key.h +++ b/include/crypto/public_key.h @@ -25,6 +25,7 @@ struct public_key { void *key; u32 keylen; + bool key_is_private; const char *id_type; const char *pkey_algo; };